Veritas Access Appliance Administrator's Guide

Last Published:
Product(s): Appliances (7.4.3)
Platform: Veritas 3340,Access Appliance OS
  1. Section I. Introducing Access Appliance
    1. Introducing Access Appliance
      1.  
        About Access Appliance
      2.  
        About the Access Appliance Dashboard
      3. Getting started with the Access CLISH
        1.  
          Accessing the Access CLISH
        2.  
          Navigating the Access CLISH
        3.  
          Getting help using the Access CLISH
        4.  
          Displaying the command history
        5.  
          Using the more command
  2. Section II. Configuring Access Appliance
    1. Managing users
      1.  
        About user management
      2.  
        About the naming requirements for adding new users
      3.  
        About the naming requirements when assigning roles to domain users
      4.  
        Adding and removing user roles using GUI
      5.  
        Performing user management using CLISH
    2. Configuring the network
      1.  
        About configuring the Access Appliance network
      2.  
        About bonding Ethernet interfaces
      3.  
        Bonding Ethernet interfaces
      4.  
        Configuring DNS settings
      5.  
        About Ethernet interfaces
      6.  
        Displaying current Ethernet interfaces and states
      7.  
        Configuring IP addresses
      8.  
        Configuring VLAN interfaces
      9.  
        Configuring NIC devices
      10.  
        About configuring routing tables
      11.  
        Configuring routing tables
      12.  
        Changing the firewall settings
      13.  
        Configuring Access Appliance in IPv4 and IPv6 mixed mode
      14.  
        Support for multiple data subnets
    3. Configuring authentication services
      1.  
        About configuring LDAP settings
      2.  
        Configuring LDAP server settings
      3.  
        Administering the Access Appliance cluster's LDAP client
      4.  
        About Active Directory (AD)
      5.  
        Configuring AD server settings
      6.  
        Configuring entries for Access Appliance DNS for authenticating to Active Directory (AD)
      7.  
        Configuring AD/LDAP using the GUI
      8.  
        Configuring the NIS-related settings
      9.  
        Configuring NSS lookup order
  3. Section III. Managing Access Appliance storage
    1. Configuring storage
      1.  
        About storage provisioning and management
      2.  
        About configuring disks
      3.  
        About configuring storage pools
      4.  
        Configuring storage pools
      5.  
        About quotas for usage
      6.  
        Enabling, disabling, and displaying the status of file system quotas
      7.  
        Setting and displaying file system quotas
      8.  
        Setting user quotas for users of specified groups
      9.  
        About quotas for CIFS home directories
      10.  
        Workflow for configuring and managing storage using the Access Appliance CLI
      11.  
        Displaying information for all disk devices associated with the nodes in a cluster
      12.  
        Displaying WWN information
      13.  
        Importing new LUNs forcefully for new or existing pools
      14.  
        Initiating host discovery of LUNs
      15.  
        Formatting or reinitializing a disk
      16.  
        Removing a disk
    2. Managing disks
      1.  
        Adding disks to a storage pool
      2.  
        Removing disks from a storage pool
      3.  
        Viewing information about disks
      4.  
        Accessing disk details
      5.  
        Discovering disks
      6.  
        Formatting a disk
    3. Configuring ISCSI
      1.  
        About iSCSI
      2.  
        Configuring the iSCSI initiator
      3.  
        Configuring the iSCSI initiator name
      4.  
        Configuring the iSCSI devices
      5.  
        Configuring discovery on iSCSI
      6.  
        Configuring the iSCSI targets
      7.  
        Modifying tunables for iSCSI
    4. Access Appliance as an iSCSI target
      1.  
        About Access Appliance as an iSCSI target
      2.  
        Managing the iSCSI target service
      3.  
        Managing the iSCSI targets
      4.  
        Managing the LUNs
      5.  
        Managing the mappings with iSCSI initiators
      6.  
        Managing the users
      7.  
        Creating an iSCSI target and provisioning LUNs
      8.  
        Adding an initiator for an iSCSI target
      9.  
        Removing an initiator for an iSCSI target
      10.  
        Adding portal IPs for an iSCSI target
      11.  
        Setting up authentication for an iSCSI target
      12.  
        Viewing the list of initiators for an iSCSI target
      13.  
        Viewing the portal IPs for an iSCSI target
      14.  
        Removing portal IPs for an iSCSI target
      15.  
        Removing authentication settings for an iSCSI target
      16.  
        Removing an iSCSI target
      17.  
        Removing the file system store for an iSCSI target
      18.  
        Viewing the list of LUNs for an iSCSI target
      19.  
        Creating a LUN for an iSCSI target
      20.  
        Increasing the size of a LUN for an iSCSI target
      21.  
        Reducing the size of a LUN for an iSCSI target
      22.  
        Removing a LUN for an iSCSI target
      23.  
        Cloning a LUN for an iSCSI target
      24.  
        Creating a snapshot of a LUN for an iSCSI target
      25.  
        Viewing the list of snapshots for an iSCSI target
      26.  
        Removing a LUN snapshot
      27.  
        Restoring a LUN snapshot
  4. Section IV. Managing Access Appliance file access services
    1. Configuring the NFS server
      1.  
        About using the NFS server with Access Appliance
      2.  
        Using the kernel-based NFS server
      3.  
        Accessing the NFS server
      4.  
        Displaying and resetting NFS statistics
      5.  
        Configuring Access Appliance for ID mapping for NFS version 4
      6.  
        Configuring the NFS client for ID mapping for NFS version 4
      7.  
        About authenticating NFS clients
      8. Setting up Kerberos authentication for NFS clients
        1.  
          Adding and configuring Access Appliance to the Kerberos realm
    2. Using Access Appliance as a CIFS server
      1.  
        About configuring Access Appliance for CIFS
      2.  
        About configuring CIFS for standalone mode
      3.  
        Configuring CIFS server status for standalone mode
      4.  
        Changing security settings
      5. About configuring CIFS for Active Directory (AD) domain mode
        1.  
          Joining Access Appliance to Active Directory (AD)
        2.  
          Verifying that Access Appliance has joined Active Directory (AD) successfully
        3.  
          Using multi-domain controller support in CIFS
        4.  
          About leaving an AD domain
        5.  
          Changing domain settings for AD domain mode
        6.  
          Removing the AD interface
      6.  
        Setting NTLM
      7. About setting trusted domains
        1.  
          Specifying trusted domains that are allowed access to the CIFS server
        2.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
        3.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
        4.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
        5.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
        6.  
          About configuring Windows Active Directory as an IDMAP backend for CIFS
        7.  
          Configuring the Active Directory schema with CIFS-schema extensions
        8.  
          Configuring the LDAP client for authentication using the CLI
        9.  
          Setting Active Directory trusted domains
      8.  
        About storing account information
      9.  
        Storing user and group accounts
      10.  
        Reconfiguring the CIFS service
      11.  
        About mapping user names for CIFS/NFS sharing
      12.  
        About the mapuser commands
      13.  
        Adding, removing, or displaying the mapping between CIFS and NFS users
      14.  
        Automatically mapping UNIX users from LDAP to Windows users
      15. About managing home directories
        1.  
          Setting the home directory file systems
        2.  
          Setting up home directories
        3.  
          Displaying home directory usage information
        4.  
          Deleting home directories and disabling creation of home directories
      16. About CIFS clustering modes
        1.  
          About switching the clustering mode
      17. About migrating CIFS shares and home directories
        1.  
          Migrating CIFS shares and home directories from normal to ctdb clustering mode
        2.  
          Migrating CIFS shares and home directories from ctdb to normal clustering mode
      18.  
        Setting the CIFS aio_fork option
      19. About managing local users and groups
        1.  
          Creating a local CIFS user
        2.  
          Configuring a local group
      20.  
        Enabling CIFS data migration
    3. Configuring an FTP server
      1.  
        About FTP
      2.  
        Creating the FTP home directory
      3.  
        Using the FTP server commands
      4.  
        About FTP server options
      5.  
        Customizing the FTP server options
      6.  
        Administering the FTP sessions
      7.  
        Uploading the FTP logs
      8.  
        Administering the FTP local user accounts
      9.  
        About the settings for the FTP local user accounts
      10.  
        Configuring settings for the FTP local user accounts
    4. Using Access Appliance as an Object Store server
      1.  
        About the Object Store server
      2.  
        Use cases for configuring the Object Store server
      3.  
        Configuring the Object Store server
      4.  
        About buckets and objects
      5.  
        File systems used for objectstore buckets
      6.  
        S3 with NFS use case
      7. Configuring the S3 server using GUI
        1.  
          Setting Object Access server default parameters
        2.  
          Setting up the Object Access server group-specific parameters
        3.  
          Viewing information about S3
        4.  
          Provisioning the S3 bucket using GUI
  5. Section V. Managing Access Appliance security
    1. Setting up FIPS mode
      1.  
        FIPS 140-2 conformance for Access Appliance
      2.  
        Viewing FIPS status for Access Appliance
      3.  
        Enabling FIPS for Access Appliance
      4.  
        To enable FIPS using the command-line interface
    2. Configuring STIG
      1.  
        STIG overview for Access Appliance
      2.  
        Enabling OS STIG hardening for Access Appliance
      3.  
        Viewing STIG status of an Access Appliance
      4.  
        Enabling STIG using the command-line interface
  6. Section VI. Monitoring and troubleshooting
    1. Configuring event notifications and audit logs
      1.  
        About troubleshooting
      2.  
        Monitoring command activity
      3.  
        Monitoring alerts
      4. About alert management
        1.  
          Viewing information about alert management
        2.  
          Managing alerts
      5.  
        Monitoring events
      6.  
        Viewing reports
      7.  
        Viewing cluster storage usage
      8.  
        Viewing file system usage
      9.  
        About event notifications
      10.  
        About severity levels and filters
      11.  
        About SNMP notifications
      12.  
        Configuring an email group
      13.  
        Configuring a syslog server
      14.  
        Exporting events in syslog format to a given URL
      15.  
        Displaying events on the console
      16.  
        Configuring events for event reporting
      17.  
        Configuring an SNMP management server
    2. Appliance log files
      1.  
        About appliance log files
      2.  
        Viewing log files using the Support command
      3.  
        Gathering device logs with the DataCollect command
      4.  
        Downloading logs using the Log Transfer Console
      5.  
        Forwarding logs to an external server
  7. Section VII. Provisioning and managing Access Appliance file systems
    1. Creating and maintaining file systems
      1.  
        About creating and maintaining file systems
      2.  
        About encryption at rest
      3. Considerations for creating a file system
        1.  
          Best practices for creating file systems
        2.  
          Choosing a file system layout type
        3.  
          Determining the initial extent size for a file system
        4.  
          About striping file systems
        5.  
          About creating a tuned file system for a specific workload
        6.  
          About FastResync
        7.  
          About fsck operation
        8.  
          Setting retention in files
        9.  
          Setting WORM over NFS
        10.  
          Manually setting WORM-retention on a file over CIFS
        11. About managing application I/O workloads using maximum IOPS settings
          1.  
            Setting the maximum IOPS
      4.  
        Creating a file system
      5.  
        Bringing the file system online or offline
      6.  
        Listing all file systems and associated information
      7. Modifying a file system
        1.  
          Adding or removing a mirror from a file system
        2.  
          Adding or removing a column from a file system
        3.  
          Increasing the size of a file system
        4.  
          Decreasing the size of a file system
      8. Managing a file system
        1.  
          Defragmenting a file system
        2.  
          Checking and repairing a file system
        3.  
          Configuring FastResync for a file system
        4.  
          Disabling the FastResync option for a file system
        5.  
          Checking and resynchronizing stale mirrors
        6.  
          Setting file system alerts
        7.  
          Displaying file system alert values
        8.  
          Removing file system alerts
      9.  
        Destroying a file system
      10.  
        Upgrading disk layout versions
  8. Section VIII. Provisioning and managing Access Appliance shares
    1. Creating shares for applications
      1.  
        About file sharing protocols
      2.  
        About concurrent access
      3.  
        Sharing directories using CIFS and NFS protocols
      4.  
        Sharing a file system as a CIFS home directory
      5.  
        About concurrent access with NFS and S3
    2. Creating and maintaining NFS shares
      1.  
        About NFS file sharing
      2. About the NFS shares
        1.  
          Creating an NFS share with continuous replication
        2.  
          Creating an NFS share with episodic replication
        3.  
          Creating an NFS share with encryption
        4.  
          Creating an NFS share with episodic replication and encryption
        5.  
          Creating an NFS share without replication and encryption
      3.  
        Displaying file systems and snapshots that can be exported
      4.  
        Exporting an NFS share
      5.  
        Displaying exported directories
      6.  
        About managing NFS shares using netgroups
      7.  
        Unexporting a directory or deleting NFS options
      8.  
        Exporting an NFS share for Kerberos authentication
      9.  
        Mounting an NFS share with Kerberos security from the NFS client
      10.  
        Exporting an NFS snapshot
    3. Creating and maintaining CIFS shares
      1.  
        About managing CIFS shares
      2. About the CIFS shares
        1.  
          Creating a CIFS share with continuous replication
        2.  
          Creating a CIFS share with episodic replication
        3.  
          Creating a CIFS share with encryption
        4.  
          Creating a CIFS share with episodic replication and encryption
        5.  
          Creating a CIFS share without replication and encryption
      3.  
        Exporting a directory as a CIFS share
      4.  
        Configuring a CIFS share as secondary storage for an Enterprise Vault store
      5.  
        Exporting the same file system/directory as a different CIFS share
      6.  
        About the CIFS export options
      7.  
        Setting share properties
      8.  
        Displaying CIFS share properties
      9.  
        Hiding system files when adding a CIFS normal share
      10.  
        Allowing specified users and groups access to the CIFS share
      11.  
        Denying specified users and groups access to the CIFS share
      12.  
        Exporting a CIFS snapshot
      13.  
        Deleting a CIFS share
      14.  
        Modifying a CIFS share
      15.  
        Making a CIFS share shadow copy aware
      16. About managing CIFS shares for Enterprise Vault
        1.  
          Creating a CIFS share for Enterprise Vault with replication
        2.  
          Creating a CIFS share for Enterprise Vault without replication
    4. Using Access Appliance with OpenStack
      1.  
        About the Access Appliance integration with OpenStack
      2. About the Access Appliance integration with OpenStack Cinder
        1. About the Access Appliance integration with OpenStack Cinder architecture
          1. Access Appliance NFS-based Cinder driver
            1.  
              Configuring Access Appliance with OpenStack Cinder
          2.  
            Access Appliance iSCSI based Cinder driver
        2.  
          Configuring OpenStack Cinder
      3. About the Access Appliance integration with OpenStack Manila
        1.  
          OpenStack Manila use cases
        2.  
          Configuring Access Appliance with OpenStack Manila
        3.  
          Creating a new share backend on the OpenStack controller node
        4.  
          Creating an OpenStack Manila share type
        5.  
          Creating an OpenStack Manila file share
        6.  
          Creating an OpenStack Manila share snapshot
    5. Integrating Access Appliance with Data Insight
      1.  
        Access Appliance integration with Data Insight
  9. Section IX. Managing Access Appliance storage services
    1. Compressing files
      1. About compressing files
        1.  
          About the compressed file format
        2.  
          About the file compression attributes
        3.  
          About the file compression block size
      2.  
        Best practices for using compression
      3.  
        Use cases for compressing files
      4. Compression tasks
        1.  
          Compressing files
        2.  
          Showing the scheduled compression job
        3.  
          Scheduling compression jobs
        4.  
          Listing compressed files
        5.  
          Uncompressing files
        6.  
          Modifying the scheduled compression
        7.  
          Removing the specified schedule
        8.  
          Stopping the schedule for a file system
        9.  
          Removing the pattern-related rule for a file system
        10.  
          Removing the modified age related rule for a file system
    2. Configuring episodic replication
      1.  
        About Access Appliance episodic replication
      2.  
        How Access Appliance Replication works
      3.  
        Starting Access Appliance episodic replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file systems to replicate
      6.  
        Setting up files to exclude from an episodic replication unit
      7.  
        Scheduling the episodic replication
      8.  
        Defining what to replicate
      9.  
        About the maximum number of parallel episodic replication jobs
      10.  
        Managing an episodic replication job
      11.  
        Replicating compressed data
      12.  
        Displaying episodic replication job information and status
      13.  
        Synchronizing an episodic replication job
      14.  
        Behavior of the file systems on the episodic replication destination target
      15.  
        Accessing file systems configured as episodic replication destinations
      16. Episodic replication job failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
    3. Configuring continuous replication
      1.  
        About Access Appliance continuous replication
      2. How Access Appliance continuous replication works
        1.  
          How data flows in continuous replication synchronous mode
        2.  
          How data flows in continuous replication asynchronous mode
      3.  
        Starting Access Appliance continuous replication
      4.  
        Setting up communication between the source and the target clusters
      5.  
        Setting up the file system to replicate
      6.  
        Managing continuous replication
      7.  
        Displaying continuous replication information and status
      8.  
        Unconfiguring continuous replication
      9. Continuous replication failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
      10.  
        Addition of multiple file systems to a Replicated Volume Group
    4. Using snapshots
      1.  
        About snapshots
      2.  
        Creating snapshots
      3.  
        Displaying snapshots
      4.  
        Managing disk space used by snapshots
      5.  
        Bringing snapshots online or taking snapshots offline
      6.  
        Restoring a snapshot
      7.  
        About snapshot schedules
      8.  
        Configuring snapshot schedules
      9.  
        Managing automated snapshots
    5. Using instant rollbacks
      1.  
        About instant rollbacks
      2.  
        Creating a space-optimized rollback
      3.  
        Creating a full-sized rollback
      4.  
        Listing Access Appliance instant rollbacks
      5.  
        Restoring a file system from an instant rollback
      6.  
        Refreshing an instant rollback from a file system
      7.  
        Bringing an instant rollback online
      8.  
        Taking an instant rollback offline
      9.  
        Destroying an instant rollback
      10.  
        Creating a shared cache object for Access Appliance instant rollbacks
      11.  
        Listing cache objects
      12.  
        Destroying a cache object of a Access Appliance instant rollback
  10. Section X. Reference
    1. Appendix A. Access Appliance documentation
      1.  
        Using the Access Appliance product documentation
      2.  
        About accessing the online man pages
  11.  
    Index

A

about
Access Appliance continuous replication, About Access Appliance continuous replication
Access Appliance episodic replication, About Access Appliance episodic replication
Active Directory (AD), About Active Directory (AD)
bonding Ethernet interfaces, About bonding Ethernet interfaces
buckets and objects, About buckets and objects
changing share properties, Setting share properties
configuring Access Appliance for CIFS, About configuring Access Appliance for CIFS
configuring CIFS for AD domain mode, About configuring CIFS for Active Directory (AD) domain mode
configuring disks, About configuring disks
configuring in IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
configuring routing tables, About configuring routing tables
configuring storage pools, About configuring storage pools
Continuous replication failover and failback, Continuous replication failover and failback
creating and maintaining file systems, About creating and maintaining file systems
episodic replication job failover and failback, Episodic replication job failover and failback
Ethernet interfaces, About Ethernet interfaces
FTP, About FTP
FTP local user set, About the settings for the FTP local user accounts
FTP set, About FTP server options
iSCSI, About iSCSI
leaving AD domain, About leaving an AD domain
managing CIFS shares, About managing CIFS shares
Multi-protocol support for NFS with S3, S3 with NFS use case
NFS file sharing, About NFS file sharing
setting trusted domains, About setting trusted domains
shares, About file sharing protocols
snapshot schedules, About snapshot schedules
snapshots, About snapshots
storage provisioning and management, About storage provisioning and management
storing account information, About storing account information
striping file systems, About striping file systems
the IP addresses for the Ethernet interfaces, About Ethernet interfaces
About
compressed file format, About the compressed file format
compressing files, About compressing files
concurrent access, About concurrent access
FastResync, About FastResync
file compression attributes, About the file compression attributes
file compression block size, About the file compression block size
integration with OpenStack Cinder, About the Access Appliance integration with OpenStack Cinder
SNMP notifications, About SNMP notifications
about Access Appliance
as an iSCSI target, About Access Appliance as an iSCSI target
About Configuring
network, About configuring the Access Appliance network
about maximum IOPS, About managing application I/O workloads using maximum IOPS settings
about S3
viewing information, Viewing information about S3
Access
accessing the CLISH, Accessing the Access CLISH
Access Appliance
about, About Access Appliance
integration with OpenStack Manila, About the Access Appliance integration with OpenStack Manila
key features, About Access Appliance
product documentation, Using the Access Appliance product documentation
Access Appliance continuous replication
about, About Access Appliance continuous replication
description of feature, How Access Appliance continuous replication works
starting, Starting Access Appliance continuous replication
Access Appliance episodic replication
about, About Access Appliance episodic replication
compression, Replicating compressed data
scheduling, Scheduling the episodic replication
starting, Starting Access Appliance episodic replication
Access Appliance Replication
description of feature, How Access Appliance Replication works
Access Appliance to the Kerberos realm
adding and configuring, Adding and configuring Access Appliance to the Kerberos realm
accessing
Access Appliance product documentation, Using the Access Appliance product documentation
CLISH, Accessing the Access CLISH
disk details, Accessing disk details
episodic replication destinations, Accessing file systems configured as episodic replication destinations
man pages, About accessing the online man pages
Active Directory
setting the trusted domains for, Setting Active Directory trusted domains
Active Directory (AD)
about, About Active Directory (AD)
joining Access Appliance to, Joining Access Appliance to Active Directory (AD)
verifying Access Appliance has joined successfully, Verifying that Access Appliance has joined Active Directory (AD) successfully
activity
monitoring, Monitoring command activity
AD domain mode
changing domain settings, Changing domain settings for AD domain mode
configuring CIFS, About configuring CIFS for Active Directory (AD) domain mode
security settings, Changing domain settings for AD domain mode
AD interface
using, Removing the AD interface
AD trusted domains
disabling, Setting Active Directory trusted domains
add local user
FTP, Administering the FTP local user accounts
adding
a column to a file system, Adding or removing a column from a file system
a severity level to an email group, Configuring an email group
a syslog server, Configuring a syslog server
an email address to a group, Configuring an email group
an email group, Configuring an email group
an initiator for an iSCSI target, Adding an initiator for an iSCSI target
CIFS share, Setting share properties
filter to a group, Configuring an email group
IP address to a cluster, Configuring IP addresses
mirror to a file system, Adding or removing a mirror from a file system
portal IPs for an iSCSI target, Adding portal IPs for an iSCSI target
SNMP management server, Configuring an SNMP management server
VLAN interfaces, Configuring VLAN interfaces
adding a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
adding and configuring
Access Appliance to the Kerberos realm, Adding and configuring Access Appliance to the Kerberos realm
aio_fork option
setting, Setting the CIFS aio_fork option
alerts
file system removing, Removing file system alerts
allowing
specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
an initiator for an iSCSI target
adding, Adding an initiator for an iSCSI target
as an iSCSI target
about Access Appliance, About Access Appliance as an iSCSI target
Authenticate
NFS clients, About authenticating NFS clients
authenticating
NFS clients using Kerberos, Setting up Kerberos authentication for NFS clients
authentication
configuring the LDAP client using the CLI, Configuring the LDAP client for authentication using the CLI
authentication for an iSCSI target
removing, Removing authentication settings for an iSCSI target
setting up, Setting up authentication for an iSCSI target

B

best practices
creating file systems, Best practices for creating file systems
Best practices
using compression, Best practices for using compression
bind distinguished name
setting for LDAP server, Configuring LDAP server settings
bonding
Ethernet interfaces, Bonding Ethernet interfaces
bonding Ethernet interfaces
about, About bonding Ethernet interfaces
bringing
file system online or offline, Bringing the file system online or offline
buckets and objects
about, About buckets and objects

C

cache object
destroying for an instant rollback, Destroying a cache object of a Access Appliance instant rollback
cache objects
listing, Listing cache objects
changing
an IP address to online
on any running node, Configuring IP addresses
domain settings for AD domain mode, Changing domain settings for AD domain mode
local CIFS user password, Creating a local CIFS user
security settings, Changing security settings
share properties about, Setting share properties
checking
and repairing a file system, Checking and repairing a file system
for stale mirrors on file systems, Checking and resynchronizing stale mirrors
on the status of the NFS server, Accessing the NFS server
CIFS
allowing specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
configuring schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
denying specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
export options, About the CIFS export options
mapuser commands, About the mapuser commands
standalone mode, About configuring CIFS for standalone mode
using multi-domain controller support, Using multi-domain controller support in CIFS
CIFS aio_fork option
setting, Setting the CIFS aio_fork option
CIFS and NFS protocols
share directories, Sharing directories using CIFS and NFS protocols
CIFS clustering modes
about, About configuring Access Appliance for CIFS
CIFS data migration
enabling, Enabling CIFS data migration
CIFS home directories
quotas, About quotas for CIFS home directories
CIFS operating modes
about, About configuring Access Appliance for CIFS
CIFS server
starting, Reconfiguring the CIFS service
trusted domains that are allowed access, Specifying trusted domains that are allowed access to the CIFS server
CIFS server status
standalone mode, Configuring CIFS server status for standalone mode
CIFS service
standalone mode, Configuring CIFS server status for standalone mode
CIFS share
adding, Setting share properties
deleting, Deleting a CIFS share
exporting as a directory, Exporting a directory as a CIFS share
exporting the same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
making shadow copy aware, Making a CIFS share shadow copy aware
modifying, Modifying a CIFS share
CIFS share and home directory
migrating from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS share for Enterprise Vault with replication
creating, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication
creating, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication
creating, Creating a CIFS share with continuous replication
CIFS share with encryption
creating, Creating a CIFS share with encryption
CIFS share with episodic replication
creating, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption
creating, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption
creating, Creating a CIFS share without replication and encryption
CIFS shares and home directories
migrating from ctdb clustering modes, About migrating CIFS shares and home directories
migrating from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
CIFS snapshot
exporting, Exporting a CIFS snapshot
CIFS/NFS sharing
mapping user names, About mapping user names for CIFS/NFS sharing
clearing
DNS domain names, Configuring DNS settings
DNS name servers, Configuring DNS settings
LDAP configured settings, Configuring LDAP server settings
CLI
configure and manage storage, Workflow for configuring and managing storage using the Access Appliance CLI
client configurations
displaying, Administering the Access Appliance cluster's LDAP client
LDAP server, Administering the Access Appliance cluster's LDAP client
cloning
LUN for an iSCSI target, Cloning a LUN for an iSCSI target
cluster
adding an IP address to, Configuring IP addresses
changing an IP address to online for any running node, Configuring IP addresses
displaying all the IP addresses for, Configuring IP addresses
clustering modes
ctdb, About CIFS clustering modes
collect logs
commands, Viewing log files using the Support command
datacollect, Gathering device logs with the DataCollect command
log file location, Viewing log files using the Support command
types of logs, Viewing log files using the Support command
columns
adding or removing, Adding or removing a column from a file system
command history
displaying, Displaying the command history
Command-Line Interface (CLI)
getting help on how to use, Getting help using the Access CLISH
communicating
source and destination clusters, Setting up communication between the source and the destination clusters
source and target clusters, Setting up communication between the source and the target clusters
Compressed file format
about, About the compressed file format
Compressing files
about, About compressing files
use cases, Use cases for compressing files
compression
tasks, Compression tasks
Concurrent access
about, About concurrent access
concurrent access
NFS and S3, About concurrent access with NFS and S3
Configure and manage storage
CLI, Workflow for configuring and managing storage using the Access Appliance CLI
configuring
Access Appliance for CIFS, About configuring Access Appliance for CIFS
AD schema with CIFS-schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
CIFS for standalone mode, About configuring CIFS for standalone mode
event notifications, Monitoring alerts , About event notifications
IP routing, Configuring routing tables
IPv4 and IPv6 mixed mode, Configuring Access Appliance in IPv4 and IPv6 mixed mode
iSCSI devices, Configuring the iSCSI devices
iSCSI discovery, Configuring discovery on iSCSI
iSCSI initiator, Configuring the iSCSI initiator
iSCSI initiator name, Configuring the iSCSI initiator name
iSCSI targets, Configuring the iSCSI targets
job resynchronization, Synchronizing an episodic replication job
NFS client for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NIC devices, Configuring NIC devices
NSS lookup order, Configuring NSS lookup order
VLAN interfaces, Configuring VLAN interfaces
Windows Active Directory as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
Configuring
Object Store server, Configuring the Object Store server
Configuring Access Appliance
ID mapping for NFS version 4, Configuring Access Appliance for ID mapping for NFS version 4
configuring CIFS share
secondary storage for an Enterprise Vault store, Configuring a CIFS share as secondary storage for an Enterprise Vault store
configuring disks
about, About configuring disks
configuring Ethernet interfaces
about, About Ethernet interfaces
configuring routing tables
about, About configuring routing tables
configuring storage pools
about, About configuring storage pools
Configuring the Object Store server
use case, Use cases for configuring the Object Store server
Considerations
creating a file system, Considerations for creating a file system
continuous replication
display status, Displaying continuous replication information and status
setting up file system, Setting up the file system to replicate
unconfiguring, Unconfiguring continuous replication
Continuous replication failover and failback
about, Continuous replication failover and failback
converting
existing file system into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
creating
CIFS share for Enterprise Vault with replication, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication, Creating a CIFS share with continuous replication
CIFS share with encryption, Creating a CIFS share with encryption
CIFS share with episodic replication, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption, Creating a CIFS share without replication and encryption
full-sized rollback, Creating a full-sized rollback
iSCSI target, Creating an iSCSI target and provisioning LUNs
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
LUN for an iSCSI target, Creating a LUN for an iSCSI target
mirrored file systems, Creating a file system
mirrored-stripe file systems, Creating a file system
NFS share with continuous replication, Creating an NFS share with continuous replication
NFS share with encryption, Creating an NFS share with encryption
NFS share with episodic replication, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption, Creating an NFS share without replication and encryption
OpenStack Manila file share, Creating an OpenStack Manila file share
OpenStack Manila share snapshot, Creating an OpenStack Manila share snapshot
OpenStack Manila share type, Creating an OpenStack Manila share type
share backend on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
simple file systems, Creating a file system
snapshot of a LUN for an iSCSI target, Creating a snapshot of a LUN for an iSCSI target
snapshot schedules, Configuring snapshot schedules
snapshots, Creating snapshots
space-optimized instant rollbacks, Creating a space-optimized rollback
storage pools, Configuring storage pools, Adding disks to a storage pool
striped file systems, Creating a file system
striped-mirror file systems, Creating a file system
Creating a file system
considerations, Considerations for creating a file system
creating and maintaining file systems
about, About creating and maintaining file systems
creating directory
FTP, Creating the FTP home directory
creating file systems
best practices, Best practices for creating file systems
ctdb clustering mode
about, About CIFS clustering modes
directory-level share support, Exporting a directory as a CIFS share
switching the clustering mode, About switching the clustering mode
current Ethernet interfaces and states
displaying, Displaying current Ethernet interfaces and states
customizing server options
FTP, Customizing the FTP server options

D

data flow
continuous replication synchronous mode, How data flows in continuous replication synchronous mode
Data Insight
integrating Access Appliance, Access Appliance integration with Data Insight
datacollect
device logs, Gathering device logs with the DataCollect command
decreasing
size of a file system, Decreasing the size of a file system
defining
what to replicate, Defining what to replicate
defrag, Defragmenting a file system
defragmenting
file systems, Defragmenting a file system
delete local user
FTP, Administering the FTP local user accounts
deleting
CIFS share, Deleting a CIFS share
configured mail server, Configuring an email group
email address from a specified group, Configuring an email group
email groups, Configuring an email group
file system store for an iSCSI target, Removing the file system store for an iSCSI target
filter from a specified group, Configuring an email group
home directories, Deleting home directories and disabling creation of home directories
home directory of given user, Deleting home directories and disabling creation of home directories
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS options, Unexporting a directory or deleting NFS options
route entries from routing tables of nodes in cluster, Configuring routing tables
severity from a specified group, Configuring an email group
snapshot schedules, Managing automated snapshots
syslog server, Configuring a syslog server
VLAN interfaces, Configuring VLAN interfaces
denying
specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
description of Access Appliance continuous replication, How Access Appliance continuous replication works
description of Access Appliance Replication, How Access Appliance Replication works
destroying
a file system, Destroying a file system
cache object of an instant rollback, Destroying a cache object of a Access Appliance instant rollback
instant rollbacks, Destroying an instant rollback
snapshots, Managing disk space used by snapshots
storage pools, Configuring storage pools
directories
displaying exported, Displaying exported directories
unexporting the share, Unexporting a directory or deleting NFS options
directory-level share support
ctdb clustering mode, Exporting a directory as a CIFS share
disabling
AD trusted domains, Setting Active Directory trusted domains
creation of home directories, Deleting home directories and disabling creation of home directories
DNS settings, Configuring DNS settings
FastResync option, Disabling the FastResync option for a file system
LDAP clients
configurations, Administering the Access Appliance cluster's LDAP client
NIS clients, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
disk
formatting, Formatting or reinitializing a disk
removing, Removing a disk
disk layout versions
upgrading, Upgrading disk layout versions
Disk quotas
CIFS, About quotas for usage
file systems, About quotas for usage
usage, About quotas for usage
disks
accessing details about, Accessing disk details
viewing information about, Viewing information about disks
displaying
all the IP addresses for cluster, Configuring IP addresses
command history, Displaying the command history
current Ethernet interfaces and states, Displaying current Ethernet interfaces and states
current list of SNMP management servers, Configuring an SNMP management server
DNS settings, Configuring DNS settings
events on the console, Displaying events on the console
existing email groups or details, Configuring an email group
exported directories, Displaying exported directories
file system alert values, Displaying file system alert values
file systems that can be exported, Displaying file systems and snapshots that can be exported
home directory usage information, Displaying home directory usage information
information for all disk devices for the nodes in a cluster, Displaying information for all disk devices associated with the nodes in a cluster
LDAP client configurations, Administering the Access Appliance cluster's LDAP client
LDAP configured settings, Configuring LDAP server settings
list of syslog servers, Configuring a syslog server
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS statistics, Displaying and resetting NFS statistics
NIS-related settings, Configuring the NIS-related settings
NSS configuration, Configuring NSS lookup order
routing tables of the nodes in the cluster, Configuring routing tables
share properties, Displaying CIFS share properties
snapshot quotas, Managing disk space used by snapshots
snapshot schedules, Configuring snapshot schedules
snapshots, Displaying snapshots
snapshots that can be exported, Displaying file systems and snapshots that can be exported
time interval or number of duplicate events for notifications, Configuring events for event reporting
values of the configured SNMP notifications, Configuring an SNMP management server
values of the configured syslog server, Configuring a syslog server
VLAN interfaces, Configuring VLAN interfaces
displaying a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
displaying WWN information, Displaying WWN information
DNS
domain names
clearing, Configuring DNS settings
name servers
clearing, Configuring DNS settings
specifying, Configuring DNS settings
settings
disabling, Configuring DNS settings
displaying, Configuring DNS settings
enabling, Configuring DNS settings
domain
setting, Reconfiguring the CIFS service
setting user name, Reconfiguring the CIFS service
domain controller
setting, Reconfiguring the CIFS service
domain name
for the DNS server
setting, Configuring DNS settings

E

email address
adding to a group, Configuring an email group
deleting from a specified group, Configuring an email group
email groups
adding, Configuring an email group
adding ignore-string functionality, Configuring an email group
deleting, Configuring an email group
deleting ignore-string functionality, Configuring an email group
displaying existing and details, Configuring an email group
enabling
CIFS data migration, Enabling CIFS data migration
DNS settings, Configuring DNS settings
FastResync for a file system, Configuring FastResync for a file system
LDAP client configurations, Administering the Access Appliance cluster's LDAP client
NIS settings, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
enabling, disabling, and displaying
file system quotas, Enabling, disabling, and displaying the status of file system quotas
encryption
KMS, About encryption at rest
Enterprise Vault store
configuring CIFS share as secondary storage, Configuring a CIFS share as secondary storage for an Enterprise Vault store
episodic replication destination file system behavior
about, Behavior of the file systems on the episodic replication destination target
episodic replication destinations
accessing, Accessing file systems configured as episodic replication destinations
episodic replication job
displaying status, Displaying episodic replication job information and status
enabling compression, Replicating compressed data
managing, Managing an episodic replication job
show job, Displaying episodic replication job information and status
episodic replication jobs
maximum number of parallel, About the maximum number of parallel episodic replication jobs
episodic replication unit
setting up files to exclude, Setting up files to exclude from an episodic replication unit
Ethernet interfaces
bonding, Bonding Ethernet interfaces
event notifications
configuring, Monitoring alerts , About event notifications
displaying time interval for, Configuring events for event reporting
event reporting
setting events for, Configuring events for event reporting
events
displaying on the console, Displaying events on the console
monitoring, Monitoring events
excluding directories and files
setting up, Setting up files to exclude from an episodic replication unit
export options
CIFS, About the CIFS export options
exporting
an NFS share, Exporting an NFS share
CIFS snapshot, Exporting a CIFS snapshot
directory as a CIFS share, Exporting a directory as a CIFS share
events in syslog format to a given URL, Exporting events in syslog format to a given URL
NFS snapshot, Exporting an NFS snapshot
same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
SNMP MIB file to a given URL, Configuring an SNMP management server
exporting for Kerberos authentication
NFS share, Exporting an NFS share for Kerberos authentication

F

failover and failback
about, Continuous replication failover and failback
about episodic replication, Episodic replication job failover and failback
FastResync
about, About FastResync
File compression attributes
about, About the file compression attributes
File compression block size
about, About the file compression block size
file system
converting into a cache object, Creating a shared cache object for Access Appliance instant rollbacks
file system alert values
displaying, Displaying file system alert values
file system alerts
removing, Removing file system alerts
setting, Setting file system alerts
file system quotas
enabling, disabling, and displaying, Enabling, disabling, and displaying the status of file system quotas
setting and displaying, Setting and displaying file system quotas
file system store for an iSCSI target
deleting, Removing the file system store for an iSCSI target
file systems
adding a mirror to, Adding or removing a mirror from a file system
bringing online or offline, Bringing the file system online or offline
checking and repairing, Checking and repairing a file system
checking for stale mirrors, Checking and resynchronizing stale mirrors
creating, Creating a file system
decreasing the size of, Decreasing the size of a file system
defragmenting, Defragmenting a file system
destroying, Destroying a file system
disabling FastResync option, Disabling the FastResync option for a file system
enabling FastResync, Configuring FastResync for a file system
increasing the size of, Increasing the size of a file system
listing with associated information, Listing all file systems and associated information
removing a mirror from, Adding or removing a mirror from a file system
restoring from an instant rollback, Restoring a file system from an instant rollback
that can be exported
displayed, Displaying file systems and snapshots that can be exported
types of layout, Choosing a file system layout type
filter
about, Monitoring alerts , About severity levels and filters
adding to a group, Configuring an email group
deleting from a specified group, Configuring an email group
firewall setting, Changing the firewall settings
forcefully
importing new LUNs for new or existing pools, Importing new LUNs forcefully for new or existing pools
formatting
a disk, Formatting or reinitializing a disk
fsck
about, About fsck operation
FTP
about, About FTP
add local user, Administering the FTP local user accounts
creating directory, Creating the FTP home directory
customizing server options, Customizing the FTP server options
delete local user, Administering the FTP local user accounts
local user password, Administering the FTP local user accounts
local user set download bandwidth, Configuring settings for the FTP local user accounts
local user set home directory, Configuring settings for the FTP local user accounts
local user set maximum connections, Configuring settings for the FTP local user accounts
local user set maximum disk usage, Configuring settings for the FTP local user accounts
local user set maximum files, Configuring settings for the FTP local user accounts
local user set upload bandwidth, Configuring settings for the FTP local user accounts
logupload, Uploading the FTP logs
server start, Using the FTP server commands
server status, Using the FTP server commands
server stop, Using the FTP server commands
session show, Administering the FTP sessions
session showdetail, Administering the FTP sessions
session terminate, Administering the FTP sessions
show local users, Administering the FTP local user accounts
FTP local user set
about, About the settings for the FTP local user accounts
FTP set
about, About FTP server options

G

group membership
managing, Creating a local CIFS user

H

hiding
system files when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
history command
using, Displaying the command history
home directories
setting up, Setting up home directories
home directory file systems
setting, Setting the home directory file systems
home directory of given user
deleting, Deleting home directories and disabling creation of home directories
home directory usage information
displaying, Displaying home directory usage information
hostname or IP address
setting for LDAP server, Configuring LDAP server settings
how to use
Command-Line Interface (CLI), Getting help using the Access CLISH

I

ID mapping for NFS version 4
configuring Access Appliance, Configuring Access Appliance for ID mapping for NFS version 4
importing
new LUNs forcefully for new or existing pools, Importing new LUNs forcefully for new or existing pools
increasing
size of a file system, Increasing the size of a file system
size of a LUN for an iSCSI target, Increasing the size of a LUN for an iSCSI target
initiating host discovery of LUNs, Initiating host discovery of LUNs
initiator for an iSCSI target
removing, Removing an initiator for an iSCSI target
instant rollbacks
about, About instant rollbacks
bringing online, Bringing an instant rollback online
creating a shared cache object, Creating a shared cache object for Access Appliance instant rollbacks
creating full-sized, Creating a full-sized rollback
creating space-optimized, Creating a space-optimized rollback
destroying, Destroying an instant rollback
listing, Listing Access Appliance instant rollbacks
refreshing from a file system, Refreshing an instant rollback from a file system
restoring a file system from, Restoring a file system from an instant rollback
taking offline, Taking an instant rollback offline
integrating Access Appliance with Data Insight, Access Appliance integration with Data Insight
integration of Access Appliance
with OpenStack, About the Access Appliance integration with OpenStack
Integration with OpenStack Cinder
about, About the Access Appliance integration with OpenStack Cinder
IP addresses
adding to a cluster, Configuring IP addresses
displaying for the cluster, Configuring IP addresses
modifying, Configuring IP addresses
removing from the cluster, Configuring IP addresses
IP addresses for the Ethernet interfaces
about, About Ethernet interfaces
IP routing
configuring, Configuring routing tables
iSCSI
about, About iSCSI
iSCSI devices
configuring, Configuring the iSCSI devices
iSCSI discovery
configuring, Configuring discovery on iSCSI
iSCSI initiator
configuring, Configuring the iSCSI initiator
iSCSI initiator name
configuring, Configuring the iSCSI initiator name
iSCSI target
creating, Creating an iSCSI target and provisioning LUNs
removing, Removing an iSCSI target
iSCSI target service
managing, Managing the iSCSI target service
iSCSI targets
configuring, Configuring the iSCSI targets
managing, Managing the iSCSI targets

J

job resynchronization
configuring, Synchronizing an episodic replication job
joining
Access Appliance to Active Directory (AD), Joining Access Appliance to Active Directory (AD)

K

Kerberos authentication
authenticating NFS clients, Setting up Kerberos authentication for NFS clients
Kerberos realm
adding and configuring Access Appliance for, Adding and configuring Access Appliance to the Kerberos realm
Kerberos share
mounting from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
Kernel-based
NFS server, Using the kernel-based NFS server

L

layouts
types of file system, Choosing a file system layout type
LDAP
before configuring, About configuring LDAP settings
LDAP client
configuring for authentication using the CLI, Configuring the LDAP client for authentication using the CLI
LDAP password hash algorithm
setting password for, Configuring LDAP server settings
LDAP server
clearing configured settings, Configuring LDAP server settings
disabling client configurations, Administering the Access Appliance cluster's LDAP client
displaying client configurations, Administering the Access Appliance cluster's LDAP client
displaying configured settings, Configuring LDAP server settings
enabling client configurations, Administering the Access Appliance cluster's LDAP client
setting over SSL, Configuring LDAP server settings
setting port number, Configuring LDAP server settings
setting the base distinguished name, Configuring LDAP server settings
setting the bind distinguished name, Configuring LDAP server settings
setting the hostname or IP address, Configuring LDAP server settings
setting the root bind DN, Configuring LDAP server settings
setting the users, groups, and netgroups base DN, Configuring LDAP server settings
leaving
AD domain, About leaving an AD domain
list of initiators for an iSCSI target
viewing, Viewing the list of initiators for an iSCSI target
list of snapshots for an iSCSI target
viewing, Viewing the list of snapshots for an iSCSI target
listing
all file systems and associated information, Listing all file systems and associated information
cache objects, Listing cache objects
free space for storage pools, Configuring storage pools
instant rollbacks, Listing Access Appliance instant rollbacks
storage pools, Configuring storage pools
local CIFS groups
creating, Configuring a local group
deleting, Configuring a local group
displaying, Configuring a local group
local CIFS user
creating, Creating a local CIFS user
deleting, Creating a local CIFS user
displaying, Creating a local CIFS user
local CIFS user password
changing, Creating a local CIFS user
local user and groups
managing, About managing local users and groups
local user password
FTP, Administering the FTP local user accounts
local user set download bandwidth
FTP, Configuring settings for the FTP local user accounts
local user set home directory
FTP, Configuring settings for the FTP local user accounts
local user set maximum connections
FTP, Configuring settings for the FTP local user accounts
local user set maximum disk usage
FTP, Configuring settings for the FTP local user accounts
local user set maximum files
FTP, Configuring settings for the FTP local user accounts
local user set upload bandwidth
FTP, Configuring settings for the FTP local user accounts
log files
introduction, About appliance log files
logupload
FTP, Uploading the FTP logs
LUN for an iSCSI target
cloning, Cloning a LUN for an iSCSI target
creating, Creating a LUN for an iSCSI target
removing, Removing a LUN for an iSCSI target
LUN snapshot
removing, Removing a LUN snapshot
restoring, Restoring a LUN snapshot
LUNs
initiating host discovery, Initiating host discovery of LUNs
managing, Managing the LUNs
provisioning, Creating an iSCSI target and provisioning LUNs
LUNs for an iSCSI target
viewing, Viewing the list of LUNs for an iSCSI target

M

mail server
deleting the configured mail server, Configuring an email group
obtaining details for, Configuring an email group
setting the details of external, Configuring an email group
man pages
how to access, About accessing the online man pages
managing
CIFS shares, About managing CIFS shares
continuous replication, Managing continuous replication
group membership, Creating a local CIFS user
home directories, About managing home directories
iSCSI target service, Managing the iSCSI target service
iSCSI targets, Managing the iSCSI targets
local users and groups, About managing local users and groups
LUNs, Managing the LUNs
mappings with iSCSI initiators, Managing the mappings with iSCSI initiators
users, Managing the users
managing NFS shares
using netgroups, About managing NFS shares using netgroups
mapping
of UNIX users from LDAP to Windows users, Automatically mapping UNIX users from LDAP to Windows users
mappings with iSCSI initiators
managing, Managing the mappings with iSCSI initiators
mapuser commands
about, About the mapuser commands
maximum IOPS
setting, Setting the maximum IOPS
maximum number
parallel episodic replication jobs, About the maximum number of parallel episodic replication jobs
migrating
CIFS share and home directory from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS shares and home directories, About migrating CIFS shares and home directories
CIFS shares and home directories from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
mirrored file systems
creating, Creating a file system
mirrored-stripe file systems
creating, Creating a file system
modifying
an IP address, Configuring IP addresses
CIFS share, Modifying a CIFS share
snapshot schedules, Configuring snapshot schedules
tunables for iSCSI, Modifying tunables for iSCSI
monitoring
activity, Monitoring command activity
events, Monitoring events
more command
using, Using the more command
mounting
NFS share from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
mounting snapshots, Bringing snapshots online or taking snapshots offline
Multi-protocol support for NFS with S3
limitations, S3 with NFS use case

N

naming requirement for new users, About the naming requirements for adding new users
navigating CLISH
Access, Navigating the Access CLISH
NFS client
configuring for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NFS clients
authenticating, About authenticating NFS clients
NFS file sharing
about, About NFS file sharing
NFS options
deleting, Unexporting a directory or deleting NFS options
NFS server
about, About using the NFS server with Access Appliance
checking on the status, Accessing the NFS server
kernel-based, Using the kernel-based NFS server
starting, Accessing the NFS server
stopping, Accessing the NFS server
NFS share
exporting, Exporting an NFS share
exporting for Kerberos authentication, Exporting an NFS share for Kerberos authentication
NFS share with continuous replication
creating, Creating an NFS share with continuous replication
NFS share with encryption
creating, Creating an NFS share with encryption
NFS share with episodic replication
creating, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption
creating, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption
creating, Creating an NFS share without replication and encryption
NFS shares
managing using netgroups, About managing NFS shares using netgroups
NFS snapshot
exporting, Exporting an NFS snapshot
NFS statistics
displaying, Displaying and resetting NFS statistics
resetting, Displaying and resetting NFS statistics
NIC devices
configuring, Configuring NIC devices
NIS
clients
disabling, Configuring the NIS-related settings
enabling, Configuring the NIS-related settings
domain name
setting on all the nodes of cluster, Configuring the NIS-related settings
related settings
displaying, Configuring the NIS-related settings
server name
setting on all the nodes of cluster, Configuring the NIS-related settings
node
in a cluster
displaying information for all disk devices, Displaying information for all disk devices associated with the nodes in a cluster
NSS
displaying configuration, Configuring NSS lookup order
lookup order
configuring, Configuring NSS lookup order
NTLM
disabling, Setting NTLM
enabling, Setting NTLM

O

object server, About the Object Store server
object server group-specific parameters
setting up, Setting up the Object Access server group-specific parameters
Object Store server
configuring, Configuring the Object Store server
objectstore buckets, File systems used for objectstore buckets
obtaining
details of the configured email server, Configuring an email group
offline
taking an instant rollback offline, Taking an instant rollback offline
online
bringing an instant rollback online, Bringing an instant rollback online
OpenStack
about the integration with OpenStack, About the Access Appliance integration with OpenStack
OpenStack Manila
integration with Access Appliance, About the Access Appliance integration with OpenStack Manila
OpenStack Manila file share
creating, Creating an OpenStack Manila file share
OpenStack Manila share snapshot
creating, Creating an OpenStack Manila share snapshot
OpenStack Manila share type
creating, Creating an OpenStack Manila share type

Q

quota commands
setting and displaying file system quotas, Setting and displaying file system quotas
quota limits
enabling or disabling snapshot, Managing disk space used by snapshots
quotas
CIFS home directories, About quotas for CIFS home directories
setting user quotas for users of specified groups, Setting user quotas for users of specified groups

R

reducing
size of a LUN for an iSCSI target, Reducing the size of a LUN for an iSCSI target
refreshing
instant rollbacks from a file system, Refreshing an instant rollback from a file system
removing
a column from a file system, Adding or removing a column from a file system
a disk, Removing a disk
authentication for an iSCSI target, Removing authentication settings for an iSCSI target
initiator for an iSCSI target, Removing an initiator for an iSCSI target
IP address from the cluster, Configuring IP addresses
iSCSI target, Removing an iSCSI target
LUN for an iSCSI target, Removing a LUN for an iSCSI target
LUN snapshot, Removing a LUN snapshot
mirror from a file system, Adding or removing a mirror from a file system
portal IPs for an iSCSI target, Removing portal IPs for an iSCSI target
snapshot schedules, Managing automated snapshots
removing a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
renaming
storage pools, Configuring storage pools
replicating file systems
setting up, Setting up the file systems to replicate
resetting
NFS statistics, Displaying and resetting NFS statistics
restoring
a file system from an instant rollback, Restoring a file system from an instant rollback
LUN snapshot, Restoring a LUN snapshot
snapshots, Restoring a snapshot
resynchronizing
stale mirrors on file systems, Checking and resynchronizing stale mirrors
route entries
deleting from routing tables, Configuring routing tables
routing tables
of the nodes in the cluster
displaying, Configuring routing tables

S

scheduling
episodic replication, Scheduling the episodic replication
security
standalone mode, Configuring CIFS server status for standalone mode
security settings
AD domain mode, Changing domain settings for AD domain mode
changing, Changing security settings
server start
FTP, Using the FTP server commands
server status
FTP, Using the FTP server commands
server stop
FTP, Using the FTP server commands
session show
FTP, Administering the FTP sessions
session showdetail
FTP, Administering the FTP sessions
session terminate
FTP, Administering the FTP sessions
setting
aio_fork option, Setting the CIFS aio_fork option
base distinguished name for the LDAP server, Configuring LDAP server settings
bind distinguished name for LDAP server, Configuring LDAP server settings
details of the external mail server, Configuring an email group
domain, Reconfiguring the CIFS service
domain controller, Reconfiguring the CIFS service
domain name for the DNS server, Configuring DNS settings
domain user name, Reconfiguring the CIFS service
events for event reporting, Configuring events for event reporting
file system alerts, Setting file system alerts
filter of the syslog server, Configuring a syslog server
home directory file systems, Setting the home directory file systems
IDMAP backend to ad for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
IDMAP backend to hash for accessing CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
IDMAP backend to ldap for trusted domain access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
IDMAP backend to rid for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
LDAP server hostname or IP address, Configuring LDAP server settings
LDAP server over SSL, Configuring LDAP server settings
LDAP server port number, Configuring LDAP server settings
LDAP users, groups, and netgroups base DN, Configuring LDAP server settings
maximum IOPS, Setting the maximum IOPS
NIS domain name on all the nodes of cluster, Configuring the NIS-related settings
prior to configuring LDAP, About configuring LDAP settings
retention, Setting retention in files
root bind DN for the LDAP server, Configuring LDAP server settings
severity of the syslog server, Configuring a syslog server
SNMP filter notifications, Configuring an SNMP management server
SNMP severity notifications, Configuring an SNMP management server
the NIS server name on all the nodes of cluster, Configuring the NIS-related settings
trusted domains, About setting trusted domains
trusted domains for the Active Directory, Setting Active Directory trusted domains
user quotas for users of specified groups, Setting user quotas for users of specified groups
WORM over NFS, Setting WORM over NFS
WORM-retention over CIFS, Manually setting WORM-retention on a file over CIFS
setting up
authentication for an iSCSI target, Setting up authentication for an iSCSI target
home directories, Setting up home directories
object server group-specific parameters, Setting up the Object Access server group-specific parameters
replicating file systems, Setting up the file systems to replicate
setting up an episodic replication unit
to exclude directories and files, Setting up files to exclude from an episodic replication unit
severity levels
about, Monitoring alerts , About severity levels and filters
adding to an email group, Configuring an email group
severity notifications
setting, Configuring an SNMP management server
shadow copy
making a CIFS share aware, Making a CIFS share shadow copy aware
share backend
creating on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
share directories
CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
share properties
displaying, Displaying CIFS share properties
shared cache object
creating, Creating a shared cache object for Access Appliance instant rollbacks
shares
about, About file sharing protocols
show local users
FTP, Administering the FTP local user accounts
showing
snapshot schedules, Managing automated snapshots
size of a LUN for an iSCSI target
increasing, Increasing the size of a LUN for an iSCSI target
reducing, Reducing the size of a LUN for an iSCSI target
snapshot of a LUN for an iSCSI target
creating, Creating a snapshot of a LUN for an iSCSI target
snapshot schedules
about, About snapshot schedules
creating, Configuring snapshot schedules
deleting, Managing automated snapshots
displaying, Configuring snapshot schedules
modifying, Configuring snapshot schedules
preserving, Managing automated snapshots
removing, Managing automated snapshots
showing, Managing automated snapshots
snapshots
about, About snapshots
creating, Creating snapshots
destroying, Managing disk space used by snapshots
displaying, Displaying snapshots
displaying quotas, Managing disk space used by snapshots
enabling or disabling quota limits, Managing disk space used by snapshots
mounting, Bringing snapshots online or taking snapshots offline
restoring, Restoring a snapshot
that can be exported
displayed, Displaying file systems and snapshots that can be exported
unmounting, Bringing snapshots online or taking snapshots offline
SNMP
filter notifications
setting, Configuring an SNMP management server
management server
adding, Configuring an SNMP management server
deleting configured, Configuring an SNMP management server
displaying current list of, Configuring an SNMP management server
MIB file
exporting to a given URL, Configuring an SNMP management server
notifications
displaying the values of, Configuring an SNMP management server
server
setting severity notifications, Configuring an SNMP management server
SNMP notifications
about, About SNMP notifications
source and destination clusters
communicating, Setting up communication between the source and the destination clusters
source and target clusters
communicating, Setting up communication between the source and the target clusters
specific workload
creating a tuned file system, About creating a tuned file system for a specific workload
specified group
deleting a severity from, Configuring an email group
specifying
DNS name servers, Configuring DNS settings
SSL
setting the LDAP server for, Configuring LDAP server settings
standalone mode
CIFS server status, Configuring CIFS server status for standalone mode
CIFS service, Configuring CIFS server status for standalone mode
security, Configuring CIFS server status for standalone mode
starting
Access Appliance continuous replication, Starting Access Appliance continuous replication
Access Appliance episodic replication, Starting Access Appliance episodic replication
CIFS server, Reconfiguring the CIFS service
NFS server, Accessing the NFS server
stopping
NFS server, Accessing the NFS server
storage pools
creating, Configuring storage pools, Adding disks to a storage pool
destroying, Configuring storage pools
listing, Configuring storage pools
listing free space, Configuring storage pools
renaming, Configuring storage pools
storage provisioning and management
about, About storage provisioning and management
storing
account information, About storing account information
user and group accounts in LDAP, Storing user and group accounts
user and group accounts locally, Storing user and group accounts
striped file systems
creating, Creating a file system
striped-mirror file systems
creating, Creating a file system
striping file systems
about, About striping file systems
switching
ctdb clustering mode, About switching the clustering mode
syslog format
exporting events to a given URL, Exporting events in syslog format to a given URL
syslog server
adding, Configuring a syslog server
deleting, Configuring a syslog server
displaying the list of, Configuring a syslog server
displaying the values of, Configuring a syslog server
setting the filter of, Configuring a syslog server
setting the severity of, Configuring a syslog server
system files
hiding when adding a CIFS normal share, Hiding system files when adding a CIFS normal share

T

troubleshooting
about, About troubleshooting
trusted domains
allowing access to CIFS when setting an IDMAP backend to ad, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
allowing access to CIFS when setting an IDMAP backend to hash, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
allowing access to CIFS when setting an IDMAP backend to ldap, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
allowing access to CIFS when setting an IDMAP backend to rid, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
specifying which are allowed access to the CIFS server, Specifying trusted domains that are allowed access to the CIFS server
tunables for iSCSI
modifying, Modifying tunables for iSCSI
tuned file system
creating for a specific workload, About creating a tuned file system for a specific workload

U

unexporting
share of exported directory, Unexporting a directory or deleting NFS options
UNIX users from LDAP to Windows users
automatic mapping of, Automatically mapping UNIX users from LDAP to Windows users
unmounting snapshots, Bringing snapshots online or taking snapshots offline
unplanned failback
process overview, Overview of the unplanned failback process, Overview of the unplanned failback process
unplanned failover
process overview, Overview of the unplanned failover process, Overview of the unplanned failover process
upgrading
disk layout versions, Upgrading disk layout versions
Use case
configuring the Object Store server, Use cases for configuring the Object Store server
Use cases
compressing files, Use cases for compressing files
user and group accounts in LDAP
storing, Storing user and group accounts
user and group accounts locally
storing, Storing user and group accounts
user names
mapping for CIFS/NFS sharing, About mapping user names for CIFS/NFS sharing
users
managing, Managing the users
using
AD interface, Removing the AD interface
history command, Displaying the command history
more command, Using the more command
multi-domain controller support in CIFS, Using multi-domain controller support in CIFS
Using compression
best practices, Best practices for using compression
Using NFS Server, About using the NFS server with Access Appliance

V

verifying
Access Appliance has joined Active Directory (AD), Verifying that Access Appliance has joined Active Directory (AD) successfully
viewing
information about disks, Viewing information about disks
list of initiators for an iSCSI target, Viewing the list of initiators for an iSCSI target
list of snapshots for an iSCSI target, Viewing the list of snapshots for an iSCSI target
LUNs for an iSCSI target, Viewing the list of LUNs for an iSCSI target
portal IPs for an iSCSI target, Viewing the portal IPs for an iSCSI target
viewing information
about S3, Viewing information about S3
VLAN
adding interfaces, Configuring VLAN interfaces
configuring interfaces, Configuring VLAN interfaces
deleting interfaces, Configuring VLAN interfaces
displaying interfaces, Configuring VLAN interfaces

W

what to replicate
defining, Defining what to replicate
Windows Active Directory
configuring as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
workflow
object server, About the Object Store server
WORM over NFS
setting, Setting WORM over NFS
WORM-retention over CIFS
setting, Manually setting WORM-retention on a file over CIFS
WWN information
displaying, Displaying WWN information