ECS Admin Guide
ECS Admin Guide
Version 2.2
Administrator's Guide
302-002-523
02
Copyright 2013-2016 EMC Corporation. All rights reserved. Published in the USA.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Figures 7
Tables 9
Chapter 1 Introduction 13
Introduction to the ECS Portal........................................................................14
Log in to the ECS Portal................................................................................. 14
Change Password..........................................................................................16
Access to portal areas................................................................................... 16
Ordering and searching tables in the portal................................................... 19
About this VDC.............................................................................................. 20
Introduction.................................................................................................. 54
Understanding users and roles in ECS........................................................... 54
Users in ECS.....................................................................................54
User roles.........................................................................................55
Domain and local users....................................................................57
User scope: global or namespace.....................................................57
Working with the users at the ECS Portal....................................................... 58
Add a new object user......................................................................60
Add a domain user as an object user................................................61
Create a local management user or assign a domain user to a
management role............................................................................. 61
Assign an Active Directory group name to the system admin or system
monitor role..................................................................................... 62
Create a namespace administrator................................................... 63
Assign an Active Directory group name to the namespace admin role
........................................................................................................ 64
Working with the authentication providers at the ECS Portal..........................64
Add an authentication provider........................................................ 65
Authentication provider settings...................................................... 66
Considerations when adding authentication providers..................... 69
Understanding the mapping of users into a namespace................................ 70
Map domain users into a namespace............................................... 71
Chapter 1, "Introduction"
Introduction 13
Introduction
2. Click Save.
You are logged out and the standard login screen appears.
Change Password
When you are logged in at the ECS Portal, you can change your password.
System Admin, Namespace Admin, and System Monitor users have access to the Change
Password page.
Procedure
1. At the ECS Portal, select Settings > Change Password
2. Enter a new password in the Password field and enter it again in the Confirm
Password field.
3. Click Save.
Hardware Health Monitor storage node and disk status for each storage
pool.
For more information, see: Monitor hardware on page
136.
Node and Process Health Monitor health of nodes and processes by memory and
CPU utilization.
For more information, see: Monitor node and process
health on page 138.
Settings Object Base URL Set the Base URL to determine which part of object
address is the bucket and namespace.
For more information, see: Address ECS object storage
and use the Base URL on page 108
About this VDC View information about the VDC's nodes: node names,
rack IDs, and software versions.
For more information, see About this VDC on page
20.
Namespace Admin
The following table lists the menu items that the Namespace Admin has permission to
use and provides a link to documentation articles that provide more information on their
use.
drive the ordering of rows. When you reenter the page, the default ordering will be
applied. Similarly, refreshing the page will return the page to the default ordering.
Figure 1 Table Column with Sort Control Available
Other tables provide filter options to reduce table size. See Monitoring basics on page
116.
Using Search
The Search facility enables some table rows to be filtered based on matching text strings.
As you type text in the Search box, rows that contain strings that match the search string
are displayed. The order in which the rows that match the search criteria are displayed
depends on the ordering applied by the table column ordering.
Refreshing a Page
A refresh control is provided on pages that contain table data. Using refresh will return
the table to its default ordering.
Figure 2 Starred Rows Indicate Nodes with a Different Software Version than the Current Node
Note
Some parts of the initial configuration may be completed as part of the installation
service.
Each panel title links to the portal monitoring page that shows deeper detail for the topic.
Global User menu
The Global User menu appears on each portal page.
Performance
The Performance panel shows you how network read and write operations are performing
now and the average over the last 24 hours.
Data
The Data panel breaks down local VDC storage by user data and system data. Keep in
mind that user data is the amount of you data ingested by ECS. The capacity used by your
data will be affected by copies of your data and current system activities processing
those copies.
Storage Efficiency
The Storage Efficiency panel shows how efficient the erasure coding (EC) process is
currently working. The graph shows the progress of the current EC process, and the other
values show the amount of EC data waiting for the EC process as well as the current rate
of the EC process.
Geo Monitoring
The Geo Monitoring panel shows how much data from the local VDC is waiting for geo-
replication as well as the rate of the replication. Recovery Point Objective (RPO) refers to
the point in time in the past to which you can recover. The value here is the oldest data at
risk of being lost if a local VDC fails before replication is complete. Failover Progress
shows the progress of any active failover occurring in the federation involving the local
VDC. Bootstrap Progress shows the progress of any active process to add a new VDC to
the federation.
Alerts
The Alert panel displays a count of critical alerts and errors. Click Alerts to see the full list
of current events.
Storage pools
Storage pools let you organize storage resources based on business requirements. For
example, if you require physical separation of data, you can partition the storage into
multiple different storage pools.
Use the Storage Pool Management page available from Manage > Storage Pools to view
the details of existing storage pools, to create new storage pools, to modify existing
storage pools, and to delete storage pools.
Figure 4 Storage Pool Management page
Field Description
Name The name of the storage pool.
Status The current state of the storage pool and of the nodes. Storage pool states are:
l Ready: At least four nodes are installed and all nodes are in the ready
to use state.
l Not Ready: A node in the storage pool is not in the ready to use.
l Partially Ready: There are less than four nodes and all nodes are in the
ready to use state.
Host Name The fully qualified host name assigned to the node.
Rack ID The name assigned to the rack that contains the nodes.
Field Description
l Edit: Use to change storage pool's name and the set of nodes included in
the storage pool.
l Delete: Use to delete storage pools. All nodes in storage pool must be
removed before you can delete a storage pool. You cannot delete the
system storage pool which is the first storage pool created. If the system
storage pool has empty nodes, the empty nodes can be deleted if the
number of nodes is greater than four.
Cold Storage A storage pool with the Cold Storage property set uses an erasure coding (EC)
scheme more efficient for infrequently accessed objects. Cold Storage is also
known as a Cold Archive. Once a storage pool has been created, this setting
cannot be changed.
Note
Cold storage requires a minimum hardware configuration of 6 nodes. See the Data
Protection section of the ECS Planning Guide for more details.
5. Select the nodes to add to the storage pool from the Available Nodes list.
a. To select nodes one-by-one, click the + icon next for each node.
b. To select all available nodes, click the + icon at the top of the Available Nodes list.
c. To narrow the list of available nodes, type the node's public IP address or host
name in the search field.
6. When you have completed the node selection, click Save.
7. Wait 10 minutes after the storage pool is in the Ready state before you perform other
configuration tasks. This allows the storage pool time to initialize.
If you do not wait long enough, you receive the following error message: Error
7000 (http: 500): An error occurred in the API Service. An
If you receive this error, wait a few more minutes before attempting any further
configuration.
Field Description
Name The VDC's name.
Endpoints The public IP addresses of the nodes in the storage pools that comprise the VDC.
11. Enter the public IP addresses of the site you are adding. Enter them as a comma-
separated list.
12. Click Save.
Procedure
1. Log in to one of the operational VDCs in the federation.
2. Go to Manage > Replication Group.
3. Click Edit for the replication group that contains the VDC to delete.
4. Click Delete in the row that contains the VDC and storage pool to remove.
5. Click Save.
6. Go to Manage > VDC. The status for the permanently removed VDC changes to
Permanently failed.
7. Select Delete from the drop down in the row of the VDC to remove.
8. Click Save.
Replication groups
Replication groups are logical constructs that define where storage pool content is
protected. Replication groups can be local or global. Local replication groups protect
objects within the same VDC against disk or node failures. Global replication groups
protect objects against disk, node, and site failures.
Use the Manage Replication Groups page to view replication group details, to create new
replication groups, and to modify existing replication groups. You cannot delete
replication groups in this release.
Figure 6 Manage Replication Groups page
Field Description
Name The replication group name.
Field Description
VDC The number of VDCs in the replication group and the names of the VDCs where
the storage pools are located.
Storage Pool The names of the storage pools and their associated VDCs.
Replicate to A replication group with this feature disabled uses default replication. With
All Sites default replication, data is stored at the primary site and a full copy is stored at a
secondary site chosen from the sites within the replication group. The secondary
copy is protected by triple-mirroring and erasure coding. This process provides
data durability with storage efficiency. A replication group with this feature
enabled makes a full readable copy of all objects to all sites (VDCs) within the
replication group. Having full readable copies of objects on all VDCs in the
replication group provides data durability and improves local performance at all
sites at the cost of storage efficiency.
Actions Edit: Use to modify the replication group name and the set of VDCs and storage
pools in the replication group.
Configuring ESRS
This process describes steps to enable ESRS configuration on ECS. ECS version 2.2 and
later requires ESRS Virtual Edition.
Procedure
1. Perform install/upgrade procedures through post-upgrade/install manual
configurations.
2. Run the fcli to configure customer information and serial number on the cluster.
Note
For 2.2, you must delete, then add any existing ESRS server that you edit with the ECS
Portal. Editing the server is not functional for 2.2.
Configuring ESRS 43
Configure One or More Sites
l Introduction.......................................................................................................... 46
l Understanding tenants..........................................................................................46
l Understanding namespace settings...................................................................... 47
l Working with namespaces at the ECS portal.......................................................... 50
l Create and configure a namespace........................................................................50
Configure a namespace 45
Configure a namespace
Introduction
Namespaces provide the mechanism by which multiple tenants can access the ECS
object store and ensure that the objects and buckets written by users of a tenant are
segregated from users of other tenants.
This article introduces some concepts around tenants and namespace settings:
l Understanding tenants on page 46
l Understanding namespace settings on page 47
l Working with namespaces at the ECS portal on page 50
and describes the operations required to configure a namespace using the ECS Portal:
l Create and configure a namespace on page 50
While the configuration operations described in this article use the ECS portal, the
concepts described in Understanding tenants on page 46 and Understanding
namespace settings on page 47 apply whether you are using the portal or the REST API.
Understanding tenants
ECS supports access by multiple-tenants, where each tenant is defined by a namespace
and the namespace has a set of configured users who can store and access objects
within the namespace.
Namespaces are global resources in ECS and a System Admin or Namespace Admin
accessing ECS at any federated VDC can configure the namespace settings. In addition,
object users assigned to a namespace are global and can access the object store from
any federated VDC.
The key characteristic of a namespace is that users from one namespace cannot access
objects belonging to another namespace. In addition, ECS enables an enterprise to
configure namespaces and to monitor and meter their usage, and enables management
rights to be granted to the tenant so that it can perform configuration and monitoring and
metering operations.
It is also possible to use buckets as a means of creating sub-tenants. The bucket owner is
the sub-tenant administrator and can assign users to the sub-tenant using access control
lists. However, sub-tenants do not provide the same level of segregation as tenants; any
user belonging to the tenant could be assigned privileges on a sub-tenant, so care must
be taken when assigning users.
The following scenarios are supported:
Enterprise single tenant
All users access buckets and objects in the same namespace. Sub-tenants (buckets)
can be created to allow a subset of namespace users to access the same set of
objects. A sub-tenant could be a department within the enterprise.
Namespace Admin - User Id of one or more users who you want to assign to the Yes
User Namespace Admin role; a list of users should be comma
separated.
Namespace Admins can be local or domain users. If you want
the Namespace Admin to be a domain user, you will need to
ensure that an authentication provider has been added to ECS.
Refer to Add users and assign roles on page 54 for details.
Namespace Admin - Domain group that you want to assign to the Namespace Admin Yes
Domain Group role. Any member, once authenticated, will be placed in the
Namespace Admin role for the namespace. The group must be
assigned to the namespace by setting the Domain User
Mappings for the namespace.
To use this feature you will need to ensure that an
authentication provider has been added to ECS. Refer to Add
users and assign roles on page 54 for details.
Replication Group The default replication group for the namespace. Yes
Namespace Quota Enables quotas for the namespace. The quotas will apply to the Yes
total storage used by the namespace. Soft and hard limits can
be defined to notify that a defined limit has been reached and to
Bucket Quota Defines a default quota that will be applied to buckets created Yes
(Bucket Default) in this namespace. The default quota is a Block Quota which,
when reached, will prevent write/update access to the bucket.
The default bucket quota is applied at bucket create time, so
changing the default bucket quota will not change the bucket
quota for already created buckets.
Server-side Defines a default value for Server-side Encryption that will apply No
Encryption (Bucket to buckets created in this namespace.
Default) Server-side Encryption is also know as Data At Rest Encryption
or D@RE. This feature encrypts data inline before storing it on
ECS disks or drives. This encryption prevents sensitive data from
being acquired from discarded or stolen media. If the
namespace enables encryption, then all its buckets will be
encrypted buckets unless you disable encryption for the bucket
at creation time. For a complete description of the feature, see
the ECS Security Configuration Guide.
Access During Defines a default value for Access During Outage that will be Yes
Outage (Bucket applied to buckets created in this namespace.
Default)
Compliance (Bucket ECS has object retention features enabled or defined at the No
Default) object-, bucket-, and namespace-level. Compliance strengthens
these features by limiting changes that can be made to retention
settings on objects under retention.
Compliance rules include:
l Compliance is enabled at the namespace-level. This means
that all buckets in the namespace must have a retention
period greater than zero.
l Compliance can only be enabled on a namespace when the
namespace is created. (Compliance cannot be added to an
existing namespace.)
l Compliance cannot be disabled once enabled.
l All buckets in a namespace must have a retention period
greater than zero.
Note
Retention Policies Enables one or more retention policies to be added and Yes
configured.
A namespace can have a number of associated retention
polices, where each policy defines a retention period. By
applying a retention policy to a number of objects, rather than
applying a retention period directly, a change the retention
policy will cause the retention period to be changed for the
complete set of objects to which the policy has been applied. A
request to modify an object that falls before the expiration of the
retention period will be disallowed.
It is also possible to specify retention policies and specify a
quota for the namespace. Further information on using these
features is provided in Retention periods and policies on page
75.
Domain Enables AD/LDAP domains to be specified and the rules for Yes
including users from the domain to be configured.
Domain users can be assigned to ECS management roles. In
addition, users belonging to the domain can use the ECS self-
service capability to register as object users.
The mapping of domain users into a namespace is described in
Understanding the mapping of users into a namespace on page
70
The following attribute can be set using the ECS Management REST API, not from the ECS
Portal.
Allowed (and Disallowed) Replication Groups
Enables a client to specify which replication groups can be used by the namespace.
Field Description
Name Name of the namespace.
Max Quota Quota limit at which writes to the namespace will be blocked.
Actions Actions that can be performed on the namespace. Edit and Delete actions
are available.
3. Set the namespace administrator by entering a domain or local user in the User Admin
field and/or adding a domain group in the Domain Group Admin field.
Multiplle users or groups can be added as comma separated lists.
4. Specify appropriate value for each of the bucket default fields.
The following controls set the default value when a bucket is created using an object
client:
l Default Bucket Quota
l Access During Outage
l Compliance
5. Decide if this namespace requires Server-side Encryption. If Yes, every bucket in the
namespace will have Server-side encryption enabled and every object in the buckets
will be encrypted. If you select No, you can still apply Server-side encryption to
individual buckets in the namespace at the time of creation.
6. If you want to set a quota for the namespace:
a. Set theNamespace Quota control to Enabled.
b. Choose Notification Only or Block Access
If you choose to block access when a specified storage limit is reached, you can
also specify a percentage of that limit at which a notification will be sent.
7. Add and Configure Retention Policies.
a. In the Retention Policies area, select Add to add a new policy.
To perform more complex mappings using groups and attributes, you should refer to
Add users and assign roles on page 54
9. Select Save.
l Introduction.......................................................................................................... 54
l Understanding users and roles in ECS................................................................... 54
l Working with the users at the ECS Portal............................................................... 58
l Working with the authentication providers at the ECS Portal..................................64
l Understanding the mapping of users into a namespace........................................ 70
Introduction
This article describes the types of users supported by ECS and the roles to which they can
be assigned.
It introduces the main concepts around ECS users and roles:
l Understanding users and roles in ECS on page 54
l Working with the users at the ECS Portal on page 58
and then describes how to add management users or object users:
l Add a new object user on page 60
l Add a domain user as an object user on page 61
l Create a local management user or assign a domain user to a management role on
page 61
l Create a namespace administrator on page 63
In addition, it shows you how you can set up an authentication provider and perform the
mapping of domain users into a namespace:
l Add an authentication provider on page 65
l Map domain users into a namespace on page 71
Users in ECS
ECS requires two types of user: management users, who can perform administration of
ECS, and object users, who access the object store to read and write objects and buckets
using the supported data access protocols (S3, EMC Atmos, OpenStack Swift, and CAS).
Management users can access the ECS Portal. Object users cannot access the ECS Portal
but can access the object store using clients that support the ECS data access protocols.
Management users and object users are stored in different tables and their credentials
are different. Management users require a local username and password, or a link to a
domain user account. Object users require a username and a secret key. Hence you can
create a management user and an object user with the same name, but they are
effectively different users as their credentials are different.
In addition, management and object user names can be unique across the ECS system or
can be unique within a namespace. This is referred to as user scope and is described in:
User scope: global or namespace on page 57.
Details of the supported user types are provided in the following sections:
Management Users
Management users can perform the configuration and administration of the ECS system
and of tenants configured in ECS.
Management users can be local users whose credentials are stored by ECS and are
authenticated by ECS against the locally held credentials, or they can be domain users
defined in Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) and
authenticated against users held in those systems. You can find out more about domain
and local users in Domain and local users on page 57.
Management users are not replicated across geo-federated VDCs.
Object users
Object users are end-users of the ECS object store and access it through object clients
using the ECS supported object protocols (S3, EMC Atmos, Openstack Swift, and CAS).
Object users can also be assigned Unix-style permissions to access buckets exported as
filesystems for HDFS.
Object users are defined by a username and a secret key that can be used to access the
object store. Usernames can be local names or can be domain-style user names that
include a "@" in their name.
A management user can create an object user account and can assign a secret key to the
object user account when the account is created or at any time thereafter. When created
by a management user, the object users secret key is distributed by email or other
means.
For domain users, a secret key can be obtained by the object user using the ECS self-
service capability, using a client that talks to the ECS REST API (object users do not have
access to the ECS portal). You can read more about domain users in: Domain and local
users on page 57, and you can refer to Data Access Guide: Obtain secret key to access
object storage for information on creating a secret key.
Object users are global resources, so an object user created at a VDC can be given
privileges to read and write buckets, and objects, within the namespace to which they are
assigned, from any VDC.
Root user
The root user is available at system initialization and is pre-assigned to the System
Admin role.
The root user should only be used for initial access to the system. On initial access, the
root user password should be changed at the Settings > Password page and one or more
new System Admin accounts should be created.
From an audit perspective, it is important to know which user carried out changes to the
system, so root should not be used, and each System Admin user should have their own
account.
User roles
ECS defines roles to determine the operations that a user account can perform at the ECS
Portal or when accessing ECS using the ECS Management REST API. Management users
User roles 55
Configure authentication and manage users
and groups can be assigned to administration roles in ECS and can be either local users
or domain users. Roles can also be assigned to Active Directory group names.
The following management roles are defined:
l System Admin on page 56
l System Monitor on page 56
l Namespace Admin on page 56
System Admin
The System Admin role can configure ECS and specify the storage used for the object
store, how the store is replicated, how tenant access to the object store is configured,
and which users have permissions on an assigned namespace.
The System Admin can also configure namespaces and perform namespace
administration, or can assign a user who belongs to the namespace as the Namespace
Admin.
The System Admin has access to the ECS Portal and system administration operations
can also be performed from programmatic clients using the ECS Management REST API.
Because management users are not replicated across site, a System Admin must be
created at each VDC that requires one.
System Monitor
The System Monitor role can view all ECS Portal data, but cannot make any changes.
The System Monitor role can view all ECS Portal data, but cannot provision the ECS
system. The monitor cannot create, update, or delete storage pools, replication groups,
namespaces, buckets, users and so on through the portal or ECS management API.
Monitors cannot modify any other portal setting except their own passwords.
Because management users are not replicated across sites, a System Monitor must be
created at each VDC that requires one.
Namespace Admin
The Namespace Admin is a management user who can access the ECS Portal to configure
namespace settings, such as quotas and retention periods, and can map domain users
into the namespace and assign local users as object users for the namespace.
Namespace Admin operations can also be performed using the ECS Management REST
API.
A Namespace Admin can only be the administrator of a single namespace.
Because authentication providers and namespaces are replicated across sites (they are
ECS global resources), a domain user who is a Namespace Admin can log in at any site
and perform namespace administration from that site.
Local management accounts are not replicated across sites, so a local user who is a
Namespace Admin can only log in at the VDC at which the management user account was
created. If you want the same username to exist at another VDC, the user must be created
at the other VDC. As they are different accounts, changes to a same-named account at
one VDC, such as a password change, will not be propagated to the account with the
same name at the other VDC.
Note
The user scope setting must be made before the first object user is created.
PUT /config/object/properties/
<property_update>
<properties>
<properties>
<entry>
<key>user_scope</key>
<value>NAMESPACE</value>
</entry>
</properties>
</property_update>
The Object Users table provides access to the following information and operations.
Attribute Description
Name The name of the user.
Actions Provides a selection menu for the actions that are available. The actions
that are available are: Edit and Delete.
The Object Users pane additionally provides access to the the following controls:
Control Description
New Object User The New Object User button enables an object user to be added.
The Management Users table provides access to the following information and
operations.
Column Description
Name The name of the user.
Actions Provides a selection menu for the actions that are available. The actions
that are available are: Edit and Delete.
Note
Do not use the ECS Portal to perform this operation if you want users to be assigned
to different Swift groups.
You can refer to Working with the users at the ECS Portal on page 58 for information
about the Manage > Users page.
Procedure
1. At the ECS Portal, select Manage > Users.
The Object Users Page is shown by default and displays the Object Users table which
lists the local users that have been created and the namespace to which they are
assigned.
2. Select New Object User.
The New Object User page is displayed.
3. Enter a name for the user.
This is a name for a local user that will be created.
You can use domain-style names that include "@". For example,
"[email protected]". However, this is a convenience to enable you to keep
names unique and consistent with AD names, authentication is performed using a
secret key assigned to the username, not through AD or LDAP.
Note
User names must be lowercase letters, numbers and any of the following characters: !
#$&'()*+,-./:;=?@_~
The Object Users Page is displayed by default and you need to change to the
Management Users page.
2. Select Management Users.
The Management Users page is displayed which shows any users that have currently
been assigned and provide a New Management User button.
3. Select New Management User.
The New Management User pages is displayed which enables you to create a local
user and assign the new user to the management role, or assign a domain user to the
management role.
4. Select Local User or AD/LDAP User.
For a local user you will need to define a password; for a domain user, the user and
password credentials that ECS will use to authenticate a user are held in AD/LDAP, so
you don't need to define a password.
5. Enter the name the user.
If you have selected AD/LDAP, the user must exist and have been made available by
adding an authentication provider to ECS.
If you select local user, a new local management user will be created.
Note
User names must be lowercase letters, numbers and any of the following characters: !
#$&'()*+,-./:;=?@_~
6. To assign the user to the System Monitor role, select Yes at the System Monitor
selector.
7. If you want to assign the user to the System Admin role, select Yes at the System
Administrator selector.
If you are creating a management user who will be assigned to the Namespace Admin
role for a namespace, you should leave this as No.
If you select Yes, but at a later date you want to remove System Administrator
privileges from the user, you can edit the user settings and change this to No.
8. Select Save.
Assign an Active Directory group name to the system admin or system monitor role
You can assign an AD domain group to the system admin or system monitor role from the
ECS Portal. When an AD domain group is assigned a management role, all users in the AD
group will have that role.
Before you begin
l You must be a system admin to assign a management role.
l To assign an AD domain group to a management role, you must first ensure that an
authentication provider has been added. See Add an authentication provider on page
65.
You can refer to Working with the users at the ECS Portal on page 58 for information
about the Manage > Users page.
Note
Procedure
1. At the ECS Portal, select Manage > Users.
The Object Users page displays by default. Change to the Management Users page.
2. Select Management Users.
The Management Users page is displayed which shows any users that have currently
been assigned and provides a New Management User button.
3. Select New Management User.
The New Management User page displays.
4. Select AD/LDAP User or Group.
For a domain user, the user and password credentials that ECS uses to authenticate a
user are held in AD/LDAP, so you don't need to define a password.
5. Change the User dropdown to Group.
6. Fill in the Group Username field with your complete AD domain group name including
the domain. For example: [email protected].
7. To assign the group to the system monitor role, select Yes at the System Monitor
selector.
8. To assign the group to the system admin role, select Yes at the System Administrator
selector.
9. If you select Yes to either of these roles, you can remove the role from the group later
by changing the setting to No.
10. Select Save.
Note
Procedure
1. At the ECS Portal, select Manage > Namespace.
2. Select a namespace and select Edit, or select New Namespace.
3. Fill in the Domain Group Admin field with your complete AD domain group name
including the domain. For example: [email protected]. To add more
than one domain group, separate the names with commas.
Note
An AD domain group can only be the namespace admin for one namespace.
Actions Provides a selection menu for the actions that are available. The actions
that are available are: Edit and Delete.
The Authentication Provider Page additionally provides access to the following controls:
Control Description
New Authentication The New Authentication Provider button enables an authentication
Provider provider to be added.
4. To verify the configuration, add a user from the authentication provider at Manage >
Users > Management Users, then try to log in as the new user.
mycompany.com
Server URLs ldap or ldaps (secure LDAP) with the domain controller IP
address. Default port for ldap is 389 and ldaps is 636.
Usage: one or more of
ldap://<Domain controller IP >:<port> (if not default port)
or
ldaps://<Domain controller IP >:<port> (if not default port)
If the authentication provider supports a multidomain forest,
use the global catalog server IP and always specify the port
number. Default is 3268 for ldap, 3269 for ldaps.
Usage: ldap(s)://<Global catalog server IP>:<port>
Manager DN Indicates the Active Directory Bind user account that ECS uses to
connect to Active Directory or LDAP server. This account is used
to search Active Directory when a ECS administrator specifies a
user for role assignment, for example.
Requirement:
Example:
CN=Manager,CN=Users,DC=mydomaincontroller,DC=com
WARNING
Providers Select Disabled if you want to add the server to ECS but not
immediately use it for authentication. (Regardless of whether
this property is true, ECS validates that the provider's name and
domain are unique.)
Group Attribute Indicates the Active Directory attribute that is used to identify a
group. Used for searching the directory by groups.
Example: CN
Note
Example:
Search Scope One Level (search for users one level under the search base) or
Subtree (search the entire subtree under the search base).
Search Base Indicates the Base Distinguished Name that ECS uses to search
for users at login time and when assigning roles or setting ACLs.
Example: CN=Users,DC=mydomaincontroller,DC=com
Example:
CN=Users,OU=myGroup,DC=mydomaincontroller,DC=com
Search Filter Indicates the string used to select subsets of users. Example:
userPrincipalName=%u
Note
ECS does not validate this value when you add the
authentication provider.
The decision to add a single authentication provider, or multiple, depends on the number
of domains in the environment, and the location on the tree from which the manager user
is able to search. Authentication providers have a single search_base from which
searches are conducted. They have a single manager account who must have read access
at the search_base level and below.
Use a single authentication provider for multiple domains if you are managing an Active
Directory forest and:
l the manager account has privileges to search high enough in the tree to access all
user entries
l the search will be conducted throughout the whole forest from a single search base,
not just the domains listed in the provider.
Otherwise, configure an authentication provider for each domain.
Note that even if you are dealing with a forest and you have the correct privileges, you
might not want to manage all the domains with a single authentication provider. You
would still use one authentication provider per domain when you need granularity and
tight control on each domain, especially to set the search base starting point for the
search. Since there is only one search base per configuration, it needs to include
everything that is scoped in the configuration in order for the search to work.
The search base needs to be high enough in the directory structure of the forest for the
search to correctly find all the users in the targeted domains.
l If the forest in the configuration contains ten domains but you target only three, do
not use a single provider configuration, because the search will unnecessarily span
the whole forest, and this may adversely affect performance. In this case, use three
individual configurations.
l If the forest in the configuration contains ten domains and you want to target ten
domains, a global configuration is a good choice, because there is less overhead to
set up.
The example below shows the use of multiple mapping criteria. All members of the
corp.sean.com domain who belong to the Storage Admins group and have their
Department attribute set to Accounts AND Company set to Acme, OR belong to the
Storage Admins group and have their Department set to Finance, will be mapped into the
namespace.
Procedure
1. At the ECS portal, select Manage > Namespace.
2. In the Namespaces table, click on the Edit action for the namespace to open it for
editing.
3. If a domain hasn't already been specified, click Add to add a mapping and enter the
domain name in the Domain field.
4. Specify any groups that you want to use to map users into the namespace.
The group or groups that you specify must exist in AD.
5. If you want to use attributes to map users into the namespace enter the name of the
attribute and the value or values for the attribute. If you do not want to use attributes
to map users into the namespace, click the delete button to remove the attribute
fields from the current mapping.
For users to be mapped into the domain, the attribute value set for the user must
match the attribute value specified in ECS.
6. Save the namespace settings.
l Introduction.......................................................................................................... 74
l Quotas.................................................................................................................. 74
l Retention periods and policies.............................................................................. 75
l Lock buckets and users......................................................................................... 76
l Metering............................................................................................................... 77
l Audit buckets........................................................................................................78
Manage tenants 73
Manage tenants
Introduction
ECS provides a number of features to support the management of a tenant.
The following features are supported:
Users
The ability to assign a Namespace Admin for the namespace and to create object
users for the namespace is described in Add users and assign roles on page 54.
Quotas
The ability to set quotas on namespaces and buckets is described in Quotas on page
74.
Retention Periods
The ability to create retention policies is described in Retention periods and
policies on page 75.
Metering
The ability to meter the writing of data to buckets and namespaces is described in
Metering on page 77.
Audit buckets
The ability to audit the operations associated with buckets is described in Audit
buckets on page 78.
Quotas
You can set soft and hard quotas on a namespace and on buckets created within a
namespace.
Soft quotas cause events to be logged to inform you that the quota has been reached;
hard quotas provide a hard limit on the amount of object storage that can be used for a
bucket or namespace - when the limit is reached, access to the bucket or namespace is
blocked.
Quotas can be set from the ECS Portal or using the API and the CLI.
Setting quotas from the portal
You can set quotas for a namespace from the Manage > Namespace page, as described in
Configure a namespace for a tenant on page 46.
Quotas for a bucket are set from the Manage > Bucket page, as described in Create and
configure buckets on page 86 .
Setting quotas using the API
The following API paths provide the ability to set quotas:
Method Description
PUT/GET/DELETE /object/namespaces/ Sets the quota for a namespace. The payload
namespace/{namespace}/quota specifies hard and soft quotas.
Method Description
PUT/GET/DELETE /object/bucket/ Sets the quota for a bucket. The payload
{bucketName}/quota specifies hard and soft quotas.
You can find more information about the ECS Management REST API in: Data Access
Guide: Use the ECS Management REST API and the online reference is here.
or you can create them using the ECS Management REST API, a summary of which is
provided below.
Method Description
PUT /object/bucket/{bucketName}/retention The retention value for a bucket defines a
mandatory retention period which is applied to
every object within a bucket. So, if you set a
retention period of 1 year, an object from the
bucket can not be modified or deleted for one
year.
You can find out how to access the ECS Management REST API in the following article:
Data Access Guide: Use the ECS Management REST API and the online reference is here.
How to apply retention policies and periods
You can apply retention periods to buckets at the ECS Portal.
When you create objects or buckets using the object service protocols, for example, when
you create an S3 bucket using a client that supports the S3 protocol, you can apply the
retention period or retention policy using x-ems headers.
When you create objects, you can apply the following retention period and retention
policy headers:
l x-emc-retention-period
l x-emc-retention-policy
When you create a bucket, you can set the retention period using the x-emc-retention-
period header.
Method Description
PUT /object/bucket/{bucketName}/lock Locks a bucket so that all writes to the bucket
are disallowed.
PUT /object/users/{userid}/lock Locks an object user (not AD user) such that all
subsequent API operations performed by the
user return an error.
You can find out how to access the ECS Management REST API in the following article:
Data Access Guide: Use the ECS Management REST API and the online reference is here.
Metering
ECS provides support for metering the use of the object storage at the namespace and
bucket level.
Attribute Description
Total Size (GB) Total size of the objects stored in the selected namespace or
bucket at the end time specified in the filter.
Bandwidth Ingress (MB) Total of incoming object data (writes) for the selected
namespace or bucket during the specified period.
Bandwidth Egress (MB) Total of outgoing object data (reads) for the selected namespace
or bucket during the specified period.
Note
Metering data is not available immediately as it can take a significant amount of time to
gather the statistics for data added to the system and deleted from the system.
Metering 77
Manage tenants
Refer to Monitor storage: metering and capacity for more information on accessing these
details.
Metering using the API
The following API paths provide the ability to retrieve metering information:
Method Description
GET /object/billing/buckets/{namespace}/ Gets the current usage for a bucket in a
{bucket}/info?sizeunit=<KB|MB|GB> specified namespace.
You can find more information about the ECS Management REST API in: Data Access
Guide: Use the ECS Management REST API and the online reference is here.
Audit buckets
The controller API provides the ability to audit the use of the S3, EMC Atmos, and
OpenStack Swift object interfaces.
The following operations on object containers (S3 buckets, EMC Atmos subtenants, and
OpenStack Swift containers) are logged.
l Create Bucket
l Delete Bucket
l Update Bucket
You can find more information about the ECS Management REST API in: Data Access
Guide: Use the ECS Management REST API and the online reference is here.
Audit buckets 79
Manage tenants
Remove a site 81
Remove a site
l Licensing...............................................................................................................84
l Obtain the EMC ECS license file.............................................................................84
Manage licenses 83
Manage licenses
Licensing
EMC ECS licensing is capacity-based.
At a minimum you need to obtain at least an ECS license and upload it to the appliance.
The Settings > License page provides additional details.
l Introduction.......................................................................................................... 86
l Bucket concepts....................................................................................................86
l Bucket attributes...................................................................................................87
l Bucket ACLs.......................................................................................................... 92
l Create a bucket using the ECS Portal..................................................................... 93
l Edit a bucket......................................................................................................... 94
l Set the bucket ACL permissions for a user............................................................. 95
l Set the bucket ACL permissions for a pre-defined group........................................ 96
l Set custom group bucket ACLs.............................................................................. 97
l Create bucket using the object APIs.......................................................................98
l Bucket and key naming conventions................................................................... 102
Introduction
Containers are required to store object data. In S3 these containers are called buckets
and this term has been adopted as a general term in ECS. In Atmos, the equivalent of a
bucket is a subtenant, in Swift, the equivalent of a bucket is a container, and for CAS, a
bucket is a CAS pool.
In ECS, buckets are assigned a type which can be S3, Swift, Atmos, or CAS. In addition,
S3, Atmos, or Swift buckets can be configured to support file system access (for HDFS),
and a bucket configured for file system access can be read and written using its object
protocol and using the HDFS protocol. This is often referred to as cross-head support.
Buckets can be created for each object protocol using its API, usually using a client that
supports the appropriate protocol. Additional support for creating S3, HDFS, and CAS
buckets is provided by the ECS Portal and the ECS Management API. The ability to create
buckets from the portal makes it easy to create buckets for HDFS and CAS and makes it
easy to take advantage of some of the more advanced bucket configuration options
provided by ECS, such as quotas and retention periods.
Where you want to create buckets using the object protocols, you can use special x-emc
headers to control bucket configuration.
This article describes how to create and edit buckets, and set ACLs for a bucket, using the
ECS Portal and also describes the additional x-emc headers that you can use to control
bucket configuration when using the supported object protocols.
Bucket concepts
Buckets are object containers and can be used to control access to objects and to set
properties that define attributes for all contained objects, such as retention periods and
quotas.
Bucket access
Buckets are associated with a replication group. Where the replication group spans
multiple VDCs, the bucket contents are similarly replicated across the VDCs. Objects in a
bucket that belongs to a replication group which spans two VDCs, VDC1 and VDC2, for
example, can be accessed from either VDC1 or VDC2. Objects in a bucket that belongs to
a replication group that is only associated with VDC1, can only be accessed from VDC1,
they cannot be accessed from other VDCs in a federated ECS system.
The identity of a bucket and its metadata, such as its ACL, are global management
information in ECS, which means that they are replicated across the system storage pools
and can be seen from all VDCs in the federation. However, the bucket can only be listed
from a VDC that is part of the replication group to which the bucket belongs.
Bucket ownership
A bucket belongs to a namespace and object users are also assigned to a namespace.
Each object user can create buckets only in the namespace to which they belong,
however, any ECS object user can be assigned as the owner of a bucket or object, or a
grantee in a bucket ACL, even if the user does not belong to the same namespace as the
bucket or object. This enables buckets and objects to be shared between users in
different namespaces. For example, in an enterprise where a namespace is a department,
a bucket or object can be shared between users in different departments.
When an object user wants to access a bucket in a namespace that they don't belong to,
the namespace must be specified using the x-emc-namespace header.
Bucket attributes
The ECS Portal enables buckets to be created and managed at the Manage > Buckets
page.
The Bucket Management page provides a bucket table which displays the buckets for a
selected namespace. The table displays bucket attributes and provides Edit Bucket, Edit
ACL, and Delete actions for each bucket.
The attributes associated with a bucket are described in the following table. To view and
change attributes that are not displayed on the Bucket Management page, you can select
Edit Bucket.
Bucket Tagging Tags are name-value pairs that can be defined for a bucket and Yes
enable buckets to be classified.
More information on bucket tagging is provided in: Bucket
tagging on page 91.
Quota Quota for a bucket. Behavior associated with exceeding the Yes
quota can be defined by setting Hard (Block) and Soft
(Notification) and quotas.
Soft (Notification) Quota
Quota setting at which you will be notified. This is a soft
quota and can be set on its own or can be set in addition to
a hard quota.
The quota cannot be set less than 1GB.
More information on quotas is provided in: Manage a
tenant on page 74.
File System Indicates that ECS will allow the bucket to be used as a Hadoop No
Distributed File System (HDFS).
To simplify access to the file system, a default group, and
default permissions associated with the group, can be defined.
More information can be found in Default Group on page 89
Metadata Search Indicates that metadata search indexes will be created for the No
bucket based on specified key values.
Note
Access During A flag set on the bucket which specifies the behavior when Yes
Outage accessing data in the bucket when there is a temporarily
unavailable zone in a geo-federated setup.
If you set this flag to Enabled, and a temporary site outage
occurs, objects that you access in this bucket might have been
updated at the failed site but changes might not have been
propagated to the site from which you are accessing the object.
Hence, you are prepared to accept that the objects you read
might not be up to date.
If the flag is Disabled, data in the zone which has the temporary
outage is not available for access from other zones and object
reads for data which has its primary in the failed site will fail.
Default Group
Where a bucket is enabled for file system access, it is possible to specify a default group
for the bucket. When accessed as a file system, the members of the Unix group can
access the file system. Without this assignment, only the bucket owner would be able to
access the file system.
In addition, files and directories created using object protocols can be assigned group
permissions that will enable members of the Unix group to access them.
The File System Enabled dialog is shown below.
Default Group 89
Create and manage buckets
When a Metadata Key Type of User is selected (see below), you must specify the name of
the user metadata to create an index for. In addition, you need to specify the data type so
that ECS knows how to interpret the metadata values provided in search queries.
You can read more about metadata search feature in Data Access Guide: Metadata
search S3 extension .
Bucket tagging
Tags in the form on name-value pairs can be assigned to a bucket enabling object data
stored in the bucket to be categorized. For example, bucket data can be associated with a
cost-center or project.
Bucket tags and values can be read and managed using the ECS Portal or using custom
clients with the ECS Management REST API. In addition, bucket tags are included in the
metering data reports in the ECS Portal or ECS Management REST API.
The bucket tagging dialog is shown below.
Bucket tagging 91
Create and manage buckets
Bucket ACLs
The privileges a user has when accessing a bucket are set using an Access Control List
( ACL).
When you create a bucket and assign an owner to it, an ACL is created that assigns a
default set of permissions to the bucket owner - the owner is, by default, assigned full
control.
You can modify the permissions assigned to the owner or you can add new permissions
for a user by selecting the Edit ACL operation for the bucket.
At the ECS Portal, the Bucket ACLs Management page provides User ACLs, Group ACLs,
and Custom Group ACLs panels to manage the ACLs associated with individual users and
pre-defined groups, and to allow groups to be defined that can be used when accessing
the bucket as a file system.
The ACL attributes are provided in the following table.
ACL Permission
Read Allows user to list the objects in the bucket.
Write ACL Allows user to write the ACL for the bucket.
Execute Sets the execute permission when accessed as a file system. This permission
has no effect when the object is accessed using the ECS object protocols.
Full Control Allows user to Read, Write, Read ACL, and Write ACL.
Privileged Write Allows user to perform writes to a bucket or object when the user doesn't have
normal write permission. Required for CAS buckets.
Delete Allows user to delete buckets and objects. Required for CAS buckets.
User ACLs
The User ACL panel show the ACLs that have been applied to users and enables ACLs to
be assigned to a user using the Add operation.
Note
Because the ECS Portal supports S3, HDFS, and CAS buckets, the range of permissions
that can be set are not applicable to all bucket types.
Group ACLs
You can set permissions for a set of pre-defined groups. The following groups are
supported:
public
All users authenticated or not.
all users
All authenticated users.
other
Authenticated users but not the bucket owner.
log delivery
Not supported.
The permissions that can be assigned are listed in Table 7 on page 92.
Custom Group ACLs
Custom group ACLs enable groups to be defined and for permissions to be assigned to
the group. The main use case for assigning groups to a bucket is to support access to the
bucket as a file system, for example, when making the bucket available for HDFS.
Note
If the bucket is to be used for CAS, you cannot enable metadata search as a similar
search capability is provided in the implementation of the Centera API.
12. Set Access During Outage as Enabled if you want the bucket to be available during a
temporary site outage.
13. If required, set a bucket retention period for the bucket.
You can read more about retention periods in: Retention periods and policies on page
75.
14. Select Save to create the bucket.
Results
You can assign users to the bucket and set permissions for users (or pre-defined groups)
from the buckets table Actions menu.
Edit a bucket
You can edit some bucket settings after the bucket has been created and after it has had
objects written to it.
Before you begin
l You must be a Namespace Admin or a System Admin to edit a bucket.
l If you are a Namespace Admin you can edit the setting for buckets belonging to your
namespace.
l If you are System Admin you can edit the settings for a bucket belonging to any
namespace.
Procedure
1. At the ECS portal, select Manage > Buckets.
2. In the Buckets table, select the Edit action for the bucket for which you want to
change the settings.
3. You can edit the following bucket attributes:
l Quota
l Bucket Owner
l Bucket Tagging
l Access During Outage
l Bucket Retention
You cannot change the following attributes of the bucket:
l Replication Group
l Server-side Encryption
l File System Enabled
l CAS Enabled
l Metadata Search
You can find out more information about these settings in: Bucket concepts on page
86.
4. Select Save.
2. In the Buckets table, select the Edit ACL action for the bucket for which you want to
change the settings.
3. To set the ACL permissions for a user, select the User ACLs button.
To select the ACL for a group, select Group ACLs or Custom Group ACLs. You can refer
to Set the bucket ACL permissions for a pre-defined group on page 96 or Set custom
group bucket ACLs on page 97for more information on setting group ACLs.
4. You can edit the permissions for a user that already has permissions assigned, or you
can add a user that you want to assign permissions for.
l To set (or remove) the ACL permissions for a user that already has permissions,
select Edit (or Remove) from the Action column in the ACL table.
2. In the Buckets table, select the Edit ACL action for the bucket for which you want to
change the settings.
3. To set the ACL permissions for a pre-defined group, select the Group ACLs button.
You can read more about the pre-defined groups in: Bucket concepts on page 86
2. In the Buckets table, select the Edit ACL action for the bucket for which you want to
change the settings.
3. To set the ACL for a custom group, select Custom Group User ACLs.
4. At the Custom Group User ACLs page, select Add.
x-emc-file-system-access-enabled
Configures the bucket for HDFS access. The header must not conflict with the
interface that is being used. That is, a create bucket request from HDFS cannot
specify x-emc-file-system-access-enabled=false.
x-emc-namespace
Specifies the namespace to be used for this bucket. If the namespace is not
specified using the S3 convention of host/path style request, then it can be
specified using the x-emc-namespace header. If the namespace is not specified
as this header, the namespace associated with the user is used.
x-emc-retention-period
Specifies the retention period that will be applied to objects in a bucket. Each time a
request is made to modify an object in a bucket, the expiration of the retention
period for the object is calculated based on the retention period associated with the
bucket.
x-emc-is-stale-allowed
Specifies whether the bucket can be accesses during a temporary VDC outage in a
federated configuration.
x-emc-server-side-encryption-enabled
Specifies whether objects written to a bucket are encrypted.
x-emc-metadata-search
Specifies one or more user or system metadata values that will be used to create
indexes of objects for the bucket. The indexes can be used to perform object
searches that can be filtered based on the indexed metadata.
The response provides the name and identity of all data services virtual pools. For
example:
<data_service_vpools>
<data_service_vpool>
<creation_time>1403519186936</creation_time>
<id>urn:storageos:ReplicationGroupInfo:8fc8e19b-edf0-4e81-
bee8-79accc867f64:global</id>
<inactive>false</inactive>
<tags/>
<description>IsilonVPool1</description>
<name>IsilonVPool1</name>
<varrayMappings>
<name>urn:storageos:VirtualDataCenter:1de0bbc2-907c-4ede-
b133-f5331e03e6fa:vdc1</name>
<value>urn:storageos:VirtualArray:793757ab-ad51-4038-
b80a-682e124eb25e:vdc1</value>
</varrayMappings>
</data_service_vpool>
</data_service_vpools>
3. Set up s3curl by creating a .s3curl file in which to enter the user credentials.
The .s3curl file must have permissions 0600 (rw-/---/---) when s3curl.pl is run.
In the example below, the profile "my_profile" is used to reference the user
credentials for the "[email protected]" account, and "root_profile" references the
credentials for the root account.
%awsSecretAccessKeys = (
my_profile => {
id => '[email protected]',
key => 'sZRCTZyk93IWukHEGQ3evPJEvPUq4ASL8Nre0awN'
},
root_profile => {
id => 'root',
key => 'sZRCTZyk93IWukHEGQ3evPJEvPUq4ASL8Nre0awN'
},
);
4. Add the endpoint that you want to use s3curl against to the .s3curl file.
This will be the address of your data node or the load balancer that sits in front of your
data nodes.
For example:
push @endpoints , (
'203.0.113.10', 'lglw3183.lss.emc.com',
);
5. Modify the s3curl.pl script so that it includes the x-emc headers in its "string to
sign".
Replace the following lines:
[^:]+): *(?'val'.+)$/) {
my $name = lc $+{header};
my $value = $+{val};
with:
my $name = lc $1;
my $value = $2;
Note that the -acl public-read-write argument is optional, but can be used to
set permissions to enable access to the bucket. For example, if you intend to access
to bucket as HDFS from an environment that is not secured using Kerberos.
If successful (with --debug on) you should see output similar to the following:
vpool:urn:storageos:ObjectStore:e0506a04-340b-4e78-
a694-4c389ce14dc8: http://203.0.113.10:9020/S3B4
Note
If you want to use a bucket for HDFS, you should not use underscores in the bucket name
as they are not supported by the URI Java class. For example, viprfs://
my_bucket.ns.site/ will not work as this is an invalid URI and is thus not
understood by Hadoop.
Namespace name
The following rules apply to the naming of ECS namespaces:
l Cannot be null or an empty string
l Length range is 1..255 (Unicode char)
l Valid characters are defined by regex /[a-zA-Z0-9-_]+/. Hence:
n Alphanumeric characters
n Special characters: hyphen (-) and underscore (_).
Note
l Introduction........................................................................................................ 108
l Bucket addressing.............................................................................................. 108
l Add a Base URL................................................................................................... 110
Introduction
Applications that are written to use Amazon S3 can be enabled to use ECS object storage
by setting the Base URL parameter. The Base URL is set by default to amazonaws.com.
This article describes how to set the Base URL and ensure that requests are routed to
ECS.
The following sections describe the addressing scheme supported by ECS, the use of the
Base URL parameter, and the mechanism for setting the Base URL parameter.
l Bucket addressing on page 108
l Add a Base URL on page 110
Bucket addressing
The ECS S3 service provides a number of ways in which to identify the bucket against
which the operation defined in a request should be performed.
When using the Amazon S3 service, all buckets names must be unique. However, the ECS
S3 service supports the use of a namespace, which can be used in addition to the bucket
name and allows buckets in different namespaces to have the same name. By assigning
a namespace to each tenant, a tenant can assign bucket names without regard for the
names currently used by other tenants. If no namespace is specified in a request, ECS
uses the default namespace associated with the tenant to which the user making the
request belongs.
The namespace that refers to the location of an object can be specified in the x-emc-
namespace header of an HTTP request. ECS also supports extraction of the location from
the host header and allows the following Amazon S3 compatible addressing schemes:
l Virtual Host Style Addressing on page 108
l Path Based Addressing on page 108
Virtual Host Style Addressing
In the virtual host addressing scheme, the bucket name appears in the hostname. For
example, the bucket called "mybucket" on host ecs1.yourco.com, would be accessed
using:
http://mybucket.ecs1.yourco.com
In addition, ECS also allows the inclusion of a namespace in the address. For example:
<bucketname>.<namespace>.ecs1.yourco.com
To use this style of addressing, you need to configure ECS so that it knows which part of
the URL is the bucket name. This is done by configuring the Base URL. In addition, you
need to ensure that your DNS system can resolve the address. The following sections
provide more information:
l DNS Configuration on page 109
l Base URL on page 109
Path Based Addressing
In the path based addressing scheme, the bucket name is added to the end of the path.
For example:
ecs1.yourco.com/mybucket
DNS Configuration
When accessing ECS storage using the S3 service, you will need to ensure that the URL
resolves to the address of the ECS data node, or the data node load balancer.
Where your application uses path-style addressing, this is simply a case of ensuring that
the base name is resolvable by DNS. For example, if your application normally issues
requests in the form ecs1.yourco.com/bucket, you will need to have a DNS entry that
resolves ecs1.yourco.com to the IP address of your load balancer used for access to ECS
nodes. If you are using the Amazon service this URI will be of the form: s3-eu-
west-1.amazonaws.com.
Where your application is using virtual host style addressing, the URL will include the
bucket name and can include a namespace. Under these circumstances, you will need to
ensure that you include a DNS entry that will resolve the virtual host style address. You
can do this by using a wildcard in the DNS entry.
For example, if your application normally issues requests in the form
bucket.s3.yourco.com, you will need to have two DNS entries.
l ecs1.yourco.com
l *.ecs1.yourco.com
Or, if If you are using an application that previously connected to the Amazon S3 service,
using bucket.s3.amazonaws.com, the entries would be:
l s3.amazonaws.com
l *.s3.amazonaws.com
These entries allow the base name to be resolved when issuing service-level commands
(for example, list buckets) and the virtual host style bucket address to be resolved.
If you are creating an SSL certificate for this service, it should have the wildcard entry on
the name of the certificate and the non-wildcard version as a Subject Alternate Name.
Base URL
If you have an S3 application that uses virtual host style addressing and you want to use
it to connect to ECS, the Base URL must be set to enable ECS to know which part of the
address refers to the bucket and, optionally, namespace. The Base URL can be set using
the ECS Portal, or using the ECS Management REST API, and requires the ECS System
Administrator role.
The Base URL Management page shows the Base URLs that have been created and how
ECS should use the them.
In order that ECS knows how to treat the bucket location prefix, the Base URL must be
configured by choosing one of the following options.
l Use Base URL with namespace
l Use Base URL without namespace
When processing a request, ECS will:
1. Try to extract namespace from the x-emc-namespace header. If found, skip the steps
below and process the request.
2. Get the hostname of the URL from the host header and check if the last part of the
address matches any of the configured Base URLs.
3. Where there is a BaseURL match, use the prefix part of the hostname (the part left
when the Base URL is removed), to obtain the bucket location.
The following examples demonstrate how ECS handles incoming HTTP requests with
different structures.
Example1
Host: baseball.image.emc.finance.com
BaseURL: finance.com
Use BaseURL with namespace enabled
Namespace: emc
Bucket Name: baseball.image
Example 2
Host: baseball.image.emc.finance.com
BaseURL: finance.com
Use BaseURL without namespace enabled
Example 3
Host: baseball.image.emc.finance.com
BaseURL: not configured
You must ensure that the domain specified in a request that uses a URL to specify an
object location resolves to the location of the ECS data node or a load balancer that sits
in front of the data nodes.
Procedure
1. At the ECS Portal, select Settings > Object Base URLs.
3. Enter the name of the Base URL. This will provide additional information about the
base URL when looking at the base URL table.
4. Enter the Base URL.
If your objects location URLs are in the form: https://
mybucket.mynamespace.acme.com (that is, bucket.namespace.baseurl )
or https://mybucket.acme.com (that is, bucket.baseurl), the base URL
would be acme.com.
Monitor 113
Monitor
l Filter: fill in filter fields and the date range and select Filter to display result rows that
match all filter fields. The default date range is always yesterday and today.
l Drill down displays with breadcrumbs: Breadcrumbs let you quickly drill up when you
have drilled down into detail screens. See the "Navigating with Breadcrumbs" figure
below.
l History charts with left to right mouse-overs: Get detailed charts showing hourly
snapshots for the last five days worth of data which you can browse through using
your mouse as a left-to-right chart cursor. See the example below. See the "History
chart with active cursor" figure below.
The standard monitoring filter provides the ability to narrow results by time and date. It is
available on several monitoring pages. Some pages have additional filter types. Select a
time range, then a date range, click apply, and the Filter panel closes and the page
content updates. Select the pin icon to keep the Filter panel open after applying the filter.
Figure 11 Open Filter panel with criteria selected
When the Filter panel closes, a summary of the applied filter displays along with a Clear
Filter command and a Refresh command.
Figure 12 Closed Fiter panel showing summary of applied filter
Highlighted text in a table row indicates a link to a detail display. Selecting the link drills
down to the next level of detail. On drill down displays, a path string shows your current
location in the sequence of drill down displays. This path string is called a breadcrumb
trail or breadcrumbs for short. Selecting any highlighted breadcrumb jumps up to the
associated display.
When you select a History button, all available charts for that row display below the
table. Mouse over a chart from left to right to see a vertical line that helps you find a
specific date-time point on the chart. A pop-up display shows the value and timestamp
for that point.
6. Click Apply to display the metering data for the selected namespace and bucket, and
time period.
Metering data
Object metering data for a specified namespace, or a specified bucket within a
namespace, can be obtained for a defined time period at the ECS portal Monitor >
Metering page.
The metering information that is provided is shown in the table below.
Attribute Description
Total Size (GB) Total size of the objects stored in the selected namespace or
bucket at the end time specified in the filter.
Bandwidth Ingress (MB) Total of incoming object data (writes) for the selected
namespace or bucket during the specified period.
Attribute Description
Bandwidth Egress (MB) Total of outgoing object data (reads) for the selected namespace
or bucket during the specified period.
Note
Metering data is not available immediately as it can take a significant amount of time to
gather the statistics for data added to the system and deleted from the system.
Procedure
1. Select Audit.
2. Optionally, select Filter.
3. Specify a Date Time Range and adjust the From and To fields and time fields.
4. Select a Namespace.
5. Click Apply.
Monitor alerts
Use the Alerts panel of the Events page to view and manage system alerts.
Procedure
1. Select Alerts.
2. Optionally, click Filter.
3. Select your filters. The alerts filter adds filtering by Severity and Type, as well as an
option to Show Acknowledged Alerts, which retains the display of an alert even after
acknowledged by the user.
Alert types must be entered exactly. Alert types are described in the table below:
4. Click Apply.
5. Next to each event, click the acknowledge button to acknowledge and dismiss the
message (if the Show Acknowledged Alerts filter is not selected).
Monitor capacity
You can monitor the capacity utilization of storage pools, nodes, and disks.
The capacity tables and displays are shown in Storage capacity data on page 128. Each
table has an associated History display that enables you to see how the table data has
changed over time.
Using the ECS Management REST API you can retrieve data programmatically using
custom clients. Support for this feature and other features that enable a tenant to be
managed is provided in Manage a tenant on page 74. The ECS Management REST API
Reference is provided here.
Procedure
1. At the ECS Portal, select Monitor > Capacity Utilization.
2. You can drill down into the nodes and to individual disks by selecting the appropriate
link in the table.
Guidance on navigating the tables is provided in Using monitoring pages on page
116.
3. To display the way in which the capacity has changed over time, select History for the
storage pool, node, or disk that you are interested in.
Attribute Description
Storage Pool Name of the storage pool.
Usable Capacity Total usable capacity. This is total of the capacity already used
and the capacity still free for allocation.
Attribute Description
If the Current filter is selected, the History button displays
default history for the last 24 hours.
The history display for the storage pool capacity utilization table is shown below.
Attribute Description
Nodes IP address of the node.
Disks Number of disks associated with the node. Click node number
to open: Disk Capacity Utilization on page 130
Usable Capacity Total usable capacity provided by the disks within the node.
This is total of the capacity already used and the capacity still
free for allocation.
The history display for the node capacity utilization table is shown below.
Attribute Description
Disks Disk identifier.
The history display for the disk utilization table is shown below.
Recent Transaction Failures per For each error code that occurred in the monitoring period,
type display that code's percent of the total errors.
Procedure
1. Select Monitor > Traffic Metrics.
2. Locate the target VDC name.
3. Optionally, select the VDC name to drill down to the nodes display.
4. Select History button for the target VDC or node.
l Monitor hardware................................................................................................136
Monitor hardware
Describes how to use the Monitor > Hardware Health page.
Hardware health is designated by three states:
l Good: The hardware component is in normal operating condition.
l Suspect: Either the hardware component is transitioning from good to bad because of
decreasing hardware metrics, or there is a problem with a lower-level hardware
component, or the hardware is not detectable by the system because of connectivity
problems.
l Bad: The hardware needs replacement.
In the case of disks, these states have the following meanings:
l Good: The system is actively reading from and writing to the disk.
l Suspect: The system no longer writes to the disk but will read from it. Note that
"swarms" of suspect disks are likely caused by connectivity problems at a node.
These disks will transition back to Good when the connectivity issues clear up.
l Bad: The system neither reads from nor writes to the disk. Replace the disk. Once a
disk has been identified as bad by the ECS system, it cannot be reused anywhere in
the ECS system. Because of ECS data protection, when a disk fails, copies of the data
that was once on the disk are recreated on other disks in the system. A bad disk only
represents a loss of capacity to the system--not a loss of data. When the disk is
replaced, the new disk does not have data restored to it. It simply becomes raw
capacity for the system.
Procedure
1. Select Monitor > Hardware Health.
2. Locate the table row for the target storage pool.
3. Optionally, select a storage pool name to drill down to the node display.
4. Optionally, select a node endpoint to drill down to the disk display.
Figure 17 Hardware Health
Avg. CPU Usage (%) VDC and Node Average percent of the
CPU hardware used by the
selected VDC or node.
Procedure
1. Locate the table row for the target VDC.
2. Optionally, select the VDC name to drill down to a table with rows for each node in the
VDC.
3. Optionally, select the a node endpoint to drill down to a table with rows for each
process running on the node.
4. Select the History button for the target VDC, node, or process.
Monitor chunks
Describes the ECS Portal monitoring page for chunks.
This page reports statistics for sealed chunks in the local zone. A sealed chunk is one
that can no longer accept writes. It is immutable.
Table Description
Chunk Count of Each Shows number and percentage of sealed chunks for different chunk
Type types per each storage pool configured in the local zone.
Total Length of Each Shows total logical size of sealed chunks for different chunk types per
Chunk Type each storage pool configured in the local zone.
Avg Sealed Length of Shows average logical size of sealed chunks for different chunk types
Each Type per each storage pool configured in the local zone.
User data This column provides relevant data for the user data (repository) chunks in the
storage pool.
Metadata This column provides relevant data for the system metadata chunks in the storage
pool.
Geo data Geo chunks are chunks containing replicas of data from other zones (VDCs).
This field provides relevant data for the geo-copy chunks in the storage pool.
XOR XOR chunks are chunks that save disk space by using the XOR algorithm to
compress data from other chunks and replace those chunks with an XOR chunk.
This field provides relevant data for the XOR chunks in the storage pool.
Chunk metrics
Figure 19 Chunk Summary
Column Description
Storage Pool
Total Data for Erasure The total logical size of all data chunks in the storage pool, which are
Coding subject to EC.
Total Data Erasure Coded The total logical size of all erasure-coded chunks in the storage pool.
% Erasure Coded Data The percent of data in the storage pool that is erasure coded.
Rate of Erasure Coding The rate at which any current data waiting for erasure coding is being
processed.
Est Time to Complete The estimated completion time extrapolated from the current erasure
coding rate.
Procedure
1. Select Monitor > Erasure Coding.
2. Locate the table row for the target storage pool.
3. Select the History button.
Column Description
Storage Pool Lists each storage pool in the local zone.
Recovery Rate Rate data is being recovered in the specified storage pool in.
Time to Completion Estimated time to complete the recovery extrapolated from the
current recovery rate.
Procedure
1. Select Monitor > Recovery Status.
2. Locate the table row for the target storage pool.
3. Select the History button.
Hardware Recovery Rate of disk bandwidth used to recover data after hardware failures.
Erasure Encoding Rate of disk bandwidth used in system erasure coding operations.
XOR Rate of disk bandwidth used in the system's XOR data protection
operations. Note that XOR operations occur for systems with three or more
sites (VDCs).
Consistency Checker Rate of disk bandwidth used to check for inconsistencies between
protected data and its replicas.
Procedure
1. Select Monitor > Disk Bandwidth.
2. Locate the target VDC name and either the Read or Write table row for that VDC.
3. Optionally, select the Node Count to drill down to a table with rows for the nodes in
the VDC.
4. Select the History button for the VDC or node.
Column Description
Replication Group Lists the replication groups this zone (VDC) participates in. Click a
replication group to see a table of remote zones in the replication group
and their statistics. Click the Replication Groups link above the table to
return to the default view.
Write Traffic The current rate of writes to all remote zones or individual remote zone in
the replication group.
Read Traffic The current rate of reads to all remote zones or individual remote zone in
the replication group.
User Data Pending The total logical size of user data waiting for replication for the replication
Replication group or remote zone.
Metadata Pending The total logical size of metadata waiting for replication for the replication
Replication group or remote zone.
Data Pending XOR The total logical size of all data waiting to be processed by the XOR
compression algorithm in the local zone for the replication group or remote
zone.
Column Description
Remote Replication At the VDC level, lists all remote replication groups the local zone
Group\Remote Zone participates in. At the replication group level, this column lists the remote
zones in the replication group. The data listed is the system identifier for
the VDC or replication group as an URN.
Overall RPO (mins) The recent time period for which data might be lost in the event of a local
zone failure.
Figure 22 RPO
Field Description
Replication Lists the replication groups that the local zone is a member of. The data listed
Group is the system identifier for the replication group as an URN.
Failed Zone Identifies failed zone that is part of the replication group.
User Data Chunks which used to be replicated to the failed zone have to be re-replicated
Pending Re- to a different zone. The field reports logical size of all user data (repository)
replication chunks waiting re-replication to a different zone instead of the failed one"
Metadata Chunks which used to be replicated to the failed zone have to be re-replicated
Pending Re- to a different zone. This field reports logical size of all system data chunks
replication waiting re-replication to a different zone instead of the failed one.
Data Pending Shows the count and total logical size of chunks waiting to be retrieved by the
XOR Decoding XOR compression scheme.
Failover A percentage indicator for the overall status of the failover process.
Progress
Figure 23 Failover
Column Description
Replication This column provides the list of replication groups the local zone participates
Group in with new zones being added. Each row provides metrics for the specified
replication group.
Added Zone The zone being added to the specified replication group.
User Data The logical size of all user data (repository) chunks waiting replication to the
Pending new zone being added.
Replication
Metadata The logical size of all system metadata waiting replication to the new zone
Pending being added.
Replication
Bootstrap State l Started: The system has begun preparing to add the zone to the
replication group.
l BlindReplayDone
l ReplicationCheckDone: The process that checks to make sure that all
replication chunks are in an acceptable state has completed successfully.
l ConsistencyCheckDone: The process that makes sure that all system
metadata is fully consistent with other replicated data has completed
successfully.
l ZoneSyncDone: The synchronization of the failed zone has completed
successfully.
l ZoneBootstrapDone: The bootstrap process on the failed zone has
completed successfully.
l Done: The entire bootstrap process has completed successfully.
Column Description
Bootstrap The completion percent of the entire bootstrap process.
Progress (%)
l Service logs.........................................................................................................162
l ECS service log locations.....................................................................................162
Service logs
Describes the location and function of the ECS service logs.
Storage administrators can access ECS service logs if you have permission to access a
node and access the logs. Using the Monitoring pages of the ECS Portal is usually a better
way to understand the state of your system.
Note
From ECS 2.2 HF1cassvc, objheadsvc and hdfssvc services are combined into
dataheadsvc.