Nutanix Files User Guide
Nutanix Files User Guide
Files Overview.............................................................................................................. 15
File Server View in Prism......................................................................................................................................15
Files Console.............................................................................................................................................................. 18
Dashboard View............................................................................................................................................18
Monitoring View............................................................................................................................................19
Shares View................................................................................................................................................... 25
Data Management View........................................................................................................................... 29
Alerts & Events View.................................................................................................................................29
Tasks View......................................................................................................................................................32
Configuration View..................................................................................................................................... 33
File Analytics.............................................................................................................................................................35
ii
Disconnecting Shares................................................................................................................................94
Nested Shares and Exports................................................................................................................................ 94
Durable SMB File Handles...................................................................................................................................96
Managing Limited Local Users (SMB Only)................................................................................................. 96
Configuring Backup for Distributed Shares................................................................................................. 97
Enabling SMB Symlinks........................................................................................................................................ 98
Setting Directory-Level Quotas.........................................................................................................................99
User Management.....................................................................................................110
User Mapping........................................................................................................................................................... 110
Configuring User Mapping.......................................................................................................................111
Managing Roles........................................................................................................................................................117
Managing REST API Roles...................................................................................................................... 118
Authorizing a REST API User................................................................................................................ 118
Quotas......................................................................................................................................................................... 119
Managing Quotas........................................................................................................................................121
Files Options...............................................................................................................125
Cloning........................................................................................................................................................................125
Cloning a File Server................................................................................................................................125
Encryption................................................................................................................................................................. 127
Files Data Collection.............................................................................................................................................127
Access-Based Enumeration (SMB only)....................................................................................................... 127
File Blocking............................................................................................................................................................ 128
Blocking Files on a File Server............................................................................................................ 128
Antivirus (AV) Scanning (SMB Only)............................................................................................................ 129
Configuring Antivirus Scanning (SMB Only)................................................................................... 131
Antivirus Tab................................................................................................................................................132
Files REST APIs...................................................................................................................................................... 134
Performance Optimization....................................................................................135
Managing Performance Optimization............................................................................................................135
Unblocking Rebalancing......................................................................................................................... 138
Workload Optimization....................................................................................................................................... 138
Modifying the Workload Type..............................................................................................................138
File System Compression................................................................................................................................... 139
iii
Activating Disaster Recovery............................................................................................................... 144
High Availability......................................................................................................................................................147
Smart Tiering........................................................................................................................................................... 147
Self-Service Restore..............................................................................................................................................147
Enabling Self-Service Restore.............................................................................................................. 148
Adding Snapshot Schedules.................................................................................................................149
Retrieving Files (SMB Only)...................................................................................................................151
Retrieving Files (NFS Only)................................................................................................................... 151
Deleting SSR Snapshots.......................................................................................................................... 151
Setting Custom Snapshot Times.........................................................................................................152
Troubleshooting.........................................................................................................157
Invalid Mounts After Authentication Change............................................................................................. 157
Client Access Denial (NFS Protocol)............................................................................................................. 157
Clients Cannot Mount Shares........................................................................................................................... 157
Client Side Network Mapping...........................................................................................................................157
Connecting to Authentication Services........................................................................................................158
Constraint Violation.............................................................................................................................................. 158
DNS Missing SRV Records................................................................................................................................. 158
Domain Controller Issues....................................................................................................................................158
Finding IP Addresses........................................................................................................................................... 158
Identifying the Share Owner.............................................................................................................................159
Invalid Credential................................................................................................................................................... 159
NLM Locks................................................................................................................................................................ 159
Network Cannot Expand.................................................................................................................................... 159
NTLM Authentication Issues............................................................................................................................. 160
Share Copying........................................................................................................................................................ 160
Stale Statistics........................................................................................................................................................ 160
Time Difference...................................................................................................................................................... 160
Unsuccessful Authentication.............................................................................................................................. 161
Copyright..................................................................................................................... 162
INTRODUCTION TO NUTANIX FILES
Nutanix Files (Files) is a software-defined, scale-out file storage solution that lets you share files
in a centralized and protected location to eliminate the requirement of a third-party file server.
Files uses a scale-out architecture that provides file services to clients through the Server
Message Block (SMB) and Network File System (NFS) protocols. Files combines one or more
file server VMs (FSVMs) into a logical file server instance sometimes referred to as a Files
cluster. You can create multiple file servers within a single Nutanix cluster.
Files creates a volume group (VG) for every FSVM to provide stable storage for persistent
states and audit events. During a service outage, the states, storage, and events of a VG fail-
over to another FSVM. Files also creates a dedicated container for every file server instance. If
you choose to delete a file server, you can delete the container in Prism the fact.
Tip: Solutions Documentation offers tech notes that include performance best practices,
sizing recommendations, migration guidance, and an in-depth technical overview of Files
architecture.
Files offerings also include File Analytics, for statistics and monitoring of file servers, and the
Files Manager for a unified control plane of all file servers. For more information on these
products, see the File Analytics Guide and the Files Manager Guide.
Features
Files includes the following salient features:
Networking
Files uses storage and client networks.
• Storage network: The storage network enables communication between the FSVMs and the
Controller VMs.
• Client network: The client network enables communication between the clients and the
FSVMs, allowing clients to access the Files shares. Files also uses the client network to
communicate with the directory services.
Files Deployment
Files deployment overview and requirements.
To deploy Files in a Nutanix cluster, do the following:
1. Satisfy the prerequisites and port requirements, see Prerequisites on page 7 and Port
Requirements on page 7.
2. Install the Files software, see Installing (or Upgrading) Files on page 12.
3. Create a file server instance (Files cluster), see Creating a File Server on page 36.
4. Create one or more file shares (SMB) or exports (NFS), see Share and Export Management
on page 64.
Port Requirements
Files has various firewall requirements depending on the protocols and services being used.
The Port Reference provides detailed port information for Nutanix products and services,
including port sources and destinations, service descriptions, directionality, and protocol
requirements.
Prerequisites
Review this section carefully to ensure you have satisfied the prerequisites before attempting to
deploy Files.
Limitations
File servers require the following minimum configurations.
Note: Refer to Files Release Notes for release-specific details on supported configurations and
software compatibility.
Network Requirements
The storage network requires at least one more IP address than the number of FSVMs. The
client network requires the same number of IP addresses as the number of FSVM nodes.
Required Information
Collect the following information before deploying Files.
NTP Server Used for the time synchronization between the file
server and AD service.
DNS server names Files uses DNS to resolve FSVM names and access
external services.
iSCSI data services IP address Files uses iSCSI to connect the storage to the FSVMs.
See the Nutanix Volumes Guide for more information
about iSCSI storage.
Storage network gateway The VLAN that connects the Controller VM to the
FSVM.
Storage network subnet The storage network subnet value.
Storage network IP address range If there is more than one FSVM, the number of IP
addresses is the total number of FSVMs (one FSVM
per node) plus one more address. For example, in a
three-node cluster you will need four IP addresses,
and in a four-node cluster you will need five. Single-
FSVM deployments require only one storage network
IP address.
Client network gateway VLAN connects the FSVM to the AD and DNS.
Client network subnet Subnet of client network.
Client network IP address range One IP address for each FSVM in the file server. For
example, a three FSVM file server needs three IP
addresses.
Note:
Tip: The Nutanix Files Release Notes provide details on updates in each Files and FSM version.
To check the current version of Files or the FSM, and to upgrade to later versions, perform the
inventory check in LCM. For steps on performing inventory and upgrades in LCM, refer to the
Life Cycle Manager Guide.
Note:
• [ESXi only] When performing one-click hypervisor upgrades that have Files, disable
the anti-affinity rules on all FSVMs. After the hypervisor successfully upgrades,
enable the anti-affinity rules on the FSVMs.
• ESXi hosts that belong to multiple vSphere clusters or are deployed across multiple
datacenters might experience limitations. See KB 5369 for more information.
Procedure
6. To download software, click the Download button for the target upgrade version.
a. File server metadata file: click the Choose File button and select the target Files
metadata file.
• Action buttons to create a file server (see Creating a File Server on page 36), to configure
the network (see Updating the Network Configuration on page 55), and to deploy File
Analytics (see File Analytics).
• An entities table displays information about each file server. You can filter the table contents
by entering a string in the search field located above the table.
Note: The Recommendations column is disabled. See Recommendations in the Files Console
dashboard.
• A File Summary pane displays high-level details about file servers on the cluster, and, after
selecting a file server, the File Server Details pane displays summary information for that file
server.
• A gear icon with options to download the table content in the CSV or JSON format.
• A list of operations to perform on the file server that includes the following: Launch Files
Console (see Files Console on page 18, Clone (see Cloning on page 125), Update (see
File Server Updates on page 54), Protect (see Data Management on page 140), and
Delete (see Deleting a File Server on page 53). You can perform some of these operations
through the Files Console.
Note: The values for the parameters do not account for features applied by AOS or space used
at the storage container level.
Details Pane
Selecting a file server in the table presents detailed information in the File Server Details pane.
The following tables describe the fields.
The parameters described in this table represent values from the perspective of the file server.
DNS domain name The name of the domain that the file server is (DNS domain name)
registered to. "Not Protected" indicates that
the file server is not currently in a protection
domain.
Space used The total amount of storage space used within xx [GiB|TiB]
the file server currently.
Space used by The amount of space used within the file xx [MiB|GiB|TiB]
snapshots server to store snapshots currently.
Size The size of the file system of the file server. xx [TiB]
Protection domain The name of the protection domain that (protection domain
includes this file server. Clicking the name name)
displays the Data Protection view for that
protection domain. "Not Protected" indicates
that the file server is not in a protection
domain. See the Data Protection and Recovery
with Prism Element guide for information on
protection domains.
Storage container The name of the storage container of the file (storage container
server. Clicking the name displays the Storage name)
Container view for that storage container.
Protocol The protocols used by the file server. SMB, NFS, or both
SMB directory service The SMB protocol always uses Active Active Directory
Directory as the directory service.
NFS directory service The NFS protocol has multiple options for the Unmanaged, Active
directory service. Directory, or LDAP
Client-side network The name of the network used by clients. (network name)
Storage network The name of the network used for storage. (network name)
Alerts Tab
The Alerts tab displays a table of alerts for the selected file server. You can also see alert details
in the Files Console, see Alerts & Events View on page 29.
Files Console
The Files Console provides administrative tools and dynamically updated information for a
single file server and its shares.
Access the Files Console from the File Server view in Prism Element (PE) or from the Files
Manager (FM) in Prism Central (PC).
The Files Console consists of the following primary tabs:
• The Dashboard tab is the home page in the files console provides an overview of file server
dataDashboard View on page 18.
• The Shares tab provides detailed information on every share on the file server, see Share
Details View on page 27.
• The Data Management tab provides options for configuring disaster recovery, self-service
restore, and Smart Tiering, se Data Management on page 140.
• The Alerts & Events tab provides details of file server events and alerts on the file server with
an option to acknowledge each occurrence, see Alerts & Events View on page 29.
• The Tasks view displays a list of recent tasks and the current status of each task, s Tasks
View on page 32.
• The Configuration tab includes configuration options for the file server and a Platform view
that provides a configuration summary, see Configuration View on page 33.
Dashboard View
This Dashboard view is the landing page in the Files Console.
Dashboard
The Dashboard tab includes the following elements.
• A Capacity Summary pane that visualizes the data usage on the file server.
• A File Server Health pane indicates the health status of the file server.
• A Performance Summary pane that consists of a graph that displays current throughput,
current total IOPS, and current latency data.
• A Data Lens pane indicates whether you have or have not enabled Data Lens on the file
server, see the Nutanix Data Lens User Guide for more details.
• A top Top Shares pane includes a drop-down option to sort top-shares by storage used,
connections, and files.
• A Features pane that lists the features enabled on the file server.
• A Recommendations pane lists recommendations for improving the file server performance.
Monitoring View
The Monitoring tab includes subtabs with granular monitoring details.
Usage Tab
The Usage tab displays these graphs.
• The Storage Used graph displays a rolling time interval monitor of the storage space used
for data and snapshots on the file server. Hovering over the data displays the value for the
time specified on the horizontal axis. To isolate a data set, check or uncheck the Spaced
Used by Dataset and Space Used For Snapshots boxes.
• The Open Connections graph displays a rolling time interval monitor of the number of open
connections on the file server.
• The Number of Files graph displays a rolling time interval monitor of the total number of
files in the file server. Hovering over the data displays the value for the time specified on the
horizontal axis.
• The Top Shares by Current Capacity graph indicates the top shares using the most storage
capacity.
• The Top Shares by Current Connections graph indicates the top shares with the most
current open connections.
Performance Tab
The Performance tab includes the following elements.
• The Latency graph displays average latency across a rolling time interval monitor. Hovering
over the data displays the value for the time specified on the horizontal axis. Selecting the
Show I/O and Metadata Breakdown option above the graphs adds Write Latency, Read
Latency, and Metadata Latency data set options.
• The Throughput graph displays average throughput. Hovering over the data displays the
value for the time specified on the horizontal axis. Selecting the Show I/O and Metadata
Breakdown option above the graphs adds Write Throughput and Read Throughput data
options.
• The IOPS graph displays total I/O operations per second. Hovering over the data displays
the value for the time specified on the horizontal axis. Selecting the Show I/O and Metadata
Breakdown option above the graphs adds Write IOPS, Read IOPS, and Metadata IOPS data
options.
• The Top Shares by Current Latencypane displays the shares with the most latency.
• The Top Shares by Current Throughput pane displays the shares with the most throughput.
• The Top Shares by Current IOPS pane displays the shares with the most I/O operations per
second.
Antivirus Tab
The Antivirus tab displays antivirus scanning information (see Antivirus (AV) Scanning (SMB
Only) on page 129) in a set of subtabs:
The ICAP Servers tab displays a pane that lists the configured ICAP servers and panes with the
following details:
• The All ICAP Servers pull-down list lets you choose to scan data for all ICAP servers or for a
specific server based on its IP address.
• The ICAP Server pane indicates the scanned server.
• The Connection Status pane indicates whether the server connected to Files.
• The Number of Shares pane indicates the number of shares and exports scanned.
• The Average Latency graph displays the average response latency.
• The Files Scanned and Data Processed switches reveal the Files Scanned or the Data
Processed graphs. The Files Scanned graph displays the number of files scanned by the
server. The Data Processed graph displays the amount of data processed by the server.
The Reports tab provides two tables, one summarizing the latest scan and a second listing
the identified threats. The following table describes the fields. The first table provides a scan
summary, which includes the following fields:
•
The second table provides event details, which include the following columns:
• Share/Export: the name of the share or export in which the affected file resides.
• File Path: the path to the affected file.
• Threat Description: describes the detected threat.
• ICAP server: the IP address of the ICAP server that detected the threat.
Quarantined Files and Unquarantined Files tabs include tables that describe each of the
quarantined or unquarantined files and an action pull-down menu.
Share/Export name The name of the share or export where the (name)
affected file resides.
ICAP server The name of the ICAP server that detected (server name)
the threat.
Scan time The time when the file was quarantined (time)
(unquarantined).
• The Load Average graph displays a rolling time interval monitor of the CPU usage on the file
server as a percentage of total available CPU. Placing the cursor anywhere on the horizontal
axis displays the value then.
• The Memory Usage graph displays a rolling time interval monitor of the memory usage on
the file server in GB. Placing the cursor anywhere on the horizontal axis displays the value
then.
You can select the time interval (last week, last 24 hours, last 6 hours, or last 3 hours). You can
also select to display data for all shares or for specific shares.
Column Description
Name The name of the share or export. Clicking the
share opens the share Summary in the share
details view.
Share/Export path The file path to the share or export.
Protocol type The primary protocol of the share or export
(NFS or SMB).
Share type The data distribution type of the share.
Standard shares and exports contain all data
on a single FSVM. Distributed shares and
exports load balance data across all FSVMs of
the file server.
Share protection The disaster recovery policy status on the
share. See Data Protection and Recovery on
page 140.
Self-service restore The status of self-service restore for the share
or export (enabled or disabled). See Self-
Service Restore on page 147.
Compression The status of file-system level compression:
the green checkmark icon indicates enabled
compression, and the gray x icon indicates
disabled compression. See File System
Compression on page 139
Column Description
Name Name of the share.
Share/Export path Path to the share or export.
Space used The sum of space used by data, space used
by snapshots (logical), and space used by file
metadata.
Space used by snapshots The space used by self-service restore
snapshots.
Connections The average number of open connections on
the share.
IOPS The average number of input and output
operations per second.
Throughput The average throughput.
Latency The average latency.
Summary
The Summary tab includes the following elements:
• An Actions dropdown menu includes options to update some of the share configurations.
• A Capacity Summary pane visualizes the share capacity used by snapshot and actual data.
• A Share Properties pane includes details on the configuration of the share (see the "Share
Properties" table for more details).
• A Performance Summary pane consists of a graph that displays current throughput, current
total IOPS, and current latency data.
• A Features pane lists the features enabled on the share.
Share path The file path to the share or export. (share path)
Mount path The mount path to the share or export. (mount path)
Blocked file types The status of file blocking, see File Blocking on [enabled | disabled]
page 128.
Snapshots
The Snapshots tab includes a table that displays all snapshots of the share. The table includes
column with the following details:
• The Create Time indicates the time that Files took the snapshot.
• The Snapshot ID indicates the unique identified for the snapshot.
• The Total Space indicates the size of the snapshot.
• The Reclaimable Space indicates the amount of space that you can recover by deleting the
snapshot.
Quota Policies
The Quota Policies tab includes a New Quota Policy button and a table that displays all quota
policies on the share.
Metrics
The Metrics tab includes two more tabs: Usage and Performance.
The Usage tab includes the following dynamically updated graphs:
• The Protection tab includes more tabs for Disaster Recovery and Self-Service Restore.
• In the Disaster Recovery tab, configure Smart disaster recovery (DR) or protection-
domain-based DR. See Data Protection and Recovery on page 140.
• In the Self-Service Restore tab, configure snapshot schedules. See Self-Service Restore
on page 147.
• The Smart Tiering tab, includes an option to configure Smart Tiering using Data Lens. See
Smart Tiering on page 147.
The Alerts & Events view consists of the Alerts and the Events tab.
Alerts Tab
The Alerts tab includes the following elements:
(selection box) To select the alert, click this box. Clicking n/a
the Acknowledge or Resolve buttons
acknowledges or resolves all the selected
alerts.
Source entity Displays the entity name (File Server) to (entity name)
which this alert applies. Clicking the name
displays the details for that file server.
Create time Displays the date and time when the alert (time and date)
occurred.
The Events tab displays a table of events across all file servers. The following table describes
the event table fields.
Title Displays the event title and indicates related (message text)
entities.
Entities Displays the type of entity (File Server, [share, file server]
Share) to which the event applies. A comma-
separated list appears if it applies to multiple
entities. Clicking the entity name displays the
details for that file server, share, or export.
Event type Displays the category for the event. [storage, user action]
(create time) Displays the date and time when the event (time and date)
occurred.
Tasks View
The Tasks view in the Files Console.
The Tasks view indicates the tasks running on the file server and includes the following
elements:
• A tasks table that lists each administrative operation initiated on the file server.
• A filters menu to filter using pre-configured filters.
Configuration View
The Configuration view in the Files Console.
• Authentication
• Blocked file types
• Manage roles
• Update DNS entries
• Antivirus
• Platform
The Platfrom view includes the following elements:
• An Update drop-down menu includes options to update file server basics, scale up/ scale
down, and update the DNS and NTP servers.
• The Configuration Summary provides details about the configuration of the file server.
• The Files Cluster diagram provides a visual diagram of the file server configuration.
Parameter Description
Name The name of the file server.
Version The Files version.
File Server VMs Number of file server VMs on the file server.
Memory Maximum configured memory.
CPU Maximum configured CPU.
Protocol The primary protocol and, when applicable,
the secondary protocol (see Multi-Protocol
Support for Files on page 87).
SMB directory service The configured directory service for SMB
shares.
NFS directory service The configured directory service for NFS
shares.
DNS domain name The name of the domain name system (DNS)
for the file server.
Protection domain The name of the protection domain.
Storage container The name of the storage container.
File Analytics
File Analytics provides data and statistics on the operations and contents of a file server.
Once deployed, Files adds a File Analytics VM (FAVM) to the Files cluster. A single FAVM
supports all file servers in the cluster, but you must enable Analytics separately for each file
server. Files protects the data on the FAVM and keeps it in a separate volume group.
For deployment steps and administrative guidance, refer to the File Analytics Guide.
• No High Availability (HA) support. Single-FSVM deployments do not include other FSVMs
that an out-of-service FSVM can fall back on, see High Availability on page 147.
• No distributed share support. Since distributed shares and exports spread data across
multiple FSVMs, single-FSVM deployments only support standard shares.
Important: When the file server capacity or the container capacity reaches 100 percent, all
shares or exports within the file server become read-only and Files blocks write privileges. Prism
displays alerts when the file server capacity or the container capacity reaches 90 percent and
when either reaches 100 percent capacity.
Note: Provide two static IP addresses for each new FSVM, one for the client-side network and
one for the storage network.
Procedure
1. Go to the File Server view in Prism Element (PE) (see File Server View in Prism on page 15)
and click the + File Server button.
2. If a New File Server: Pre-Check window appears, review the displayed information and
address any unsatisfied prerequisites before continuing.
Files checks your current environment and either verifies it satisfies the prerequisites or
identifies where it does not meet the requirements (see Prerequisites on page 7). A blue
check mark indicates a satisfied prerequisite. Any unchecked items need attention. The
Note: To use the high-availability (HA) and DRS features, add all ESXi hosts under the same
ESXi cluster and place one FSVM per ESXi host.
• If you are satisfied with the recommended configuration, click Next button.
• To change the configuration, click Customize. The File Server Capacity Configuration
window displays. To change the configuration based on performance requirements,
enter the target number of connections and throughput amount (in MBps) in the SMB
Concurrent Connections and NFS Throughput in MBps fields and then click Save.
Note: If clients or the AD domain controllers are in the same subnet as the controller VM
(CVM) or the storage network, configure the same client-side and storage-side networks.
Otherwise, use separate client and storage networks. If you use the same network for both
a. VLAN (AHV) or Port Group (ESXi): Select the target VLAN or port group from the drop-
down list.
After selecting the target, configured network parameters display if the target is a
managed network.
d. NTP Servers: Enter the server names or IP addresses for the NTP servers. Use a comma-
separated list for multiple entries.
e. When all the entries are correct, click Next.
a. VLAN (AHV) or Port Group (ESXi): Use the pull-down list to select the desired VLAN or
port group for the storage network.
Once you select the target, if the target is a managed network, Files displays configured
network parameters.
6. In the Directory Services tab, select one or more protocols to use (check the Use SMB
Protocol box, Use NFS Protocol box, or both boxes).
Note: You can skip this step and select the protocols later, but you cannot use the file server
until this step is complete.
a. Active Directory Realm Name: Enter the Active Directory realm name for join domain
operations.
b. Username: Enter an AD username in the domain|username format or in the UPN format
username@ADrealm. You must have an administrator account or the following required
permissions for the relevant AD organizational unit (OU) realm:
Note:
• Do not remove the file-server computer object in AD, as that can cause file-
server services to be disrupted.
• If the DNS domain name of the file server is different from the AD domain
name, the following permission is also required:
Note: The default machine account password expiry period is 0, meaning the password
does not expire. To update the machine account password expiry period, see Setting AD
Machine Account Password Expiry on page 107.
h. [advanced option] Overwrite Existing Files Machine Account (if present): Check this box
to overwrite an existing machine account during the join-domain operation if one exists
with the same name as the file server.
i. [advanced option] Add Files Server DNS Entries Using the Same Username And
Password: Check this box to use AD credentials for adding DNS entries.
Ensure that the AD user account has DNS admin rights (when using Microsoft DNS).
• LDAP details: This section displays available LDAP (and LDAPS) servers. If there is
no data or the target server is not listed, click the + New LDAP Server button. A line
appears in the table. Enter the URI address for the server in the Server URI column
Note: When NFS uses AD, you do not need to configure user mapping for multi-protocol
access.
• Enable Identity Management for Unix (RFC 2307): Check this box if you have RFC
2307 configured for Active Directory.
• Active Directory Realm Name: Displays the Active Directory realm name (read-only).
Note: If you previously configured SMB, the following fields do not appear because
they are already configured for the SMB protocol.
Note: If the DNS domain name of the file server is different from the AD domain name,
the following permission is also required:
Note: The default machine account password expiry period is 0, meaning the password
does not expire. To update the machine account password expiry period, see Setting
AD Machine Account Password Expiry on page 107.
• Overwrite Existing Files Machine Account (if present): Check this box to overwrite an
existing machine account during the join-domain operation if one exists with the same
name as the file server.
d. Show NFS Advanced Options (optional): By default Files supports both NFSv3 and
NFSv4 protocols for exports. Check this box to modify the default NFS protocol version
for all exports on the file server.
• Enable NFSv3 by default for all exports: Un-check to disable NFSv3 by default for all
exports.
• Enable NFSv4 by default for all exports: Un-check to disable NFSv4 by default for all
exports.
• In the NFSV4 Domain field, enter the NFSv4 domain name. Files uses the DNS domain
name to map NFSv4 names to UIDs and GIDs; clients and servers must agree on the
mapping.
e. When all the fields in the Directory Services tab are correct, click Next.
What to do next
• If you choose to add DNS entries, see Updating Domain Name System (DNS) Entries on
page 102.
CAUTION: Deleting a file server is permanent, and none of the deleted files can be recovered.
Procedure
1. Go to the File Server view (see File Server View in Prism on page 15), select the target file
server, and click the Delete action button.
a. If you decide to delete specific related entities, choose which entities to delete from the
following options (otherwise continue to the next step):
4. (Optional) delete file server DNS entries. Click Open DNS settings, see Updating Domain
Name System (DNS) Entries on page 102.
5. Click Delete.
• Update the name, domain, or storage capacity, see Updating File Server Basics on
page 60.
• Update the number of file server VMs (FSVMs), see Scaling FSVMs on page 58.
Note: Number of CVMs must be equal to or greater than the number of FSVMs.
• Update the vCPU count and memory size for each FSVM, see Updating Memory and vCPU
Resources on page 59.
• Go to the file server dashboard (see File Server View in Prism on page 15), select the
target file server, and click Network Config. Follow the steps as indicated in File Server
Updates on page 54.
• Update blocked file types, see Blocking Files on a File Server on page 128.
Note: Updating the network configuration requires a temporary downtime. Nutanix recommends
performing network updates during off-peak hours.
Procedure
Note: You can change the client network, storage network, DNS, and NTP IP addresses for a
file server VM. This lets you move a file server from one data center to another. If you intend
on changing the domain, you must un-join the domain first.
a. In the Client Network tab, verify or update the client network details (VLAN, IPv6
(optional), DNS, and NTP entries) as needed and click Next.
See Creating a File Server on page 36 for more information about these fields.
Note: If you change the client network configuration, click the file server DNS entries
link and delete the existing DNS entries (see Updating Domain Name System (DNS)
Entries on page 102).
Note: If the network update operation is unsuccessful, use the original IP address details and
try the update operation again.
Scaling FSVMs
Add or remove file server VMs (FSVMs) on your file server.
Procedure
3. Under New Capacity, enter an integer for the new number of FSVMs.
4. Review the settings in the Client Network and Storage Network sections.
Note: For information on configuring network settings, see the client network and storage
network sections in Creating a File Server on page 36.
5. Click Update.
Procedure
a. In the vCPUs field, select the target (total) number of vCPUs for each FSVM in the cluster.
Procedure
Tip: Before changing the file server or domain name, click the Leave Domain link to leave the
current domain (see Leaving a Domain on page 101). Changing a file server name does
not remove existing DNS entries, which you must remove manually.
a. To change or update the file server name, enter the new name in the File Server Name
field.
b. To change the DNS domain name, enter the new name in the Domain field.
Tip: After changing the file server or domain names, delete any old DNS entries from the
DNS servers, add the new DNS entries (see Updating Domain Name System (DNS)
c. To change the size of the file server, enter a value in the File Server Size (Logical) field.
Note: You cannot reduce the size of the file server. This operation does not impact current
client connections.
Procedure
FSVM IPs appear in the following format Nvm IP Addresses: internal IP,external IP.
Procedure
3. Respond to the prompts, providing the current and new nutanix user password.
Changing password for user nutanix.
Old Password:
New password:
Retype new password:
Setting Timezones
Procedure
2. Get the timezone for your region. The command returns your timezone into a region and city
format.
nutanix@fsvm$ afs fs.get_timezone
Note: To list all available timezones, see the contents of the zoneinfo file for the desired region
using the ls /usr/share/zoneinfo/regioncommand.
Replace region_name and city_name with the region and city name specified in the timezone
output. For example, afs fs.set_timezone Asia/Kolkata.
Procedure
1. Using SSH, log on to a Controller VM of the Nutanix cluster that deployed Files.
Replace fs_names with the name of a single file server or with a comma-separated list of
multiple file servers.
» Start all file servers.
nutanix@cvm$ afs infra.start *
Note: For steps on stopping and starting a Nutanix cluster, see "Node Management" in the
administrative guide for the target hypervisor.
Procedure
1. Using SSH, log on to a Controller VM of the Nutanix cluster that is running Files.
Limitations
The following limitations apply to shares and exports.
Permissions
The following default permissions apply on distributed and standard shares.
• Distributed shares/exports:
Note: Files does not support mounting SMB shares on Linux clients. Use multi-protocol shares
instead, see Creating a Multi-Protocol Share or Export on page 80.
Procedure
1. Go to the Shares view in the Files Console and click Create a New Share.
Figure 43:
• Global
• Printers
• admin$ (reserved)
• ipc$ (reserved)
• homes (reserved)
• Names are not case-sensitive.
• Each name must be unique.
• Files allows unicode characters.
• Maximum name length is 80 characters.
• A blank space or space character cannot appear as the first or last character in the
name.
• Names that end with the $ are hidden shares.
b. Description (optional): Enter a description for the share.
c. Share path (optional): You can create nested shares by specifying the path. Nested shares
inherit some properties from the parent directory. See Nested Shares and Exports on
page 94 for details.
d. Max Size (optional): Enter the maximum share size in GiB, see "System Limits" in the
release notes for details.
Leaving the field blank means there is no upper limit to the size of the share. Enter a value
here if you want to set an upper size limit. Once the limit is set, it cannot be increased.
Setting a value changes the capacity from the client view.
e. Primary Protocol Access: Select the SMB (Ideal for Windows Clients) option.
f. Enable multi-protocol access for NFS clients: Check the box to enable the multi-protocol
feature. Follow the steps in Creating a Multi-Protocol Share or Export on page 80 to
configure multi-protocol settings. Otherwise, continue to the next step.
Note: For information on the multi-protocol feature, see Multi-Protocol Support for
Files on page 87.
g. Click Next.
a. Check the Use "Distributed" share type instead of "Standard" to create a distributed
share:
• A Distributed share, also known as a home share, load-balances user data across
multiple FSVMs by distributing top-level directories.
• A Standard share, also known as a general-purpose share, serves data and connections
from a single FSVM.
A distributed share is frequently used as the repository for the personal files of a user,
while a standard share is frequently the repository shared by a group.
Tip: When using a distributed share for user profiles, facilitate better load distribution by
creating a top-level directory (TLD) for each user.
b. Enable Self Service Restore: Check this box to enable snapshots of the share contents,
see Self-Service Restore on page 147.
c. Enable File System Compression: Check this box to save space and reduce data on
the share through in-line compression of written data, see File System Compression on
page 139.
Note: Enabling compression at the container level makes the Enable File System
Compression option unavailable. The option does not appear on clusters upgraded from
earlier versions that do not support file system compression.
d. Blocked File Types: Check this box to block files with specific character patterns in their
names, see File Blocking for more information.
A field appears for blocked file types. Enter a comma-separated list of character patterns
of directories and file names blocked from the share.
e. Enable Access Based Enumeration (ABE): Check this box to restrict user access when
browsing the contents of top-level directories to only those files and folders that they
have access permissions for, see Access-Based Enumeration (SMB only) on page 127.
f. Encrypt SMB3 Messages: Check this box to enable message encryption between the file
server and client. See Encryption on page 127.
g. Click Next.
Note: For SMB shares, SMB client access is always read-write. Access-control lists (ACLs)
specify user and group access permissions.
What to do next
Map the newly created share in your name-space.
Note: Files does not support mounting NFSv4 exports on Windows clients. Use NFSv3 exports
or multi-protocol shares.
1. Go to the Shares view in the Files Console and click the Create a New Share.
• Global
• Printers
• admin$ (reserved)
• ipc$ (reserved)
• homes (reserved)
• Names are not case-sensitive.
• Each name must be unique.
• Files allows unicode characters.
• Maximum name length is 80 characters.
• A blank space or space character cannot appear as the first or last character in the
name.
• Names that end with the $ are hidden shares.
b. Description (optional): Enter a description for the share.
c. Share path (optional): You can create standard nested shares by specifying the path.
Nested shares inherit some properties from the parent directory. See Nested Shares and
Exports on page 94 for details.
d. Max Size (optional): Enter the maximum share size in GiB, see "System Limits" in the
release notes for details.
Leaving the field blank means there is no upper limit to the size of the share. Enter a value
here if you want to set an upper size limit. Once the limit is set, it cannot be increased.
Setting a value changes the capacity from the client view.
e. Primary Protocol Access: Select the NFS option.
f. Enable multi-protocol access for SMB clients: Check the box to enable the multi-protocol
feature. Follow the steps in Creating a Multi-Protocol Share or Export on page 80 to
configure multi-protocol settings. Otherwise, continue to the next step.
Note: For information on the multi-protocol feature, see Multi-Protocol Support for
Files on page 87.
g. Click Next.
a. Check the Use "Distributed" share type instead of "Standard" to create a distributed
export:
• A Distributed share, also known as a home share, load-balances user data across
multiple FSVMs by distributing top-level directories.
• A Standard export, also known as a general purpose or non-distributed export, serves
data and connections from a single FSVM
Tip: When using a distributed export for user profiles, facilitate better load distribution by
creating a top-level directory (TLD) for each user.
b. Enable Self-Service Restore: Self-service restore lets you restore files from previous
snapshots, see Self-Service Restore on page 147.
c. Enable Compression: Check this box to save space and reduce data on the share through
compression, see File System Compression on page 139.
Note: Enabling compression at the container level makes the Enable File System
Compression option unavailable. The option does not appear on clusters upgraded from
earlier versions that do not support file system compression.
d. Blocked File Types: Check this box to block files with specific character patterns in their
names, see File Blocking for more information. After checking the box, a field appears for
blocked file name patterns. Enter a comma-separated list of character patterns blocked
from the export.
Note: Blocking extensions at share level overrides the blocked extensions defined at file
server level.
Note: Files does not support Kerberos 5, Kerberos 5i, and Kerberos 5p with the NFSv3
protocol.
The options are None, System, Kerberos 5, Kerberos 5i, and Kerberos 5p.
Note: Changes to the authentication method can result in invalid mounts. Resolve the
issue by remounting the authentication type as a value for parameter sec in the mount
f. Default Access (For all clients): Select the default access permissions from one of the
following in the pull-down list:
Note: Files supports Netgroups to handle client access. Netgroups can limit access to
hosts, but Files does not support Netgroups that limit access to users.
g. + Add Exceptions (optional): If you want to refine the read and write permissions (more
than just the default), click the +Add Exceptions link.
Clicking the +Add Exceptions link displays two more fields for the two non-default
permission options. For example, if you selected Read-write as the default access, fields
for Client with read-only access and Clients with no access appear. In these fields, enter
a comma separate list of clients for the specified access permission level. Exceptions take
precedence over the default, so any client listed in one of the exception fields gets that
level of permission instead of the default permission.
Note: For IPv4 clients, exceptions can be complete IP addresses, wildcards, or subnets. For
IPv6 clients, Files only accepts complete IP addresses as exceptions.
Note: If you add or remove a client from a Netgroup, it reflects on the client after 30
minutes.
CAUTION: If a client IP address matches more than one exception rule, the client may
experience access issues.
h. Squash: Select the squash value from the pull-down list. The squash option controls the
access privileges of root client users (users with UID 0). The None value gives root users
super-user access privileges to the export, letting them create, edit, and delete files from
• Anonymous UID: Enter the anonymous user identifier value for the export.
• Anonymous GID: Enter the anonymous group identifier value for the export.
You can map regular users to anonymous ones to restrict access to the NFS export.
Setting the NFS authentication type to None maps all client users to anonymous ones.
4. Click Next.
• Global
• Printers
• admin$ (reserved)
• ipc$ (reserved)
• homes (reserved)
• Names are not case-sensitive.
• Each name must be unique.
• Files allows Unicode characters.
• Maximum name length is 80 characters.
• You cannot use a blank space or space character as the first or last character in the
name.
• Names that end with the $ are hidden shares.
b. Description (optional): Enter a description for the share or export.
c. Share path (optional): You can create standard nested shares by specifying the path.
Nested shares inherit some properties from the parent directory. See Nested Shares and
Exports on page 94 for details.
d. Max Size (optional): Enter the maximum size in GiB, see "System Limits" in the release
notes for details.
Leaving the field blank means that there is no upper limit to the size of the share or
export. Enter a value here if you want to set an upper size limit. After setting the limit it
cannot be increased.
e. Primary Protocol Access: Choose SMB (Ideal for Windows Clients) or NFS as the primary
protocol.
f. Enable multi-protocol access: Check the box to enable the multi-protocol feature.
g. Click the Next button.
a. Check the Use "Distributed" share type instead of "Standard" to create a distributed
export:
• A distributed export, also known as a sharded export or home share, load balances
user data across multiple FSVMs.
• Astandard export, also known as a general-purpose share or export, for any other
purposes.
b. Enable Self Service Restore: Self-service restore lets you restore files from previous
snapshots, see Self-Service Restore on page 147.
c. Enable File System Compression: Check this box to save space and reduce data on
the share through inline compression of written data, see File System Compression on
page 139.
Note: Enabling compression at the container level makes the Enable File System
Compression option unavailable. The option does not appear on clusters upgraded from
earlier versions without file system compression support.
d. Blocked File Types: Check this box to specify blocked file types, see File Blocking on
page 128.
e. Do the following in the SMB Protocol Access section.
• Enable Access Based Enumeration (ABE) (SMB only) enable ABE by checking this
box. ABE restricts access when browsing the contents of the top-level directories
(TLDs) to only those files and folders that you have access permission for, see Access-
Based Enumeration (SMB only) on page 127.
• Encrypt SMB3 Messages: Check this box to enable message encryption between the
file server and client. See Encryption on page 127.
Note: Files does not support Kerberos 5, Kerberos 5i, and Kerberos 5p with the NFSv3
protocol.
Note: Changes to the authentication method can result in invalid mounts. Resolve the
issue by remounting the authentication type as a value for parameter sec in the mount
b. Default Access (For All Clients): Select the default access permissions from one of the
following options in the pull-down list:
Note: Files supports Netgroups to handle client access. Netgroups can limit access to
hosts, but Files does not support Netgroups that limit access to users.
c. If you want to refine the permissions (more than just the default), add exceptions in the
provided fields.
For example, if you selected Read-Write as the default, lines for Read-Only and No
Access appear. In these fields, enter a comma separate list of clients for that access
permission level. Exceptions take precedence over the default, so any client listed in one
of the exception fields gets that level of permission instead of the default permission.
Use one of the following formats:
Note: If you add or remove a computer from a Netgroup, it reflects on the client after 30
minutes.
d. Squash: Select the squash value from the pull-down list. The squash option controls the
access privileges of root client users (users with UID 0). The None value gives root users
super-user access privileges to the export, letting them create, edit, and delete files from
• Anonymous UID: Enter the anonymous user identifier value for the export.
• Anonymous GID: Enter the anonymous group identifier value for the export.
You can map regular users to anonymous ones to restrict access to the NFS export.
Setting the NFS authentication type to None maps all client users to anonymous ones.
f. In the Multi Protocol Access section, check the box for the settings that you would like to
enable:
• Allow simultaneous read access to the same files: Clients from either protocol can
perform simultaneous reads.
• Allow symlink creation from NFS clients: This option only appears if SMB is the
primary protocol.
Note: On SMB clients, NFS client-created symlinks appear as regular objects (files or
directories).
g. Click Next.
Note: For SMB shares, SMB client access is always read-write. Access-control lists (ACLs)
specify user and group access permissions.
What to do next
To configure user mapping between NFS and SMB users, see User Mapping on page 110.
Authentication
SMB clients have only one authentication type, Active Directory (AD), that they can use to
access exports. NFS clients can access SMB shares using AD, LDAP, system, or unmanaged
protocols. Files uses the native protocol to authenticate all non-native shares.
Access-Based Enumeration
Files supports access based enumeration (ABE) for native and non-native SMB shares.
Antivirus
Files supports antivirus protection on native and non-native SMB shares.
If you access a file that has a virus through an NFS client-created symlink or hard-link, only the
path of the first access appears in the quarantine table.
Audit
Files supports audits for native and non-native shares.
CAUTION: Backup using a non-native client can result in metadata and ADS loss.
Change Notifications
There is no directory change notification support across protocols. Namespace changes made
to a share from one protocol take up to a minute to reflect for a client of the second protocol.
Concurrent Access
Files supports concurrent read-access but not concurrent write-access for multi-protocol
shares.
High-Availability
Files equips multi-protocol enabled shares and exports with high-availability. Files does not
honor the NFS grace period on SMB clients.
Namespace Compatibility
Since all SMB lookups are case insensitive, and all NFS lookups are case-sensitive, SMB clients
can encounter multiple objects with the same name string but different cases.
NFS clients can create multiple files on SMB shares that use the same name-string but different
cases. This leads to issues for Windows clients that find files with the same name but in
Quota
Files supports quota, see Quotas on page 119.
Stats
Files combines stats for native and non-native shares.
Symlinks
NFS clients can create symlinks on native and non-native NFS shares and follow them using a
native or non-native protocol.
Limitations
• Files silently ignores permission change requests for non-native protocol clients.
• NFS file or directory names that include trailing spaces are treated as illegal characters on
SMB namespaces.
• Native SMB shares cannot enable the NFS squash option.
• NFS users might not see ownership details on native SMB shares. For NFS users, default
owner and group on native SMB shares appears as root/root. However, SMB users see the
default owner and group as BUILTIN administrators.
• Template mapping ignores the domain of users and groups.
• Files does not support multi-protocol compatibility for legacy NFS exports.
• When SMB clients create share objects on non-native shares, the objects derive the mode
information from their parent share.
• If SMB is the primary protocol, you can only apply a quota to SMB users.
• Clusters created using earlier versions of Files might not support some new features.
• When renaming a share or export, access to the old name remains if you maintain the
existing connection. Close and reopen the browser or CLI to no longer see the old name.
Note: See Explicit Paths for Shares and Exports for a list of modifiable features on shares
and exports with explicit paths.
Procedure
• In the Files Console, select the target entry in the share table of the Shares tab.
» Click Delete, to delete the share (you do not need to proceed to the next steps).
» Click Update to modify the settings of the share or export. Proceed to the next steps for
directions.
» Click Add Quota Policy to add a user or group quota to the share, see Quotas on
page 119.
• To update the share, follow the steps as indicated.
Note: When renaming a share or export, access to the old name remains as long as the
existing connection is maintained. Close and reopen the browser or CLI to no longer see
the old name.
See the Creating a Share (SMB) on page 65, Creating an Export (NFS) on page 71,
or Creating a Multi-Protocol Share or Export on page 80 for details about each field.
Warning: Deleting a share or export is permanent, and the deleted share or export cannot be
recovered.
Procedure
1. Remove the share or export contents and disconnect all clients. (All directories and files
within the share/export should be deleted.)
2. In the Files Console, select the target entry in the share table of the Share tab.
3. In the row for the selected entry, click three dots menu > Delete.
CAUTION: When deleting a share or export with an explicit path, the data and storage is not
removed, see Nested Shares and Exports on page 94.
Note: All shares and exports with explicit paths must be deleted before deleting the parent
share.
Note: If your home directory exists in multiple distributed shares, Files matches to the first share
created chronologically.
Distributed shares appear with other shares in Files when enumerating shares on the file server.
Files enables distributed home share support by default.
Access home directories using the UNC path \\Files_server\SamAccountName (instead of \
\Files_server\home_share\SamAccountName).
Procedure
Procedure
To configure preferred home shares.
nutanix@fsvm$ afs smb.set_conf “preferred home shares” “home-share1, home-share2” section=global
Replace home-share1 and home-share2 with the names of the homes shares.
Note: During a lock protection interval, Files does not prevent NFS clients from accessing the
file. Files only prevents SMB clients from accessing files during the disconnected state.
Note: The periodic handler cleans up stale locks for the disconnected persistent file handles
every 24 hours.
Procedure
1. To confirm the status of continuous availability, replace the share-name and check the share
profile.
nutanix@fsvm$ afs share.list sharename=share-name
What to do next
Check the status of continuous availability by repeating the command in step 1.
Connected Shares
Connect standard or distributed shares in the namespace of another standard or distributed
share.
Connecting shares creates a unique, continuous namespace. Use connected shares to distribute
data across multiple FSVMs from a specified directory.
Distributed shares let you only shard data on the top-level directory (TLD) level. To shard data
from a lower-level directory, connect shares by submounting a distributed share onto the path
of another share or export. Files distributes that data from the mount point across multiple
FSVMs. The distribution of data achieves load balancing.
The connected, continuous namespace lets you have different settings within the namespace,
such as directory-level quotas. For more details on directory-level quotas, see Setting
Directory-Level Quotas on page 99. Rather than connecting existing shares, you can also
create a new share with an explicit path, see Nested Shares and Exports on page 94.
Note: For multi-protocol enabled shares, a submount point can apply to multiple directories due
to the case-sensitive NFS behavior and case-insensitive SMB behavior. As a result, Files uses all
directories with the same name but different cases as submount points.
Connecting a Share
Shard a standard share or export.
1. Replace submount-path with the file path to the mount point from the standard share. Replace
child-share-name.
nutanix@fsvm$ afs share.edit child-share-name submount_path=submount-path
Disconnecting Shares
Disconnect connected shares or exports.
Procedure
Note: Due to caching issues, child shares and exports can still appear as mounted.
What to do next
For NFS, remount the parent share on the client.
The following rules and limitations apply for creating, deleting, or modifying shares and exports
with explicit paths:
• New nested shares and exports cannot start with the name of another share or export
created using an explicit path.
• Explicit paths must start with the forward-slash (/) character.
• When you create a share or export, an explicit path must contain a parent share or parent
export name and the directory path (do not use the root directory).
• Files does not support changed file tracking (CFT) backup for nested shares and exports.
• When you enable or disable multi-protocol on a parent share, the action reflects for all
nested shares or exports for that parent.
• Nested shares and exports inherit both the primary and secondary protocols, which you
cannot modify at the nested-share level.
• The share path is case-sensitive for the NFS protocol.
• When you delete any of the directories in an explicit path, the path becomes inaccessible.
• Namespace changes under the root of the nested share do not appear immediately when
accessed through the parent share path.
Consider the following recommendations:
• Delete all nested shares and exports before deleting the parent share.
Feature Modification
You can modify some of the properties of nested shares. Most of the time you cannot modify
inherited properties. Refer to the following table for modification options.
• Files permits a maximum of 100 limited local users per file server.
• Limited local users cannot access non-native shares.
• Files does not support user-mapping for limited local users.
Procedure
• To add a limited local user to a limited local group, use the following command:
nutanix@fsvm$ sudo net sam addmem 'group-name' 'file-server-name\user-name'
Note: You can add local users to local groups, which are in BUILTIN\Users and BUILTIN
\Administrators.
Procedure
» Add a backup server by replacing backup-server-ip with the IP address for the backup server.
nutanix@fsvm$ afs smb.set_conf "backup hosts" backup-server-ip section=global
• Remote-to-remote
• Remote-to-local
Note: By default, remote to local and remote to remote symlinks are disabled on Windows
clients. To enable, symlink access on Windows clients, use the following command.
> fsutil behavior set SymlinkEvaluation R2R:1 R2L:1
SMB clients must have symlink access enabled to access symlinks and follow the
targets.
Note: Hycu does not support symlinks. Commvault does not support cross-share symlinks.
Procedure
Disabling SMB links only prevents the creation of new symlinks. Existing symlinks remain
accessible.
Disabling SMB links only prevents the creation of new symlinks. Existing symlinks remain
accessible.
Procedure
1. Create a share or export and specify the max size, see Creating a Share (SMB) on
page 65.
Alternatively, you can apply a share size limit to the newly created share or export, see
Modifying a Share or Export on page 89.
2. Connect the share or export to a directory of a standard share or export, see Connecting a
Share on page 93.
Files applies the quota for the connected share or export to the directory.
Joining a Domain
Join a file server to a domain.
Note:
• If the file server time and the Network Time Protocol (NTP) time are not in sync, the
Prism web console raises an alert. Be sure to sync the file server time and NTP time
before joining to a domain.
• The join domain process can be unresponsive if the Active Directory computer
objects exist from previous unresponsive join attempts. Before attempting to join to
the domain, remove the previous Files computer objects from the Active Directory.
The Prism web console also prompts you to overwrite existing computer accounts.
• Do not remove the file server computer object in AD, as that can cause disruptions
to file-server services.
Procedure
Leaving a Domain
Disconnect your file server from a domain by following the steps described.
CAUTION: Leaving a domain causes Files to stop services until you join the file server to a
domain. During this time, existing and future clients cannot use shares, exports, or permissions.
Procedure
Clicking the Leave Domain link removes the file server connection to the domain. After
changing the file server name or domain, do the following to re-establish the file server
connection to a new domain:
• Remove any old DNS entries from one or more DNS servers.
• Add the new DNS entries (see Updating Domain Name System (DNS) Entries on
page 102).
• Update the directory services (see Updating Directory Services on page 107).
Procedure
1. In the Files Console (see Files Console on page 18), go to Configuration > Update DNS
Entries.
2. To automatically configure DNS entries, select the Automatic (MS-DNS only) option and do
the following in the indicated fields:
Note:
• The automatic option is available only when using Microsoft DNS. If you use a
different DNS server or you see a message that Files did not find the entries on
the DNS server, use the manual method.
• Files can only add PTR entries for the /24 zone. Check the subnet of the external
network to confirm the zone. Files does not add PTR records automatically for
a. Select an action: Select Add/Update entries or Delete Entries from the pull-down menu.
Selecting Add/Update entries adds (or updates as needed) the required file server entries
to the DNS server automatically. (You do not need to enter them yourself.) Selecting
Delete Entries automatically deletes the current file server entries from the DNS server.
b. Preferred Name Server (optional): Enter a preferred name server.
c. Username: Enter the user name of the DNS server administrator.
d. Password: Enter the administrator password.
e. Click Submit.
Copy the entries from the table and add them to the DNS server.
You can either copy the entries manually or click the Copy All link to copy the entire table.
Click Actions to download that table in the CSV or JSON format. (To delete the current
file servers entries on the DNS server, use this list to determine which entries to delete.)
b. Click the Verify button.
After copying the entries to the DNS server, verify that they are correct. Clicking the
Verify button checks each entry in the table against the DNS server entries. A check mark
in the Is Verified column indicates that entry is present on the DNS server. There should
be a check mark for every entry.
c. Repeat step (a) for any entries that do not have a check mark in the Is Verified column.
The most likely reason (other than a network issue) for a missing check mark is a copy-
and-paste error when transferring that entry to the DNS server. Check your work and
repeat this process until Files verifies all entries.
Disjoint Domains
Configure different DNS domain and active directory (AD) realm values through the disjoint
domains feature.
Your deployment must have the following requirements prior to configuring disjoint domains:
Procedure
1. After creating the file server configure the protocols and join the domain.
nutanix@fsvm$ afs fs.configure_name_services AD-realm-name username protocol
"SMB", "NFS", "NFS,SMB", "SMB,NFS" and "None" are valid arguments for Protocol.
(Optional) use one of following instead:
nutanix@fsvm$ afs fs.configure_name_services AD-realm-name username protocol organizational_unit=organizational unit
nutanix@fsvm$ afs fs.configure_name_services AD-realm-name username protocol overwrite=true/false
2. Configure the Microsoft DNS, see Updating Domain Name System Entries. If the DNS domain
name and AD realm names are not the same, provide the full user principal name (UPN) of
an administrator or user.
Procedure
1. In the Files Console (see Files Console on page 18), go to Configuration > Authentication.
2. In the Directory Services window, select the protocols you want to use and complete the
fields for the selected protocols.
You can select SMB, NFS, or both. Each protocol contains more fields to complete. See the
Directory Services tab step in Creating a File Server on page 36 for detailed instructions.
3. When all the fields are correct, click the Update button.
Procedure
Authentication
This topic provides an overview of unmanaged, LDAP, and Active Directory (AD)
authentication for file servers.
Depending on the primary and secondary protocols configured for your file server, access
and authentication configuration vary. File servers using SMB protocol must configure Active
Directory (AD). File servers using the NFS protocol can use Lightweight Directory Access
Protocol (LDAP), AD, or unmanaged authentication services.
LDAP
When you configure LDAP as the authentication service, Files uses Netgroups to control client
access. The Files LDAP setup is based on the RFC 2307 standard.
To configure LDAP, assign an LDAP server and a base distinguished name (DN) in the
Directory Services tab during file server creation. The base DN specifies where the search for
users begins. The file server binds to the LDAP server. For added security, set up a bind DN for
the LDAP server. Without the bind DN, Files binds to the LDAP server as anonymous.
Active Directory
Files supports AD with NFS and SMB. To set up Active Directory, specify the AD realm name,
username, and password. If you have multiple domain controllers, you can configure a preferred
domain controller (PDC). If you do not configure a PDC, Files uses any available domain
controller.
Using the RFC 2307 standard is an optional setting in AD.
Authorization
The authorization setup on native shares and exports determines user and group read-and-
write access permissions.
By default, all domain users and domain admin have full access to standard shares and exports.
For distributed shares and exports, domain admins have full access but domain users have
read-only access.
Note: Files does not support namespace operations on top-level directories (TLDs) from Mac
clients. You can manage TLDs from Windows clients using the Microsoft Management Console
(MMC) Snap-In for Nutanix Files.
User Mapping
Configure user mapping on file servers that have multi-protocol shares or exports.
User mapping lets you access the same share or export using native and non-native protocols.
You can retain your user-mapping configuration while configuring the directory services. User-
mapping configurations are on a file-server level, which extend to all shares and exports on the
file server.
Note: If the NFS security type is not Kerberos, you must configure user mapping for multi-
protocol shares and exports.
• NFS clients accessing SMB shares can use IDs from AD, LDAP, or client-generated
unmanaged IDs .
• If the NFS security type is not Kerberos, you must configure user mapping for multi-protocol
shares and exports
• LDAP usernames cannot be numeric.
Note: Group identifiers (GID) and user identifiers (UID) can appear mismatched because of
the access point. The first part of the UID/GID is a config-based range. The last part of the
UID/GID is the relative ID (RID) of the user, which is based on the SID. Clients and file servers
use different config ranges, so the first part of the GID/UID can appear mismatched.
Mapping Behavior
Files user the following mapping behaviors:
• UserGroup: Default mapping for new shares and exports created with Files 3.6.1 or later. Files
maps a non-native user to a native user. Files ignores all groups of the non-native user and
uses groups of the native user for authorization. Files does not use the groups of the non-
native user in the access token.
• MappedGroups: Files maps the non-native user and the associated groups to a native user
and the respective native groups. The native groups can also be groups of the native user.
The access token has a set of user and group identities. Use MappedGroups for the following
use cases:
Note: With legacy mapping, Files requires group mapping for the primary group of SMB users
to access native NFS exports.
Mapping Configurations
User mapping includes the following mapping configurations:
• Search: Use the Search tab to search for mapping rules of a user or a group.
• Rule-Based Mapping: Use the Rule-Based Mapping tab to configure a mapping rule for AD
and LDAP users. The following options apply:
Note: User mapping does not support the user name format (UPN).
Procedure
• To map users or groups manually, click Add one-to-one mapping. Add the following
information in the indicated fields:
1. In the SMB Name field, enter the name of an SMB user or group.
2. In the NFS ID, enter the name of an NFS user or group.
Note: Files does not support user-mapping entries that have wildcards on both ends.
a. To map SMB and NFS users and groups, choose one of the following default rules:
a. Choose one of the following options from the SMB Users With No NFS Mapping
dropdown:
Note: If NFS has LDAP, use a user or group name. Otherwise, use a user or group ID.
• In the SMB User field, enter a default SMB user target for NFS users without mapping.
• In the SMB Group field, enter a default SMB group target for NFS groups without
mapping.
e. Click Save.
6. (optional) To delete all mapping rules for all users and groups, click the Purge All Mapping
button
CAUTION: Clicking Purge All Mapping permanently removes all existing mapping rules.
• File server admin. The file server admin can manage all file server operations, modify the
access permissions for all users in all the shares/exports, and back up and restore data on
the file server.
• Backup admin. The backup admin can back up and restore data on the file server (but does
not have other administrative permissions).
Note: Assign a backup service account (AD user or group) the backup admin role to prevent
insufficient access issues.
Procedure
1. In the Files Console (see Files Console on page 18), go to Configuration > Manage Roles.
The Manage roles view displays.
3. Do the following :
a. In the User field, enter the Active Directory user or group name.
Enter user or group names in the samAcctName or NETBIOS\samAcctName format. Replace
samAcctName with the SAM-account-name.
b. In the Role field, select File Server Admin: Full access or Backup Admin: Backup access
only from the pull-down list.
c. To add the user, click the check mark icon.
d. To add more administrators, repeat these steps.
4. To modify an administrator, click the pencil icon in the three dot menu > edit for that user
and update the name or role as desired.
5. To delete an administrator, click the three dot menu > edit for that user.
Procedure
2. To add a RESP API user, click + New User in the REST API access users section.
A new line for the new user appears at the bottom of the list.
a. In the Username field, enter the username requiring REST API access.
4. To modify a username or password, click three dots menu > Edit in the row for the target
entry.
5. To delete a user, click three dots menu > Delete in the row for the target entry.
Note: To create a REST API user, see Managing REST API Roles on page 118.
Procedure
2. Click Authorize.
A dialog box for REST API user credentials appears.
3. Enter the REST API user credentials in the username and password fields.
4. Click Authorize.
Quotas
This topic describes the Files quota types, notifications, and policies.
Set quotas to allot the storage space a user or group can use.
There are two quota levels:
• User: Sets a specific amount of storage for a single user. For example, if an administrator
allots only 1 GB, then you cannot use more than 1 GB – the total storage capacity for you is
limited to 1 GB.
• Group: Sets the amount of space for each user in that group. For example, a group with a
policy of 10 GB and 10 users can potentially use 100 GB of data (10 x 10 = 100 GB) under that
quota policy.
Alternatively, rather than configuring quotas for specifics users, groups, or directories, you can
configure a maximum share size to restrict the amount of storage space used by a share. To
limit the space in a directory, see Setting Directory-Level Quotas on page 99.
Policies
A quota policy specifies the consumption limit and enforcement type for all quota levels as
configured by the administrator. Enforcement types determine if a user or group can continue
to use the quota once they consume their share. See the enforcement types descriptions in the
following table.
CAUTION: Quota policy enforcement begins several minutes after policy creation. Therefore,
if you reach the quota limit before the interval is complete, Files raises the alert but does not
enforce the quota.
Note: Beginning with AOS 5.15.1 and AOS 5.17.1 you can set decimal quota values, earlier AOS
versions only permit integer quota values. During a disaster recovery (DR) event to a container
with a version earlier than AOS 5.15.1 and AOS 5.17.1, Files rounds the decimal quota value down
to an integer.
Enforcement Type
• Hard Limit: Prevents further writes once quota
limit is reached.
• Soft Limit: Does not prevent writes. Sends email
notifications to email recipients.
Email Recipients Enable the email recipients box and enter the email
addresses for recipients Files should notify about
hard and soft quota limits.
• If you have defined a Files user-level quota, then recipients receive the quota from this user-
level policy.
• If you have not defined a user level, but you have defined multiple group-level policies, then
Files applies the policy with the most space.
• If you have not defined a user or group policy for any given user, Files chooses the quota
default policy.
Note: If you add a new AD group and want to add a quota policy for that group, contact Nutanix
Support to refresh the quota cache.
Multi-Protocol Limitations
The following limitations apply when you enable both SMB and NFS read-and-write access on a
share or export.
• You can only apply a quota to users and groups of the primary protocol. For example, if SMB
is the primary protocol, you can only apply a quota to SMB users.
• When you map multiple non-native users or groups to a single native user or group, Files
only applies a quota to the first non-native user or group.
• Quota applies to non-native users mapped to native users who belong to a group quota.
Managing Quotas
Add or edit user or group quotas in Files.
Procedure
a. Under Add Users, select to add the quota policy for a Individual User or User Group.
b. In the Username field, enter the target user-name or group-name.
c. In the Quota Limit field, enter the space for the quota limit (in GiB).
d. Select the enforcement type.
• Hard limit: Prevents further writes after reaching quota limit and puts the user or group
into read-only mode.
• Soft limit: Does not prevent writes. Sends email notifications to email recipients.
Note: You cannot set both a soft and hard limit for the same user or group.
e. Check the Send email notification to the Files administrator box to enable email
notifications and add email recipients in the Email Recipients field.
f. To add the quota policy after entering the required information, click Add.
a. You can edit the existing policy by updating the amount of space (GiB), the enforcement
type (hard or soft limit), and the email notifications and recipients. Click Add.
5. In the row for the target policy, click the three dot menu > delete.
Cloning
Clone any file server protection domain snapshot at the local or remote site.
The file server clone is not protected by default. Be sure to enable the protection domain if
you want the file server protected. Files cannot clone snapshots taken in earlier releases. Also,
file server clones cannot be replicated or migrated to clusters that use earlier AOS and Files
versions.
Cloning helps with the following without impacting the original Files cluster:
1. In the File Server view in PE (see File Server View in Prism on page 15), select the target file
server and then click the Clone button.
The Clone File Server window displays.
a. Name of Cloned File Server: Enter a name for the new (cloned) file server.
The clone name must be different that the original file server name.
b. Domain: Enter a fully qualified domain.
c. List of Snapshots: Click the option of the snapshot to use for the clone.
A list of available snapshots (if any) appears in this field. Select one of the existing
snapshots or select Take a new snapshot, which takes a new snapshot of the file server
(after you complete this form) and then use that snapshot to create the clone.
d. Click the Next button.
3. In the Client Network tab, enter the required information to configure the client network for
the clone and then click the Next button.
Note: See Creating a File Server on page 36 for details about configuring the client
network, storage network, and user management.
5. In the Directory Services tab, select one or more protocols to use (SMB, NFS, or both) and
enter the specified configuration information. When all the information is complete, click the
Create button.
Encryption
Encryption options for Files.
Files supports AOS software encryption and in-flight message encryption for SMB3 shares.
You can apply AOS software encryption to Files by activating it through Prism, see Configuring
Data-At-Rest Encryption (Software Only) in the AOS Security Guide. Refer to the Files Release
Notes to ensure that you are running a compatible version of AOS.
Note: To activate ABE after a group membership of a user changes, remove all previous share
sessions, remount the share, and reconnect existing client connections.
Procedure
1. To enable ABE during share creation, see Creating a Share (SMB) on page 65.
File Blocking
Restrict specific files or file types from appearing on a file server or share.
Specify a character pattern of file names or extensions to block files. Use an asterisk (*) as a
wildcard for multiple characters or a question mark (?) as a wildcard for a single character.
Note: The question mark character (?) only matches UTF-8 single byte ASCII characters. The
question mark character (?) does not apply to multibyte unicode characters.
Files applies the file blocking policy to all levels of a share or export, which disables the ability
to create files with the specified character pattern in the name. An attempt to create blocked
files results in an error. Share-level file blocking overrides the files blocked on the file-server
level.
Files allows a maximum of 300 file blocking patterns on a file server.
After enabling file blocking, Files does not permit the following operations:
Procedure
4. Click Save.
Note: Refer to the Compatibility Matrix for a list of compatible security software. Filter by
Solution Type > Security and Additional Component > Nutanix Files. Files requires two or more
ICAP servers. Nutanix recommends having a minimum number of scanning threads that is 11 times
the number of FSVM nodes or (11 * number of FSVM nodes).
Overview
Files performs the following tasks with ICAP servers when a client requests to read, write, open,
or close a file.
1. Files determines that the file requires scanning.
2. Files sends files that require scans to the ICAP server with a scan request.
3. The ICAP server scans the file and reports the scan results to Files.
4. Files quarantines and denies access to unsafe files.
5. If the file is clean or disinfected, then Files allows the client access to the file.
lines.
Figure 75: Antivirus File State Diagram
Glossary
Files and Prism Element use the following terms to show file status applied by the antivirus
scanning feature.
State Definition
Event Definition
Procedure
• IP address or hostname
• Port (the default port number is 1344)
• Description
c. To save the configuration, lick the check mark icon.
For a detected antivirus server, the software tests the validity of the configured server
and updates the status to OK.
d. Ensure the connection status automatically updates to OK.
e. Click Next.
Note:
• Ensure these settings match the file type configuration of your ICAP servers.
• Nutanix recommends adding the following file extensions for user profiles
when using the Files antivirus scanning:
• .dat
• .ini
• .pol
• When Files with a specific extension type are quarantined incorrectly by the
ICAP server, adding this file type extension to the ignore list only prevents
future file quarantines. Remove the quarantine for the incorrectly quarantined
files to access them.
• Scan Timeout: Set the maximum amount of time that a scan can take before timing
out.
• Block access to files if scan cannot be completed (recommended): Block access if the
ICAP servers are unavailable or cannot scan the file for any reason.
f. Click Save.
Antivirus Tab
The layout and elements of the Antivirus tab in the Files Console.
• ICAP servers
• Reports
• Quarantined Files
• Unquarantined Files
To view this information, in the Files Console, go to Monitoring > Antivirus.
ICAP Servers
The ICAP servers tab displays the scanned files information for each ICAP server.
• ICAP Server Statistics: The table displays information such as port number, description, files
scanned, disconnect count, average latency, connection status, and actions available.
• Average Latency: This graph displays the latency times for the scans (in milliseconds).
• Files Processed or Data Processed: Click the Files Processed drop-down arrow to select the
files processed or data processed graph. The processed files graph displays the number of
scanned files. The data processed graphs display the amount of processed data (in GiB).
• Queue Length: The number of files in the scan queue.
Reports
The Reports tab displays the information about the scanning period and share status.
• Scan Period: This information displays the files scanned, threats detected, number of files
cleaned, and number of files quarantined during each scanning period.
• Share Status: Displays the state of the scanned share. The parameters includes: file path,
threat description, ICAP server, time, action taken on share.
Quarantined Files
The Quarantined Files tab displays the files that contain a virus. The antivirus software places
virus-infected files into quarantine where clients cannot read or write the files. An administrator
can perform the following actions on the quarantined files.
Unquarantined Files
The Unquarantined Files tab displays files manually released from quarantine. You can use
unquarantined files. Files does not rescan unquarantined files again until the administrator
resets the unquarantine state. Perform the following actions on unquarantined files.
• Reset: Move the files to a normal state that is not quarantined or unquarantined. In this state,
the next access to the file triggers the scan.
• Quarantine: Move the files to quarantine to block read and write access.
CAUTION: Alpha APIs are intended for use in testing clusters only and are meant for early
feedback from customers. Do not use the alpha APIs in a production environment. Support for
alpha API-based features may not appear in future releases. Revisions of multiple v4 API versions
may not be compatible. Also note that the APIs could be incomplete, the object schema and
semantics may change drastically. There is no commitment on support for alpha APIs from
Nutanix Support.
The Files REST API Explorer offers developers tools to customize the Files experience using
Files v4 alpha REST APIs. You can access the Files REST API Explorer through the Files Console
or through an FSVM. The Files service v4 APIs are independent from Prism Element (PE) and
Prism Central (PC) APIs. However, the platform APIs, for operations such as create, clone,
update or delete a file server, remain in Prism Element (PE).
To access the Files API Explorer in the Files Console, go to admin > REST API Explorer.
CAUTION: This operation can cause a momentary connection drop for end users accessing
files on the file server. When possible, perform scale-out and rebalancing operations during
maintenance windows, or off-peak hours.
» Scale up
» Rebalance
» Scaleout
4. Click Continue.
» For the rebalancing, confirm that you are performing the operation during off-peak hours.
Note: Perform rebalance operations during off-peak hours. For earlier AOS versions, you
must manually unblock the rebalancing operation, see Unblocking Rebalancing on
page 138.
» For scale up or scale out, continue to the next step to update the file server capacity
configuration.
5. (Scale up and scale out only) update the file server capacity configuration.
a. Review or modify the recommended value for Number of VCPUs Per File Server VM as it
appears in the drop-down menu.
b. Review or modify the recommended value for Memory Per File Server VM as it appears in
the drop-down menu.
c. To complete the configuration, click Save.
Dismissing recommendations
Unblocking Rebalancing
Unblock rebalancing guardrails.
Procedure
Unblock load-balancing guardrails on the file server.
nutanix@fsvm$ afs lb.unblock_rebalancing
Workload Optimization
This chapter describes options for optimizing the performance of your Files cluster.
There are three types of share workload types: default, random, and sequential. Designating
a workload type determines the file system characteristics (including block size) used for the
share, which optimizes the resource usage and performance of certain workloads. For example,
workloads with small I/O on large files perform more efficiently with small block sizes.
The different workload types have the following specifications.
• Default: Uses 64 KB per block. Does not provide specified optimization. The share can
perform all workloads varying performance
• Random: Uses 16 KB per block. Optimized for small I/O workloads.
• Sequential: Uses 1 MB per block. Optimized for large I/O workloads. Requires a minimum of
24 GB memory per FSVM.
The Shares view in the Files Console includes a Metrics tab and a Performance subtab, which
displays write, read, and metadata I/O per second in the IOPS graph. Use the data from the
graph to configure the workload type for the share, see Modifying the Workload Type on
page 138.
CAUTION: If you modify the share type without following the workload optimization guidance as
specified, share performance can degrade.
• If the I/O sizes for read and write operations are less than or equal to 16 KB and the file sizes
equal to 10 MB or more, use the Random workload type.
• If the I/O sizes for read and write operations are less than or equal to 1 MB and the file sizes
equal to 10 MB or more, use the Sequential workload type.
• If the I/O sizes for read and write operations do not match the criteria for Random or
Sequential workload types, use the Default workload type.
Note: Changing the workload type of a share changes the performance characteristics only for
the files created after the change.
Procedure
Replace share-name with the name of the share or export. Replace workload with one of the
following workload types: default , sequential, or random.
nutanix@fsvm$ afs share.edit share-name share_workload_type=workload
Note: Only clusters created with later versions of Files and AOS support file system compression.
The option to enable file system compression does not appear on clusters created with earlier
versions of Files and AOS.
Tip: For information on disaster recovery with share-level replication, see "Smart DR" in the Files
Manager User Guide.
As part of DR, Files automatically creates a protection domain for a file server and the entities
within the file server (such as VMs and volume groups) during file server creation. By default,
Files adds all entities on the file server to the protection domain.
To activate DR, enable and set up the schedule for snapshots and replication for the protection
domain. Files Async and NearSync DR take snapshots when the preceding snapshot is
complete. Async has a 60-minute recovery point objective (RPO). NearSync has a 1-minute
recovery point objective (RPO).
Files creates a dedicated container for each file server instance, which cannot be used by
another file server, VM, or for any other purpose. This requirement also applies to remote
containers used for replication. If you want to replicate a file server container to a remote site,
make sure that the remote container, like the local container, is not used for any other purpose.
The remote site must have at least the same number of nodes as the number of FSVMs in the
Files instance. To ensure feature parity after activating the file server on the remote site, both
sites must have the same AOS version.
You can provide custom names for the file server protection domains at the time of setting up
the file server (see Creating a File Server on page 36). If a file server does not have a specified
protection domain name, the default protection domain name is NTNX-file_server_name.
Files supports cross-hypervisor DR. Configuration steps are the same.
Note: Refer to "Smart DR" in the Files Manager Guide, for steps on configuring Smart DR.
Procedure
1. If you have not done so already, configure a remote backup site to the local cluster.
See the "Configuring a Remote Site (Physical Cluster)" topic in the Data Protection and
Recovery with Prism Element guide.
Note: The remote site must have at least the same number of nodes as the number of FSVMs
in the Files instance.
2. In the Files Console (see Files Console on page 18), go to Data Management > Protection.
The Disaster Recovery and Self Service Restore tabs appear. In the Disaster Recovery tab,
the Protection Domain (PD) Based and Smart DR sections specify if the indicated DR type is
enabled.
After creating a file server, Files automatically adds the file server to a newly created
protection domain. However, when the file server does not have a protection domain, the
Configure action link displays in the Protection Domain (PD) Based section with the not
enabled status.
a. Click Configure.
Files redirects to the File Server view in Prism Element.
4. In the file server table, select the file server by clicking the row it appears in.
5. Under the file server table, click the Protect action link.
The Protection configuration: [file-server-name] window appears.
a. (Optional) in the Protection Domain Name field, update the name of the protection
domain.
b. Click Protect File Server.
If you did not map the local and remote containers when configuring a remote site
(VStore name mapping), create a new remote container.
Tip: See the "Creating a Storage Container" section in the Prism Web Console Guide for
this procedure.
Note: Ensure to also save the snapshot schedule on the remote site.
Procedure
2. In the Table view and Async DR tab, select the protection domain from the table.
3. Click Update.
The "Update Protection Domain" window appears.
4. In the Schedule tab, click New Schedule (or, to update an existing schedule, click the pencil
icon).
a. Repeat every [minutes|hours|days]: Click the appropriate circle for minutes, hours, or
days and then enter the desired number in the box for the scheduled time interval.
The interval cannot be less than 1 minute.
Note: Intervals of less than 60 minutes use NearSync disaster recovery. NearSync
schedules inherit requirements and limitations of AOS NearSync, see "Requirements of
• If you select weekly, select the boxes for the days of the week the schedule should run.
• If you select monthly, enter one or more integers (in a comma-separated list) to
indicate which days in the month to run the schedule. For example, to run the schedule
on the 1st, 10th, and 20th days, enter "1,10, 20".
c. Start on: Enter the start date and time in the indicated fields.
The default value is the current date and time. Enter a new date if you want to delay the
schedule from starting immediately.
d. End on: To specify an end date, check the box and then enter the end date and time in
the indicated fields.
The schedule does not have an end date by default, and the schedule runs indefinitely
unless you enter an end date.
e. Retention Policy: Enter the number of snapshots to save locally and at the remote sites.
• Enter a number in the Local line "keep the last ## snapshots" field. The default is 1.
• Enter the number of snapshots to save on the Remote Site in the "keep the last ##
snapshots" field. This number can be different from the number that you have entered
in the Local line. This replication is an async replication. After the replication completes,
the protection domain is going to be available in the Async DR tab of the remote site.
• The saved snapshots equal to the value entered in the keep the last ## snapshots field
+ 1. For example, if you entered 20 as the value for keep the last ## snapshots field,
Files saves 21 snapshots. When Files takes the next (22nd) snapshot, Files deletes the
oldest snapshot and replaces it with the new snapshot.
Note: If too many schedules have the same start time, replications can fall behind. To
avoid this issue, stagger start times across schedules.
Note: The name for the automatically created protection domain contains NTNX as a prefix
followed by the file server name.
Procedure
What to do next
Activate the file server for planned or unplanned migration (see Activating a File Server on
page 145).
Procedure
1. In the Prism Element File Server view, select the target file server.
When a file server is inactive, (Needs activation) appears next to the file server name and an
Activate button appears in the action button list (just below the file server table).
High Availability
Fail over for file server VMs (FSVMs).
High Availability (HA) for Files insures that during a disruption of service a file server VM
(FSVM), on clusters of two or more FSVMs, can fail over to another FSVM. High Availability is
enabled by default on all clusters of two or more FSVMs.
When an FSVM experiences an issue, Files reassigns the IP of the FSVM to another FSVM in the
cluster. The IP of the out-of-service FSVM remains available. However, the shares and exports
on the impacted FSVM are unavailable for several minutes during a failover.
Affinity rules do not affect HA; multiple FSVMs can share a single host during a HA event.
Smart Tiering
Tier data to an object store.
You can free up space on your file server by tiering data to aobject store. You must configure
tiering through Data Lens. However, you can also access the Tiering Dashboard on Data Lens
from the Files Console. In the Files Console, go to Data Management > Smart Tiering and click
Manage on Data Lens.
Self-Service Restore
Self-service restore (SSR) lets you open and copy a previous version of a file. For SMB you can
use SSR to restore files.
With Self-Service Restore (SSR), Files takes snapshots of the stored cluster data at the share
level. SSR exposes these snapshots to the share or export and lets you view or restore a file
from any of the previous snapshots without an administrator. The snapshots are read-only and
point-in-time (snapshots taken at a certain time) copies.
SSR is disabled by default, but you can enable it during or after share creation.
Files supports 24 hour (every hour), daily, weekly, and monthly snapshots on a fixed schedule.
By default, SST takes a snapshot every hour, retains the most recent 24 snapshots, and deletes
the oldest SSR snapshot after exceeding the retention count for the snapshot type. Schedule
snapshots for regular or frequent intervals to provide same-day protection against accidental
deletions.
The snapshot retention count corresponds to the retention period, which are as follows:
Limitations
Consider the following limitations before enabling SSR.
Procedure
2. In the row for the target share, click three dot menu > edit.
What to do next
Add a snapshot schedule for SSR, see Adding Snapshot Schedules on page 149.
1. In the Files Console, go to Data Management > Protection > Self Service Restore.
The Self Service Restore window displays.
2. Click + Add New Schedule and enter schedule details in the indicated fields.
a. Type: Set the schedule interval. The snapshot types include hourly, daily, weekly, and
monthly.
Note: You can only have one schedule type per file server. For example, a single file server
cannot have two hourly schedules.
The schedule does not have an end date by default, and the schedule runs indefinitely
unless you enter an end date.
• If you select weekly, select boxes for the days of the week to run the schedule. Select
the boxes in Pick days of week.
• If you select monthly, enter one or more integers (in a comma-separated list) to
indicate which days in the month to run the schedule. For example, to run the schedule
on the 1st, 10th, and 20th days, enter "1,10,20".
b. Frequency: Enter the number of snapshots to occur within that type of schedule in the
box. Enter the value in numerical format for minutes, hours, or days.
The interval cannot be less than an hour, so the minutes value must be at least 60.
Note: The frequency field only supports hourly and daily schedules.
c. Snapshots: Enter the number of snapshots to retain for this schedule. Enter the value in
numerical format.
4. To edit an existing snapshot schedule, click the three dots menu > edit icon.
a. To delete an existing schedule, click three dots menu > delete. Deleting schedules
ages out the snapshots based on the schedule type. For example, Files deletes hourly
schedules every hour until complete.
Procedure
1. To access the file share, go to the target directory and select Properties > Previous Versions.
Previous versions of files display in order of date modified. Therefore, unmodified files do not
appear. Previous versions of folders display every available snapshot.
To see deleted files or directories, access a previous version of the parent folder and restore
the file or directory.
2. Open and manage the previous versions according to your vendor documentation.
Note: When the absolute path to the directory of the snapshot is longer than 3922 characters,
the attempt to browse into the snapshot can fail with a file name too long error message.
Procedure
1. Go to the snapshots of the target directory by replacing /dir1/dir2 with the directory path.
$ cd /dir1/dir2/.snapshot
Note: You can only get to the .snapshot directory using the cd command. The .snapshot directory
is not visible otherwise. Using the ls -a command does not show the .snapshot directory.
Procedure
3. Remove snapshots.
Note: You can delete multiple snapshots by specifying a comma-separated list of UUIDs.
» Remove multiple snapshots using labels by defining the label. Labels define if the
snapshot schedule is hourly, daily, weekly, or monthly. Deleting snapshots using labels
deletes all snapshots for the specified label on the share.
nutanix@fsvm$ afs snapshot.remove share_name=share_name label=label
Procedure
Replace 1 - 23 with an integer to specify the time offset from UTC. For example, replace 1 - 23
with 2 to offset the time by 2 hours.
nutanix@fsvm$ afs snapshot.set_ssr_hourly_offset 1 - 23
Note: Hardening Files with the settings described in this section requires AOS 5.19.2 (or later)
and Files 3.8.1 (or later).
Support file server configuration of the SCMA ncli file-server get-security-config fs-name=file-server-name
policy.
Change the default schedule of running the ncli file-server edit-security-params fs-name=file-server-name
SCMA. The schedule can be hourly, daily, schedule=hourly
weekly, and monthly.
Disable the core-dump settings to let the ncli file-server edit-security-params fs-name=file-server-name
file server VM generate stack traces for any enable-core=false
cluster issue.
When a high governance official must run the Have the following settings.
hardened configuration. Enable Aide : true
Enable Core : false
Enable High Strength Password : true
Enable Banner : false
Schedule : HOURLY
When a federal official must run the hardened Have the following settings.
configuration. Enable Aide : true
Enable Core : false
Enable High Strength Password : true
Enable Banner : true
Schedule : HOURLY
Back up the DoD banner file. Run the following command, and repeat on all
FSVMs.
nutanix@FSVM$ sudo cp -a /srv/salt/security/AFS/sshd/
DODbanner /srv/salt/security/AFS/sshd/DODbannerbak
Modify DoD banner file. Run the following command, and repeat on all
FSVMs.
nutanix@FSVM$ sudo vi /srv/salt/security/AFS/sshd/
DODbanner
Replace the existing self-signed SSL certificate Run the following command.
with a new one. nutanix@CVM$ ncli file-server ssl-certificate-change-pfx-file-
password uuid=fs_uuid
Modify the DSCP value of one or more traffic nutanix@FSVM$ afs net.edit_qos
types. [management_dscp_value=value] [data_dscp_value=value]
Disable QoS on all traffic types and delete the nutanix@FSVM$ afs net.disable_qos
existing configuration.
Rsyslog
The table following provides details on rsyslog daemon configuration for log forwarding.
Remove the module and forwarding level form nutanix@FSVM$ afs rsyslog.remove_server_module
the rsyslog server. server_name=configured_server_name
module_name=SYSLOG_MODULE
Set the status for rsyslog forwarding. (You can nutanix@FSVM$ afs rsyslog.set_status enable=true/false
disable rsyslog forwarding completely without
removing the configured server details.)
Set up transport layer security (TLS) nutanix@FSVM$ afs rsyslog.set_tls auth_mode=anon, x509/
parameters of the rsyslog server. certvalid, x509/fingerprint,
x509/name
Note: Not setting the auth-mode to anon, ca_chain_path=PEM_encoded_CA_certificate_file_absolute_path
requires specifying permitted peers in a permitted_peers=permitted_peers
comma-separated list.
Procedure
Remount the authentication type as a value for parameter sec.
host$ -o sec=authentication-type
Procedure
This problem might be fixed by restarting the RPC-GSSAPI service on the clients. For example,
enter the following command on a Linux CentOS 6 client:
nutanix@fsvm$ sudo service rpcgssd restart
The command syntax to restart the RPC-GSSAPI service varies among different Linux versions.
Procedure
To allow clients in the same subnet as the Controller VM or storage network to mount shares,
configure the file server with the same network for both the client-side and storage-side
networks.
Procedure
1. In a multi-site environment, map the Files client network to a local site in the AD.
2. In a single-site environment or with only a single geographic location, ignore the warning.
Files | Troubleshooting | 157
Connecting to Authentication Services
The file server cannot connect with the AD server or it cannot contact the LDAP server for the
given domain.
The file server cannot reach the given domain name with the specified DNS server list.
Possible reasons include spelling mistakes in the domain name, incorrect DNS name servers, or
connectivity issues with the domain controller servers.
Procedure
1. Check the DNS server addresses, domain name, and status of the domain controllers.
Constraint Violation
Domain controller reused an operation due to a possible constraint violation.
Procedure
1. Ensure that Files related SPN entries are not present in the forest.
2. Ensure that the domain controllers do not have any replication issues.
Procedure
Add the domain controller SRV records for the required protocols and services.
Procedure
Ensure that one writeable domain controller is working in the given domain.
Finding IP Addresses
Fetch the IP addresses for all FSVMs.
Various causes.
Procedure
Enter the following command from any FSVM: nutanix@fsvm$ afs misc.fsvmips
Output lists the IP addresses for the FSVMs in the node.
Files | Troubleshooting | 158
Identifying the Share Owner
Identify the owner of a share or export.
The Files UI does not list the name of share and export owners.
Procedure
Perform one of the following commands to identify the share owner.
» List the share owners of a distributed share or export by specifying the share-name and the
share-path(including the name of the top-level directory TLD).
nutanix@fsvm$ share.owner_fsvm share-name path=share-path
Invalid Credential
Invalid user name or password.
Files cannot authenticate on the AD using the given user name and password combinations.
Procedure
NLM Locks
Unable to get Network Lock Manager (NLM) locks from Mac client.
NLM recovery does not work over the User Datagram Protocol (UDP). Use the transmission
Control Protocol (TCP) instead.
Procedure
2. Restart services.
user@host$ launchctl stop com.apple.lockd ; launchctl start com.apple.lockd
user@host$ launchctl stop com.apple.statd ; launchctl start com.apple.statd
Procedure
Files | Troubleshooting | 159
2. To update the file server network, enter the following:
nutanix@cvm$ afs infra.update_file_server_network
3. To update a specific file server within the network, enter the following:
nutanix@cvm$ afs infra.update_file_server_network fs_name
Procedure
For example, viewing the list of added names would appear similar to the following:
C:\>repadmin /prp view MINDC03 allow
Share Copying
Copy operation interrupted while using Microsoft robocopy to copy large files to Files shares.
Various causes (for example network bandwidth issues).
Procedure
Use robocopy with the /z option. This option resumes any interrupted copy operation.
Stale Statistics
Windows client experiences stale statistics.
Default cache entry time is approximately 5 minutes.
Procedure
To change the default cache entry time of 5 minutes, log into the FSVM and run the following :
nutanix@fsvm$ afs smb.set_conf “stats cache ttl” “value” section=global
Time Difference
A time difference exists between Files and the domain controller.
Files | Troubleshooting | 160
Files uses Kerberos protocol for authentication on the AD. Kerberos is a time sensitive protocol
and cannot sync the correct time when the client and servers are out of sync for several
minutes.
Procedure
Use the same NTP server for the domain controller and Files.
Unsuccessful Authentication
Authentication might be unsuccessful for the NT LAN manager (NTL when contacting read-
only domain controllers (RODC).
The list of allowed password replication must include the machine account name or file server
name. To resolve, follow troubleshooting steps on a domain controller.
Procedure
For example, viewing the list of added names would appear similar to the following:
C:\>repadmin /prp view MINDC03 allow
Files | Troubleshooting | 161
COPYRIGHT
Copyright 2021 Nutanix, Inc.
Nutanix, Inc.
1740 Technology Drive, Suite 150
San Jose, CA 95110
All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. Nutanix and the Nutanix logo are registered trademarks of Nutanix, Inc. in the
United States and/or other jurisdictions. All other brand and product names mentioned herein
are for identification purposes only and may be trademarks of their respective holders.
Files | Copyright | 162