NexentaFusion 2.0.5 User Guide
NexentaFusion 2.0.5 User Guide
5
User Guide
Preface ........................................................................................................................................ 7
Intended Audience ..................................................................................................................... 7
Document History ...................................................................................................................... 7
1. Introduction to NexentaFusion 2.0 ...................................................................................... 8
Overview .................................................................................................................................... 8
Registering a NexentaStor Appliance ......................................................................................... 8
Removing an Appliance .............................................................................................................. 9
Viewing the Historical Analytics of a Removed Appliance ......................................................... 9
Identifying NexentaFusion GUI from NexentaStor .................................................................... 9
Reviewing License for NexentaStor Appliance ........................................................................... 9
Updating License for NexentaStor Appliance .......................................................................... 10
2. Managing Pools .................................................................................................................. 11
Viewing Existing Pools .............................................................................................................. 11
Creating Pools on Single or Clustered Nodes ........................................................................... 11
Naming the Pool ....................................................................................................................... 12
Selecting Pool Options ............................................................................................................. 12
Selecting Pool Build Method .................................................................................................... 12
Selecting Data Devices for Pool Using Auto Method ............................................................... 12
Selecting Data Devices for the Pool Manually ......................................................................... 13
Adding Cache, Log, and Spare Devices to a Pool...................................................................... 14
Smart Sparing ........................................................................................................................... 15
Completing Pool Creation ........................................................................................................ 15
Exporting Pools......................................................................................................................... 15
Importing Pools ........................................................................................................................ 16
Destroying a Pool ..................................................................................................................... 16
Maintaining Pools ..................................................................................................................... 17
Scrubbing .................................................................................................................................. 17
Unmapping and Trimming........................................................................................................ 17
Pool Properties ......................................................................................................................... 18
Adding Capacity to an Existing Pool ......................................................................................... 19
Viewing Pool Status .................................................................................................................. 20
Administering Pool Data Devices ............................................................................................. 21
Smart Sparing and Device Replacement .................................................................................. 21
Removing a Device from a Pool ............................................................................................... 21
Replacing a Device in a Pool ..................................................................................................... 21
Attaching a New Mirror Device ................................................................................................ 22
Detaching a Device from a Mirror ............................................................................................ 22
Setting a Device in a Pool to Offline ......................................................................................... 22
Setting a Physical Device to Online .......................................................................................... 22
Clearing Errors from a Device................................................................................................... 22
Clearing Errors from all Devices in a Pool ................................................................................ 22
2
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
3. Managing FileSystems ........................................................................................................ 23
Creating a File System on a Pool .............................................................................................. 23
Viewing File Systems ................................................................................................................ 25
Sharing File Systems Using NFS ................................................................................................ 28
Configuring and Enabling the NFS Server................................................................................. 28
Creating an NFS Share .............................................................................................................. 29
Open Shares ............................................................................................................................. 29
Shares with Security Options ................................................................................................... 29
Creating an NFS Share for a File System .................................................................................. 30
Sharing File Systems Using SMB ............................................................................................... 31
Configuring and Enabling the SMB Server ............................................................................... 31
Setting Minimum and Maximum Protocol Version for SMB Client ......................................... 33
Creating an SMB Share ............................................................................................................. 33
Mapping an SMB Share on Windows ....................................................................................... 35
4. Managing Volumes ............................................................................................................. 36
Creating and Managing Volume Groups and Volumes ............................................................ 36
Creating a Volume Group ......................................................................................................... 36
Creating Volumes ..................................................................................................................... 37
Editing Properties for Volume Groups and Volumes ............................................................... 38
Deleting a Volume Group or Volume ....................................................................................... 40
Managing iSCSI Host Groups, Targets, and Target Groups ...................................................... 40
About Creating, Editing, and Destroying iSCSI Targets and Target Groups ............................. 40
Creating iSCSI Targets............................................................................................................... 41
Creating iSCSI Target Groups.................................................................................................... 42
Viewing iSCSI Target Information and Sessions ....................................................................... 42
Editing or Deleting iSCSI Targets .............................................................................................. 42
Removing iSCSI Targets from a Group and Destroying the Target Group ............................... 43
Configuring Secure Authentication .......................................................................................... 44
Configuring iSCSI Host Groups ................................................................................................. 44
Managing FC Host Groups, Targets and Target Groups ........................................................... 45
Configuring FC Host Groups ..................................................................................................... 45
Adding FC Targets to a New or Existing FC Target Group ........................................................ 46
Removing FC Targets from a Group ......................................................................................... 46
Viewing Target Group Sessions ................................................................................................ 47
Destroying FC Target Groups ................................................................................................... 47
Managing LUNs ........................................................................................................................ 47
Viewing LUN Information ......................................................................................................... 48
Editing and Destroying LUN Mappings..................................................................................... 49
5. Data Protection .................................................................................................................. 50
Taking a One-Time Snapshot.................................................................................................... 50
Cloning a Snapshot and Promoting a Clone ............................................................................. 51
Rolling Back or Deleting a Snapshot ......................................................................................... 52
Preparing the Appliance for Replication .................................................................................. 53
Setting the Replication Network Interface............................................................................... 53
Setting the Replication Group Password.................................................................................. 53
Adding a Protection Service ..................................................................................................... 54
Working with Protection Services ............................................................................................ 54
3
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Adding a Scheduled Replication Service .................................................................................. 54
Adding a Scheduled Snapshots Service .................................................................................... 56
Filtering Snapshots and Data Protection Service Data............................................................. 57
Configuring Continuous Replication......................................................................................... 57
Editing or Deleting a Schedule ................................................................................................. 58
Manually Executing a Service ................................................................................................... 59
Disabling and Enabling a Protection Service ............................................................................ 59
Destroying a Protection Service ............................................................................................... 60
Viewing the Replication History ............................................................................................... 61
Flipping the Direction of a Replication Service ........................................................................ 61
Activating a Destination Dataset .............................................................................................. 62
Recovering a Faulted Replication Service ................................................................................ 62
Verifying and Querying Data Protection Data .......................................................................... 63
6. High Availability .................................................................................................................. 64
About NexentaStor High Availability ........................................................................................ 64
NexentaStor HA on Bare-Metal................................................................................................ 64
NexentaStor VSA on VMware .................................................................................................. 65
About NexentaStor High Availability and HA Services ............................................................. 66
Editing vCenter Credentials for VSA-based Clusters ................................................................ 67
Verifying Cluster Status ............................................................................................................ 68
Viewing Network Heartbeats ................................................................................................... 68
Configuring an HA Service for a Pool with Shared Devices ...................................................... 68
Adding an Unshared Pool to an HA Service ............................................................................. 69
Viewing Status Details for a Shared Pool ................................................................................. 69
Moving a Pool under HA Service Control ................................................................................. 70
Removing a Pool from HA Control ........................................................................................... 70
Managing HA Services .............................................................................................................. 71
Verifying Service Status ............................................................................................................ 71
Viewing VIPs Associated with an HA Service............................................................................ 72
Adding a VIP ............................................................................................................................. 72
Editing and Deleting a VIP ........................................................................................................ 73
Viewing Disk Heartbeats .......................................................................................................... 73
Viewing SCSI Reservation Details ............................................................................................. 73
Fail Over Services Manually...................................................................................................... 74
Moving an HA Service............................................................................................................... 74
Setting the HA Service Mode ................................................................................................... 75
Stopping and Starting an HA Service ........................................................................................ 75
Destroying an HA Service ......................................................................................................... 75
7. Managing Hardware ........................................................................................................... 76
Viewing Appliance Hardware Information ............................................................................... 76
Viewing an Appliance Profile and Version ............................................................................... 76
Reviewing Server Sensors......................................................................................................... 77
Rescanning Storage Devices ..................................................................................................... 77
Chassis Section ......................................................................................................................... 77
Representation Modes ............................................................................................................. 77
Chassis Sensor Values............................................................................................................... 78
Enclosure/Bay Blink Feature .................................................................................................... 78
4
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Enclosure Labels ....................................................................................................................... 78
Faulted Drives........................................................................................................................... 78
8. Managing Network ............................................................................................................. 79
IP Links Management ............................................................................................................... 79
Common Datalink Operations .................................................................................................. 79
Adding an IP Address to Datalink ............................................................................................. 80
Adding a Link to Aggregation ................................................................................................... 80
Assigning VLAN Tag .................................................................................................................. 80
Changing Datalink MTU ............................................................................................................ 80
Unconfiguring Links .................................................................................................................. 80
Creating Aggregates ................................................................................................................. 81
Creating IPMP Group................................................................................................................ 82
Configuring a Network Interface .............................................................................................. 82
Unconfiguring Interface ........................................................................................................... 83
Creating IP Routes .................................................................................................................... 84
Modifying IP Network Settings................................................................................................. 85
Verifying FC Interfaces ............................................................................................................. 85
9. Configuring Appliance Settings .......................................................................................... 86
System Settings ........................................................................................................................ 86
Services Configuration.............................................................................................................. 86
Configuration Settings .............................................................................................................. 86
Node Management .................................................................................................................. 87
Data Settings ............................................................................................................................ 88
Log Severity .............................................................................................................................. 88
Active Probes............................................................................................................................ 88
10. Performance Monitoring and Analytics ............................................................................. 89
Terminology ............................................................................................................................. 89
NexentaFusion Analytics Overview .......................................................................................... 90
Data Aggregation and Retention .............................................................................................. 91
Using the Appliance Dashboard ............................................................................................... 91
Canvas Management ................................................................................................................ 92
Using Canvas Widgets .............................................................................................................. 92
Widget Management ............................................................................................................... 93
Chart Widget Management...................................................................................................... 93
Analyzing Data .......................................................................................................................... 93
Analyzing Performance Data .................................................................................................... 93
Working with Top N Widgets ................................................................................................... 94
Analyzing Capacity Data ........................................................................................................... 95
Analyzing Health and Utilization Data ...................................................................................... 95
Viewing the Historical Analytics of a Removed Appliance ....................................................... 95
Global Analytics ........................................................................................................................ 95
Query Builder Overview ........................................................................................................... 96
Chart Area ................................................................................................................................ 97
11. Fault Management............................................................................................................. 98
About NexentaFusion Alerts, Logs, Audits, and Events.......................................................... 98
About Alerts ............................................................................................................................. 98
5
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Managing Alerts ....................................................................................................................... 98
Acknowledging Alerts ............................................................................................................... 99
Exporting Alerts ........................................................................................................................ 99
Removing Alerts ....................................................................................................................... 99
Managing Alert Rules ............................................................................................................... 99
Creating Alert Rules ................................................................................................................ 100
Editing Alert Rules .................................................................................................................. 100
Deleting Alert Rules ................................................................................................................ 101
Email Settings for Alerts ......................................................................................................... 101
Logs......................................................................................................................................... 101
Searching for Logs and Audits ................................................................................................ 102
Exporting Audits and Logs ...................................................................................................... 102
12. Manage Users and Roles .................................................................................................. 103
User Accounts in NexentaFusion............................................................................................ 103
Adding a Local UI User…………………………………………………………………………………………..103
Destroy User………………………………………………………………………………………………………….104
Change Password…………………………………………………………………………………………………..104
Changing User Roles………………………………………………………………………………………………105
Roles in NexentaFusion .......................................................................................................... 107
Administrator………………………………………………………………………………………………………..107
Security Admin………………………………………………………………………………………………………107
Storage Admin……………………………………………………………………………………………………….107
Read-only………………………………………………………………………………………………………………107
Additional Resources .............................................................................................................. 109
6
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Preface
This documentation presents information specific to Nexenta products. The information is for reference
purposes and is subject to change.
Intended Audience
This documentation is intended for Storage Administrators and assumes that you have experience with
data storage concepts, such as NAS, SAN, NFS, and ZFS; Fibre Channel (FC) and iSCSI interfaces; Microsoft
Windows Active Directory.
Document History
Revision Date Description
2.0.5 GA Version. Deleted “Configuring
nf-2.0-userguide-RevE April 2023 NexentaCloud” chapter and cloud references from
the document.
2.0.4 GA Version. Updated the cover page to
nf-2.0-userguide-RevD December 2022
reflect the 2.0.4 release.
2.0.3 GA Version. Added a new chapter “Manage
nf-2.0-userguide-RevC October 2022
Users and Roles”.
Updated the cover page to reflect the 2.0.2
nf-2.0-userguide-RevBB July 2022
release.
Updated the cover page to reflect the 2.0.1
nf-2.0-userguide-RevBA May 2022
release.
2.0.0 GA Version. Re-organized the chapter
nf-2.0-userguide-RevB April 2022
sections to make it consistent.
nf-2.0-userguide-RevA February 2022 2.0.0 GA Version
7
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
1. Introduction to NexentaFusion 2.0
Overview
NexentaFusion is a graphical user interface that provides centralized management of multiple
NexentaStor appliances. It tracks performance analytics trends and monitors system faults.
From a single pane, NexentaFusion provides appliance-specific summary views of hardware components,
services, and storage logical objects such as shares, snapshots, and clusters. You can navigate the GUI
using its intuitive tabs, drill-down menus, action cog wheels, and expand or contract arrows.
8
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. For a clustered appliance, after the first node successfully authenticates, a second dialog box
appears with the pre-filled credentials used for the first node. If the credentials for the second node
are different, enter the appropriate credentials. Click I trust the certificate, and then click Continue.
7. After successful registration, you are redirected to a new appliance configuration page.
Note: Immediately after registering an appliance, its health is shown as “unknown” until the background
tasks with additional requests to the appliance have been completed.
Removing an Appliance
You can remove a registered NexentaStor single or clustered node by doing the following:
1. Log in to NexentaFusion as an Administrator.
2. In the Appliances page, click the COG next to the appliance you want to remove.
3. Click Remove from the action items listed under the COG.
4. If you want to retain all the data such as analytics or logs in the NexentaFusion database, clear the
check box.
5. Now click Remove.
If you removed the appliance but retained the data in the NexentaFusion database, the appliance is
still listed in the appliance list page with the status “removed”. This option is provided so that you
can view the historical analytics of a decommissioned appliance anytime.
9
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Click the COG on the top right corner of the card and select License option to open license window.
The license window contains vital information about the licenses installed on the appliance nodes. For a
clustered appliance, the information is presented per node.
When the license is no longer valid for a NexentaStor appliance (time expired or capacity limit exceeded),
you can update the NexentaStor appliance license using the NexentaFusion UI.
Note: When the license is no longer valid for a NexentaStor appliance (time expired or capacity limit
exceeded), the appliance card content will be blurred and contain a license warning. In this mode you will
not be able to access any views to manage the appliance from the UI, create or import pools, add devices
to pools (even from node CLI). But appliance I/O continues, and you will be able to use the CLI to view
information about the appliance.
10
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
2. Managing Pools
Pools are the basic storage entity of NexentaStor system, which group several storage drives together,
provide drive redundancy and host filesystems, volumes, and volume groups.
With NexentaFusion, you can create, manage, import, export and destroy storage pools. For clustered
appliances, High Availability feature for pools is supported, which could automatically move the pool to
the working node of the appliance, if the node where the pool is currently hosted fails.
Note: By default, the table does not list exported pools. To show exported pools, toggle Show exported
pools to YES. For exported pools, some of the information in the table is unavailable until the pool is
imported.
The following sections demonstrate how to create a pool on standalone and clustered appliance. The first
step in the pool creation process is to establish a name, choose the storage type, specify a High Availability
(HA) configuration or not, identify if you want to use inactive devices and specify the build method for
the pool.
11
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Naming the Pool
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. Open Pools page for appropriate appliance.
4. Click Create pool on the right top of the page
5. In the Create Pool panel on the left, enter the desired pool name in the appropriate field
Note: Pool name should be unique per node for standalone appliance and per appliance in a clustered
appliance.
Note: Using these inactive devices in the current pool will make the earlier pool permanently unavailable.
12
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
the enclosures to eliminate data loss during a single enclosure failure. When it is set to NO, the system
distributes device selection among the selected enclosures, but an enclosure failure might result in
data loss.
13
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
o Before adding disks to the pool, verify the details of the available drives by hovering the
cursor over the disk label in the table.
3. If you selected Allow inactive devices to be part of the pool you are creating, the inactive devices
appear with an asterisk symbol. For these devices, the previous pool becomes permanently
unavailable if this device is used in the new pool.
4. Click the plus icon ( + ) to add a disk to the vDev in the pool. Click the minus ( - ) icon to remove an
incorrectly selected disk from the vDev and select another. The disk outlines in the vDev show the
minimum number of disks needed for the selected redundancy. Additional devices can be added by
clicking the plus icon ( + ) for the desired disks.
5. To add another vDev, click New vDev +. When Guided Configuration is ON, the vDev is populated
with disks like those chosen for the previous vDev, if available.
6. Click Next and continue with adding Cache, Log, and Spare Devices to a Pool.
Now that you have selected the data devices to the pool using Manual or Auto method, you can add
cache and log to a pool.
Guided configuration is enabled by default to display only SSD devices for Log, or Cache vDevs. Although
not recommended, you can disable guided configuration to use non-SSD devices for Log or Cache.
14
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
o Select log redundancy type from the drop-down list and click Create. Click the plus icon (+)
on the desired devices to add as log. If the redundancy type mirror was selected, additional
mirror vDevs can be added by clicking New vDev and adding additional devices.
o Click Skip to continue without adding a log device.
Smart Sparing
When a device in a pool with raid-z or mirror redundancy fails, smart-sparing automatically selects the
right spare device to activate by means of an ordered search using media type, size, and locality as
criteria. Media types currently supported are HDD and SSD. The size attribute is used to ensure that the
spare is at least the same size or bigger than the failed drive. Locality of the device refers to the storage
enclosure.
For example, for a pool configured with an SSD hot spare (for Log devices) and HDD hot spares (for data
devices) in each storage enclosure:
• Smart sparing will make sure that the SSD spare is only activated when there is a Log SSD failure.
• For an HDD failure, smart sparing preferentially activates the HDD spare in the storage enclosure
where the failure occurred.
To add spare devices to a pool, do the following:
1. Choose options from the Select chassis and Select disks drop-down to filter the available disks by
enclosure and size, to help locate devices that will be suitable for spares.
2. To add optional spare devices, select Spare and do one of the following:
o Click Create.
o Click the plus icon (+) on the desired devices to add as spares and click Save.
o Click Skip to continue without adding a spare device.
Exporting Pools
Exporting a pool from the appliance detaches it from its associated storage. All the devices belonging to
the pool are marked as exported and are in use. Exported pools can be moved between appliances and
imported if enough devices are available. All mounted datasets of the pool are unmounted before the
pool is exported.
15
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
To export the pool, do the following:
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. Open the Pools page.
4. Click the COG for the pool and select Export from the drop-down list.
Importing Pools
Importing a pool means making this pool active and usable by the system.
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. Open the Pools page.
4. Toggle Show exported pools to yes.
5. Click the COG for the exported pool that you would like to import and select Import.
6. Set up appropriate import parameters such as pool name (to rename a pool during import), read-
only mode import, force, and the node to import the pool.
7. Click Import to start the pool import.
Destroying a Pool
Destroying a pool enables the devices used in the pool available for other purposes. If the pool was under
HA control, it needs to be removed from HA control before it can be destroyed.
The Pool Destroy dialog box informs you if you still have shared filesystems or mapped volumes (LUNs)
in the pool. LUNs must be destroyed separately; their existence can cause pool to destroy to fail. Shared
filesystems can be unmounted as part of the pool destroy process if the Force checkbox is checked.
When a pool is destroyed, the data on the pool is not destroyed. If the pool devices have not been
reallocated, the pool can be imported and made available for use again, using the CLI.
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. Open the Pools page.
4. Click the COG for the appropriate pool and select Destroy from the drop-down list.
5. If the pool dialog indicates that shared filesystems are detected, and you still want to destroy the
pool, click on the check box to force the datasets to be unmounted.
6. Now click Destroy.
16
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Maintaining Pools
To perform a management action on a pool, do the following:
1. Open the Pools page for appropriate appliance
2. Select the COG for a pool and choose a management action from the drop-down list. If the pool
belongs to an HA cluster, two HA specific options are also available.
See Pool Management Actions for High Availability section for detailed descriptions of each of the
management actions.
Scrubbing
The scrub process traverses the data of the entire pool and checks to make sure that there are no data
integrity issues. The scrub process can be scheduled using a cron expression.
Before initiating a scrubbing service, consider the following guidelines:
• Scrubbing is a resource-consuming operation like resilvering. It is preferable to schedule scrubbing
during a maintenance window and to do only one operation at a time.
• If a scrub is already in progress, a subsequent start-scrub returns an error.
• If a resilver is in progress, the system schedules the scrub operation to start after the resilver
completes.
• You can manually start a scrub service when replacing a disk to ensure that the replacement device
is functional. This also ensures that data is written correctly and verifies the integrity of the pool.
To scrub, do the following:
1. Click the COG for the pool and select Scrub from the drop-down list. The dialog that is displayed
provides status information about the last scrub/resilver, and gives you the options to
o Set a schedule for the scrub task
o Initiate a scrub now
2. Scrub can also be scheduled from the Pool Properties dialog box.
17
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
To unmap, do the following:
1. Click the COG for the pool, select Status from the drop-down list and switch to Properties tab.
2. On the Unmap section, you can:
o Enable the auto-unmap feature for this pool.
o Schedule the start and stop times for the unmap process.
o Enable Force unmap – if set, it forces ZFS to issue unmap even if it thinks a device does not
support it.
3. Unmap can also be scheduled or triggered to process now from the pool Unmap option of pool COG
menu.
Pool Properties
You can edit pool properties any time after a pool is created. If you edit the pool properties for a clustered
appliance, the modifications are made on the node where the pool is active.
To edit pool properties, do the following:
1. Click the COG for the pool and select Status from the drop-down list.
2. Switch to Properties tab on the opened Status of Pool dialog box.
3. Modify the option settings as necessary.
The List of Pool Properties table explains the available options.
4. Click Save button to save the changes.
Properties Description
Auto-expand=(on|off) Enables automatic pool expansion when the underlying device is grown.
NexentaFusion supports two modes for UNMAP, for efficient use of the
storage. With UNMAP, a storage appliance can notify the underlying storage
media about certain sectors that are no longer needed in a volume or a file
system, enabling the SSD to handle garbage collection and wear-leveling
Real-time Auto unmap management more efficiently.
=(on|off)
Auto Unmap: At the pool level, you can set the AUTO-UNMAP property to
ON for the ZFS to issue UNMAP commands to the underlying vDevs of any
blocks as it trims blocks. By default, the AUTO-UNMAP zpool property is set
to OFF.
18
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Properties Description
Force Unmap: By turning this option ON or OFF, you can control whether
device support is taken into consideration when issuing UNMAP commands
Real-time Force
to the underlying vDevs of the pool. By turning it on, at the pool level, you
unmap =(on|off)
can invoke the ZFS to force run UNMAP job even if the underlying device does
not support it.
You can invoke ZFS to run UNMAP jobs at a scheduled time for a set duration.
When invoked, a manual trim runs through all the empty space on a pool and
Scheduled Unmap
immediately trims it. Note that trimming may have a considerable
=(start|stop)
performance impact on the pool if the device does not handle trim
effectively.
Note: The Delegation and Failure mode properties should not be changed without consulting Nexenta
Support. Changes to these properties could result in data corruption.
The following rules apply for increasing the size of redundant pools:
• When increasing the size of a non-redundant pool you are prompted to Add disks.
• When increasing the size of a redundant pool, you are prompted to add a New vDev.
To edit the capacity of an existing pool, do the following:
1. For an existing pool on the Management > Pools page, click COG on the far right and select Edit
from the drop-down list.
2. In the Edit Pool panel on the left, do one of the following:
o For a redundant pool, click New vDev.
o For a non-redundant pool, click Add disks.
19
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
3. Toggle the Show only: pool disks to OFF.
Disks available for selection are displayed with a white + sign in a bright green background.
4. Select the prompted number of disks from the table on the right and click Save.
20
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Administering Pool Data Devices
The Edit Pool dialog provides the mechanisms for managing individual devices in a pool, should a device
become unreliable or not functioning properly.
To manage data devices in a pool, do the following:
1. Open Pools page for appropriate appliance
2. Click the COG for the appropriate pool, and select Edit from the drop-down list
3. Click the device in the left panel and select the appropriate action from the drop-down list.
The available actions will vary depending upon the redundancy and the type of vDev.
21
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Attaching a New Mirror Device
Select Attach on the COG of a device in a 2-way mirror to create a 3-way mirror. The enclosure view
changes to show the disks that are valid attachment candidates, filtered by the disks that are the same
size and media type as the disk to be replaced. Click the “+” on the desired replacement disk.
Select Attach on the COG of a device in a non-redundant pool to create a 2-way mirror with the existing
device.
Note: The operation is refused if there are no other valid replicas of the data.
22
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
3. Managing FileSystems
You can create file systems and share them for anonymous access or authenticated access in workgroup
mode or domain. Likewise, you can create volume groups and volumes, and share the volumes by
mapping them as LUNs. NexentaFusion provides data protection capabilities that apply to any dataset,
be it a file system, volume group, or volume. Data protection is accomplished using snapshots and
replication that can be scheduled or continuous.
Configuring a file system, or volume group and volumes: The file system is managed by multiple
properties for maximum performance and optimization. A volume group is a container for managing
volume datasets.
Sharing a file system or volume: NexentaFusion consolidates advanced capabilities to share file systems
and volumes over the network.
Protecting data with snapshots and replication: Data protection capabilities apply to any dataset, be it
a file system, volume group, or volume.
NexentaFusion allows you to see the status of all the file systems, including compression performance,
and share a file system using various sharing protocols (SMB, NFS) that enable both Windows and Unix
hosts to access the datasets. NexentaFusion also enables virus scanning on the file system, allows you to
search for a specified file system and manages Access Control Lists when creating and editing shares. The
storage pool is always a root directory for the file system hierarchy.
23
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Note: When you create a child file system, most unspecified property values are inherited from its
parent dataset. Some properties can only be set when the file system is created.
Property Description
Inherit ACL rules Controls the inheritance of the ACL settings by new files and
subdirectories from the parent directory. You can change the
properties at any time, using the following options:
• discard — Does not inherit the ACL entries.
• noallow — Inherits ACL entries only with deny access
type.
• restricted — Inherits ACL entries, excluding
write_owner, write_acl .
• passthrough — Defines mode of newly created files
with the inherited ACL entries.
• passthrough-x — Assigns a permission to execute to
newly created files, if this permission is defined in file
creation mode and inherited by the ACL.
Record size Specifies a suggested block size for files in a file system
Case sensitivity Indicates whether the file name matching algorithm used by
the file system should be case sensitive, case insensitive, or
allow a combination of both styles of matching
Accept only UTF-8 characters If enabled, the file system will reject file names that include
characters not present in the UTF-8-character set, the
"unicodeNormalizationMode" property must either not be
explicitly set or be set to "none"
Minimum space reserved for data Sets the minimum amount of disk space that is guaranteed to
and protection a dataset, not including descendants, such as snapshots and
clones. Value zero means no quota
Quota size Limits the amount of disk space a dataset and its descendants
can consume. Value zero means no quota
Unicode normalization mode Indicates whether the file system should perform a unicode
normalization of file names whenever two file names are
compared, and which normalization algorithm should be
used. If this property is set to a legal value other than "none",
and the "utf8Only" property was left unspecified, the
"utf8Only" property is automatically enabled.
24
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Minimum space reserved for data Sets the minimum amount of disk space that is guaranteed to
only a dataset, not including descendants, such as snapshots and
clones. Value zero means no quota
Dedupe mode Controls whether duplicate data is removed from the dataset
Expose snapshot directory Controls whether the .ZFS directory is hidden or visible in the
root of the file system
Update access time = true or false Controls whether to the access time for files is updated when
they are read. Turning this property off (false) avoids
producing write traffic when reading files, which can result in
significant performance gains, but might confuse mailers or
other similar utilities that use this field.
Estimated maximum IOPs The estimated maximum IOPs is computed using this
filesystem’s rate limit and record size. This estimate assumes
that the client is utilizing a matching record size. The value is
n/a when no rate limit is set
Quota size for data only Sets the amount of disk space that a dataset can consume.
Value zero means no quota
Inherit ACL rules Controls how ACL entries are inherited when files and
directories are created
Rate limit Sets the maximum bandwidth per second that can be
consumed when this filesystem is shared. Example: 1 GiB
User Quotas / Group Quotas Sets the filesystem quota per user or group
Note: The values that is shown on the Performance Widget (with the IOPs chart) for the share is like the
Estimated Maximum IOPs value if the transfer size (xfer size) of the clients doing IO is the same as the
record size used for the estimate.
25
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
To view file system status, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Filesystems. A list of all pools belonging to the selected appliance is shown.
For a clustered appliance, a list of the pools that are part of an HA service are shown, as well as
the pools that are not.
4. To only view data for a specific pool, start from selecting an appropriate criterion using the Filter by
drop-down list. The default is to show all pools.
5. To view the entire file system structure, click the arrows on the left of the table header.
6. To view the list of file systems in a pool, click the expander arrow next to the pool name.
7. Optionally, sort by a specific column by clicking the column head. If compression was enabled when
the file system was created, the Reduction Ratio column appears showing the correlation of actual
storage capacity to uncompressed capacity. This number represents the compression effectiveness.
8. To view file system properties, click the COG for a file system and select Properties.
A dialog box appears showing the editable properties.
Add New Filesystem This action is used to add a new file system.
Data Protection This action is used to go to file system data protection page.
Edit NFS Share This action is used to open NFS share edit dialog
Edit SMB Share This action is used to open SMB share edit dialog
Show ACL This action is used to open dialog with a list of ACLs.
26
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
You can view the following file system metrics:
• Bytes used: amount of disk space consumed by a dataset and all
its descendants, which is the same as Allocated amount shown in
the table.
• Bytes used by itself: amount of disk space that is used by a dataset
itself, which would be freed if the dataset was destroyed, after
first destroying any snapshots and removing any reservations.
• Bytes referenced: amount of data accessible by a dataset, which
might or might not be shared with other datasets in the pool.
View capacity usage • Bytes used by protection: amount of disk space that is consumed
summary by snapshots of a dataset.
• Compression ratio: compression ratio achieved for a dataset,
expressed as a multiplier.
• Bytes used by children: amount of disk space used by the children
of this dataset.
• Original snapshot: property for cloned file systems or volumes
that identifies the snapshot from which the clone was created.
• To view file system metrics, select the file system, then select COG
> Properties, and expand Usage Data.
You can share a file system so that users can remotely access its
contents. A child file system inherits the sharing protocol of its parent.
An individual child file system can also have addition sharing
Share using NFS/SMB protocols. For example, if a parent file system uses the SMB protocol,
its child file system must also use SMB, along with any other protocol
assigned to the child individually. To mount a file system in Windows,
you must share it first.
You can use filters to narrow the file systems data display, allowing you to view only the information that
is needed. You can also filter filesystem snapshots and data protection services. This section
demonstrates both procedures.
To filter data for file system listings, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Filesystems, then select one of the following: Filesystems or Shares.
4. To only show data for a specific pool, select a Pool from the drop-down list. The default is to show
all pools.
5. To refine the data display, select an option to Filter by from the drop-down list.
6. Specify the desired parameters by making selections from drop-down lists and entering filter values,
as needed. Filter criteria varies with the selected option.
7. Click Filter to apply the filter and view the results or click Clear to reset the fields.
27
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Sharing File Systems Using NFS
NFS allows you to share file systems on Linux and UNIX operating systems. A shared file system appears
as a local resource. NexentaFusion supports NFS v2, NFS v3, and NFS v4.
NFSv4 identity domain Specifies the common domain for NFS clients and servers.
28
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Creating an NFS Share
Sharing file systems using the NFS protocol provides the following advantages:
• Shared storage.
• Simultaneous read/write access to NFS share by multiple clients.
• Fast performance, compression, snapshots, ACLs (NFS v4 only), etc.
• Easy to create and manage, without additional resources.
NexentaFusion provides an intuitive interface for sharing an NFS file system that is accessible to all hosts,
or restricted to specific clients:
• Open share for VMware and Virtualization — Use this sharing option if the share is to be mounted in
a VMware environment for use as a Datastore that is accessible to all hosts. Or, if the share is to be
mounted on hosts in other virtualization environments that require full root access.
• Open share for any NFS client — Use this sharing option to allow all hosts read and write access to
the share.
• Advanced - share with security options — Use this sharing option to specify the clients that are
allowed access to the share using selected authentication protocols.
Open Shares
Open shares trust the client to perform authentication. The user’s UNIX user-id and group-ids are passed
in the clear over the network, unauthenticated by the NFS server.
• Open share for VMware and Virtualization — The share provides full root access to all hosts.
• Open share for any NFS client — The file system ACL is modified to give everyone@ full read, write,
and modify permissions.
29
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
• Root — Sets anon=root. Allows root access to all hosts. It is the default setting for shares that use the
Open share for VMware and Virtualization option.
• Other — Sets anon=<username>. Allows you to set the ACE for a specified user (username) with read,
write, and modify permissions.
30
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
c. Click the arrow on the right of Anonymous File Access Control to choose from the following
options.
Clicking the radio button on the left activates a selection check box on the right:
o disabled (-1) — Anonymous access is disabled. This is the default selection for Open share for
any NFS client shares. If not already selected, click the check box to the right to activate this
option. Click the check box again to deselect.
o nobody — Automatically allows access for user nobody. Click the check box to the right to
activate this option.
o root — Allows root access to the share for all hosts. This is the default selection for Open
share for VMware and Virtualization shares. If not already selected, click the check box to the
right to activate this option.
o other — Provides a text field in which you can specify a user (username) that can have read,
write, and modify access for the share. Click the check box to the right to activate this option.
Click the check box again to deselect.
The access control entries (ACEs) to be added and removed appear below.
8. Click Save.
Table 5: NFS Sharing Options
Option Description
Authentication AUTH_SYS — In secure authentication, the user name and password are transferred
Protocols transparently. AUTH_NONE — Null authentication, where NFS clients are mapped
by NFS servers as user nobody.
Open Share Allows all hosts to have read and write access to a share, or the share can be
mounted on hosts in VMware or another virtualized environment. An open share
trusts the client to perform authentication.
Note: Using group ACLs is recommended, as it is more efficient than per-user ACLs.
31
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Table 6: SMB Server Tunables
Specifies the Active Directory site. Leave this field blank if you
AD site name
do not have a local Active Directory site.
Enable IPv6 Enables IPv6 Internet protocol support within the CIFS Service.
The following procedure demonstrates how to enable SMB on the appliance, and optionally configure
tunables for the SMB server to meet the needs of your IT infrastructure.
To configure the SMB server, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Administration > System Settings.
4. Under System services, click the COG for the SMB server and select Enable to activate SMB.
5. To configure SMB, click the COG again and select Properties from the drop-down list.
32
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. Do the following as necessary:
o Enter a system comment to describe the server.
o To modify the workgroup, click Edit Workgroup, enter a Workgroup name, and click Save.
7. To join the Active Directory Domain, click Join Domain, and then in the Active Directory Domain
Settings dialog box, do the following:
o Enter the Active Directory domain and the Primary Domain Controller (PDC) address.
o Enter your AD Login and Password.
o Click Save.
8. Expand the Advanced Options section and make the necessary selections or changes.
33
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Table 7: SMB Share Options
To see only the files and directories for which you have access, select
Access-based enumeration Access-Based Enumeration (ABE) in the SMB share option. You may
enable ABE to filter large directories or to hide files.
Allow guest access Enables guest access with read/write access to the share.
This property will be visible and can be set only if the server max
Continuous availability protocol version is 3.0 or higher. It enables continuous availability for
the SMB share.
Before you can share a file system using SMB, you must have enabled SMB as described in Configuring
and Enabling the SMB Server.
To create a SMB share for a file system, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Filesystems. The pools belonging to that appliance are shown in the “Name”
column.
4. To view the file systems in a pool, click the expand arrow beside the pool name.
5. Click the COG for the filesystem and select Share using SMB.
6. Enter a Description and click Save.
34
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Mapping an SMB Share on Windows
This section demonstrates how to map an SMB share on Windows. To map an SMB share on Windows,
you must enable guest access for the SMB file system. Windows users are mapped as guest users. You
can enable guest access in the SMB file system properties with NexentaFusion.
Note: To access an SMB share as an SMB client when the SMB share exists on a shared pool enabled for
high availability, you must know the VIP address.
35
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Managing Volumes
Creating and Managing Volume Groups and Volumes
This section demonstrates how to create volume groups and volumes. A volume is a dataset that
represents a block device. A volume must be configured as a member of a volume group below a pool.
You can then set volume properties such as compression modes and volume size. A volume can be
accessed remotely by mapping it as an iSCSI or FC LUN.
The following table is a task map that outlines the process for creating volume groups and volumes.
Table 8: Task Map: Managing Volume Groups and Volumes
Task Topic
Optional: Edit the properties of an existing Editing Properties for Volume Groups and Volumes
volume group or volume.
36
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
5. Specify the following characteristics in the Create Volume Group dialog:
o Name — Enter a unique name for the volume group.
o Block size — Select a block size from the drop-down list. Block-size of a volume group (as a
default value for the new volumes) can be changed later. You also can change a block-size
value of a new volume while you are creating it.
o Minimum space reserved for data and protection — Specify the minimum amount of disk
space guaranteed for the volume group and its descendants. There is no default value. A
value of zero means there is no minimum.
o Minimum space reserved for data only — Specify the minimum amount of disk space
guaranteed for the volume group not including descendants, such as snapshots and clones.
There is no default value. A value of zero means there is no minimum. Cannot be changed
after volume group was created.
6. Expand the Optional Settings and specify the following properties as necessary:
o Compression mode — Enables or disables compression mode for the volume group. The
default is Iz4.
o Read only — Controls whether the volume group can be modified. The default is false.
o Dedupe mode — Controls whether duplicate data is removed from the file system. The
default is off.
o Sync mode — Controls synchronous behavior. The default is standard.
7. Click Create.
Creating Volumes
This section demonstrates how to create a new volume of a specified size. Volumes that are to be
included in a volume group inherit the properties for that volume group by default. You can modify
volume properties, if desired.
To create a volume, do the following:
1. Complete the following tasks:
o Create Pools on Single or Clustered Nodes.
o Create a Volume Group.
2. Click the arrow to the left of the pool that contains the volume group, then click the COG for the
volume group and select Add New Volume.
3. In the Create Volume dialog box, specify the following:
o Name — Specifies a unique name for the volume.
o Volume size — Specifies the logical size of the volume.
o Block size — Sets the block size. Select a block size from the drop-down list. The block size
cannot be changed after the volume has been written, so set the optimum size at this time.
o Thin-provisioned — Controls whether a volume is thin-provisioned. Thin provisioning
provides the ability to allocate storage capacity on demand. The default is NO. For a thin-
provisioned volume, toggle to YES. Cannot be changed later.
37
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
o Minimum space reserved for data only — For thin-provisioned volumes, specify the minimum
amount of disk space guaranteed for the volume not including descendants, such as
snapshots and clones. There is no default value. A value of zero means there is no quota.
Cannot be changed later
o Minimum space reserved for data and protection — Specify the minimum amount of disk
space guaranteed for the volume and its descendants, including snapshots and clones. There
is no default value. A value of zero means there is no quota.
4. Expand the Optional Settings and specify the following properties, or accept the defaults:
o Compression mode — Enables or disables compression mode for the volume. The default is
Iz4.
o Read only — Controls whether the volume can be modified. The default is false.
o Dedupe mode — Controls whether duplicate data is removed from the volume. The default
is off.
o Sync mode — Controls synchronous behavior. The default is standard.
5. Click Create.
38
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
5. In the Edit Volume Group Properties dialog box, modify the following properties as necessary:
o Block size — Sets the block size. Select a block size from the drop-down list.
o Minimum space reserved for data only — For thin-provisioned volumes, specify the minimum
amount of disk space guaranteed for the volume not including descendants, such as
snapshots and clones. A value of zero means there is no quota. Cannot be changed later.
o Minimum space reserved for data and protection — Specify the minimum amount of disk
space guaranteed for the volume and its descendants, including snapshots and clones. There
is no default value. A value of zero means there is no quota.
6. Review the Usage Data, expand the Optional Settings, and modify the following properties as
necessary:
o Compression mode — Enables or disables compression mode for the volume.
o Read only — Controls whether the volume can be modified.
o Dedupe mode — Controls whether compressed data is removed from the volume.
o Sync mode — Controls synchronous behavior.
7. Click Save.
39
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Deleting a Volume Group or Volume
You can easily delete volumes and volume groups. Delete all the volumes within a volume group before
you attempt to delete the group.
To delete a volume, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Volumes > Volumes.
4. Expand the pool that contains the volume group, then click the COG for the volume to be deleted
and select Destroy from the drop-down list.
5. In the confirmation dialog box, click the Destroy volume’s snapshots check box to delete all the
volume’s snapshots, or leave it blank to retain the snapshots and only delete the volume.
6. Click Destroy.
Note: You cannot destroy a volume group that is not empty. Delete all the volumes within a volume group
before attempting to destroy the group itself.
Note: When making iSCSI changes on a clustered appliance, it may take a few seconds for the screen to
refresh and reflect the changes.
40
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Creating iSCSI Targets
You can create an iSCSI target with a specified authentication method, or no authentication at all.
Assigning a target to a target group is optional.
41
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Creating iSCSI Target Groups
A target group can contain one or more targets. You must successfully complete Creating iSCSI Targets
before you can create a target group.
To create a target group, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Volumes.
4. Select iSCSI Targets and Groups.
5. In the far-left column, select the check boxes of the targets to be included in the target group, then
click Assign To Target Group at the bottom of the window.
6. In the Add targets to group dialog box, do one of the following:
o Enter a New group name in the text field at the top.
o Select the Target group from the list.
7. Click Add.
The page refreshes automatically. You can click Refresh to update the display manually if needed.
42
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. In the Edit Target dialog box, modify the target settings, as needed.
7. Click Save.
43
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Configuring Secure Authentication
Challenge-Handshake Authentication Protocol (CHAP) is a scheme that the PPP protocol uses to
authenticate the remote clients in the network. Secure authentication is optional. However, the following
CHAP options ensure that only trusted hosts can access specified targets:
• Unidirectional CHAP — Unidirectional CHAP is the most used iSCSI security level. It enhances data
security and ensures that only authorized initiators access the data with unidirectional CHAP between
a particular initiator and the NexentaStor appliance on a peer-to-peer model.
• Bidirectional CHAP — Bidirectional CHAP provides a two-layer authentication protection. It requires
that the target identifies an initiator, as well as the initiator identifying the target.
Unidirectional CHAP Authentication
Unidirectional CHAP assumes that an initiator has its own secret, which you specify on the NexentaStor
appliance side. When an initiator connects to a target, the SCSI Target verifies the initiator credentials
before granting access to data. An initiator logging in to an appliance iSCSI target with unidirectional CHAP
enabled must have a CHAP secret set.
Bidirectional CHAP
You can establish bidirectional CHAP to provide more secure authentication. Set up a CHAP User name
and password on the target side by choosing the CHAP authentication method when you create the iSCSI
target.
44
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
8. Click Save.
Note: When making FC changes on a clustered appliance, it may take a few seconds for the screen to
refresh and reflect the changes.
Fibre Channel functionality requires an additional license. Use the NexentaStor 5.x CLI to set up FC
targets, changing ports from initiator to target mode. Currently, NexentaFusion does not provide the
ability to configure FC targets.
45
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
7. Click Add to Group.
8. To manually add an initiator to the group, enter a WWN address and click Add to Group.
9. Click Save.
46
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Viewing Target Group Sessions
This section demonstrates how to view session details for all the FC targets belonging to a group.
To view target group sessions, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Volumes.
4. Select FC Targets and Groups.
5. Click the target COG and select Show sessions in the drop-down list. The Active sessions dialog
appears.
6. Click Close to return to the FC Targets and Groups page.
Managing LUNs
NexentaFusion allows you to map volumes to LUNs. A logical unit number (LUN) identifies a logical unit,
a device addressed by protocols, such as Fibre Channel or iSCSI. This section includes topics on managing
LUNs after the volumes have been mapped.
Note: LUN can be mapped with iSCSI or Fibre Channel (FC), but not both. iSCSI and FC mappings on the
same LUN are not supported.
You can map a volume as an iSCSI LUN or FC LUN. LUN mappings enable you to select the targets to which
to export the current LUN, and the initiators that are allowed to see the LUN. In the simplest
configuration, all initiators can see the mapped targets.
Before you begin mapping a volume to a LUN, you should have already completed Creating Volumes, and
Managing iSCSI Host Groups, Targets, and Groups, or Managing FC Host Groups, Targets and Target
Groups.
Fibre Channel functionality requires an additional license. If there is no Fibre Channel license, only the
iSCSI option is active and is selected by default for mapping.
47
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
To map a volume, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Volumes > Volumes.
4. Expand the pool and volume group that contains the volume to be mapped, click the COG for the
volume, and select Map Volume from the drop-down list.
5. Select a Protocol: iSCSI or Fibre Channel.
6. If required in your environment, change the block size to use for this LUN. The block size cannot be
changed after the first mapping has been created.
7. In the Map Volume dialog box, click Add Mapping and do the following:
o Select host group from the drop-down list, or select All to allow any host access to the
volume.
o Select target group from the drop-down list.
o Optional: Assign a LUN # to the volume. The system assigns a LUN number by default, but
you can enter a specific value, if desired.
o Click Save.
8. Additional mappings can be added by repeating step 7.
9. Click Close when the mappings are complete.
48
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Editing and Destroying LUN Mappings
This section demonstrates how to edit the LUN mappings and destroy a LUN.
To edit LUN mappings, do the following:
1. Log in to NexentaFusion.
2. Select the appliance.
3. Select Management > Volumes > LUNs.
4. In the far right column, click the COG for a LUN and select Edit Mappings.
5. In the dialog box, modify LUN mappings in the following ways:
o To add a new mapping, click Add Mapping, select a host group, and target group from the
respective drop-down lists. Click the diskette icon to save changes.
o To delete a mapping, click the trash can icon for the mapping, then click Yes in the
confirmation dialog.
6. Click Close.
49
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
5. Data Protection
Data protection can be used with any dataset, be it a file system, volume group, or volume. Data
protection is accomplished using snapshots, clones, and with replication.
• Snapshots — A read-only point-in-time copy of a dataset. You can create a one-time snapshot of a
dataset or create a schedule to automatically take snapshots at specified intervals.
• Clones — A copy of a snapshot that is a separate, readable, and writable dataset. A clone remains
linked to the original snapshot from which it was created, until the clone is promoted. The snapshot
from which a clone is created cannot be deleted if the clone exists. Promoting a clone doesn't create
an independent dataset. Promoting allows to replace the origin dataset with a clone by swapping
them in the data structure.
• Replication — Frequent copying from a database in one location to a database in another location.
Replication creates a new dataset, then copies any changes made to the original dataset to the
replication location at specified intervals. A replication dataset can be local or remote. There are two
types of replications: scheduled replication and continuous replication. Replication, by definition, is
scheduled to occur at specified intervals. Continuous replication does not follow a schedule, instead
replication is triggered whenever a change is detected in the original dataset. To perform remote
replication to another appliance, the replication group password and data address must be
configured.
Note: Scheduled Replication and Continuous Replication each require an additional license. Scheduled
snapshot functionality is included with the base NexentaStor license. For more information, contact your
NexentaStor Sales Engineer.
50
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Cloning a Snapshot and Promoting a Clone
A snapshot is a copy of a dataset at a specific point in time. A clone is a new dataset created from a
snapshot that is readable and writable. A clone has an implicit dependency on the snapshot from which
it was created. Even though the clone may be at another location in the dataset hierarchy, the original
snapshot cannot be destroyed if the clone exists. You can clone a file system or volume, but not a volume
group, as a volume group is merely a container for volumes.
Note: Promoting a clone created by a replication service is not supported. For more information, see the
NexentaStor High Performance Replication User Guide.
Promoting a clone doesn't create an independent dataset. Promoting allows to replace the origin dataset
with a clone by swapping them in the data structure. This section demonstrates how to clone a snapshot,
and then promote the clone.
To create a clone, do the following:
1. Log in to NexentaFusion.
2. In the Appliances page, select the appliance.
3. Select the Management tab and do one of the following:
o Select Volumes > Volumes.
o Select Filesystems > Filesystems.
4. Click the COG to the right of the dataset and select Data Protection.
5. Click the COG for the snapshot and select Clone from the drop-down list.
6. Enter a Path for clone in the text field that includes the clone name. The clone is automatically
generated with the name specified in the path.
7. Click Clone.
51
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Rolling Back or Deleting a Snapshot
This section demonstrates how to roll back a dataset to a previous snapshot, and how to delete a
snapshot.
Note: A rollback operation reverts all changes made to the dataset since the time the snapshot was taken.
Note: Destroying a snapshot that has dependent datasets, such as a clone created from the snapshot is
not allowed. Promote any dependent clones before trying to delete snapshots.
52
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Preparing the Appliance for Replication
This section covers how to specify the dedicated network interface to use for replication, and how to
specify the replication group password.
53
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Adding a Protection Service
A service (function) performs a specific task on a dataset. A protection service creates a snapshot instance
based on a specified schedule and dataset. You establish a protection service as a basis for scheduling
snapshots and replication.
The icons in Table: Protection Service Icons appear in the Protection column for Filesystems and Volumes
as a visual indicator for the type and status of the service.
Table 9: Protection Service Icons
Indicates the source location for a replication service. Green indicates the
service is in working order. Red indicates the service is not working. Gray
indicates the service is disabled. Transparent green indicates that the child
filesystem or volume is protected by a parent data protection policy.
54
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Expand the pool, click the COG on the far right of the dataset, and select Data Protection.
5. Select Protection Services , click Add New Service + , then in the New Protection Service dialog box,
do the following:
o Enter a Service name that is unique and is made up of only letters, numbers, and any of the
following symbols: underscore (_), dash (-), or forward slash (/).
o Select Scheduled replication from the drop-down list.
o For Local replication, click the check box.
o For a Remote replication, specify the following:
o IP address or fully qualified domain name (FQDN) of the destination appliance
o Port number. The default port number is 8443
o For local and remote replication, enter the complete path to the Secondary dataset to which
the snapshots will be replicated.
6. Click the Recursive check box to take snapshots of the nested datasets under the selected parent
dataset.
7. In the Advanced options window, optionally, for filesystems shared with NFS, click Send NFS
settings to replicate NFS share permissions to the destination.
8. In the Throttle field, set a maximum transfer rate for all replication by limiting the total bandwidth
used by all transfers at any time.
9. Check the Mount destination filesystem to mount the destination filesystem to the default
mountpoint. If unchecked, mountpoint is set to none.
10. To Set destination as read-only, click the check box.
11. Click Add Schedule. In the New Schedule dialog box, select a Repeat interval (the time interval at
which the snapshots should be taken) from the drop-down list:
o Hourly — Specify the hours interval, then select a Minutes value from the drop-down list.
The minute intervals appear in the field. Optionally, you can click inside the field and manually
enter additional minute interval values.
o Daily — Specify the Run every number of days interval, then specify the time of day at which
to take the snapshot in the Run at field.
o Weekly — Select the Days of Week on which to take the snapshot, then specify the time of
day at which to take the snapshot in the Run at field.
o Monthly — Specify the Run every number of months interval, type in the Days of Month on
which to take the snapshot and press Enter. Then you can type another date. Next, specify
the time of day at which to take the snapshot in the Run at field.
12. In Snapshots Keep Policy:
o Specify the number of latest snapshots to be kept locally.
o Specify the number of latest snapshots to be kept on the secondary dataset or server.
13. Click Add Schedule, and then click Create.
55
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Adding a Scheduled Snapshots Service
For scheduled snapshots, snapshots are created on a specified schedule. Schedule services can then
replicate data on a given schedule. A service can have multiple schedules.
To create a scheduled snapshot service, do the following:
1. Log in to NexentaFusion.
2. In the Appliances page, select the appliance.
3. Select the Management tab and do one of the following:
o Select Volumes > Volumes.
o Select Filesystems > Filesystems.
4. Expand the pool, click COG on the right of the dataset, and select Data Protection.
5. Select Protection Services , click Add New Service + , then in the New Protection Service dialog
box, do the following:
o Enter a Service name that is unique and is made up of only letters, numbers, and any of the
following symbols: underscore (_), dash (-), or forward slash (/).
o Select Scheduled snapshots from the Service type drop-down list, if not already selected.
o Click the Recursive check box to take snapshots of nested datasets (filesystems) under the
selected parent dataset.
6. Click Add Schedule, then in the New Schedule dialog box, select a Repeat interval (the time interval
at which the snapshots should be taken) from the drop-down list:
o Hourly — Specify the hours interval, then select a Minutes value from the drop-down list.
The minute intervals appear in the field. Optionally, you can click inside the field and manually
enter additional minute interval values.
o Daily — Specify the Run every number of days interval during which to take the snapshot.
Then specify the time of day in the Run at field.
o Weekly — Select the Days of Week during which to take the snapshot. Then specify the time
of day in the Run at field.
o Monthly — Specify the Run every number of months interval, and then type in the Days of
Month during which to take the snapshot. Press Enter. Then you can type another date. Next,
specify the time of day in the Run at field.
7. In Snapshots Keep Policy, specify the number of latest snapshots to be kept locally.
8. Click Add Schedule, and then click Create.
56
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Filtering Snapshots and Data Protection Service Data
NexentaFusion provides filtering capabilities that greatly improve efficiency for viewing snapshot and
data protection service data.
To filter snapshot and data protection service data, do the following:
1. Log in to NexentaFusion.
2. In the Appliances page, select the appliance.
3. Select the Management tab and do one of the following:
o Select Volumes > Volumes.
o Select Filesystems > Filesystems.
4. Click the COG of a file system or volume and select Data Protection from the drop-down list.
5. Do one of the following:
o Click Snapshots and select a Filter by option from the drop-down list.
o Click Protection Services and select a Filter by option from the drop-down list.
6. Enter a query string, or make selections as appropriate, then click Filter. The results appear in a
table.
7. Click Clear to reset the default values for a new query.
Note: Continuous Replication requires an additional license. Scheduled snapshot functionality is included
with the base NexentaStor 5.x license. For more information, contact your NexentaStor Sales Engineer.
57
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
o For local and remote replication, enter the complete path to the Secondary dataset to which
the snapshots are to be replicated.
7. Optional: For a file system with nested datasets, click the Recursive check box to take snapshots of
all the nested datasets under the selected parent dataset. There is no recursive selection for
volumes and for volume groups. All volumes in a selected group are automatically replicated.
8. In the Advanced options window, optionally, for filesystems shared with NFS, click Send NFS
settings to replicate NFS share permissions to the destination.
9. In the Throttle field, set a maximum transfer rate for all replication by limiting the total bandwidth
used by all transfers at any time.
10. Check the Mount destination filesystem to mount the destination filesystem to the default
mountpoint. If unchecked, mountpoint is set to none.
11. To Set destination as read-only, click the check box.
12. In the confirmation dialog box, click Create.
13. If Continuous Replication has been disabled, you can update the target at any time doing the
following:
o Selecting Management > Filesystems.
o Select the COG for the pool and choose Data Protection from the drop-down list.
o Select Continuous Replication and then click Run Once.
58
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Manually Executing a Service
This section demonstrates how to execute a scheduled service manually.
To manually execute a service, do the following:
1. Log in to NexentaFusion and in the Appliances page, select the appliance.
2. Select the Management tab and do one of the following:
o Select Filesystems , click the COG for a file system, and select Data Protection from the drop-
down list.
o Select Volumes , click the COG for a volume or volume group, and select Data Protection
from the drop-down list.
3. Select Protection Services , click the COG for the service and select Snap Once or Run Once from
the drop-down list.
Note: Forcibly disabling recursive replication can result in data inconsistencies. You must disable a
replication service before you are allowed to destroy the service.
59
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. In the confirmation dialog box, click Yes.
Note: When deleting a Continuous Replication service, "Destroy the destination dataset" and
"Force the service to be destroyed under all circumstances" are the only available options.
When deleting a Scheduled snapshot service, "Destroy service snapshots" and "Force the service
to be destroyed under all circumstances" are the only available options.
7. Click Destroy.
60
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Viewing the Replication History
The appliance stores the results of the last 10 runs including run-once, scheduled and recovery runs.
To view the replication history:
1. Log in to NexentaFusion and in the Appliances page, select the appliance.
2. Select Management and do one of the following:
o Select Filesystems, click the COG for a file system, and select Data Protection from the drop-
down list.
o Select Volumes, click the COG for a volume or volume group, and select Data Protection from
the drop-down list.
o Select Data Protection and query for the desired Replication Services.
3. Select Protection Services, click the COG for the service and select Show history from the drop-
down list.
Note: Disable a replication service before flipping the direction of a replication service. All clients should
be quiesced prior to flipping the direction of the service, otherwise data may be compromised during the
process. Clients can resume writing data after the flip process is complete.
The following guidelines apply when flipping the direction of a replication service:
• When the replication direction is flipped, keep policy values are flipped as well.
• Two services cannot replicate to the same destination. It is not allowed.
• Check all clients prior to beginning the flip process, to maintain the integrity of the data.
• If a replication service is active when flipping the direction, an error dialog appears.
Note: For information on the advanced configuration options for a HPR service, see the NexentaStor High
Performance Replication User Guide.
Nexenta recommends that you use these advanced functionalities only as disaster recovery solutions.
To flip the direction of a service, do the following:
1. Disable the service as described in Disabling and Enabling a Protection Service.
2. In the Appliances page, select the appliance.
3. Do one of the following:
o Select Management > Volumes > Volumes.
o Select Management > Filesystems > Filesystems.
61
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Expand the pool, click the COG on the far right of the dataset and do one of the following:
o Select Data Protection > Protection Services.
o Select Data Protection > Continuous Replication.
5. Do one of the following:
o Click the COG next to the dataset and select Flip direction.
o Click Flip Replication Direction.
6. Click Yes in the confirmation dialog box that appears.
62
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Click Recover to see the exact steps that will be taken if the RECOVER button is clicked. It will create a
new recovery snapshot; then try to find the common snapshot for each replicated dataset separately,
and replicate all snapshots created after the common snapshot to the destination. Any changes or
snapshots created after the common snapshot will be destroyed. If the common snapshot does not exist,
the dataset is replicated from scratch.
63
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. High Availability
About NexentaStor High Availability
NexentaStor High Availability (HA) is an enterprise-proven cluster product that manages the availability
of critical storage pools. Based on your requirement, the HA cluster can be either configured on bare
metal or between NexentaStor Virtual Machines on VMware vSphere.
Configure the NexentaStor HA cluster using the NexentaStor Command Line Interface (CLI), and then
manage the clustered nodes with NexentaFusion.
High Availability functionality is only available when a valid NexentaStor HA license is installed on an
appliance. For more information, contact your Nexenta sales engineer or Nexenta Customer Support at
[email protected].
NexentaStor HA on Bare-Metal
NexentaStor HA cluster on bare metal consists of two servers with shared storage and any number of
configured HA services. Each service in the cluster contains one or more storage pools and zero or more
associated VIPs. The high availability of the pools is maintained by the cluster software that manages the
startup and failover of the HA services within the cluster.
An example of a High Availability (HA) cluster configuration would consist of two HA services. Each service
is created independently, then assigned to one or more pools. Under normal operation, each node
provides services to their designated pools.
In the event of either node failure, the high availability of the pools on bare-metal is maintained by the
cluster software that uses two functions to provide reliable automated failover services:
• Heartbeats: Each node in the cluster communicates with the other node through different heartbeat
mechanisms such as Network and disk heartbeats. These heartbeats are used to monitor the status
of the remote node. If a remote node responds to network or disk heartbeats, it is deemed
operational. If a remote node stops responding to heartbeats for a specific time, the HA cluster
detects system failure, and an automatic failover operation is initiated.
• SCSI based disk reservations: SCSI persistent reservations on devices in the pool are used to protect
the data in the pool if split brain scenarios where two nodes may concurrently attempt to take
ownership of a pool, or a node that was temporarily hung attempts to write to a pool it no longer
owns.
When a failed node is repaired and restarted, it re-joins the cluster and the administrator controls when
the pools are redistributed.
64
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
NexentaStor VSA on VMware
NexentaStor High Availability is also supported between NexentaStor Virtual Machines on VMware
vSphere. This configuration is popular for customers looking to add full featured NAS file services to
VMware vSphere environments on all-block SANs or Hyper-Converged Infrastructure such as VMware
Virtual SAN and Nutanix.
A NexentaStor HA cluster on VMware vSphere relies on two functions to provide reliable automated
failover services:
• Heartbeats: Each node in the cluster communicates with the other node through different heartbeat
mechanisms such as Network and disk heartbeats. These heartbeats are used to monitor the status
of the remote node. If a remote node responds to network or disk heartbeats, it is deemed
operational. If a remote node stops responding to heartbeats for a specific time, the HA cluster
detects system failure, and an automatic failover operation is initiated.
• vCenter control point: vCenter is used to control the power state of NexentaStor virtual machines to
protect against split brain scenarios and ensure that a storage pool is only imported on a single node
at any time. This is used as an alternative to SCSI persistent reservations used on bare metal clusters.
65
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
About NexentaStor High Availability and HA Services
HA Cluster
• A pair of NexentaStor appliances that have the HA feature licensed on both nodes.
• Runs a defined set of services and monitors each cluster member for failures. Clustered NexentaStor
appliances are connected through various communication channels, and exchange heartbeats that
continually send information about their states.
• Can have multiple pools and services, with at least one dedicated pool per HA service.
• Includes a built-in monitoring mechanism that detects a failure in the interface between the clients
and the datasets that can trigger an automatic failover to the other node in the cluster.
66
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Note: NexentaStor HA Cluster creation must be done in the NexentaStor CLI before registering the
appliance to NexentaFusion. Configuration settings in NexentaFusion are limited to HA services and the
VMware vCenter credential, used when deploying a VSA-based cluster.
HA Service
Detects server hardware, software and network failures across the HA Cluster and makes speedy,
predictable, and predefined decisions as to what remedial action to take.
Continually passes HA service state around the HA cluster so that services (and their associated pools)
can be automatically started on the alternate node in the cluster if necessary.
Allows manual movement of services (and their associated pools) in the HA Cluster for load balancing and
administrative needs. Provides robust data fencing of pools in the HA Cluster.
• Is configurable using NexentaFusion, NexentaStor CLI or RESTful API.
• Provides notification of significant events across the HA Cluster.
• Exercises unused system components ensuring they are available if required on failover.
• Has no automatic bounce back of HA service after the failed node is repaired.
• Has any number of VIPs that failover with the service.
67
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Verifying Cluster Status
You can review and verify the details and status of cluster nodes immediately from the Cluster Status
page, including net heartbeat and configuration information.
To verify the status of cluster nodes, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Cluster Status. The Cluster Status table appears.
5. Click Refresh to update the data.
68
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
5. Click Create Service.
This entire sequence may take a few minutes.
After associating a pool with an HA service, the pool table appears with a flashing yellow shield. After
service creation completes, the screen refreshes and a green shield appears. This means the pool is ready
to handle IOs.
Note: This entire sequence may take a few minutes. If after a refresh and several minutes the shield is
not green, mouse over the shield to see whether the status indicates a problem.
69
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
For a clustered appliance, the pool view shows the node that owns the pool. The status of the pool
is shown in the Health column. The first column in the following figure (only shown for a clustered
appliance) represents the Cluster service state.
4. In the first column, hover the cursor over the shield icon to view information on the configured VIP
and states of the service. The Unblocked parameter indicates whether the HA Service is enabled to
be started on the node.
Note: Clients using the pool during migration will see a temporary suspension of IO while the failover is
in progress.
Caution! The HA service is destroyed when the initial pool (with the same name as the HA service) with
which the service was created is removed from HA control.
The HA service takes the name of the first pool with which it is associated. Multiple pools can be managed
by one HA service. If the HA service is stopped, the pools under its control remain in an exported state,
but can be manually imported. You can remove all pools from HA control and destroy the service from
the Destroy HA Service screen.
70
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
To remove a pool from HA control, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select the clustered appliance on which the HA service exists.
3. Select Management > Pools.
All the pools belonging to the appliance are shown.
4. Click the COG of the HA pool enabled for high-availability and select Remove from HA Control from
the drop-down list.
The Destroy HA service confirmation dialog box appears, which allows you to remove all pools from
HA control and destroy the service.
5. To remove all pools from HA control and destroy the service, click Yes. The pool remains on the
node where the service was running and all the shares stay accessible from this node, but not the
VIP address.
A dialog box appears in the following cases:
o When you remove a pool from the HA service that is not the initial pool with which the service
was created.
o When you remove the initial pool with which the HA service was created.
Managing HA Services
An HA service runs on clustered nodes to provide high availability (HA) access to user data. When the HA
service detects a node failure, it transfers ownership of the shared storage to the other node in the cluster
pair. HA services are managed independently from one another and can be in several possible states.
An HA cluster must be configured using the NexentaStor 5.x CLI before it is added (registered) to
NexentaFusion. NexentaFusion only configures HA services.
71
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Viewing VIPs Associated with an HA Service
A VIP is a virtual address associated with a shared pool service. The network clients use the VIP to connect
to the shared pool. When you created an HA Service for a shared pool, as described in Managing HA
Services, you may have added one or more VIPs. This section demonstrates how to view the VIPs
associated with an HA service.
To view a list of configured VIPs associated with an HA service, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management.
5. Select the desired service in the Services summary table.
The first table in the Service details section shows the VIPs configured for the selected service.
Adding a VIP
This section demonstrates how to add a virtual IP (VIP) to an existing service. A VIP is an address
associated with a shared pool. Network clients use a VIP to connect to a shared pool. After creating an
HA service, you can add a VIP in a cluster-wide fashion on all cluster nodes.
To add a VIP to a service, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management and then select the desired service.
5. In the Services details panel, click Add VIP.
A row is added to the table.
6. Do the following:
o Enter a unique VIP Name in the text field.
o Select an IP protocol from the drop-down list. IPv4 is the default.
o Enter an IP Address and Netmask in the appropriate fields.
o Select an interface for each node from their respective drop-down lists.
7. Click the disk icon on the far right to Add VIP. Alternatively, click the X to Cancel Editing and delete
the entries for the new VIP.
After adding the VIP, the VIP information is displayed again in the table with a COG on the far right.
72
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Editing and Deleting a VIP
This section demonstrates how to edit and delete HA VIPs with NexentaFusion.
To edit an HA VIP, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management.
5. In the Services details panel, click the COG for the VIP and click Edit.
6. Modify the VIP settings as necessary, and click the disk icon to save changes.
To delete an HA VIP, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management.
5. In the Services details panel, click the COG for the VIP and click Delete.
6. In the confirmation dialog box, click Yes.
73
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Select Service Management.
5. To physically locate the device, click on Show Indicators.
Clicking on the Show Indicators displays a small icon reflecting the ident light LED.
6. To locate the disk using the blink feature, click the Ident LED icon. The Blink feature enables you
to make the indicator for a specific disk bay blink.
Moving an HA Service
This section demonstrates how to manually move a selected service to the alternate node in a cluster.
You might want to move a specific service and its associated pools to a different node for load-balancing
purposes.
You would typically fail over all services running on a cluster node (to the other cluster node) to perform
maintenance on the node.
Note: Clients using the pool during migration will see a temporary suspension of IO while the failover is
in progress.
74
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Setting the HA Service Mode
After creating an HA service, you can set the service mode to start automatically after the service stops,
or set the service mode to manual, requiring that the service be started manually. This section
demonstrates how to set the service mode to either automatic or manual.
Changing the service mode has no effect on the state of an active service.
To set the mode of a service, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management.
5. In the Services summary table, click the COG for the service and select Set Mode.
6. In the Set service mode dialog, click the appropriate radio button to set the mode for each node:
automatic or manual.
7. Click Set to apply the changes.
Destroying an HA Service
This section demonstrates how you can destroy an HA service with NexentaFusion.
To destroy an HA service, do the following:
1. Log in to NexentaFusion.
2. In the Appliances List page, select a cluster.
3. Select Management > High Availability.
4. Select Service Management.
5. In the Services summary table, click the COG for the service and select Destroy from the drop-down
list.
6. In the confirmation dialog box, click Yes.
75
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
7. Managing Hardware
Viewing Appliance Hardware Information
After registering a NexentaStor appliance, you can view the appliance hardware information on the
Hardware page.
For easy management, NexentaFusion provides a graphical or tabular view of the enclosures and disks
connected to the appliance. Use this Hardware page to identify the physical location of certain devices.
The Hardware page enables you to view:
• System software version
• Current system storage profile
• CPU information: CPU model, vendor, number of cores, number of threads.
• RAM information: total amount, available amount.
• HBA information: installed controllers, their models and driver types.
• NIC information: available interfaces, their state and speed.
• Sensors information based on IPMI data: sensor id, name, current value, units, type, and state.
• Rescan inventory option.
• Chassis information: connected enclosures vendor, model, sensor information, list of connected
devices per enclosure and enclosure connection information.
• Blink enclosure option.
• Blink device option.
To open hardware page:
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. From the menu on the left, navigate to Management > Hardware.
76
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Reviewing Server Sensors
Sensor information is provided per node based on IPMI data. If the node does not have IPMI controller,
the sensor information will be missing for this node.
To review sensor information:
1. Navigate to hardware page for appropriate appliance.
2. Select the appropriate node (if the appliance is HA cluster).
3. Click the COG on the right near the Refresh button.
4. Click Display server sensors information.
The sensor data is not updated live. To update to the current values, click Refresh on the sensors
page.
Chassis Section
Chassis section of appliance Hardware page helps to identify and manage recognized chassis, enclosures,
and storage devices (drives). There is an ability to review sensor information for enclosures that support
it as well as trigger blinking the indicator for certain enclosure or drive bay. The drives that are located
within server case are presented under the Internal or attached media section.
Representation Modes
Chassis section provides several representation modes to ease the review for devices (drives). In general,
the drives are grouped by enclosures and then by bays, trays, rows, etc. within enclosure. The grouping
intends to copy the physical layout of the enclosure model and the location of the devices according to
this layout.
There are two representation modes for Chassis section - grid mode and table mode. While grid mode
could be more helpful to present the physical layout of drives in enclosure, table mode provides more
information on the usage of drive in system. For example, the drive might be used to storage pool
affiliation.
77
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
The number of displayed drives can be filtered by enclosure, disk type, pool, or disk attributes. In the
table mode, only the devices that meet the filtered-condition appear. In the graphical view, the devices
that meet the condition appear in solid colors and the devices that do not meet the filtered condition
appear in muted color.
Note: In the Internal or attached media section, a device could appear as an outline and labelled as RMV.
These are removable devices that cannot be used for pools.
Enclosure Labels
Every external enclosure could be assigned an arbitrary label to ease its identification. By default, the
value of the label is set to internal system identifier of the enclosure, but this can be changed any time.
To change the label, double click the area to the right of the enclosure model (when you hover the cursor
over this area, it shows a tooltip) and enter the desired label and press Enter key on the keyboard.
To remove the label and set it to default value, delete the label completely and press Enter. The label will
be reset to default.
Faulted Drives
Error icons on a device indicate that FMA (Fault Management) has detected an issue and created an
appliance alert case. Click on the error icon to view the details of the alert case. A click on the case ID will
navigate the user to the Alert Cases view, with the filter set to that case ID. Click the COG to view
additional information.
78
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
8. Managing Network
NexentaFusion enables you to manage network configuration of appliance nodes in the following ways:
• IP Links management
• Network Aggregates management
• IPMP Group management
• VLAN management
• MTU management
• IP Addresses management
• IP Routes management
• IP network settings
• FC Interfaces overview
IP Links Management
IP datalink management is performed through IP Links tab of the Networks page.
IP links page provides an ability to manage physical and virtual datalinks. The set of operations that may
be performed on a particular datalink depend on its type and link purpose.
Every link type supports basic operations such as adding new address, adding a link to aggregate,
assigning a VLAN tag, setting MTU and unconfiguring.
Some of the link types support additional operations, such as removing members from aggregates or
destroying for virtual datalinks such as aggregates and IPMP.
Note: There is a specific link type called mgmt. Links of this type are management interfaces and cannot
be managed from Fusion. Even basic operations are unavailable for links of this type. To control these
links, you should use NexentaStor CLI.
79
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Adding an IP Address to Datalink
The operation is available under Add Address option of datalink COG menu. Alternatively, check the
checkbox to the left for datalink and click Add Address at the bottom of the page.
You can have any number of associated addresses for a single datalink. When creating an address object,
you specify a name, type (static, dhcp, mgmt, addrconf), and network mask.
For a static address, you set the network IP address, network mask and name. For dynamic address
configurations ("dhcp" for IPv4 and "addrconf" for IPv6) only a name is required. IPv4 and IPv6 are both
for addresses and network masks. The protocol version depends on your input.
Unconfiguring Links
You can unconfigure the link using Unconfigure IP Address option under COG menu for a particular
datalink.
80
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Creating Aggregates
Link aggregation combines multiple physical Ethernet links into one logical link to increase network
performance and protect the appliance against failures.
Link aggregations are beneficial in the following ways:
• Administering multiple interfaces as a single port.
• Using one IP address to aggregate multiple interfaces.
• Securing the IP address of an aggregation from external applications.
• Allowing for the automatic failover of IOs from a failed interface to a usable link in the aggregation.
• Increasing the bandwidth within a physical network setup.
Aggregation prevents appliances from being limited to the bandwidth of the largest NIC, increasing the
throughput to that of the combined NICs. When creating an aggregate, you are asked to (optionally)
specify Link Aggregation Control Protocol (LACP) mode settings for the aggregations. NexentaStor
supports LACP - IEEE 802.3ad. LACP automatically bundles multiple physical ports into a single logical
channel, thus providing greater performance and availability.
81
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. In the Add Network Address dialog box, do the following:
o Enter a Name.
o Select an address Type from the drop-down list. The remaining fields change depending on
the Type of link selected. The information required varies with the type of address.
o Specify the information for the remaining fields and click Add Address.
To remove interface from aggregate, select Remove [link-name] from the COG menu.
To destroy the aggregate, select Destroy from COG menu.
82
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
6. In the Add Network Address dialog box, do the following:
o Enter a Name.
o Select an Address Type from the drop-down list.
The information required varies with the type of address being added. The remaining fields
change depending on the type of link selected.
o Specify the information for the remaining fields and click Add Address.
Note: You cannot destroy IPMP group when it has members. You must delete all members from IPMP
group to be able to destroy it.
Unconfiguring Interface
To unconfigure an interface:
1. Click the COG on the far right.
2. Select Unconfigure from the drop-down list.
3. In the confirmation dialog box, click Yes.
To add a member to an existing IPMP group:
1. In the Links table, click the COG of the link to be added as a member, and select Add to... from the
dropdown.
2. In the resulting dialog box, select the IPMP group from the dropdown, and click Add.
3. The IPMP Groups table are updated to display the new member.
To remove a member from an IPMP group:
1. Expand the IPMP group in the IPMP Groups table so that the members are visible.
2. Click the COG on the member to be removed and select Remove from Group.
To delete an IPMP group:
1. Log in to NexentaFusion.
2. Click Appliance, if not already in the Appliance view.
3. In the Appliances List, click an appliance and select the Management tab.
4. Click Networks > IP Links.
5. In the IPMP Groups table, click the expand arrow to the left of the IPMP Group name.
6. Click the COG of each group member, select Remove from group from the drop-down list, and click
Yes in the confirmation dialog box.
The IPMP must be empty before it can be deleted.
7. Click the COG for the IPMP group, choose Destroy from the drop-down list, and click Yes in the
confirmation dialog box to destroy the selected IPMP group.
83
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Creating IP Routes
IP routes management is performed through IP Routes tab of the Networks page.
You can view existing network routes, create new network routes, and delete network routes as
necessary. You create a new network route by providing the network or host as destination and specifying
a reachable gateway address through which the packets are to be routed.
To create a route to a specific host, specify a specific IP address for the destination (for example,
192.168.10.44).
To create a route to a network, you can use the network/cidr format for the destination (for example,
192.168.10.0/24) or a specific IP address (192.168.10.0).
84
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Modifying IP Network Settings
IP network settings management is performed through IP Network settings tab of the Networks page.
During NexentaStor installation, you may have set up a domain name server (DNS) during the initial
NexentaStor installation. This section demonstrates how to verify the established DNS settings, and
modify them as needed.
Verifying FC Interfaces
To verify information for Fibre Channel (FC) appliance interfaces, do the following:
1. FC interfaces overview is performed through FC Interfaces tab of the Networks page.
2. Select Networks > FC Interfaces.
A table displays the appliance FC interface information.
3. Verify the following information:
o Port WWN — unique World Wide Name (WWN) indicator for the port assigned to the
appliance interface
o State — current health status for the port
o Current Speed — measured in Gb
o Mode — initiator or target mode
o Node WWN — unique WWN indicator assigned to the node
o HBA — make and model of the Host Bus Adapter (HBA)
85
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
9. Configuring Appliance Settings
System Settings
The System Settings page provides the following appliance configuration and maintenance features and
tools:
• Services configuration
• Configuration settings
• Node version management
• Node power management
Services Configuration
System services allows you to control and manage appliance nodes services. The services are managed
per node, so neither service state nor configuration is automatically synchronized between cluster nodes.
For every service, Enable/Disable commands are available through the service cog menu. In addition,
some of the services provide some configuration options that are accessible through Properties option
of the service cog menu.
Configuration Settings
With System Configuration Settings section, you can change appliance-wide configuration settings. For
most of the options, you can select whether the setting will be the same for all cluster nodes or unique
to each node.
The following configuration options are available:
• Administrator Email
Set up the email address of the NexentaStor admin user for system failure notifications.
• Alert Emails
Set up an email address to receive email notifications directly from the appliance, in addition to
displaying the alerts in NexentaFusion. You can also subscribe to be notified by only a subset of all
alerts by providing the class prefixes.
Example of a class prefix: If you want to receive notifications about all faults, set the Class prefix to
fault. If you want to receive notifications only for zfs faults, set the Class prefix to fault.fs.zfs.
Fusion can generate an email notification for alert case events too.
• Alert threshold settings
86
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Using this feature, you can specify whether the appliance should generate an alert when CPU
utilization thresholds or Network utilization thresholds are exceeded, and set the threshold values.
You can also edit the email address to receive the alert notifications directly from the appliance.
• Defaults for CPU Utilization
CPU utilization is configured to alert when the default warning threshold exceeds 75% and the error
threshold exceeds 90%.
• Defaults for Network Utilization
The network usage is configured to alert when the warning threshold exceeds 75% and the error
threshold exceeds 90%.
• Network Hostmodel
Controls how outbound IP traffic is routed across multiple interfaces on the NexentaStor node using
either the Weak end system model or the Strong end system model as defined in RFC1122. The Weak
hostmodel, also known as asymmetric routing, allows the NexentaStor node to select any outbound
interface that can reach the destination IP address, independent of the source IP address of the
packet. The Strong hostmodel, also known as symmetric routing, should be used for scenarios where
outbound traffic must be kept on interfaces that are on the same subnet as the source IP address in
the packet. This is particularly useful when strict segregation of IP traffic across different interfaces
is required.
• Resilver priority
Sets ZFS scrub and resilver priority.
• SMTP
Appliance SMTP configuration, which is required for sending email notifications.
• Swagger
Controls the availability of appliance REST API online documentation. Disabled by default.
Node Management
The Node Management section allows you to perform power management and version management of
each node.
The NexentaStor version and the API version is displayed under the corresponding node hostname. If
there is a bell icon and an Upgrade button to the right of node version, there is a version update available.
Hovering the pointer over the bell icon or the Upgrade button will display a tooltip with a list of available
updates.
Clicking Upgrade button opens a modal window with the detailed list of available upgrades with details
such as the system version, the build number, and the packaging date.
To upgrade the system to a specific version:
1. Click Upgrade to open upgrade modal window.
2. Click the radio button corresponding to the version you want to upgrade to.
3. Select the Force creation of new boot environment during upgrade checkbox to force-create a new
system boot environment (BE).
For significant changes between the current and the selected system version, the new BE is created
even if not requested.
87
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
4. Click Upgrade to start the upgrade.
5. After the upgrade is finished, reboot the node manually any time.
The Node Management section provides node power management capabilities as well. The power
management controls are located at the bottom of upgrade section and are represented by Reboot and
Power off buttons.
Data Settings
The Data Settings page provide an ability to configure settings for log severity and active probes.
To open the Data settings page:
1. Log in to NexentaFusion.
2. Select the appropriate appliance.
3. From the menu on the left, navigate to Settings > Data.
Log Severity
The Log Severity section controls how many data is pushed by node syslog to analytics server. The more
verbose level is set, the more messages are available for analysis.
To set the severity, move the slider to the desired level and click Save button. For a clustered appliance,
the same configuration is applied to both nodes of a cluster.
Active Probes
The Active Probes section controls the types of statistic data that is pushed to the database from the
appliance. This data can be used in Dashboard widgets and in Analytics section.
You can select what exact statistics is pushed by appliance nodes to analytics database. To do this, check
the desired statistics and click Save button.
For a clustered appliance, the same settings are applied to both the nodes of a cluster.
88
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
10. Performance Monitoring and Analytics
Terminology
The following table introduces NexentaFusion terms used for performance monitoring and analytics.
Table 10: Analytics Terminology
Terms Description
A canvas is a container in which you view widgets. You can place one
Canvas and more widgets on any canvas to investigate aspects of the appliance
components operation and performance.
89
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Note: When logged in as read-only, the Dashboard view and Analytics views are not subject to the
inactivity timeout. This allows the dashboard to be displayed in a NOC-type of environment.
After Elasticsearch is properly configured, running, and NexentaFusion analytics is configured, the
appliances connected to the NexentaFusion instance start pushing the analytics data directly to
Elasticsearch. The appliances push the current value for every metric of enabled probes to Elasticsearch
on the regular time intervals, which could vary for certain probes. The default push interval for most of
the probes is 15 seconds.
90
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Data Aggregation and Retention
NexentaStor appliances push the real-time probes data to Elasticsearch. The time interval between the
pushes for most of the probes is 15 seconds. To avoid overwhelming the database with data, there are
specific Aggregation and Retention jobs that run automatically according to a configured schedule.
Data Aggregation and Retention jobs work together to optimize the database capacity. Aggregation jobs
create new entries in the database that represents the average value of the real-time metric per a specific
time interval. In other words, aggregation jobs create an average metric value out of the several real-
time metric values stored in the database.
After the aggregated value per metric is created, there is no longer needed to store the real-time entries
for the values that were used for this aggregation so these entries could be deleted from the database.
Data Retention jobs are the ones that perform the actual removal of the real-time data from the
database.
91
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Canvas Management
The following operations are available for all user-defined canvases (available on the canvas bar COG
menu):
• Edit canvas name
• Export canvas blueprint: Exports the configuration of currently opened canvas as JSON file. This file
could be used to create another canvas with the same configuration of widgets using Import canvas
blueprint option
• Remove canvas
• Add new canvas (also available by pressing + sign to the right of all canvas names on canvas bar)
• Clone current canvas: Creates a new canvas with the same configuration of widgets as on the
currently opened canvas
• Import canvas blueprint: Creates new canvas from the previously saved JSON file.
The Dashboard canvas is different from the user-defined canvases since it does not support most of
the management options that are available for user-defined canvases.
• Reset to defaults: Discards the modifications made to Dashboard canvas by the user and restores the
default canvases.
92
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Widget Management
When dropped to the canvas, the widgets could be additionally configured to show the piece of metric
that is needed, like the bandwidth of HPR service or I/O performance of the FC LUN. But some widgets
such as pool capacity widgets cannot be configured.
All the widgets dropped to the canvas have a COG menu with the following options available:
• Save: Saves the widget to configured widgets section. The current widget size is preserved and can
be recovered when the saved widget is placed on any canvas. For widgets that support additional
configuration, this configuration will be preserved as well
• Clone: Creates a copy of the widget on the currently opened canvas. The size and widget
configuration are preserved
• Remove: Removes the widget from the canvas
There is also a possibility to change the name of the widget placed on the canvas. To rename the widget,
double click the widget and enter the new name.
Analyzing Data
This section describes how to use the widgets of the Widget Selection Panel.
94
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Analyzing Capacity Data
The following Capacity widgets provide visual summaries of logical and physical capacities:
• Configured Capacity shows the sum of the free capacity and the allocated capacity of the pool after
applying redundancies (raid/mirror).
• Data Reduction shows the data reduction ratio for pools, not including dedupe reduction.
• Pools Configured Capacity displays a graphical summary of the free capacity and the allocated
capacity of all configured pools on the appliance. Hover the cursor over a pool graph to view the
allocated capacity and available free space for the pool.
• Pools % Allocated Capacity shows the allocated capacity, and capacity used for data protection, for
each individual pool in the appliance. Pool allocated capacity values are shown as a percentage of the
total values.
Global Analytics
The Global Analytics page is the most flexible way to examine the data saved in Elasticsearch. Unlike
appliance Dashboard, global Analytics page is not tied to a particular appliance and does not have any
predefined selectors for metrics like widgets. This allows you to build more sophisticated charts for
analysis.
The Global Analytics page is available on the top horizontal toolbar of NexentaFusion and is available
from any screen.
95
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
You can see the following controls on the Global Analytics page:
• Query builder - a set of drop-down lists that specify the analytics data search parameters
• Chart area - displays the selected metrics as charts based on grouping selection
• Summary table - displays the boundary, average and latest values of every selected metric per
selected time range
96
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Chart Area
Chart area displays the selected metrics as charts built according to the selected grouping mode.
Hovering any place on the chart will open a tooltip describing the values of all charts on the corresponding
point in time.
There is a way to quickly zoom in the time range on the chart. To do that, drag the mouse pointer holding
the left mouse button on the chart from the start to the end of the desired time interval.
To reset the zoomed chart to the value originally selected in Time range selector, click Reset time range
to the left of the Time range selector.
97
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
11. Fault Management
About NexentaFusion Alerts, Logs, Audits, and Events
NexentaFusion enables you to perform analysis and monitoring of the appliances connected to a particular
NexentaFusion instance. NexentaFusion collects logs, alerts and metrics from the connected appliances
and provides an interface to perform the analysis of this information. In addition, NexentaFusion can be
configured to notify the administrators through email if certain parameters match the conditions or a
particular event was generated by appliance.
To store logs, alerts, and metrics, NexentaFusion uses external ElasticSearch database. These databases
must be set up and configured separately to provide the ability for NexentaFusion to collect and analyze
the data from appliances.
The following sections in NexentaFusion are dedicated to event, logs, and metrics analysis: Alerts, Logs
and Analytics. Change to any of these sections from any page of NexentaFusion (located on the top
horizontal bar next to Appliances switch).
About Alerts
Alerts are generated by NexentaFusion when a certain event or log meets the conditions specified in a
NexentaFusion rule. NexentaFusion has a set of default rules that generate alerts for events and logs. You
can edit these rules to create email notifications, in addition to displaying the alerts in NexentaFusion.
Every alert could be acknowledged, which removes it from the alerts shown on the Alerts Widget of
NexentaFusion Dashboard, as well as from the alert count shown on the Appliance List view.
Managing Alerts
The Alerts page allows you to review and manage alerts notification rules and email settings related to
alerts.
The search fields at the top of the Alerts page allow you to search for alerts by alert message. The search
results can be filtered by specifying time range, host, resource, severity, and acknowledgement status in
addition to a search query.
The following capabilities are available to specify the search query:
• To search by a word that occurs in the alert message, enter that word in a search query.
• You can specify several words separated by space. The query searches for alert messages where all
the specified words are present. The order of the words in search query might not correspond to the
order these words appear in the alert message
• To search by a particular phrase in alert message or if the search query contains special characters,
place the query in double quotes: “kernel panic” “node-10”
• An asterisk (*) is supported as a wildcard
• & (AND), | (OR) and - (NOT) Boolean operations are supported. For example, (reboot | restart)
98
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Acknowledging Alerts
When you acknowledge (ACK) an alert, the ACK icon is replaced by a check mark. You can acknowledge
(ACK) alerts individually or all alerts currently visible on the screen.
To acknowledge alerts, do the following:
1. To acknowledge a single alert, click the ACK icon on the far right or click Acknowledge under the
alert cog menu.
2. To acknowledge all the alerts that are currently visible on the screen, click ACK visible alerts.
Exporting Alerts
To export alerts to (CSV) file, filter the alerts needed for export using search query and additional filters.
Then select Export as CSV.
Removing Alerts
You can remove an alert or a group of alerts. If an alert is removed, it will still be generated and visible
when the corresponding alert rule conditions are satisfied next time.
To remove on alert, select the Remove alert option under specific alert cog menu.
To remove a group of alerts, search for the alerts that need to be deleted using search query and filters.
Click the Remove alerts link on the Alerts page. This option removes all the alerts matching the search
query, not just the visible ones.
99
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
o Email - a flag that that causes for email notification to be sent. It's the same flag responsible
for generation an alert according to the alert rule
o Severity (Warning, Serious, Critical or Auto) - shows the importance of the alerts that are
generated according to the alert rule
o Type (Default or Custom) - shows whether the alert rule is predefined (Default) or user-
defined (Custom)
User-defined alert rules do have two additional attributes that define what conditions cause the
alert to be generated:
o Alert source - the system entity that generates the events that cause the alerts
o Event filters - alert source specific options that define the conditions for alert generation for
the source. Some common filters:
o Hosts - list of hosts from all connected appliances that trigger the alert. Multiple hosts may
be selected at the same time
o Event names - list of possible events of the selected alert source that might trigger the alert.
Multiple events are selected at the same time
o Target object name (Resource) - a system object that triggers the event (for example, pool
that is being created or logical unit that is being shared). If not specified, the event is triggered
for any object that might cause the event type
o Severity - the severity of FMA event that should trigger the alert. Multiple severity levels
might be selected.
Note: Predefined alert rules cannot be edited. Though the default alert can be edited to trigger email
notification. To change this, select Settings under cog menu of predefined alert rule and change the
desired settings.
100
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Deleting Alert Rules
To delete user-defined alert rule, click Remove alert rule option under cog menu of the specific alert rule
and confirm the deletion.
Note: Predefined alert rules cannot be deleted. The only option for predefined rules is the ability to
disable it, so the rule does not trigger the generation of alert. To change this, select Settings under cog
menu of predefined alert rule and edit the Enabled flag accordingly.
Logs
NexentaFusion has an ability to collect logs from connected appliances and from NexentaFusion itself.
• Logs include system events, process information, and errors that may disrupt the normal provisioning
of the storage appliance.
• Events represents a raw log of system events generated by connected appliance and NexentaFusion
itself. Alert rules are applied over these events log to generate alerts.
• Audit logs collect the record of NexentaFusion user actions that change a NexentaStor appliance with
a timestamp on when the change has been performed. An audit log also records user authentication,
when they log in and out of NexentaFusion or a NexentaStor appliance.
NexentaFusion displays the logs and audit in a tabular format with messages displayed in reverse
chronological order. You can search for a select set of logs or audits and export the results to a CSV file.
You can control what level of logs are persisted for each appliance from the appliance Settings > Data
Settings screen.
101
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Searching for Logs and Audits
Logs, Events and Audit pages provide an ability to search for logged messages and filter results. The
search query field looks for Message, Description or URL fields for Logs, Events and Audit respectively.
In addition, the time range, host, severity, component, event, user, and IP address filters could be
available for a particular log type.
For search queries, the following rules apply:
• To search by a word that is present in the searchable option, enter the word.
• You can specify several words separated by space. The query searches for strings where all the
specified words are present. The order of the words in search query might not correspond to the
order these words appear in the log message.
• To search by a particular phrase in log message or if the search query contains special characters,
place the query in double quotes: “kernel panic” “node-10”.
• An asterisk (*) is supported as a wildcard.
• & (AND), | (OR) and - (NOT) Boolean operations are supported. For example, (reboot | restart).
102
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
12. Manage Users and Roles
User Accounts in NexentaFusion
In NexentaFusion, you can create user and assign roles to the user.
• Currently, we can assign one role at a time.
• Assigning multiple roles to the user is not possible at the moment.
103
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
3. Click SAVE.
Destroy User
To delete a NexentaFusion User account:
1. Go to NexentaFusion > Fusion Settings > USERS.
2. Select the User and click Settings button. Choose the Destroy option.
3. Click DESTROY.
Change Password
In NexentaFusion, the Change password option is available for Administrator, Read-only, Storage Admin,
and Security Admin users.
To change the password:
1. Go to NexentaFusion > Fusion Settings > Change password.
104
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
2. Enter the fields in Change Password screen.
3. Click SAVE.
105
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
The Edit Local UI User window for User 1 is displayed.
3. Select the desired User role from the drop-down menu of Edit Local UI User: User1 window. In this
example, Storage Admin is selected as User role.
4. Click SAVE.
5. Enter your password in Security check window. Click OK.
106
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Now, the User1 role updated successfully by Security Admin with role changed from Read-only to Storage
Admin.
Roles in NexentaFusion
Administrator
The “Administrator” role has complete administrative privileges in NexentaFusion. A user assigned with
Administrator role can do any configurations, perform all actions, and recover lost passwords.
Security Admin
The “Security Admin” role has all the user management privileges in NexentaFusion. A user assigned with
Security Admin role can create, edit, and delete users in NexentaFusion.
Storage Admin
The “Storage Admin” role has all the storage management privileges, including registering an appliance,
managing NexentaFusion settings (except for “Users” and “LDAP” settings), managing the appliances
services (under "System services" menu). Storage Admin can Reboot, Power Off and Upgrade the
appliances.
However, the Storage Admin role does not have user management privileges (cannot create, edit, and
delete any users like the Security Admin role can do).
Read-only
The “Read-only” role has read-only permissions and no administrative permissions. Users assigned with
“Read-only” role can view, but cannot create, delete, or modify actions. The “Read-only” role cannot
reboot or power-off the appliance.
107
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Table: Tasks and Roles in NexentaFusion
Storage Security
Task Administrator Read-Only
Admin Admin
Configure, manage, and update
✓ ✓ – –
software
Reboot and power off appliance ✓ ✓ – –
Register an appliance ✓ ✓ – –
Configure settings related to
pools, services, datasets, and ✓ ✓ – –
network
Create, manage, and destroy
✓ ✓ – –
storage pools
Create, manage, and destroy HA
✓ ✓ – –
services
Create, configure, and delete
✓ ✓ – –
datasets
Configure fault, performance, and
log information (examples: SNMP,
✓ ✓ – –
Carbon and rsyslog) to be
delivered to OMC
Configure account management
✓ – ✓ –
options
Create and delete accounts ✓ – ✓ –
Assign and revoke roles to an
✓ – ✓ –
account
Reset the password of any
✓ – ✓ –
account
Change password ✓ ✓ ✓ ✓
Note: Tasks marked “✓” are doable by the respective roles, while tasks marked “–” are not.
108
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com
Additional Resources
After installing NexentaStor 5.5 and NexentaFusion 2.0.5, use the resources listed here for more
information. These documents are posted in https://nexenta.com/products/documentation.
109
Copyright © 2023 Nexenta® by DDN, ALL RIGHTS RESERVED
www.nexenta.com