Lab Guide - PowerScale Administration
Lab Guide - PowerScale Administration
POWERSCALE
ADMINISTRATION
Version [1]
LAB GUIDE
INSTRUCTOR GUIDE
Internal Use - Confidential
Dell Confidential and Proprietary
Copyright © 2020 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other
trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be
trademarks of their respective owners.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 1
Exploring the Lab Environment
Note: Chrome is the preferred browser and delivers the best experience. If
you do not have Chrome, you can use the browser of your choice.
5. A Welcome video opens, providing a lab orientation. If this is the first time you
are using the VLP, view the video. If the video does not automatically play, in
the upper right corner of your browser, click Help > Tips to review the EduLab
Orientation Video. The orientation video shows you how to deploy the lab,
access the console, and view the lab guide.
6. To learn more about the VLP, watch the EduLab Orientation video mentioned
in the previous step.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 3
Exploring the Lab Environment
Instructor Note: Ensure that all the students are able to access the
VLP, assist if otherwise.
You are John and have worked at BMC for just over a month and have been
assigned the storage administrator for the cluster. Based on your storage
experiences, you acknowledge that the configuration and day-to-day maintenance
of storage infrastructure is complex and may require several administrators to
manage it effectively.
The IT manager has told you the previous NAS platform had challenges with
scaling the storage. Those systems were limited by their single file system
(namespace) size (16TB typical). BMC will need namespace capabilities of a much
larger scale and the ability to quickly adjust to unexpected growth as their customer
base expands.
The cluster has been racked, stacked, powered, and added to DNS. The IT
manager along with senior storage administrators have put together the necessary
documentation and steps required to configure the cluster. As a part of the team,
configure the cluster based on the documentation and record your progress using
the lab exercises. The initial implementation is targeted for three business units in
the BMC organization: Sales, Engineering and Marketing.
Your goal is to implement the PowerScale cluster so that the users from each
business unit can access the data. Once done, you will configure services
such as snapshots and quotas on the data.
• InsightIQ
• DataIQ v1
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 5
Exploring the Lab Environment
Note that for usability purposes, the password for ALL systems is
Dees12345!
Note that the URL for the PowerScale WebUI used throughout this lab is
https://192.168.3.11:8080, the IP address for node-1. You can manage the
cluster through any active cluster node by using the IP address of that node.
Although most lab exercises are broken down into the three methods, not all lab
exercises can be strictly accomplished using only the WebUI or only the CLI. Some
of the lab exercises will not have a skills-based structure.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 7
Exploring the Lab Environment
a. The first page of the lab exercise is the PEQ. If you are experienced
or if you prefer a more challenging experience, try using the PEQ
method.
b. Following the PEQ pages are the step-by-step instructions for the
WebUI. Remember, you do not have to use this method if you are
configuring using the PEQ or CLI method.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 9
Exploring the Lab Environment
Introduction to PowerScale
Scenario:
With the Implementation Engineer onsite, watch the Implementation Engineer run
the Configuration Wizard.
Your 4-node cluster is ready. Each node is named boston-<#>. Next, you will
verify that you can connect to the cluster via the OneFS WebUI and the CLI. Once
connected, check the basic health of the cluster and the available storage space.
For the introduction to the PowerScale, there is no skills-based exercises. You will
perform each task in a step-by-step manner.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 11
Introduction to PowerScale
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 13
Introduction to PowerScale
2. Login to the WebUI for your new PowerScale cluster. Click on the Log in
button after entering the following credentials:
b. Password: Dees12345!
3. On the Dashboard menu, the Cluster status tab is shown as default. You
may see failed events in the New event groups table. You can ignore the
events for the purposes of this lab.
4. Scroll down to the Status table. In the Status table, mouse over the icon in the
Status column for nodes with ID 1,2,3 and 4 to see their status description.
Note: A node may have a status other than healthy (green) because of the
number of installed drives. Healthy status is not required for the purposes of
these lab exercises.
TIP: You can click the ID number of each node to go to the Node status page.
a. Node 1 IP:
b. Node 2 IP:
c. Node 3 IP:
d. Node 4 IP:
Instructor Note: Prompt the students to find and view the IP address
for each node.
6. Examine the Cluster size chart presented in the Cluster Status tab and note
the available hard disk space. Check the chart to see the growth of available
space as you add additional nodes to your cluster.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 15
Introduction to PowerScale
Note: The lab image used does not reflect capacities you will see on a
production system.
Tip: Click the shortcut on the desktop or select from the task bar.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 17
Introduction to PowerScale
3. Login as root, press ENTER, then type the password Dees12345! and press
ENTER. Note the PowerScale OneFS version for your documentation.
4. According to the Implementation Engineer, the first thing you should always do
when getting to the CLI is to check the health of the cluster. To display
information about the cluster’s status, at the boston-1 prompt, press ENTER
after typing the isi status command.
Tip: Use pipe to more (| more) or to less (| less) to prevent from needing
to scroll to view the output. Use the spacebar to forward the output. The less
command is a more powerful version of more. When reading through large
text files, the less command loads each page into memory a page at a time,
making it more efficient.
Tip: You can also use the isi stat command, which has identical output.
Remember, all commands are case sensitive.
5. Notice that the health of the cluster and the nodes is OK. Also, note the initial
available storage size with just the first four nodes in the cluster. The numbers
on your virtual cluster may not match the screenshots exactly but the location
of the information, and where you should look, will match the highlighted fields
in the screenshots throughout this document.
Question: What is the avail capacity for the cluster? How does this compare
to what the WebUI reported?
Instructor Note: The WebUI and CLI report the same storage
capacity.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 19
Adding Nodes to the Cluster
Scenario:
Now that you have validated the initial cluster build, you need to add the two
remaining nodes to the cluster. You have been given the procedures for how to do
this using the CLI and the WebUI.
The objective of the lab is to add two nodes to the cluster. If needed, use the
WebUI or the CLI step-by-step walk through portion of the exercise for guidance.
a. Add one of the two remaining nodes to the cluster using the
Configuration Wizard. Open the node that you want to add from the
console.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 21
Adding Nodes to the Cluster
2. Since this node is not part of the cluster, you will see the Configuration Wizard
as shown:
3. To join Node 5 to the boston cluster using the Configuration Wizard, perform
the following actions:
a. At the Wizard prompt, type 2 and press Enter to join the node to an
existing cluster.
b. In Join cluster prompt, type 1 and press Enter to join Node 5 to the
boston cluster.
Note: This process may take a few minutes due to the nature of the
virtual environment.
b. At the boston-1 prompt, run the isi status command to verify that
node 5 has joined the cluster. Node 5 appears at the bottom of the list
with ID set to 5.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 23
Adding Nodes to the Cluster
3. The Add node to cluster window shows the nodes available to add. There
will be one node displayed. When multiple nodes are available, there is no way
to distinguish node order prior to adding them to the cluster. In a production,
real world implementation, when adding multiple nodes into a cluster, ensure
to get the serial number off the back of the node. You can join nodes to the
cluster in the order you want to join them, or the order they appear in the rack.
a. Select the node and then click Add node. The node joins the cluster.
Note: Do not add another node to the cluster until the first node is joined because
the nodes may join out of order and break your sequential IP numbering.
4. Now verify that the node is added, go back to the Dashboard, Cluster
overview page of the WebUI. On the Cluster status tab, confirm that the
node is added to the cluster. You may need to refresh the screen or click on
another option if the virtual environment is not responding.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 25
Adding Nodes to the Cluster
b. View the Node status of Node 6 by clicking the node ID in the cluster
status tab. Notice that the node is assigned the next IP address (ext-
1) from the configuration range so that the IP addresses are
sequential. The configuration range was created when the
Implementation Engineer initially set up the cluster.
Note: If the Status column is red, wait a minute or two for the node to
finish joining. The status turns green and the values populate once
the node fully joins the cluster.
a. Under Event Groups, look at the list of event notifications along with
the level in the Severity. If there are issues with the cluster or events
that you should be aware of, the Severity will be Warning or Critical.
You may not have any events such as those shown in the graphic.
The graphic shows event you may see because of the virtual
environment. Check the box at the top of the ID column to select all
the events.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 27
Adding Nodes to the Cluster
Scenario:
Now you have a 6 node cluster. Next, you need to validate the configuration of the
newly built cluster. The IT manager has asked you to use specific isi commands
to become familiar with the cluster, understand the hardware layout, and use the
built-in help options. OneFS relies on the backend network to communicate across
the nodes, so take a moment to see how this works.
This lab explores the OneFS isi command structure and syntax. You will perform
each task in a step-by-step manner.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 29
Using CLI commands
isi commands
In this task, use the built-in man isi and isi --help, to view the commands
and command structure.
2. To view the isi command structure with all of its subcommands and options,
at the boston-1 prompt, press ENTER after typing the isi --help or isi -
h command.
Tip: You must use the vertical scroll bar to view the entire content.
Alternatively, typing a pipe | and the word more (| more) is a common
addition to commands with a lot of output. | more enables you to view the
output one page at a time. Press ENTER to view more of the output.
3. Pick one of the commands from the output and type it at the prompt. For
example: isi job or isi sync and see what type of output or assistance
you get. Shown in the graphic is the output for running the isi ntp
command.
Tip: To view a basic description of any command and its available options,
type -h or --help option after the command and press ENTER. For
example: isi ntp --help
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 31
Using CLI commands
Tip: Type q to exit from the man command and return to the boston-1 prompt.
5. The tab complete is a useful command line feature that can auto-fill partially
typed commands, file names, options, paths, subcommands and more. To
perform tab complete, press TAB while typing a command and notice that it
will autocomplete the command you are typing or suggest options.
Instructor Note: Demonstrate the use of the tab complete feature for
autocomplete and option suggestions.
1. To view the hard drives for node 1, at the boston-1 prompt, press ENTER
after typing the isi devices drive list | grep dev command.
Note: The use of | grep in the command. The addition to the command
enables you to view only the output fields with the word "dev". Running the
command without grep will output many lines that show an EMPTY bay. Try
running without using | grep.
The output shows HEALTHY drives in node 1. Also, the JOURNAL drive in
the first drive bay is required because this virtual cluster does not have an
internal SSD to store it.
a. To view the journal drive for all nodes, run the isi_for_array isi
device drive list | grep -w da1 command. The grep -w
switch is used to find an exact match. Similarly, you can view all the
drives for all nodes by running the isi_for_array isi device
drive list | grep dev command.
2. To get the list of subcommands for statistics, at the boston-1 prompt, press
ENTER after typing the isi statistics --help command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 33
Using CLI commands
3. To view all the drives on this virtual node, at the boston-1 prompt, press
ENTER after typing the isi statistics drive | more command. Notice
in the output that there is a single SSD and the rest are SAS and UNKNOWN
drives. You can use grep to filter only what you want.
Note: grep'ing the Drive string in the command is to display the header. The -
e is used to display multiple strings.
4. To view the hardware in every bay, you can run isi devices for all six
nodes in the cluster. At the boston-1 prompt, press ENTER after typing the
isi_for_array 'isi devices drive list' | grep -ie Lnn -e
dev | more command.
Note the use of | grep and | more in the command. The string Lnn is used
to output the header. Try the isi_for_array 'isi devices drive
list' command without piping.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 35
Using CLI commands
Note: You can only run the console commands while in the Configuration
console. You must leave the Configuration console to run any other cluster
command.
Tip: You do not need to type isi before commands while in the Configuration
console.
3. To view options for the interface command, press ENTER after typing the
help interface command.
Question: What are the two valid interfaces shown in the output?
4. To view the internal networks on the cluster, press ENTER after typing the
interface command.
5. To view the configuration table with the network information for int-a and int-b,
press ENTER after typing the status command.
Question: What is the number of allocated IP address and the number of free
IP addresses available on the cluster?
6. Exit the Configuration console. Press ENTER after typing the exit command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 37
Designing a OneFS Directory Structure
Scenario:
The first thing to configure is the directory structure. The three BMC business units
to access the boston cluster are sales, engineering, and marketing. In this
exercise you will create a unique base directory structure for the engineering and
marketing business units. You will create the sales base directory as part of
another exercise.
Given in the lab exercise is the information needed to create the base directories. If
needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
Base Directories
In this task, you will create two of the three required base directories. Note that you
will create the sales directory is a later lab exercise.
b. Verify that the base directories have been created by either looking
into the File system explorer page or by using the ls command.
Instructor Note: Yes. The WebUI default is 777 whereas the CLI is
755.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 39
Designing a OneFS Directory Structure
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 41
Designing a OneFS Directory Structure
d. Run the ls -la /ifs command and verify the base directory is
present.
NTP
Scenario:
Your goal is to provide user access to the cluster. Now that you have a 6-node
cluster, you need to synchronize all the cluster nodes to the same time source.
Time synchronization is critical for cluster functionality.
The IT manager has instructed you to synchronize the cluster’s Network Time
Protocol (NTP) services with the dees.lab Active Directory server. Time
synchronization is your first step to access management, you need to
configure the date and time reported by the cluster.
Given in the lab exercise is the information needed to configure NTP. If needed,
use the WebUI or the CLI step-by-step walk through portion of the exercise for
guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 43
NTP
NTP
The Active Directory domain controller is on the Windows Server 2012R2 VM. This
VM is designated as the time server that the cluster will sync its time to.
Authentication will fail if the cluster time is more than 5 minutes off from the AD
domain controller.
b. Verify that the date, time, and timezone on the nodes is the same as
that on the domain controller. Change the timezone if they do not
match. To change the time and timezone on the nodes, navigate to
the Date & Time tab on the General settings page of the WebUI.
2. Navigate to the Cluster management, General settings page, and then click
the NTP tab.
a. In the NTP Servers field, enter 192.168.3.2, and then click Save
Changes. The server with IP address 192.168.3.2 is the time server
that you want to synchronize the cluster to. The IP address of the
NTP server that you have added is displayed on the NTP Servers
field.
3. Select the Date and time tab. Compare the node’s Date and Time and Time
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 45
NTP
Zone to the system time on the DC server and the Jumpstation. You will
need to launch the DC console and login as administrator/Dees12345!.
Notice that the node time is in 24-hour format.
a. Change the cluster time if the DC time zone is different from the time
zone set on the nodes. Use the Time zone drop-down list to
configure the cluster time and time zone to match the DC server
using 24-hour format. No matter where you are in the world, set the
time zone to America/New_York - EDT.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 47
NTP
2. At the boston-1 prompt, run the isi ntp servers create 192.168.3.2
command to add the NTP server. To verify that the server has been added,
run the isi ntp servers list command, and you will see the server
listed as shown below:
3. Verify that the date, time and timezone on the nodes are the same as that on
the DC server. You will need to launch the DC console and login as
administrator/Dees12345! Notice that the node time is in 24-hour format.
a. To check the date, time and timezone on the nodes, open the
Configuration console by running the isi config command at the
boston-1 prompt. Notice that the prompt changes to boston>>>
i. To check the current date and time, run the date at the
boston>>> prompt. Similarly, run the timezone command to
check the timezone set on the nodes. Verify that the timezone
is set to Eastern Time Zone as shown below.
ii. If the timezone on the DC server and the nodes do not match,
change the timezone on the nodes by running the timezone
Eastern Time Zone command at the boston>>> prompt.
Run the commit command to save changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 49
Authentication Providers
Authentication Providers
Scenario:
BMC uses a mix of NFS and SMB clients. The next step for achieving client access
is to configure your cluster to use both LDAP and Active Directory services to
authenticate clients. OneFS best practice is to always connect LDAP first before
joining the cluster to an AD domain. To complete the cluster authentication setup,
join the cluster to Active Directory (AD).
Given in the lab exercise is the information needed to configure the Authentication
Providers. If needed, use the WebUI or the CLI step-by-step walk through portion
of the exercise for guidance.
Authentication Providers
Configure LDAP and Active Directory.
1. Use the following information to configure your cluster to use LDAP for
authentication:
2. Use the following information to configure Active Directory for the cluster:
a. Before configuring Active Directory, ensure that the time on the nodes
and time on the Jumpstation has a time difference of less than five
minutes. You can configure Active Directory using the WebUI,
Authentication providers page or the isi auth ads command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 51
Authentication Providers
2. Navigate to Access, Authentication providers, and then click the LDAP tab.
Click Add an LDAP provider.
4. To verify that the LDAP provider has been added, go to the LDAP tab, in the
LDAP providers table, ensure the new LDAP provider is listed and that it has
a green dot in the Status column as shown below.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 53
Authentication Providers
2. To configure LDAP, at the boston-1 prompt, run the isi auth ldap
create Isilon-LDAP --base-dn="dc=dees,dc=lab" --server-
uris="ldap://centos" --groupnet=groupnet0 command.
a. At the boston-1 prompt, run the isi auth status command. This
command shows which providers are currently active on the cluster.
Verify that the LDAP provider created is listed and online.
b. At the boston-1 prompt, run isi auth ldap list to view all the
LDAP providers configured for the cluster.
4. Query the LDAP server and output the various attributes for users. At the
boston-1 prompt, run the ldapsearch -x -h centos -b
dc=dees,dc=lab command.
4. On the Join a Domain page, enter the fields highlighted in the graphic and
then click Join.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 55
Authentication Providers
a. Joining the domain may take several minutes. After the cluster
successfully joins the domain, you will get a success notification and
the status should be green in the Active Directory providers table.
2. To verify the date and time on the nodes, enter the Configuration console by
running the isi config command at the boston-1 prompt. Run the date
command at the boston>>> prompt. Ensure that the time on the nodes and
the Jumpstation have a time difference of less than five minutes. If not, change
the time at the nodes by running the date YYYY/MM/DD HH:MM:SS
command at the boston>>> prompt. Replace the values for the date and time
in the command. Exit the Configuration console by running the exit
command.
3. To configure Active Directory for the cluster, at the boston-1 prompt, run the
isi auth ads create dees.lab administrator --
password=Dees12345! --groupnet=groupnet0 command.
a. At the boston-1 prompt, run the isi auth status command. This
command shows which providers are currently active on the cluster.
Verify that the Active Directory provider that was just created is listed
and online.
b. At the boston-1 prompt, run isi auth ads list to view all the
Active Directory providers configured for the cluster.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 57
Authentication Providers
5. At the boston-1 prompt, run the isi auth users list --domain dees
command. The output shows the Active Directory users.
Scenario:
✓ Configured NTP
✓ Configured authentication
✓ Configured two of three base directories
The base directories are the root of each access zone you create. Now you will
create the access zones.
Given in the lab exercise is the information needed to configure your access zones.
If needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 59
Configuring Access Zones
Access Zones
The intent is to have three BMC organizations in unique authentication zones.
Configure three access zones, one for each BMC business unit that will access the
cluster.
1. Use the following information to configure the access zones on the cluster:
Hint: For the sales access zone, you need to create the base
directory while creating the access zone.
Question: What are the default permissions for the sales base
directory?
Instructor Note: The System access zone is the default access zone
configured for IFS.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 61
Configuring Access Zones
b. Enter the fields as shown in the graphic and then click Create zone.
Note: As the base directory for sales is not created, the checkbox for
Create zone base directory if it does not exist is checked.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 63
Configuring Access Zones
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 65
Configuring SmartConnect
Configuring SmartConnect
Scenario:
You have created the base directory structure, connected to the authentication
providers, and created the access zones. The next step is to configure
SmartConnect. You have enlisted the help of the DNS Administrator to get
SmartConnect configured and name resolution working for the cluster.
SmartConnect
1. Use the following information to configure the SmartConnect service IP (SSIP):
a. You can use the WebUI, Network configuration page or the isi
network subnets modify command to configure the SSIP.
Tip: If you need to configure a single SSIP for the cluster, enter the
same IP for the start and end IP values in the range.
i. Subnet: subnet0
2. Configure the IP address pools for the three SmartConnect zones. You can
use the WebUI, Network configuration page or the isi network pools
create command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 67
Configuring SmartConnect
3. Once the IP address pools are configured for each access zone, you need to
create the delegation records in DNS. Use the following information to create a
delegation record for each SmartConnect zone.
b. Create two new hosts in the forward lookup zone dees.lab named
sip9 and sip10. sip9 IP address is 192.168.3.9 and sip10 IP address
is 192.168.3.10.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 69
Configuring SmartConnect
a. Click Edit and update the fields as shown in the graphic and click on
Save changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 71
Configuring SmartConnect
Tip: In a hybrid cluster environment (mix of different node types), you may
only want to choose the interfaces of nodes that the business unit will access.
For example, in an environment with a mix of F800 and H400 nodes, the Sales
unit may need access only to the F800 nodes. In that case, choose only the
interfaces of the F800 nodes while creating the IP address pool for the Sales
unit.
3. Navigate to the Cluster management, Licensing page. Scroll down and click
on Manage trials. Select SmartConnect Advanced and click Start trial.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 73
Configuring SmartConnect
a. Click More on subnet0 and select Add pool. Enter the following to
create the engineering IP address pool:
• Add all the external interfaces of ext-1 to manage the incoming traffic
5. Click More on subnet0 and select Add pool. Enter the following to create the
marketing IP address pool:
• Add all the external interfaces of ext-1 to manage the incoming traffic
6. Verify that the IP address pools are successfully created and listed under
subnet0 as shown in the graphic.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 75
Configuring SmartConnect
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 77
Configuring SmartConnect
1. From the VLP, open the DC console. The DC virtual machine is the domain
controller and the DNS server. Login using administrator/Dees12345!
3. In the New Host window, enter the fields as shown and then select Add Host.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 79
Configuring SmartConnect
4. Add a second New Host using the name sip10 and the IP address
192.168.3.10
b. For the Delegated domain, type sales, click Next, and then click
Add on the Name Servers window.
d. On the Name Servers page, click Next, and then click Finish.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 81
Configuring SmartConnect
c. In the navigation pane, right-click dees.lab and select Reload. Log off
the DC virtual machine.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 83
RBAC and ZRBAC
Scenario:
Before continuing with configuring user access, the IT manager has asked you to
grant administrative access control to other members of the team who will perform
various administrative activities on the cluster. For each member, create a user
account and assign the user to a suitable role. Create a user with auditing
privileges for the cluster and a user with administrative privileges for the
Engineering business unit.
Given in the lab exercise is the information needed to create and assign users to
roles. If needed, use the step-by-step walk through portion of the exercise for
guidance.
a. View the default engineering and sales users. You can use the
WebUI, Users tab in the Membership and roles page or you can
use the isi auth users command.
b. View the default administrative roles. Use the WebUI, Roles tab in
the Membership and roles page or the isi auth roles
command.
Instructor Note: The access zones have their own distinct roles.
c. View the privileges for a role in the WebUI. Use the View/Edit button
next to the role name or use the isi auth roles view command.
Question: Is the list of the privileges different for each role? What
privilege enables login to the WebUI? What privilege enables SSH
login?
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 85
RBAC and ZRBAC
2. Create a Local user. You can use the WebUI, Users tab in the Membership
and roles page or the isi auth users create command.
Instructor Note: Add the AD provider to the System zone and choose
the user from the AD users.
Hint: To select the zone, use the --zone option in the CLI
command. For the WebUI, select the zone from the dropdown
menu.
3. Add users to roles. You can use the WebUI, Roles tab in the Membership
and roles page or the isi auth roles modify command.
a. User: Dante
i. Role: AuditAdmin
Instructor Note: No, because the AuditAdmin role does not have the
privileges.
b. User: engAdmin
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 87
RBAC and ZRBAC
2. To view the OneFS users that are created by default, navigate to the Access,
Membership and roles page. Click on the Users tab.
a. To view the users in the System zone, set the Current access zone
to System from the dropdown menu, and select the Providers from
the dropdown menu. The users under FILE: System are the core
accounts created by OneFS.
b. To view the users in the engineering zone, set the Current access
zone to engineering, and change the providers to LDAP: Isilon-
LDAP
c. Similarly view the users for different access zones and providers by
changing the Current access zone and Providers field.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 89
RBAC and ZRBAC
a. View the built-in roles for any zone by selecting that zone in the
Current access zone dropdown menu. Shown below is an example
of the built-in roles in the engineering zone. The engineering zone
has 2 built-in roles: ZoneAdmin and ZoneSecurityAdmin
b. To view the privileges for the ZoneAdmin role, click the View/Edit
button. In the View role details window, note the privileges.
i. You may view the privileges of any role in any zone in a similar
manner. Also, view the privileges of a role in the CLI and
notice the difference in the naming from that shown in the
WebUI.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 91
RBAC and ZRBAC
2. To list the OneFS users that are created by default, at the boston-1 prompt,
run the following commands:
b. Non-System zone:
ii. sales zone local users: isi auth users list --zone
sales
iv. Similarly, view the users for other access zones by replacing
the zone name.
3. To list the built-in administrator roles, at the boston-1 prompt, run the following
commands:
iii. Similarly, view the roles for other access zones by replacing
the zone name.
4. To view the privileges for the built-in roles, at the boston-1 prompt, run the
following commands:
a. For the SystemAdmin role in the System zone: isi auth roles
view SystemAdmin
b. For the ZoneAdmin role in the engineering zone: isi auth roles
view ZoneAdmin --zone engineering
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 93
RBAC and ZRBAC
c. Similarly, view the privileges for any role in any zone by replacing the
role and zone names.
2. Create a user account for user Dante in the System access zone.
b. On the Create a user dialog box, enter the new user information as
shown in the graphic. After entering the user information, click the
Create user button.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 95
RBAC and ZRBAC
c. Verify that the user account for Dante is created successfully and
shown below the user Guest in the Users tab.
3. Create a user account for user engAdmin in the engineering access zone.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 97
RBAC and ZRBAC
2. Create a user account for user Dante in the System access zone.
a. At the boston-1 prompt, run the isi auth users create Dante
--enabled yes --set-password --password-expires no
command.
Note: The text you type at the password and confirm prompt will not be visible.
b. Verify that the user account for Dante has been created by running
the isi auth users list command.Note that without using the
--provider option, the output shows users from all the configured
providers.
3. Create a user account for user engAdmin in the engineering access zone.
b. Verify the user is created by running the isi auth users list -
-zone engineering command.
c. View the user default setting by running the isi auth users view
engAdmin --zone engineering command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 99
RBAC and ZRBAC
b. In the View role details window, click on Edit role. In the Edit role
details window, click on Add a member to this role.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 101
RBAC and ZRBAC
a. Log out of the WebUI and login as Dante using the credentials
Dante/Dees12345!
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 103
RBAC and ZRBAC
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 105
RBAC and ZRBAC
a. To add to the ZoneAdmin role, at the boston-1 prompt, run the isi
auth roles modify ZoneAdmin --add-user engAdmin --
zone engineering command.
e. You will be unable to SSH into the cluster as engAdmin because the
ZoneAdmin and ZoneSecurityAdmin roles are not assigned the
ISI_PRIV_LOGIN_SSH privilege which is require for SSH acces.
On-disk Identity
Scenario:
The On-disk identity stores an authoritative version of the identity for users and
groups. This becomes important when accessing restored files replicated to a
remote system. The IT manager has asked you to use the OneFS CLI to identify
the UID, GID, SID, and the On-disk identity for user accounts.
Given in the lab exercise is the information required to identify identities. If needed,
use the CLI step-by-step walk through portion of the exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 107
On-disk Identity
On-disk Identity
1. Use the following information to help identify the UID, GID, SID, and the on-
disk identity for user accounts. This step can only be performed using the
OneFS CLI.
a. Ensure that the global setting for the On Disk Identity is set as
native. Use the WebUI Access > Settings page or the isi auth
settings global command.
b. View the access token for the marketing zone user sera. To do this,
use the isi auth mapping token command.
c. View the access token for the marketing zone user sera by
referencing the domain as dees\\sera or [email protected]
Question: Is the SID the same for user sera when referenced as
sera and dees\\sera? Why or Why not?
Instructor Note: Yes, because the user sera account exists in both
Active Directory and LDAP and the account has a real SID as well as
a real UID.
d. View the access token for the sales zone user john.
Instructor Note: The On Disk identity is the SID. User john only
exists in Active Directory. If an object lacks a real UID or GID, then its
SID is set as the On Disk identity. OneFS only uses a SID for the on
disk identity when no configured authentication sources return a real
UID or GID.
e. View the mapping information for user with UID 10. To do this, use
the isi auth mapping view command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 109
On-disk Identity
2. Verify that the global setting for the On Disk Identity is set as native. To do
this, at the boston-1 prompt, run the isi auth settings global view
command and note the setting.
a. Change the setting, if needed, at the boston-1 prompt run the isi
auth settings global modify --on-disk-identity
native command.
3. View the access token for the marketing zone user sera. At the boston-1
prompt, run the isi auth mapping token sera --zone marketing
command.
a. Locate the UID and SID for user sera. Notice that the SID is an
algorithmic SID or 'UNIX SID', where the common S-1-22 is
appended with the UID to create a SID for an account that requires
one. Locate the GID and SID for the Primary Goup. Notice that the
SID is a UNIX SID.
b. Notice that the On Disk identity is the same as the UID. User sera is
an LDAP user. An object that has an explicit UNIX identity maintains
that identity as the On Disk identity.
4. At the boston-1 prompt, run the isi auth mapping token dees\\sera
--zone marketing command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 111
On-disk Identity
a. The On Disk identity setting is the UID. As the user account sera
exists in both Active Directory and LDAP, the account has a real SID
as well as a real UID.
5. View the access token for the sales zone user john. At the boston-1 prompt,
run the isi auth mapping token dees\\john --zone sales
command.
a. Note the On Disk identity for user john. The On Disk identity is the
SID. User john only exists in Active Directory. If an object lacks a real
UID or GID, then its SID is set as the On Disk identity. OneFS only
uses a SID for the on-disk identity when no configured authentication
sources return a real UID or GID.
6. To display the mapping information for a user with UID 10, at the boston-1
prompt, run the isi auth mapping view UID:10 command. You can
also view the mapping information for a user by using the SID or GID in the
command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 113
Permissions
Permissions
Scenario:
Before configuring the shares and exporting the file systems, the IT manager wants
you to become familiar with the way OneFS depicts and enforces permissions. For
this lab, view and modify the permissions on the cluster, and demonstrate how to
make a file or directory using advanced ACL.
Given in the lab exercise is the information needed to view, change and understand
file system permissions in OneFS. If needed, use the WebUI or the CLI step-by-
step walk through portion of the exercise for guidance.
Permissions
1. Use the following information to view, change the permissions and ownership
of the sales access zone base directory.
a. View the permissions and ownership of the sales base directory. You
can use the WebUI, File system explorer page or the ls command.
b. Change the owner of the sales base directory to the Active Directory
administrator. You can use the file system explorer of the WebUI or
the chown command.
c. Change the group owner of the sales base directory to the domain
administrators group. You can use the files system explorer of the
WebUI or the chgrp command.
d. Ensure that all individuals have read, write and execute access to the
sales base directory. You can use the files system explorer of the
WebUI or the chmod command.
2. Use the following information to change the authoritative permission type, add
and remove ACLs, for the sales base directory. This step can only be
performed only using the CLI.
a. Change the authoritative permission type for the sales base directory
to ACL. Use the chown command and its options.
b. Add an advanced ACL to the sales base directory for a user. Use the
chmod command and its options.
i. User: nobody
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 115
Permissions
c. Add an advanced ACL to the sales base directory for a group. Use
the chmod command and its options.
d. Remove the everyone ACL entry for the sales base directory. Use
the chmod command and its options.
3. Use the following information to understand the impact of changing the ACL
policy settings. This step can be performed only using the WebUI.
a. View the default ACL policy settings. Use the Access menu in the
WebUI.
b. Change the environmental variable with the different options and note
the changes to different settings.
Question: For each option, what is the impact of using chmod on files
that have existing ACLs?
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 117
Permissions
2. Examine the permissions and ownership of the sales access zone base
directory.
a. Navigate to the File system, File system explorer page. Set the
Current access zone to sales. On the sales directory, click View
details.
b. In the View directory property details window, you can see the
permissions and ownership set for the directory.
3. Change the permissions and ownership for the sales access zone base
directory.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 119
Permissions
d. The IT manager wants the permissions for the base directory writable
for all individuals. Ensure all the Permissions check boxes are
checked. Click Save changes, and then Close.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 121
Permissions
2. Examine the permissions and ownership of the sales access zone base
directory. At the boston-1 prompt, run the ls -led /ifs/sales command.
Note the permissions and ownership for the directory.
Note: The ls command lists the directory contents. The -l option is to list files
in the long format. The -e option prints the Access Control List (ACL). The -d
option lists on the directory and not its contents.
3. Change the permissions and ownership for the sales access zone base
directory.
a. Change the owner of the sales base directory to the Active Directory
administrator. At the boston-1 prompt, run the chown
[email protected] /ifs/sales command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 123
Permissions
2. View the authoritative permission type for the sales access zone base
directory. At the boston-1 prompt, run the ls -led /ifs/sales command.
Note that the permission type is set to POSIX as the ACL for the sales
directory is the Synthetic ACL.
Note: Although the owner of the directory was the Active Directory
administrator, the -s option uses an external authentication provider
and in this example, makes the directory ACL authoritative.
b. Run the ls -led /ifs/sales command and note the entry of the
added user.
Note: The nobody account is used for mapping root users over NFS to a different
UID so they are not treated as root on the cluster. This is known as root squash.
The generic_all permission represents Full Control permissions in Windows.
b. Run the ls -led /ifs/sales command and note the entry of the
added group.
6. Remove an ACL.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 125
Permissions
Note: With POSIX authoritative, changing the mode bits also changes
the synthetic ACLs.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 127
Permissions
Note: In the given scenario, you have created access zone sales that
authenticates using Active Directory, engineering that authenticates
using LDAP, and marketing that uses both authentication providers.
The ideal setting for such a setup is Balanced.
SMB Shares
Scenario:
The Marketing business unit has requested two Windows shares for their
environment. The first share is to accommodate home directories for all the
marketing users and the second share is for general purpose file sharing. Once the
shares are created, verify accessibility from an SMB client.
Given in the lab exercise is the information needed to configure SMB shares. If
needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 129
SMB Shares
SMB Shares
1. Create a share to accommodate home directories for all marketing users.
a. Enable SMB service. Use the WebUI, Windows sharing (SMB) page
or the isi services command.
Hint: Ensure to set the access zone before creating the share.
Hint: Use the --wellknown option when using the isi smb
shares permission command. In the WebUI, you may
change the permissions by clicking the View/Edit button.
c. Map the user home directory using the File Explorer on the
Jumpstation.
i. Folder: \\marketing\home
d. Verify that the home directory for user John is created. Use the File
system explorer page of the WebUI or the ls command.
a. Create a share. You can use the WebUI, Windows sharing (SMB)
page or the isi smb shares create command.
Hint: Ensure to set the access zone before creating the share.
b. Map the user home directory using the File Explorer on the
Jumpstation.
i. Folder: \\marketing\mktg-share
iii. Change the permissions for the mktg-share directory. You can
use the File system explorer page of the WebUI or the
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 131
SMB Shares
3. Navigate to the Protocols, Windows sharing (SMB) page. Select the SMB
shares tab. Set the Current access zone to marketing. Click on Create an
SMB share.
4. In the Create an SMB share window, enter the fields as shown and click
Create share.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 133
SMB Shares
Note: When joining the Active Directory domain, the Domain Users group is
automatically added to the cluster's user group by default. This can be seen by
selecting Add member and choosing an AD user.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 135
SMB Shares
6. Go back to the WebUI and navigate to the File system, File system explorer
page. Set the Current access zone to marketing. Click on home. Verify that
the john home directory has been created.
a. Minimize mRemoteNG.
b. Open the File Explorer on the Jumpstation by clicking the icon on the
task bar. Right-click on This PC and click on Map network drive.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 137
SMB Shares
5. Verify that the john home directory has been created. Go back to
mRemoteNG, at the boston-1 prompt, run ls /ifs/marketing/home and
ensure that john is listed.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 139
SMB Shares
b. In the Create an SMB share window, enter the fields as shown and
click Create share.
3. Minimize the WebUI. Go to the File Explorer on the Jumpstation to map the
share. Map the mktg-share share. Refer to the previous task if required.
a. In the mapped mktg-share, right click in the right panel, select New
and then select Folder. Why do you get an access denied message?
This is because you do not have the needed permissions.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 141
SMB Shares
Note: When a share is created with the ACL policy settings set to
Balanced and the Directory ACLs setting set to Apply Windows
default ACLs, the share is ACL authoritative.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 143
SMB Shares
2. Create a general share for all the marketing users. At the boston-1 prompt,
run the isi smb shares create mktg-share --zone=marketing --
path=/ifs/marketing/mktg-share --create-path command.
a. In the mapped mktg-share, right click in the right panel, select New
and then select Folder. Why do you get an access denied message?
This is because you do not have the needed permissions.
b. At the boston-1 prompt, run the isi smb share view mktg-
share --zone marketing | grep -ie Permission -e
Everyone command. Notice that the permission is set as allow read
for Everyone.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 145
SMB Shares
Note: When a share is created with the ACL policy settings set to
Balanced and the Directory ACLs setting set to Apply Windows
default ACLs, the share is ACL authoritative.
NFS Exports
Scenario:
Now that you have configured the Windows shares, export the directories to the
Linux users. The IT manager has asked that you create, configure, export, and
mount a general purpose directory for use by the marketing members that use
Linux clients. Although the dominant access to the files is using Linux, some
Windows users may also access the files. The IT manager wants you to
understand root squash and the permission behavior.
Given in the lab exercise is the information needed to configure NFS exports. If
needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 147
NFS Exports
NFS Exports
1. Create a general purpose NFS export for the marketing members using Linux
clients.
b. Enable NFS service. You can use the UNIX sharing (NFS) page of
the WebUI or the isi services command.
Instructor Note: Any client not restricted by rules can access the
export.
d. Create an NFS alias for the export in the marketing access zone.
You can use the NFS aliases tab of the UNIX sharing (NFS) page in
the WebUI or the isi nfs aliases command.
2. Mount the NFS directory exported from the cluster to the Centos machine.
This step can be performed only with the CLI.
Hint: If the DNS and alias are not configured, use the IP
address for the marketing access zone and the directory path
for the export.
c. Create a empty file named test using the touch command. Verify the
owner and group for the test file using the ls command.
Question: Why is the user and group not root on the file test that
user root on the Centos client created?
d. On the cluster, revoke the Write permission for Others in the mktg-
export directory and note that the owner for the directory is user root.
You can use the File system explorer page of the WebUI or the
chmod and ls commands.
e. In the Centos client, try to create another empty file named test1.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 149
NFS Exports
Instructor Note: Because root on the cluster and root on the client
are not the same user.
f. Add the Centos root (192.168.3.3) to the Root clients rule of the NFS
export for the mktg-export directory. You can use the UNIX sharing
(NFS) page of the WebUI or the isi nfs exports command.
g. Try to create file test1 again on the Centos client. Verify the owner
and group for file test1.
a. Navigate to the File System, File system explorer page. Set the
Current access zone field to marketing. Click on Create directory.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 151
NFS Exports
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 153
NFS Exports
5. Create an NFS alias for the export so the user will not have access to the full
directory path of their export. An alias creates a shortcut for the directory path
name.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 155
NFS Exports
2. Create the mktg-export directory. At the boston-1 prompt, run the following
commands:
4. Create the export for the mktg-export directory. At the boston-1 prompt, run
the following commands:
Replace the <ID> field in the command with the export ID.
5. Create an NFS alias for the export so the user will not have access to the full
directory path of their export. An alias creates a shortcut for the directory path
name. At the boston-1 prompt, run the following commands:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 157
NFS Exports
Note: If DNS were not configured, you can use an IP address that is
in the marketing IP address pool configured on the cluster. Without
using DNS and without using an NFS alias, the command may look
like mount 192.168.3.33:/ifs/marketing/mktg-export
/mnt/gen-purpose
3. On the Centos SSH connection, run the whoami command to verify you are
user root.
4. Revoke the Write permission for Others. You may perform this step either
using the WebUI or CLI.
ii. Select Edit properties. Note that the user is root. Uncheck the
write permission for Others. Click on Save changes and
Close.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 159
NFS Exports
6. The root user of the Centos client is a trusted root for the cluster. Change the
root squash for the client. You may perform this step either using the WebUI or
CLI.
ii. Click Edit export. In the Edit NFS export details window,
enter 192.168.3.3 in the Root clients field. This is the Centos
client where user root is trusted. Click Save changes and then
Close.
ii. Add root client: Run the isi nfs exports modify <ID>
--zone marketing --root-clients 192.168.3.3
command. Replace the <ID> field with the export ID.
iii. Verify: Run the isi nfs exports view <ID> --zone
marketing command. Replace the <ID> field with the export
ID. Notice that 192.168.3.3 has been added as a root client.
This is the Centos client where user root is trusted.
Note: The 192.168.3.3 client is configured under the Root clients rule as well as
the Always read/write clients rule. The Root clients rule takes precedence.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 161
NFS Exports
the test1 file. Alternatively, you may navigate to the File system, File
system explore page of the WebUI, marketing access zone, mktg-
export directory, and view the details on the test1 file.
S3
Scenario:
The IT manager wants the Marketing users to access data from an S3 application.
Demonstrate the S3 configuration steps to create a bucket and access the bucket
using other protocols.
Given in the lab exercise is the information needed to configure S3. If needed, use
the WebUI or the CLI step-by-step walk through portion of the exercise for
guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 163
S3
S3 Buckets
1. Configure S3 for the marketing access zone and verify multi-protocol access.
a. Enable the S3 service. Use the Object storage (S3) page of the
WebUI or the isi services command.
b. Set the base domain for the marketing access zone settings. Use the
Object storage (S3) page of the WebUI or the isi s3 settings
command.
d. Create a secret key for the Active Directory user John. Note the
Access id and the Secret Key. Use the Object storage (S3) > Key
management page of the WebUI or the isi s3 keys command.
e. Create a new account in the S3 Browser. Open the browser from the
desktop or taskbar. Use the Access id and the Secret Key obtained
from the previous task.
g. Create a new SMB share in the marketing access zone. Use the
Windows Sharing (SMB) page of the WebUI or the isi smb
shares command.
i. Name: mktg-bucket
h. Map the mktg-bucket share using Windows Explorer. Verify that you
are able to access the Animation folder.
i. Folder: \\marketing\mktg-bucket
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 165
S3
b. Configure the zone settings. Select the Zone settings tab and
change the current access zone to marketing. Enter the base
domain and as shown and click Save changes.
c. To create a bucket, select the Buckets tab and set the current
access zone to marketing. Click Create Bucket and enter the fields
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 167
S3
d. Once done, you will find the bucket listed in the Buckets table.
a. Create a secret key for the Active Directory user John. On the Object
storage (S3) page, select the Key management tab. Set the current
access zone to marketing. Select user John and click Create new
key. A new key secret key will be listed in the Secret key Details
table. Note the Access id and the Secret key for user John.
b. Open the S3 Browser using the taskbar or the desktop. Enter the
details as shown in the graphic to create a new account. You need to
copy the Access id and the Secret Key from the WebUI and paste
them in the new account form. Once done, Add new account.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 169
S3
c. The mktg-bucket will be listed on the left. To add contents, select the
bucket and then click Upload > Upload Folder. Choose the
Animation directory from the File-Repository directory and click
Select Folder. Once uploaded, the folder will appear on the right.
d. Now, try to access the bucket using SMB. Create a SMB share in the
marketing access zone as shown. Refer to the SMB Shares
exercise of the lab guide for the detailed procedure.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 171
S3
e. Map the mktg-bucket share on the Jumpstation. Verify that you are
able to access the Animation folder.
c. Configure the zone settings. At the boston-1 prompt, run the isi s3
settings zone modify --base-domain
marketing.dees.lab --zone marketing command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 173
S3
a. Create a secret key for the Active Directory user John. At the
boston-1 prompt, run the isi s3 keys create DEES\\john --
zone marketing command. Note the Access id and the Secret
key for user John.
b. Open the S3 Browser using the taskbar or the desktop. Enter the
details as shown in the graphic to create a new account. You need to
copy the Access ID and the Secret Key from the CLI and paste them
in the new account form. Once done, Add new account.
c. The mktg-bucket will be listed on the left. To add contents, select the
bucket and then click Upload > Upload Folder. Choose the
Animation directory from the File-Repository directory and click
Select Folder. Once uploaded, the folder will appear on the right.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 175
S3
d. Now, try to access the bucket using SMB. At the boston-1 prompt,
run the isi smb shares create mktg-bucket --
zone=marketing --path=/ifs/marketing/mktg-bucket -
-i=yes command. Change the permissions by running the isi smb
shares permission modify mktg-bucket --
zone=marketing --wellknown Everyone --permission-
type=allow --permission=full command.
f. Map the mktg-bucket share on the Jumpstation. Verify that you are
able to access the Animation folder.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 177
HTTP - Optional
HTTP - Optional
Scenario:
The Marketing business unit has requested the use of HTTP for their clients. The IT
manager has asked you to configure HTTP on the cluster for the Marketing
business unit and test the connection.
Given in the lab exercise is the information needed to configure HTTP. If needed,
use the WebUI or the CLI step-by-step walk through portion of the exercise for
guidance. This is an optional lab exercise for the course. You may choose to either
perform or skip this exercise.
HTTP
1. Use the following information to configure HTTP for the cluster.
a. Create the HTTP root directory in the marketing access zone. You
can use the File system explorer page of the WebUI or the mkdir
command.
b. Configure HTTP for the cluster. You can use the HTTP settings page
of the WebUI or the isi http settings command.
iii. Give full permission to the copied log file in the HTTP base
directory. Use the chmod command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 179
HTTP - Optional
a. Navigate to the File System, File system explorer page. Set the
Current access zone field to marketing. Click on Create directory.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 181
HTTP - Optional
2. Create HTTP root directory. At the boston-1 prompt, run the following
commands:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 183
HTTP - Optional
2. Add contents to the HTTP root directory. At the boston-1 prompt, perform the
following steps:
c. Give full permissions to the log file by running the chmod 777
/ifs/marketing/streaming/main_config_changes.log
command. You will get an access denied message if the permissions
are not set.
c. To verify access, on the Index page, click on the log file to ensure the
file opens.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 185
HTTP - Optional
Scenario:
As part of the documentation process, the IT manager has asked you to analyze
how OneFS uses data protection levels to protect data, and then lead a small
workshop for the team to ensure everyone understands OneFS data protection.
The IT manager has created exercises to identify the protection levels of the file
layouts for various protection strips, as well as determine the overhead for cluster
sizing. You will review and make changes to the data protection settings for
directory and file protection levels that can affect node pool, folder, and file.
Given in the lab exercise is the information needed to configure Data Protection. If
needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 187
Data Protection and File Layout
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 189
Data Protection and File Layout
Hint: Ensure to get the node pool ID if you are performing this step
using the CLI.
Question: Note the Storage Pools > Summary tab has an Info
message stating vmware_100gb_6gb requested protection is
different than the suggested protection. What does this mean?
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 191
Data Protection and File Layout
b. Change the protection settings for the mktg-DP directory. Use the
File system explorer page of the WebUI or the isi set command.
c. Create an SMB share for the mktg-DP directory. Use the Windows
sharing (SMB) page of the WebUI or the isi smb shares
command.
Note: Although the file policy is set at +2d:1n protection, the explicit
directory permission on the mktg-DP directory takes precedence.
Instructor Note: 5 data stripe units and 1 FEC stripe unit spread
across 1 drive per node, which means N+1n protection.
Note: Although the file policy is set at +2d:1n protection, and the
explicit directory permission on the mktg-DP directory is set at +1n,
the explicit protection policy at the file level takes precedence.
Instructor Note: 15 data stripe units and 3 FEC stripe units spread
across 3 drive per node.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 193
Data Protection and File Layout
2. Navigate to the File System, Storage pools page, Summary tab. The
Summary tab displays storage pool status and local storage usage statistics.
The SmartPools info message indicates that the requested protection is
different than the protection suggested by OneFS. The Info message is not an
error.
3. Configure the +1n protection level for the vmware_100gb_6gb node pool.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 195
Data Protection and File Layout
4. Change the protection level for the default file pool policy. Navigate to the File
Pool Policies tab and click View details for Default policy. Click on Edit
policy. Change the Requested protection to +2d:1n and click Save
changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 197
Data Protection and File Layout
2. Configure the +1n protection level for the vmware_100gb_6gb node pool.
b. To change the Protection Policy, you need the ID of the node pool
that you want to change. Run the isi storagepool nodepools
modify <node pool ID> -p +1n command. The -p option tells
you which protection level you are going to use. Replace the <node
pool ID> in the command with the ID for the vmware_100gb_6gb
node pool.
3. Change the protection level for the default file pool policy to +2d:1n.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 199
Data Protection and File Layout
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 201
Data Protection and File Layout
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 203
Data Protection and File Layout
b. Map the mktg-DP share and then copy the Animation folder from the
File-Repository directory to the mapped share.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 205
Data Protection and File Layout
b. View the file properties once again to verify the changes and close
the window.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 207
Data Protection and File Layout
c. Although the file policy is set at +2d:1n protection, and the explicit
directory permission on the mktg-DP directory is set at +1n, the
explicit protection policy at the file level takes precedence.
2. Configure the +1n protection level for the mktg-DP directory. At the boston-1
prompt, run the following commands:
Note: Replace the <node pool ID> in the command with the ID for
the vmware_100gb_6gb node pool. Run the isi storagepool
nodepools list command to get the ID.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 209
Data Protection and File Layout
b. Map the mktg-DP share and then copy the Animation folder from the
File-Repository directory to the mapped share.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 211
Data Protection and File Layout
c. Although the file policy is set at +2d:1n protection, and the explicit
directory permission on the mktg-DP directory is set at +1n, the
explicit protection policy at the file level takes precedence.
SmartPools
Scenario:
The IT manager has asked you to tier cluster data on two different types of storage.
Use SmartPools to create node pools and tiers. Use file pools policies to specify
target files to move and store on a different tier with different protection settings.
The protection levels you choose are unique to your workflows, your clusters, and
your organization requirements. What is an acceptable failure rate for one
organization may be unacceptable to another.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 213
SmartPools
SmartPools
1. Configure SmartPools.
a. Activate SmartPools license. For the lab environment, you will use
the trial license functionality. Use the Licensing page of the WebUI
or the isi license command.
i. Name: media_pool
d. Build a tier to encompass the newly created node pool. Use the
Storage pools page of the WebUI or the isi storagepool
tiers command.
i. Name: media_tier
2. Navigate to the File System, Storage pools page, Summary tab. The
Summary tab displays storage pool status and local storage usage statistics.
Note that in the Status section, under the Module column, you will notice that
Policies indicates a Status of Caution because SmartPools is not yet
licensed. The SmartPools and SmartPool settings module should both show
a status of Info or Good. The CloudPools module should show a status of
Caution because CloudPools is also not yet licensed.
3. Activate SmartPools license. For the lab environment, you will use the trial
license functionality.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 215
SmartPools
b. Check SmartPools and click on Start trial. Once done, close the
window.
4. Create a manual node pool named media_pool by splitting the existing six-
node, node pool into two three-node, node pools. Note that you can only
perform this operation using the OneFS CLI.
d. The blue "X" in the actions column is an indication the newly created
media_pool is manually created and can be deleted. The gray "X" on
the vmware_100gb_6gb indicates that it is automatically created by
OneFS.
a. In the SmartPools tab, click the Pool: media_pool link. Set the
requested protection for the node pool to +3d:1n, click Save
changes.
6. Create a tier to encompass the newly created node pool. You will configure a
file pool policy shortly to use the tier.
a. Ensure you are still on the Storage pools page, SmartPools tab. To
create a tier, click the Create a tier button and name the tier as
media_tier. Add the media_pool to the tier. Click Create tier.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 217
SmartPools
2. Activate SmartPools license. For the lab environment, you will use the trial
license functionality.
3. Create a manual node pool named media_pool by splitting the existing six-
node, node pool into two three-node, node pools. Note that this operation can
only be perform using the OneFS CLI.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 219
SmartPools
5. Create a tier to encompass the newly created node pool. You will configure a
file pool policy shortly to use the tier.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 221
File Pool Policies
Scenario:
The IT manager has asked you to use file pools policies to specify targets files to
move and store on a different tier with different protection settings.
Given in the lab exercise is the information needed to configure File Pool Policies.
If needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
a. Review the cluster default file pool policy. Use the Storage pools
page of the WebUI or the isi filepool command.
Instructor Note: The default policy will be applied to all the data on
the cluster. The only exception is data for which there is some manual
configuration specified.
b. For this scenario, ensure that files only go to the Default node pool
(vmware_100gb_6gb). Change the default file policy in the Storage
pools page of the WebUI or use the isi filepool default-
policy command.
2. Create a file pool policy. A file pool policy consists of two components, Filters
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 223
File Pool Policies
and Actions. The filters are used to select the files and the actions modify the
setting of the files selected by the filter.
Instructor Note: Initially when data is written, the files may reside in
other node pools as well. In time, the data will eventually be moved to
the target node pool configured in the default policy. This operation
can also be manually triggered by running the SmartPoolsTree job.
d. Test the effect the media_policy has on the files. Run the
SmartPools Tree job. Note that the job may take a few minutes to
complete. Use the Job operations page of the WebUI or the isi
job jobs command.
i. Path: /ifs
e. Verify that the policy and disk pool is media_pool for all the .mp4
files. Use the isi get command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 225
File Pool Policies
a. Navigate to the File system, Storage pools page. Click the File pool
policies tab. Only the Default policy is displayed. At this stage the
Default policy applies to all data written to the cluster for which some
manual configuration has not been specified.
Note: You will not see the Create a file pool policy button if
SmartPools is not licensed. Without the license, you cannot create
file pool policies.
b. In the File pool policies table, in the Action column, click View
Details for the Default policy. In the View default policy details
window, review the different settings and close the window.
3. For this scenario, ensure that files only go to the default node pool
(vmware_100gb_6gb). With the Storage target and Snapshot storage
target set to anywhere, files will be placed across all node pools.
a. Click the View/Edit button for the Default policy. Click Edit policy.
Make the changes as shown and then click Save changes and
Close.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 227
File Pool Policies
a. At this stage, only the default policy file pool policy is configured. The
default policy applies to all data written to the cluster for which some
manual configuration has not been specified.
Note: You will not be able to create a new file pool policy if
SmartPools is not licensed.
3. For this scenario, ensure that files only go to the default node pool
(vmware_100gb_6gb). With the Storage target and Snapshot storage
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 229
File Pool Policies
target set to anywhere, files will be placed across all node pools.
2. Open the Windows File Explorer on the Jumpstation and map the mktg-
share, if it is not mapped. Copy the mydocuments folder from the File-
Repository directory into the mapped share mktg-share. If needed, you can
review the SMB Shares lab for the steps to map a share.
3. Review the location and protection level of data residing in the mydocuments
folder.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 231
File Pool Policies
d. If you do not change the target node pools for the Default policy, the
files can be in either of the two node pools because the Default
policy writes to anywhere, and will randomly balance which node
pool a file is written. Running the isi get -D
/ifs/marketing/mktg-share/mydocuments/* | grep
"Disk pools" command shows the distribution of the files across
the two pools.
4. Create a file pool policy to change the protection and location of .mp4 files
present in the mydocuments directory. You may perform this step either
using the WebUI or the CLI.
ii. Verify that the media_policy is listed in the File pool policies
tab.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 233
File Pool Policies
5. Test the effect the media_policy has on the files. Run the SmartPools Tree
job. Note that the job may take a few minutes to complete. You may perform
this step either using the WebUI or the CLI.
ii. On the Job summary tab, monitor the job. The indication that
the job is completed is when the job is no longer present in the
Active jobs table.
ii. Run the isi job jobs list command. This displays a list
of all the active jobs. The indication that the job is completed is
when the job is no longer present in the list. Run the command
once every minute to find out if it has been completed.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 235
File Pool Policies
6. When the job finishes, go to the SSH session and run the isi get -D
/ifs/marketing/mktg-share/mydocuments/*.mp4 | grep "Disk
pools" command. Verify that the policy and disk pool is media_pool for all
the .mp4 files.
File Filtering
Scenario:
A problem with the last storage system was the large amount of capacity
consumption due to individuals storing personal pictures on the shares. The IT
manager wants to ensure that users cannot use storage for specific files types
within specific shares. Use the file filtering feature to prevent certain files from
consuming storage in a share.
Given in the lab exercise is the information needed to configure file filtering. If
needed, use the WebUI or the CLI step-by-step walk through portion of the
exercise for guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 237
File Filtering
File Filtering
1. Use the information given below to add and verify a file filter on a SMB share.
a. Add a file filter to prevent users from writing JPEG image files on the
marketing general purpose share (mktg-share). Edit the share using
the Window sharing (SMB) page of the WebUI or the isi smb
shares command.
Instructor Note: As some files in the the M & E folder are .jpg files,
the filter added on the share prevents them from being copied.
ii. Compare the File-Repository > M & E folder with the mktg-
share > M & E folder.
2. Add a file filter to prevent users from writing JPEG image files on the
marketing general purpose share.
b. In the Edit SMB share details window, go to the File filter section
and check Enable file filters. Add the file extension .jpg as shown
and then save the changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 239
File Filtering
c. Compare the File-Repository > M & E folder with the mktg-share >
M & E folder. Notice that the JPEG files did not copy over from the
Sat Images folders, but other files such as the Thumbs.db are
copied successfully.
4. Similarly, you can add file filters to an access zone in the Access, File filter
page of the WebUI. The file filter on an SMB shares takes precedence over
the filter filter on the access zone where the share resides.
2. Add a file filter to prevent users from writing JPEG image files on the
marketing general purpose share.
a. At the boston-1 prompt, run the isi smb shares modify mktg-
share --zone=marketing --file-filtering-enabled=yes
--file-filter-extensions=.jpg --file-filter-
type=deny command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 241
File Filtering
c. Compare the File-Repository > M & E folder with the mktg-share >
M & E folder. Notice that the JPEG files did not copy over from the
Sat Images folders, but other files such as the Thumbs.db are
copied successfully.
4. Similarly, you can add file filters to an access zone using the isi file-
filter settings modify command. The file filter on an SMB shares
takes precedence over the filter filter on the access zone where the share
resides.
SmartQuotas
Scenario:
A portion of the storage capacity of the sales general purpose directory will be
allocated to each user of the directory. The IT manager has asked you to use
quotas to enforce storage limits. You will start by setting up report generation and
event notifications. Next, create a directory type quota and apply user quotas to the
general purpose directory. Ensure to test the settings.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 243
SmartQuotas
SmartQuotas
1. Use the following information to change the global quota reporting frequency
and notification rules.
a. Activate SmartQuotas license. For the lab environment, you will use
the trial license functionality.
c. Add the global notification rules for quotas. Use the SmartQuotas
page of the WebUI or the isi quota settings notifications
command.
2. Use the following information to configure directory type quotas and default-
user quotas on the general purpose sales directory.
a. Create a general purpose share for the sales access zone. Use the
Windows sharing (SMB) page of the WebUI or the isi smb
shares command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 245
SmartQuotas
Instructor Note: No, because the folder size is larger than the hard
limit enforced on the user.
Instructor Note: The quotas are configured with the global reporting
settings which schedule reports every 2 minutes of everyday.
iii. View the list of all quotas. Use the SmartQuotas page of the
WebUI or the isi quota quotas command.
i. Change the hard limit enforced on user John to 200 MB. Use
the SmartQuotas page of the WebUI or the isi quota
quotas command.
ii. Using Windows Explorer, copy the File-Repository > M & E >
Sat Images folder to the mapped sales-gen share.
Instructor Note: Yes, because the folder size is smaller than the hard
limit enforced on user John.
Question: Is the hard limit updated for user John? Why or Why
not?
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 247
SmartQuotas
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 249
SmartQuotas
c. Leave the Manual reporting section and the Email mapping section
with its default settings.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 251
SmartQuotas
5. Once done, scroll to the bottom of the page and click Save changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 253
SmartQuotas
3. Change the frequency of the quota reports. At the boston-1 prompt, run the
following commands:
4. Add the global notification rules for quotas. At the boston-1 prompt, run the
following commands:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 255
SmartQuotas
i. Enter the fields as shown. This is the share you will use for
auditing events. Once all the fields are entered click Create
Share.
b. Select the quota type as Directory quota and fill the other fields as
shown. Once done, click Create quota. A success message is
displayed on the Quota and usage tab.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 257
SmartQuotas
c. In the Quotas and usage table, click View/Edit for the directory and
review all of your settings. If you require a custom notification for this
quota, you can change the configuration in the Quotas & Usage
table.
b. Select the quota type as User quota and fill the other fields as
shown. Once done, click Create quota. A success message is
displayed on the Quota and usage tab.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 259
SmartQuotas
c. Verify that the default-user has been added in the Quotas and usage
table.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 261
SmartQuotas
c. Navigate to the Quotas and Usage tab and note all the quotas listed.
Observe that a quota for user john is listed. The default-user quota
automatically creates a quota for user john.
a. Edit the quota for user john. Navigate to the File System,
SmartQuotas, Quotas and usage tab. Find the user: Dees\john
linked entry. In order to edit this quota, you need to first remove its
link with the default-user quota. For the entry, click the Unlink
button.
b. Click the View/Edit button and then click Edit. Change the Hard limit
to 200 MB and click Save changes and close the window. You
should see a success message.
d. Next, update the quota for all users to 250 MB. On the Quotas and
usage tab, click on View/Edit for the default-user quota entry.
Update the hard limit to 250 MB and save the changes.
e. Notice the quotas on the Quotas and usage tab. The hard limit for
user john has not been updated because user john is not linked to the
default-user quota and has a specific quota setting. Any specific user
quotas that you configure take precedence over a default user quota.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 263
SmartQuotas
a. Create Share: At the boston-1 prompt, run the isi smb shares
create sales-gen --zone=sales --
path=/ifs/sales/sales-gen --i=yes --create-path
command.
3. Go to Windows Explorer and map the \\sales\sales-gen share and then click
Finish. Refer to the SMB Shares lab if you need the detailed steps to map a
Network Drive.
a. To create the quota, at the boston-1 prompt, run the isi quota
quotas create /ifs/sales/sales-gen directory --
hard-threshold 400M --soft-threshold 300M --soft-
grace 30m --container yes command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 265
SmartQuotas
a. To create the quota, at the boston-1 prompt, run the isi quota
quotas create /ifs/sales/sales-gen default-user --
hard-threshold 10M command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 267
SmartQuotas
c. View all the quotas enforced by running the isi quota quotas
list command. Observe that a quota for user john is listed. The
default-user quota automatically creates a quota for user john.
a. Edit the quota for user john. In order to edit this quota, you need to
first remove its link with the default-user quota. At the boston-1
prompt, run the isi quota quotas modify
/ifs/sales/sales-gen user --user "DEES\john" --
linked no command.
b. Change the hard limit to 200 MB by running the isi quota quotas
modify /ifs/sales/sales-gen user --user "DEES\john"
--hard-threshold 200M command.
e. Next, update the quota for all users to 250 MB. Run the isi quota
quotas modify /ifs/sales/sales-gen default-user --
hard-threshold 250M command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 269
SmartDedupe
SmartDedupe
Scenario:
Another problem with the last storage system was the large amount of storage
consumed by duplicate data. The IT manager wants you to run a deduplication
assessment to verify you can assess space savings, specify deduplication settings,
and view space savings. Also, view the deduplication report.
SmartDedupe
1. Use the following information to configure SmartDedupe and deduplicate the
marketing general purpose share.
a. Activate the SmartDedupe license. For the lab environment, you will
use the trial license functionality.
ii. View the report and note the space savings. Use the
Deduplication page of the WebUI or the isi dedupe
reports command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 271
SmartDedupe
i. Start the Dedupe job with its default values. Use the Job
operations page of the WebUI or the isi job jobs
command.
ii. Check the deduplication stats and note the amount of disk
space saved. Use the Deduplication page of the WebUI or the
isi dedupe command.
iii. View the report and note the space savings. Use the
Deduplication page of the WebUI or the isi dedupe
reports command.
Instructor Note: Identical files are deduplicated only when the files or
identical 8K blocks are stored in the same node pool and have the
same protection policy.
a. Map the mktg-share directory, if not already mapped. Ensure that the
Animation, M & E, and mydocuments directories are present as
shown. If not, copy the directories from the File-Repository directory
using Windows Explorer.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 273
SmartDedupe
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 275
SmartDedupe
b. On the Start a job dialog box, click Start job. A Job Start
Succeeded message displays briefly.
b. On the Start a job dialog box, click Start job. A Job Start
Succeeded message displays briefly.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 277
SmartDedupe
c. Check the status of the job in the Summary tab. Once the job
completes, it will be removed from the Active jobs table. This may
take a few minutes to complete.
Note: Deduplication is not efficient for all file types. For example,
media, PDFs, and zip files are not good candidates for deduplication
unless the files are heavily replicated in the same node pool. Typical
user files such as Microsoft Office files that are shared, modified, and
copied among users are good candidates for deduplication. A good
use case for deduplication is user home directories where hundreds
of users may typically keep multiple versions of the same files.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 279
SmartDedupe
a. Map the mktg-share directory, if not already mapped. Ensure that the
Animation, M & E, and mydocuments directories are present as
shown. If not, copy the directories from the File-Repository directory
using Windows Explorer.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 281
SmartDedupe
a. To run the assessment, at the boston-1 prompt, run the isi job
jobs start DedupeAssessment command.
b. To check the job status, run the isi job jobs list command to
display the active jobs list. Once the job completes, it will no longer be
present in the list. Run the command every few seconds to check if
the job is finished. This may take a few minutes to complete.
c. Once the job finishes, view the report generated. We need the job ID
to view the report. Run the isi dedupe reports list command
to get the job ID. Replace the ID in the isi dedupe reports
view <ID> command to view the report. Note that it may take as
much as five minutes for the report to display in the list.
b. Check the job status by running the isi job jobs list
command. This may take a few minutes to complete.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 283
SmartDedupe
c. Once the job completes, view the amount of disk space saved by
running the isi dedupe stats command.
d. View the report generated. Run the isi dedupe reports list
command to get the job ID. Replace the ID in the isi dedupe
reports view <ID> command to view the report.
Note: Deduplication is not efficient for all file types. For example,
media, PDFs, and zip files are not good candidates for deduplication
unless the files are heavily replicated in the same node pool. Typical
user files such as Microsoft Office files that are shared, modified, and
copied among users are good candidates for deduplication. A good
use case for deduplication is user home directories where hundreds
of users may typically keep multiple versions of the same files.
SnapshotIQ
Scenario:
The IT manager wants to ensure you can recover files from snapshots. Use
SnapshotIQ to access specific point in time copies of files and restore the data from
the snapshots.
Many of the steps need to be done in quick succession in order to see the
snapshot behavior. For this reason, it is suggested that you read through all the
steps for tasks 1 and 2 before you perform the steps.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 285
SnapshotIQ
SnapshotIQ
1. Create Snapshot Schedule.
d. View the snapshots created. Use the SnapshotIQ page of the WebUI
or the isi snapshot snapshots command. In accordance with
the configured schedule, it could take up to 2-3 minutes for snapshots
to appear.
2. Create Snapshots. Perform this step using the OneFS CLI and Windows
Explorer.
a. Create multiple point-in-time versions for a file using CLI. Use the
date > filename command.
iv. After 2-3 minues, create snapfile once again with the current
timestamp.
b. View the amount of space that the snapshot uses after data is
modified. Use the SnapshotIQ page of the WebUI or the isi
snapshot snapshots command.
3. Restore files from Snapshots. This step can be performed only using the
OneFS CLI and Windows Explorer.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 287
SnapshotIQ
iii. Use the Open, Copy and Restore operations to restore earlier
versions of snapfile.
a. Map the sales-gen share, if not already mapped. Open the mapped
sales-gen share. Delete all contents in the directory, if any.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 289
SnapshotIQ
Tip: When creating a snapshot policy, keep in mind the length of time that you want
to set for expiration of the snapshots. If you are taking a snapshot every two
minutes as you do in the lab, you may not want to keep each snapshot for more
than two hours. If you use a setting that takes a snapshot every few days, then you
may want to set the expiration time so that you have at least one saved snapshot
when the next snapshot is taken. If you manually delete the policy, the snapshots
are not deleted because a service running in the background monitors the
snapshots and does not allow them to be deleted or removed until the expiration
time that you set in the policy.
5. Go to the Snapshots tab. You should begin to see snapshots. The snapshots
do not consume any space until data has been changed or deleted. In
accordance with the configured schedule, it could take up to 2-3 minutes for
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 291
SnapshotIQ
snapshots to appear.
Tip: Click on another tab and then back to the Snapshots tab to refresh the
Snapshots table.
2. Activate the trail SnapshotIQ license. At the boston-1 prompt run the following
commands:
a. Map the sales-gen share, if not already mapped. Open the mapped
sales-gen share. Delete all contents in the directory, if any.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 293
SnapshotIQ
Tip: When creating a snapshot policy, keep in mind the length of time that you want
to set for expiration of the snapshots. If you are taking a snapshot every two
minutes as you do in the lab, you may not want to keep each snapshot for more
than two hours. If you use a setting that takes a snapshot every few days, then you
may want to set the expiration time so that you have at least one saved snapshot
when the next snapshot is taken. If you manually delete the policy, the snapshots
are not deleted because a service running in the background monitors the
snapshots and does not allow them to be deleted or removed until the expiration
time that you set in the policy.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 295
SnapshotIQ
b. Create a file named snapfile which contains the current time. At the
boston-1 prompt, run the date > snapfile command. This
command writes the current timestamp to the file.
c. Navigate to the share folder that was mapped and verify that snapfile
is created. Open the file with Notepad and view its contents.
d. Again, in the CLI, wait for 2 minutes and run the date >>
snapfile command to append the latest timestamp to the end of the
existing file.
e. In the share, open the file and view its contents after the edits. For
demonstration purposes, append the file 4-5 times. Note the time
each time you append to the file.
g. After 2-3 minutes, run the date > snapfile to recreate the file.
The contents will only include the current time at which you created
the file.
3. View the amount of space that the snapshot uses after data is modified. You
may perform this step either using the WebUI or the CLI.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 297
SnapshotIQ
b. At the boston-1 prompt, run the ls -al command. Notice that the
.snapshot directory is not seen. It is a hidden directory but can be
accessed.
d. Run the pwd command and notice that the present working directory
is .snapshot directory.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 299
SnapshotIQ
f. You should see a subdirectory here for each snapshot which has
been taken (one every two minutes). In accordance with the snapshot
schedule you created earlier in this lab, the directory names should
be MySales_<timestamp>. Take note of the timestamps in each
directory name. The contents of these snapshot directories are in a
read only state. Earlier versions of files can be copied from the
snapshot directories, but files in the directories are in a read only
state. They cannot be edited or modified.
h. Copy the earlier version of the file from the snapshot into the present
directory. Rename the file to old-snapfile by running the cp
snapfile /ifs/sales/sales-gen/MySales/old-snapfile
command.
i. Go back to the share and verify if the file is recovered. Open the file
and review the contents of the file.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 301
SnapshotIQ
c. Select one of the earlier versions. For the demonstration, the snapfile
from time 07:06 is selected. Click on Open. The earlier version of the
file will be displayed. Review the date information placed into this
point in time view of the file and close the file.
d. To copy the file, select the file and click Copy. For the
demonstration, the snapfile from time 07:06 is selected. Select your
desktop as the save location.
e. Navigate to the desktop and verify that the earlier version of the file is
present.
f. To restore the original file, open the Previous Versions tab in the
Properties window. Select the version of the file to restore. For the
demonstration, the snapfile from time 07:08 is selected. Click
Restore. Click Restore again to restore the file. Click OK in the
success window. Close the Properties window.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 303
SnapshotIQ
g. In the share, open snapfile and verify that it has been restored to the
previous version. Close the file.
SyncIQ
Scenario:
The Engineering business unit has requested a general use data set to test against
their application development effort. The IT manager has asked you to configure
SyncIQ to copy "real-type" data to the engineering group. Use this document as
part of your presentation to the team who are not familiar with the way SyncIQ
works.
The task covers how to create a SyncIQ policy, run the SyncIQ policy, and edit
SyncIQ policy. Also, re-run the policy and view the updated results to achieve the
SyncIQ test.
Given in the lab exercise is the information needed to configure SyncIQ. If needed,
use the WebUI or the CLI step-by-step walk through portion of the exercise for
guidance.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 305
SyncIQ
SyncIQ
1. Use the following information to create and run a SyncIQ policy to copy data
from the marketing general purpose to a target directory in the engineering
access zone.
a. Activate SyncIQ license. For the lab environment, you will use the
trial license functionality.
d. Create the SyncIQ policy. Use the SyncIQ page of the WebUI or the
isi sync policies command.
e. Run a policy assessment for the MktgToEng policy. Use the SyncIQ
page of the WebUI or the isi sync jobs command.
f. View the report for the policy assessment. Use the SyncIQ page of
the WebUI or the isi sync reports command.
g. Run the MktgToEng policy. Use the SyncIQ page of the WebUI or
the isi sync jobs command.
2. Use the following information to modify and test the SyncIQ policy created in
the previous step.
ii. Verify that the policy runs automatically after the copy
operation and view the report. Use the SyncIQ page of the
WebUI or the isi sync reports command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 307
SyncIQ
3. Create target directory targetCopy for the replication. In this exercise, we will
replicate the mktg-share directory to the targetCopy directory in the
engineering access zone.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 309
SyncIQ
a. Map the mktg-share directory, if not already mapped. Ensure that the
directory is not empty. If empty, copy the M & E folder from the File-
Repository directory using Windows Explorer.
b. Enter the information as shown in the graphic. Keep all other fields
with the default setting.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 311
SyncIQ
c. Navigate to the Settings tab and review the default settings. Do not
modify these settings without assistance from PowerScale Technical
Support.
a. On the Policies tab, click More in the Actions column for the
MktgToEng policy, and then select Assess sync.
b. The Assess sync should take less than a minute. Navigate to the
Summary tab and notice the Running status in the Active jobs list.
Once the job completes, it will no longer be listed in the Active jobs
list.
c. Navigate to the Reports tab and view the report, including the
duration, total files, and total data transferred. The policy assessment
did not actually transfer the files, but it provides an estimate of
duration and data to be copied before the first run of the policy.
a. On the Policies tab, click More in the Actions column for the
MktgToEng policy, and then select Start job. The SyncIQ job runs in
the background.
b. You may view the job status in the Active jobs table in the Summary
tab. Once the job completes, navigate to the Reports tab and view
the new report.
c. Navigate to File system, File system explorer. Set the access zone
to engineering. Expand the targetCopy directory. Compare the
contents with the /ifs/marketing/mktg-share directory and verify that
the copy was successful.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 313
SyncIQ
3. Create target directory targetCopy for the replication. In this exercise, we will
replicate the mktg-share directory to the targetCopy directory in the
engineering access zone.
a. Map the mktg-share directory, if not already mapped. Ensure that the
directory is not empty. If empty, copy the M & E folder from the File-
Repository directory using Windows Explorer.
b. The job should take less than a minute to run. Run the isi sync
jobs view MktgToEng command to view the job status. Run the
command every 20 seconds until the job is no more listed. This
indicates that the job has completed.
c. To view the report, we first need the job ID. Run the isi sync
reports list command. Note the Job ID.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 315
SyncIQ
a. To run the policy, at the boston-1 prompt, run the isi sync jobs
start MktgToEng command.
b. Run the isi sync jobs view MktgToEng command to view the
job status. Once done, check the report.
c. Get the job ID by running the isi sync reports list command.
Replace the Job ID in the isi sync reports view MktgToEng
<Job ID> command.
b. Change the policy to run whenever the source is modified. Leave the
rest of the fields unchanged. Click Save changes.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 317
SyncIQ
b. On the WebUI, select the Summary tab on the SyncIQ page. You
may either see the job running in the Active jobs section or a report
generated in the SyncIQ recent reports section. View the report
once the job completes. The MktgToEng policy runs every time the
source directory is modified.
c. Navigate to the File system, File system explorer page. Set the
access zone to engineering and expand the targetCopy directory.
Verify that the legal discovery directory is present.
4. On the File system explorer page, click View/Edit for the targetCopy
directory. Click Edit and remove the Write permission for Group. Save the
changes. You will see an error indicating that you can't make changes to the
file system. This is because the replicated directory is read-only and only the
SyncIQ process can modify it.
b. Run the isi sync jobs view MktgToEng command to view the
job status. Once done, check the report using the isi sync
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 319
SyncIQ
SmartLock
Scenario:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 321
SmartLock
SmartLock
1. Use the following information to create a SmartLock domain on directory in the
marketing general purpose share.
a. Activate the SmartLock license. For the lab environment, you will use
the trial license functionality.
b. Create a empty target directory for SmartLock. Use the File system
explorer page of the WebUI or the mkdir command.
ii. Enter text into the file. Save the file and close. Reopen the file
and note the contents. Once done, try to delete the file.
Instructor Note: The file can be deleted during its retention period if
the privileged delete feature is enabled. To access the privilege delete
functionality, you must be assigned the
ISI_PRIV_IFS_WORM_DELETE privilege and own the file you are
deleting. You can also access the privilege delete functionality for any
file if you are logged in through the root or compadmin user account.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 323
SmartLock
2. Activate the SmartLock license. Add the trial version for the purpose of this
lab exercise.
a. Navigate to the File system, File system explorer page. Set the
access zone to marketing. Open the mktg-share directory. Click
Create directory and enter the fields as shown.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 325
SmartLock
b. Verify that the domain is listed in the WORM domains table. Click
View/Edit for the created domain to verify the settings.
b. Open the file using Notepad. Enter some text. Save the file and
close. Reopen the file and notice that the text you entered is not
saved.
c. Now, try to delete the file. You will get an error message saying that
the file cannot be deleted. This is because the file is committed to a
WORM state and will only be released after the retention period is
complete. During the retention period, the file is read-only.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 327
SmartLock
d. Try to delete the file, 5 minutes after it was created. The file will
successfully be deleted as the retention period since the last
modification has expired.
2. Activate the SmartLock license. Add the trial version for the purpose of this
lab exercise.
3. Create a empty target directory for SmartLock. At the boston-1 prompt, run
the following commands:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 329
SmartLock
b. Open the file using Notepad. Enter some text. Save the file and
close. Reopen the file and notice that the text you entered is not
saved.
c. Now, try to delete the file. You will get an error message saying that
the file cannot be deleted. This is because the file is committed to a
WORM state and will only be released after the retention period is
complete. During the retention period, the file is read-only.
d. Try to delete the file, 5 minutes after it was created. The file will
successfully be deleted as the retention period since the last
modification has expired.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 331
HealthCheck
HealthCheck
Scenario:
HealthCheck
1. Use the following information to perform health checks on different cluster
items.
e. Wait for 2 minutes and check the evaluation details for the scheduled
checklists. Use the HealthCheck page of the WebUI or the isi
healthcheck command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 333
HealthCheck
b. Identify the cluster_capacity checklist from the table and click View
details. Note the list of items that will be evaluated in the checklist.
Once done, scroll to the bottom and click Close.
c. For the cluster_capacity checklist, click More and select Run. Once
done, you will notice that the checklist has been queued for
evaluation. The evaluation may take a minute to complete.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 335
HealthCheck
d. Once complete, the Last run start time column for the checklist will
change to PASS or FAIL with a timestamp.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 337
HealthCheck
c. Wait for 2 minutes and check the Evaluations tab. Notice that the
checklists from the newly created schedule are either queued or
evaluated. Click View details to view the evaluation details for any of
the checklists.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 339
HealthCheck
d. Wait for 2 minutes and run the isi healthcheck list command.
Notice that the checklists from the newly created schedule are either
queued or evaluated. Replace the ID in the isi healthcheck
view <ID> command to view the evaluation details.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 341
Monitoring
Monitoring
Scenario:
The IT manager wants to ensure you understand the monitoring tools. Both
InsightIQ and DataIQ are installed on stand-alone servers. Both applications are a
single point of monitoring for multiple PowerScale clusters in the data center.
DataIQ can monitor non-PowerScale volumes, InsightIQ can only monitor
PowerScale volumes.
Given in the lab exercise is the information needed to monitor the cluster using
DataIQ, InsightIQ and isi statistics. If needed, use the step-by-step walk
through portion of the exercise for guidance.
Monitoring
1. Use the following information to perform the initial configuration for InsightIQ.
a. Enable the insightiq user account. Use the Membership and roles
page of the WebUI or the isi auth users command.
i. URL: http://192.168.3.30
v. Username: insightiq
c. Enable and configure the File System Analytics (FSA). Use the
SETTINGS page of the InsightIQ interface.
2. Use to following information to view and create baseline reports on the boston
cluster.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 343
Monitoring
iii. Add a filter to report the Node Performance only for node 1.
d. Create a data usage report showing the largest physical files. Use the
File System Analytics page of the InsightIQ interface.
iii. View the data properties for any available FSA report.
3. Use the following information to add the boston cluster to the DataIQ
application.
a. Create a NFS export to mount /ifs and add the DataIQ server as a
root client. Use the UNIX sharing (NFS) page of the WebUI or the
isi nfs exports command.
c. Add the boston cluster to the DataIQ application. Use the page
Settings > Data management configuration page.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 345
Monitoring
d. View the directory details for /ifs. Use the Data Management page.
4. View the following cluster information using the isi statistics command.
e. View the performance per drive for the node you are logged into.
h. View the performance for the top active results per node.
2. Enable the insightiq user account. The insightiq user is one of the accounts
automatically created by OneFS. By default the account is disabled. You may
either use the WebUI or the CLI to perform this step.
ii. Locate the insightiq user and click View/Edit. Click Edit user.
Change the password to Dees12345! and enable the account
as shown. Once done, save the changes and close.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 347
Monitoring
a. Open the Google Chrome web browser or open a new tab in the
current Chrome browser.
d. The one-time InsightIQ EULA page appears. Review the EULA, click I
have read and agree to..., and then click Submit.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 349
Monitoring
e. The first time you log in, you are prompted to configure the datastore.
For this demonstration, we use a local datastore (as opposed to a
remote datastore) in this implementation of InsightIQ. The local
datastore option is included by default with the InsightIQ virtual
appliance. If you want to place a datastore on a PowerScale storage
cluster or on a NFS-mounted server, you can specify the cluster or
server in this task.
f. Specify the path for the Local Datastore as /datastore and click
Submit.
g. Next, the Add Cluster dialog box appears. Set InsightIQ to monitor
the boston cluster. While in this lab, you will identify the cluster by an
IP address or a host name, alternatively you could specify the name
of a SmartConnect zone.
h. Enter the fields as listed and click OK. It will take a few minutes to
complete adding the cluster. Once done, the monitored cluster is
displayed in the SETTINGS page.
• Username: insightiq
• Password: Dees12345!
b. On the Configuration for boston page, select the Enable FSA tab.
Check the Generate FSA reports and View FSA reports in
InsightIQ features in order to view chart information in the Data
Usage and Data Properties views. Click Submit.
c. Next, Select the FSA Configuration tab. Under the Job Settings
fields, review the Result Set Options settings:
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 351
Monitoring
• Maximum result set age in days: This number represents, in days, how
long to retain each data set before automatically deleting it. To retain data
sets indefinitely, type 0. You can manually delete a data set at any time.
• Maximum result set count: This number represents the maximum number
of data sets to retain. To retain an unlimited number of data sets, type 0.
f. Verify that the fields are set as shown and click Submit.
c. Select the date range from the course start date to the current day
(For example, if day 1 of the course was Monday 4/20/2020 then the
Date Range is Mon, Apr 20, 2020, 8:00 am through the current date
and time). Click View Report.
d. Scroll down for the chart view of reports on different metrics such as
External Network Throughput Rate, Protocol Operations Rate,
CPU, Disk Throughput, etc. Any of the report views created here
can be scheduled, generated as a PDF, and emailed. The report can
be customized allowing administrators to choose exactly which charts
to include in the report.
e. You may also change the zoom level, move forward and move
backward in time. Set the Zoom Level to 6hrs and scroll down to a
chart. Note the start time. Mouse-over the chart data to note the fine
granularity of information.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 353
Monitoring
f. Next, let us add filters to the reports. Scroll to the top of the page and
click Create/manage data filters. Note that the rules can be used to
create filters that allow administrators to quickly pinpoint and view
data.
g. Click Add Rule and then click the drop-down arrow that appears.
Select Node from the list. In the Match column, select 1 to view Node
1. Click Apply.
h. Scroll through the reports and notice that the reports only show
information pertaining to Node 1 as per our filter selection in the
previous step. This filter allows you to view or monitor a specific item.
If Node 1 were having performance issues, this live report would
allow you to filter through the metrics and just present the results from
Node 1, thereby making it easier and faster to perform
troubleshooting or performance analytics.
j. To share a view with other administrators, scroll back to the top of the
page, and in the top right corner of the page, click PERMALINK. The
URL can be sent to an individual. When that person clicks on it, they
can login to the InsightIQ server and see the exact same view.
b. To start with blank report, click Create from Blank Report. There are
many standard templates in the lower half of this page that you can
use as starting point for a custom report.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 355
Monitoring
c. Name the report Lab Performance Report Test. Check the Live
Performance Reporting box. This makes the report show up as an
option in Live Performance Reporting.
e. In the Select a Module for this Position field, select Active Clients.
Note the other options in the field. Select the Protocol radio button.
Click Add another performance module, then select Deduplication
Summary (Physical). Once done, click Finish.
f. This generates reports that show active clients broken down by the
protocols they are using. Confirmation of successfully saving the
report is displayed.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 357
Monitoring
b. Scroll down to the Capacity Forecast section. Under Plot data, keep
the default option of Total Usage checked.
d. Select different options under the Plot Data section, and note how
the presentation of the chart changes.
e. To view Forecast data, hold down the left mouse button and drag it
across the chart for a particular range. This will highlight that area of
the chart. Select the Click to view button to view the forecast data.
b. In the Report Type drop-down list, select Data Usage. On the FSA
Report menu, select one of the available days. Click View Report.
c. Mouse over the pie chart. Note that any of the slices can be selected
and the detail of the directory is shown on the right. All the columns in
the right section can be selected to change how the data is sorted.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 359
Monitoring
d. To view the largest cluster file, scroll down the page to the Top 1000
Files by table and select Largest Physical Size from the drop-down.
e. Scroll to the top of the page. To explore data properties, from the
Report Type menu, select Data Properties. Then from the FSA
Report menu, select an available day. Click View Report.
f. View the file type that contains the most files. Scroll down to the File
Count by Physical Size chart. Next to Breakout by: select the File
Extension option and note the files by extension are listed.
g. With charts like this, you can see files that haven't been used in a
long time and what sizes they are. Continue to explore the graphs
and data views of your cluster as time allows.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 361
Monitoring
2. Create a NFS export for to mount IFS and add the DataIQ server as a root
client. You may either use the WebUI or CLI to perform this step.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 363
Monitoring
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 365
Monitoring
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 367
Monitoring
b. Identify the options for client, drive, heat, list, protocol, pstat,
query, system, and workload. Run the isi statistics with each
option to view the output and type of data. For example, run the isi
statistics client command.
d. View the performance per drive for the node you are logged into by
your SSH session by running the isi statistics drive --
type sas command.
4. Use the isi commands to manipulate additional information about the cluster.
b. Show the read and writes by class using the isi statistics
heat --classes read,write command.
c. Show performance for the top active results per node by running the
isi_for_array "isi statistics drive | head -5"
command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 369
Monitoring
g. Get the detailed broken down cache reads and prefetches by running
the isi_cache_stats -v command.
© Copyright
Internal Use - Confidential 2020 Dell Inc. Page 371