Module 3 File System and Object Store Access FB Support Specialist
Module 3 File System and Object Store Access FB Support Specialist
Speaker name
Speaker title
Employing company
@purestorage Date
File System and Object
Store Access
Speaker name
Speaker title
Employing company
@purestorage Date
Agenda Day X – November XX
Subject to change
Lorem Ipsum Dolor Sit Amet 11:10 AM - 11:40 AM Name, Title - Company
Lorem Ipsum Dolor Sit Amet 11:40 AM - 12:10 PM Name, Title - Company
Lorem Ipsum Dolor Sit Amet 12:30 PM - 1:00 PM Lorem ipsum dolor sit amet, consectetur adipiscing elit.
©2023 Pure Storage Confidential - Subject to partner NDA Uncomplicate Data Storage, Forever 3
00 Introduction
01 Administration
2
02 Networking
06 Hardware
Access
Agenda
© 2022 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
Partner NDA
NDA
Uncomplicate Data Storage, Forever 6
Following completion of this training you
should be able to:
1
○ Troubleshoot access problems
based on mount options,
permission, export rules and
Learning policies, and NFS version
Objectives 2
differences.
○ Troubleshoot access problems
on NFS client.
©2023 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
partner NDA
NDA 7
Mount Options
Mount options are generally not a requirement. Our recommendation is to allow
auto-negotiate and exclude options unless the environment, OS, or VM need
specific variables set, or for optimization.
tcp - FlashBlade does not support UDP as a transfer protocol for NFSv3. If an operating system does
attempt to use UDP this option would be necessary to set.
nolock - NLM is support from Purity//FB 2.0.3+. We recommend leaving this option off for all FlashBlades
on 2.0.3+.
hard - Hard is the default option for most linux systems. We do not recommend using soft mounts unless
there is a very specific reason for it. If an OS or VM is mounting as soft we recommend using the hard
option.
intr or nointr - Allows/Disallows NFS requests to be interrupted if the server goes down or cannot be
reached. This mount option is deprecated after kernel 2.6.25.
relatime
FlashBlade only supports relatime if it is specifically set as an option. This sets the atime (access time) of a
file when its modified. We don’t update it on reads.
sec
The sec option sets the security type for the mount. krb5 options are only supported in NFSv4.1.
sys: This is the default mount option with no cryptographic protection.
krb5: Enables Kerberos authentication.
krb5i: Enables Kerberos authentication with integrity checks.
Krb5p: Enables Kerberos authentication with integrity checks and traffic encryption.
©2023 Pure Storage Confidential - Subject to Partner NDA 9
NFS Mounts
Linux
The general recommendation for modern Linux operating systems is
auto-negotiation with no options.
You can check the mount variables while they are mounted by using
grep for the file system name in /proc/mounts.
Once set you can check the updated settings using Get-NfsClientConfiguration command.
The mount is then done similar to linux but specifying a drive letter.
AIX - default buffer size is 64kb and the timeo is 100 = 10 seconds. These need to be raised to our
recommended settings.
Solaris - wsize and rsize options should be used but versions prior to Solaris 10 ignore larger wsize and
rsize. The default is 32k. This can be changed by updating the bsize limit on the client.
HP-UX - Enable 32-bit inode support in the export. This will be discussed in the next slide.
fieldid_32bit - Allows 32-bit inode support for clients (Recommended for HP-UX clients).
root_squash - Prevents users and groups with root privileges from mapping their privileges to a
file system. All users with UID 0 will be mapped to anonuid and users with a GID 0 to anongid.
no_root_squash - Allows root users and groups to access with root privileges.
no_all_squash - Prevents the remapping of user and group IDs to anonuid 65534 or anongid 65534. All
users and groups will retain their IDs unless root_squash is also specified.
anonuid - Any user whose UID is aHected by root_squash or all_squash will have their UID mapped to
anonuid. The default anonuid is 65534.
anongid - Any user whose GID is aHected by root_squash or all_squash will have their GID mapped to
anongid. The default anongid is 65534.
atime - Updates an inodes access time when there is a read operation on it.
secure - Prevents NFS access to client connections coming from non-reserved ports.
insecure - Allows NFS access to client connections coming from non-reserved ports.
NFS Mode bit Mode bit change Managed by Client. Access based on
This works alongside ACLs change is results in removing translated NFS ACL
merged the ACL
to manage file and into ACL
directories permissions at Shared Last permission modification wins. Access based on translated ACL.
lower levels.
Independent N/A NFS clients enforce NFS permissions. SMB clients enforce
Only mode bits allowed. SMB ACL
f file-inherit New files will have the same ACE minus the inheritance flags.
n No-propagate New subdirectories will inherit the ACE minus the inheritance flags.
inherit
i inherit-only New files and subdirectories will have this ACE but the ACE for the
directory with the flag is null.
g group Signifies that this ACE defines permissions for the members of a group.
w Write-data (files) / create-file (directories) n Read the named attributes of the file/directory.
a Append-data (files) / create-subdirectory (directories) N Write the named attributes of the file/directory.
t Read the attributes of the file/directory. y Synchronize - allow clients to use synchronous I/O with the server.
• The NLM protocol works with the NFSv3 protocol to ensure file locks are visible
across all NFS clients and to help coordinate client access to files.
• NLM locks are advisory locks. Advisory means that NFS client applications must
check for the existence of a lock to coordinate access.
• It uses a lease-based model to provide file lock guarantees and manage their
resources.
• A client must establish a client ID and at least one session ids before it is allowed
to perform any operations that open a file or acquire a byte-range locks.
© 2022 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
Partner NDA
NDA
Uncomplicate Data Storage, Forever 29
Following completion of this training you
should be able to:
1
○ Troubleshoot access problems
based on mount options,
permissions, export policies, and
Learning SMB version differences.
Objectives 2
○ Troubleshoot access problems
on SMB client.
3
○ Configure user permissions in
Active Directory.
©2023 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
partner NDA
NDA 30
SMB Modes
RFC-2307:
Active Directory for multi-protocol (SMB and NFS on one share) support for. The uidNumber and guiNumber attributes
are required to be set to access SMB shares.
AD-AUTO:
Recommended for SMB-only customers. The FlashBlade handles UID and GID mapping so it does not need to be set
on the AD side. This doesn’t allow SMB and NFS interoperability.
Native SMB:
This simplifies the configuration -
• If RFC2307 is configured in Active Directory, Native SMB uses the UID/GID attributes in Active Directory to get
the UID/GID mapping to Windows SIDs.
• If RFC2307 is not configured in Active Directory, Native SMB creates a synthesized UID/GID from the Windows
SID.
RFC-2307 and AD-AUTO are being deprecated. Native SMB is the default mode for any new installations in 4.1.x+.
These modes do not exist in 4.3.0+ and the FlashBlade is required to convert to Native SMB mode before upgrading to
any versions beyond that.
Windows allows full access to everyone unless a discretionary access control list (DACL).
A DACL rejects all permissions to all users and groups aside from those permissions
specifically set in it.
1. With Administrator privileges from a Windows server, open File Explorer and navigate to the
SMB share folder. In the example below, the share folder is called 'test-smb' on the FlashBlade
system called ‘nas1’.
2. Right click on the test-smb share
folder and select Properties.
\\<FQDN>\<share>
\\<server>\<share>
AD-AUTO.
Independent.
RFC-2307.
Native.
AD-AUTO.
Independent.
RFC-2307.
Native.
© 2022 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
Partner NDA
NDA
Uncomplicate Data Storage, Forever 46
Following completion of this training you
should be able to:
1
○ Configure accounts, users,
access keys, and buckets.
2
○ Configure versioning.
Learning 3
○ Configure replication.
Objectives
©2023 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
partner NDA
NDA 47
Identity and Access Management
(IAM)
• FlashBlade does not support external authentication providers, but does have
native Identity and Access Management (IAM) capabilities.
• Access Key and Secret Key features provide user authentication capabilities.
Policies and Rules provide authorization capabilities. Together these two
provide a robust, native, IAM capability.
• purepolicy/bucket-list
• purepolicy/object-lock
• purepolicy/object-read
• purepolicy/object-write
• purepolicy/version-delete
To use path-hosted style requests configure your S3 client's endpoint URL using
your FlashBlade data VIP or a domain that resolves to it.
Path-hosted example: http://FlashBlade_dataVIP
Virtual-hosted
Support for Virtual-hosted style S3 requests are limited on FlashBlade. If the
FlashBlade receives an http request to a datavip with the host name
BUCKETNAME.s3.amazonaws.com it treats this as a virtual-hosted request and uses
BUCKETNAME as the bucket name.
With versioning enabled any object that is modified moves the unmodified object to a separate non-current
version. Versioning can be suspended but it can not be disable on a bucket once enabled.
• Versioning can be enabled from Storage > Object Storage. Click on the options button at the end of
the buckets row and click “Enable Versioning…”, then click enable
© 2022 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
Partner NDA
NDA
Uncomplicate Data Storage, Forever 57
Recap
© 2022 Pure
©2023 Pure Storage
Storage Confidential
Confidential -- Subject
Subject to
to partner
Partner NDA
NDA
Uncomplicate Data Storage, Forever 59
© 2023 Pure Storage, Inc. All rights reserved. Pure Storage, the Pure P Logo, and the marks on the Pure
Trademark List at https://www.purestorage.com/legal/productenduserinfo.html are trademarks of Pure Storage,
Inc. Other names are trademarks of their respective owners.
The Pure Storage products and programs described in this documentation are distributed under a license
agreement restricting the use, copying, distribution, and decompilation/reverse engineering of the products. No
part of this documentation may be reproduced in any form by any means without prior written authorization from
Pure Storage, Inc. and its licensors, if any. Pure Storage may make improvements and/or changes in the Pure
Storage products and/or the programs described in this documentation at any time without notice.
THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS
AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FINESS FOR A PARTICULAR
PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE
HELD TO BE LEGALLY INVALID. PURE STORAGE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.