® Oracle ZFS Storage Appliance Administration Guide Part No: E52872-01 June 2014 Copyright © 2009, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. Copyright © 2009, 2014 Oracle et/ou ses affiliés. Tous droits réservés. Ce logiciel et la documentation qui l’accompagne sont protégés par les lois sur la propriété intellectuelle. Ils sont concédés sous licence et soumis à des restrictions d’utilisation et de divulgation. Sauf disposition de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, breveter, transmettre, distribuer, exposer, exécuter, publier ou afficher le logiciel, même partiellement, sous quelque forme et par quelque procédé que ce soit. Par ailleurs, il est interdit de procéder à toute ingénierie inverse du logiciel, de le désassembler ou de le décompiler, excepté à des fins d’interopérabilité avec des logiciels tiers ou tel que prescrit par la loi. Les informations fournies dans ce document sont susceptibles de modification sans préavis. Par ailleurs, Oracle Corporation ne garantit pas qu’elles soient exemptes d’erreurs et vous invite, le cas échéant, à lui en faire part par écrit. Si ce logiciel, ou la documentation qui l’accompagne, est concédé sous licence au Gouvernement des Etats-Unis, ou à toute entité qui délivre la licence de ce logiciel ou l’utilise pour le compte du Gouvernement des Etats-Unis, la notice suivante s’applique: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.Government. Ce logiciel ou matériel a été développé pour un usage général dans le cadre d’applications de gestion des informations. Ce logiciel ou matériel n’est pas conçu ni n’est destiné à être utilisé dans des applications à risque, notamment dans des applications pouvant causer des dommages corporels. Si vous utilisez ce logiciel ou matériel dans le cadre d’applications dangereuses, il est de votre responsabilité de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesures nécessaires à son utilisation dans des conditions optimales de sécurité. Oracle Corporation et ses affiliés déclinent toute responsabilité quant aux dommages causés par l’utilisation de ce logiciel ou matériel pour ce type d’applications. Oracle et Java sont des marques déposées d’Oracle Corporation et/ou de ses affiliés. Tout autre nom mentionné peut correspondre à des marques appartenant à d’autres propriétaires qu’Oracle. Intel et Intel Xeon sont des marques ou des marques déposées d’Intel Corporation. Toutes les marques SPARC sont utilisées sous licence et sont des marques ou des marques déposées de SPARC International, Inc. AMD, Opteron, le logo AMD et le logo AMD Opteron sont des marques ou des marques déposées d’Advanced Micro Devices. UNIX est une marque déposée d’The Open Group. Ce logiciel ou matériel et la documentation qui l’accompagne peuvent fournir des informations ou des liens donnant accès à des contenus, des produits et des services émanant de tiers. Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des dommages causés par l’accès à des contenus, produits ou services tiers, ou à leur utilisation. Contents Using This Documentation ................................................................................ 19 1 Oracle ZFS Storage Appliance Overview ....................................................... 21 ZFSSA Key Features ...................................................................................... 21 Supported Protocols ....................................................................................... 22 ZFSSA Data Services ..................................................................................... 22 Data Availability ............................................................................................ 23 ZFSSA Configuration ..................................................................................... 23 Browser User Interface (BUI) .......................................................................... 24 Main Window ....................................................................................... 25 General Usage ....................................................................................... 30 Supported Browsers ............................................................................... 35 Command Line Interface (CLI) ........................................................................ 36 Logging Into the CLI ............................................................................. 37 CLI Contexts ......................................................................................... 37 Returning to a Previous Context ............................................................... 39 Navigating to a Parent Context ................................................................. 40 Contexts and Tab-Completion .................................................................. 40 Executing Context-Specific Commands ...................................................... 41 Uncommitted Contexts ............................................................................ 41 Properties ............................................................................................. 42 2 Status ............................................................................................................. 47 Dashboard .................................................................................................... 48 Links ................................................................................................... 48 CLI ...................................................................................................... 55 ▼ Running the Dashboard Continuously ................................................... 56 Settings ........................................................................................................ 57 Introduction .......................................................................................... 57 BUI ..................................................................................................... 57 3 Contents CLI ...................................................................................................... 59 Tasks ................................................................................................... 59 NDMP Status ................................................................................................ 60 NDMP Status - BUI ............................................................................... 60 NDMP Status - CLI ............................................................................... 62 3 Initial Configuration ....................................................................................... 63 Prerequisites .................................................................................................. 63 Performing Initial Configuration Using the BUI .................................................. 63 ▼ Perform initial configuration ............................................................... 64 Configuring Management Ports ................................................................ 65 Performing Initial Configuration Using the CLI ................................................... 65 4 Network Configuration ................................................................................... 71 Network Configuration Page ............................................................................ 71 Devices ................................................................................................ 73 Datalinks .............................................................................................. 73 Network Interfaces ................................................................................. 75 Network IP MultiPathing (IPMP) ............................................................. 76 Network Performance and Availability ....................................................... 77 Network Routing Configuration ................................................................ 78 Network Configuration Using the BUI ............................................................... 81 Network Configuration Page .................................................................... 83 Network Addresses ................................................................................ 83 Network Routing Page ............................................................................ 83 Network Configuration Using the CLI ............................................................... 84 Network Configuration Tasks Using the BUI ...................................................... 86 ▼ Creating a single port interface ............................................................ 86 ▼ Modifying an interface ...................................................................... 87 ▼ Creating a single port interface, drag-and-drop ....................................... 87 ▼ Creating an LACP aggregated link interface .......................................... 88 ▼ Creating an IPMP group using probe-based and link-state failure detection ............................................................................................... 88 ▼ Creating an IPMP group using link-state only failure detection .................. 89 ▼ Extending an LACP aggregation ......................................................... 89 ▼ Extending an IPMP group .................................................................. 89 ▼ Creating an InfiniBand partition datalink and interface ............................. 90 ▼ Creating a VNIC without a VLAN ID for clustered controllers .................. 90 ▼ Creating VNICs with the same VLAN ID for clustered controllers ............. 91 4 Oracle ZFS Storage Appliance Administration Guide • June 2014 Contents ▼ Adding a static route ......................................................................... 92 ▼ Deleting a static route ........................................................................ 92 Network Configuration Tasks Using the CLI ...................................................... 93 ▼ Adding a static route ......................................................................... 93 ▼ Deleting a static route ........................................................................ 93 ▼ Changing the multihoming property to strict .......................................... 93 5 Storage Configuration ................................................................................... 95 Storage Configuration Profile ........................................................................... 96 Storage Configuration Rules and Guidelines ............................................... 97 Storage Verification ................................................................................ 97 Storage Allocation on SAS-2 Systems ....................................................... 98 Data Profile Configuration ....................................................................... 98 Importing Existing Storage Pools .................................................................... 100 Adding Additional Storage ............................................................................. 101 Unconfiguring Storage .................................................................................. 101 Storage Pool Scrub ....................................................................................... 101 Configuring Storage Using the BUI ................................................................. 101 ▼ Configuring a Storage Pool ............................................................... 101 ▼ Adding Cache Devices to an Existing Pool .......................................... 102 Configuring Storage Using the CLI ................................................................. 102 ▼ Adding Cache Devices to an Existing Pool .......................................... 102 6 Storage Area Network Configuration ........................................................... 105 SAN Targets and Initiators ............................................................................. 105 SAN Target and Initiator Groups ..................................................................... 105 Configuring SAN Using the BUI .................................................................... 106 Configuring SAN Using the CLI ..................................................................... 107 SAN Terminology ........................................................................................ 107 SAN Fibre Channel ...................................................................................... 109 FC Port Target Configuration ................................................................. 110 FC Initiator Configuration ...................................................................... 110 Performance Considerations ................................................................... 111 Troubleshooting FC .............................................................................. 112 Configuring FC Using the BUI ............................................................... 113 Configuring FC Using the CLI ............................................................... 116 iSCSI ......................................................................................................... 119 Target Configuration ............................................................................. 119 Initiator Configuration ........................................................................... 121 5 Contents Planning Client Configuration ................................................................ 121 Troubleshooting iSCSI .......................................................................... 122 Observing iSCSI Performance ................................................................ 122 Configuring iSCSI Using the BUI ........................................................... 122 Configuring iSCSI Using the CLI ........................................................... 125 SRP ........................................................................................................... 127 SRP Target Configuration ...................................................................... 127 Initiator Configuration ........................................................................... 128 Observing SRP Performance .................................................................. 128 Configuring SRP Targets Using the BUI .................................................. 128 Configuring SRP Targets Using the CLI ................................................... 129 7 User Configuration ....................................................................................... 131 User Roles .................................................................................................. 131 User Authorizations ...................................................................................... 132 Managing User Properties .............................................................................. 133 User Properties .................................................................................... 133 Role Properties .................................................................................... 134 Users BUI Page ........................................................................................... 134 Configuring Users using the BUI .................................................................... 135 ▼ Adding an Administrator .................................................................. 135 ▼ Adding a Role ................................................................................ 135 ▼ Adding Authorizations to a Role ........................................................ 135 ▼ Deleting Authorizations from a Role .................................................. 136 ▼ Adding a User Who can Only View the Dashboard ................................ 136 Configuring Users using the CLI .................................................................... 136 CLI User Configuration Example ............................................................ 136 ▼ Adding an Administrator .................................................................. 138 ▼ Adding a Role ................................................................................ 139 ▼ Adding Authorizations to a Role ........................................................ 139 ▼ Deleting Authorizations from a Role .................................................. 139 8 Setting ZFSSA Preferences .......................................................................... 141 Preference Properties .................................................................................... 141 Setting Preferences Using the CLI ........................................................... 142 Setting SSH Public Keys Using the CLI ................................................... 142 9 Alert Configuration ....................................................................................... 145 Alert Categories ........................................................................................... 145 6 Oracle ZFS Storage Appliance Administration Guide • June 2014 Contents Supported Alert Actions ........................................................................ 146 Threshold Alerts .................................................................................. 148 Configuring Alerts Using the BUI ........................................................... 149 Configuring Alerts Using the CLI ........................................................... 150 10 Cluster Configuration ................................................................................. 153 Cluster Features and Benefits ......................................................................... 153 Cluster Disadvantages ................................................................................... 154 Cluster Terminology ..................................................................................... 155 Understanding Clustering ............................................................................... 155 Cluster Interconnect I/O ........................................................................ 156 Understanding Cluster Resource Management ........................................... 159 Cluster Takeover and Failback ................................................................ 162 Configuration Changes in a Clustered Environment ............................................ 164 Clustering Considerations for Storage .............................................................. 165 Clustering Considerations for Networking ........................................................ 166 Private Local IP Interfaces .................................................................... 168 Clustering Considerations for Infiniband .......................................................... 168 Clustering Redundant Path Scenarios ....................................................... 169 Preventing 'Split-Brain' Conditions .................................................................. 170 Estimating and Reducing Takeover Impact ........................................................ 173 Cluster Configuration Using the BUI ............................................................... 175 ▼ Configuring Clustering ..................................................................... 175 ▼ Unconfiguring Clustering ................................................................. 177 Configuring Clustering Using the CLI ............................................................. 178 ▼ Shutting Down a Clustered Configuration ............................................ 178 ▼ Shutdown the Stand-by Head ............................................................ 179 ▼ Unconfiguring Clustering ................................................................. 180 Cluster Node Cabling ............................................................................ 180 Storage Shelf Cabling ........................................................................... 182 Cluster Configuration BUI Page .............................................................. 182 11 ZFSSA Services .......................................................................................... 185 Available Services ........................................................................................ 185 Data Services ...................................................................................... 186 Directory Services ................................................................................ 187 Service Settings ................................................................................... 188 Remote Access Services ........................................................................ 188 Security Services .................................................................................. 188 7 Contents Minimum Needed Ports ......................................................................... 189 Configuring Services Using the BUI ................................................................ 189 ▼ Viewing a Specific Service Screen ..................................................... 190 ▼ Viewing a Specific Service Screen ..................................................... 190 ▼ Enabling a Service .......................................................................... 190 ▼ Disabling a Service ......................................................................... 191 ▼ Defining Properties .......................................................................... 191 ▼ Viewing Service Logs ...................................................................... 191 Configuring Services Using the CLI ................................................................ 192 ▼ Selecting a Service .......................................................................... 193 ▼ Viewing a Service's State ................................................................. 193 ▼ Enabling a Service .......................................................................... 194 ▼ Disabling a Service ......................................................................... 194 ▼ Setting Properties ............................................................................ 194 ▼ Viewing Service Help ...................................................................... 195 NFS ........................................................................................................... 195 Properties ............................................................................................ 195 Kerberos Realms .................................................................................. 197 Service Logs ....................................................................................... 198 NFS Analytics ..................................................................................... 198 NFS BUI and CLI Properties ................................................................. 199 ▼ Sharing a Filesystem over NFS .......................................................... 199 iSCSI Service .............................................................................................. 200 iSCSI Service Properties ........................................................................ 200 iSCSI Service Authentication ................................................................. 201 iSCSI Service Authorization ................................................................... 201 iSCSI Service Targets and Initiators ......................................................... 201 iSCSI Troubleshooting .......................................................................... 201 SMB Service ............................................................................................... 202 SMB Service Properties ........................................................................ 202 SMB Share Properties ........................................................................... 203 NFS/SMB Interoperability ..................................................................... 204 SMB DFS Namespaces ......................................................................... 204 ▼ Example: Manipulating DFS Namespaces ............................................ 206 SMB Autohome Service ........................................................................ 206 SMB Local Groups ............................................................................... 208 SMB Local Accounts ............................................................................ 209 SMB MMC Integration ......................................................................... 209 Configuring SMB Using the BUI ............................................................ 214 FTP Service ................................................................................................ 217 8 Oracle ZFS Storage Appliance Administration Guide • June 2014 Contents FTP Properties ..................................................................................... 217 FTP Logs ............................................................................................ 219 Configuring FTP Using the BUI ............................................................. 219 HTTP Service .............................................................................................. 219 HTTP Properties .................................................................................. 220 HTTP Authentication and Access Control ................................................. 220 HTTP Logs ......................................................................................... 221 Configuring HTTP ............................................................................... 221 NDMP Service ............................................................................................ 221 NDMP Local vs. Remote Configurations .................................................. 221 NDMP Backup Formats and Types .......................................................... 222 NDMP Incremental backups .................................................................. 225 NDMP Properties ................................................................................. 227 NDMP Logs ........................................................................................ 228 Remote Replication ...................................................................................... 228 Shadow Migration ........................................................................................ 229 Shadow Migration Properties .................................................................. 229 SFTP Service .............................................................................................. 229 SFTP Properties ................................................................................... 229 SFTP Port ........................................................................................... 230 SFTP Logs .......................................................................................... 230 Configuring SFTP ................................................................................ 230 SRP Service ................................................................................................ 232 TFTP Service .............................................................................................. 233 TFTP Properties ................................................................................... 233 Configuring TFTP ................................................................................ 233 Virus Scan Service ....................................................................................... 233 Virus Scan Properties ............................................................................ 234 Virus Scan Logs ................................................................................... 236 Configuring Virus Scan ......................................................................... 236 NIS Service ................................................................................................. 236 NIS Properties ..................................................................................... 237 NIS Logs ............................................................................................ 237 Configuring NIS .................................................................................. 237 LDAP Service ............................................................................................. 238 LDAP Properties .................................................................................. 238 LDAP Custom Mappings ....................................................................... 239 LDAP Logs ......................................................................................... 241 Configuring LDAP ............................................................................... 241 Active Directory .......................................................................................... 242 9 Contents Active Directory Properties .................................................................... 242 Active Directory Domains and Workgroups .............................................. 243 Active Directory LDAP Signing ............................................................. 243 Active Directory Windows Server 2012 Support ........................................ 243 Active Directory Windows Server 2008 Support ........................................ 244 Configuring Active Directory Using the BUI ............................................. 245 Configuring Active Directory Using the CLI ............................................. 246 Identity Mapping Service ............................................................................... 247 Identity Mapping Properties ................................................................... 247 Identity Mapping Rules ......................................................................... 248 Identity Mapping Mappings ................................................................... 249 Identity Mapping Logs .......................................................................... 249 Identity Mapping Best Practices .............................................................. 250 Identity Mapping Concepts .................................................................... 250 Identity Mapping Examples .................................................................... 252 Configuring Identity Mapping ................................................................ 253 DNS Service ............................................................................................... 254 DNS Properties .................................................................................... 254 Configuring DNS ................................................................................. 255 DNS Logs ........................................................................................... 255 Active Directory and DNS ..................................................................... 255 Non-DNS Resolution ............................................................................ 255 DNS-Less Operation ............................................................................. 256 Dynamic Routing Service .............................................................................. 256 RIP and RIPng Dynamic Routing Protocols .............................................. 256 Dynamic Routing Logs ......................................................................... 257 IPMP Service .............................................................................................. 257 IPMP Properties ................................................................................... 257 IPMP Logs .......................................................................................... 257 NTP Service ................................................................................................ 258 NTP Properties .................................................................................... 258 NTP BUI Clock ................................................................................... 259 NTP Tips ............................................................................................ 259 Configuring NTP Using the BUI ............................................................. 260 Configuring NTP Using the CLI ............................................................. 260 Phone Home Service ..................................................................................... 261 Oracle Single Sign-On Account .............................................................. 262 Phone Home Properties ......................................................................... 262 Registering the Appliance ...................................................................... 263 Phone Home Status .............................................................................. 264 10 Oracle ZFS Storage Appliance Administration Guide • June 2014
Description: