Acopia Networks 810-0044-00 User manual

Acopia Networks®, Inc.
41 Wellman Street
Lowell, MA 01851
(978) 513-2900 tel
(978) 513-2990 fax
CLI Storage-Management Guide
Part Number: 810-0044-00, Revision G

CLI Storage-Management Guide
Copyright© 2006-2007, Acopia Networks®, Inc.
All Rights Reserved, Printed in U.S.A.
Revision History
September 2006 - Rev A
October 2006 - Rev B, updates for Software Release 2.4.2
January 2007 - Rev C, updates for Software Release 2.4.3
March 2007 - Rev D, updates for Software Release 2.5.0
May 2007 - Rev E, updates for Software Release 2.5.1
August 2007 - Rev F, add forest-to-forest trusts for Software Release 2.6.0
November 2007 - Rev G, minor changes in “show” commands, Software Release 2.7.0
The information in this document is proprietary to Acopia Networks®, Inc. Any unauthorized reproduction,
distribution, or use of this material is strictly prohibited.
Acopia Networks®, Inc. assumes no responsibilities for any inaccuracies that may appear within this
document. In no event will Acopia Networks be liable for direct, indirect, special, exemplary, incidental, or
consequential damages resulting from any defect or omission within this document.
Acopia Networks®, Inc. reserves the right to alter the contents of this document at any time, and without any
notice.
The terms and conditions for using the products are described in the license agreement that either shipped with
the products, was contained in the acknowledgement to your purchase order, or was otherwise provided to you.
If you have any questions about the license terms, please contact your Acopia Networks representative. By
using the products you indicate that you understand and agree to be bound by the terms and conditions of the
license agreement.
The ARX’s Licensed Software includes object code versions of third party software packages. These software
packages are subject to the terms and conditions of the license agreements found at http://www.apache.org/
licenses/LICENSE-2.0; http://www.gnu.org/licenses/gpl.html; http://www.gnu.org/licenses/lgpl.html; ftp://
ftp.isc.org/isc/inn/inn-2.4.1.tar.gz (the license file is inn-2.4.1/LICENSE).
FreedomFabric™ is a trademark and ARX® is a registered trademark of Acopia Networks, Inc. All other
brands, products, or service names may be trademarks or service marks of the companies with which they are
associated.

CLI Storage-Management Guide 2-iii
Contents
Chapter 1
Introduction
The ARX ...................................................................................................................1-1
Back-end Storage and Servers ...........................................................................1-2
Front-end Services .............................................................................................1-2
Policy .................................................................................................................1-2
Resilient Overlay Network (RON) ....................................................................1-3
Audience for this Manual..........................................................................................1-3
Using this Manual .....................................................................................................1-3
Document Conventions .............................................................................................1-4
CLI Overview............................................................................................................1-5
Exec Mode .........................................................................................................1-5
Global Commands ......................................................................................1-5
Priv-exec Mode ..................................................................................................1-5
Cfg Mode ....................................................................................................1-6
Gbl Mode ....................................................................................................1-6
Exiting a Mode...................................................................................................1-6
Prompts ..............................................................................................................1-6
The no Convention.............................................................................................1-7
The enable/no enable Convention......................................................................1-7
Getting Started...........................................................................................................1-8
Entering Cfg or Gbl Mode .................................................................................1-8
Sample Network......................................................................................................1-10
Contacting Customer Service..................................................................................1-11
Chapter 2
Product Overview
Solutions to Common Storage Problems
Today’s File Storage..................................................................................................2-1
Optimizing Storage in a Namespace Volume............................................................2-3

2-iv CLI Storage-Management Guide
Configuration Instructions................................................................................. 2-5
Adapting Storage to User Demands ......................................................................... 2-6
Migration for Capacity ...................................................................................... 2-7
Configuration Instructions.......................................................................... 2-8
Migration for Class of Storage: File-Placement Policy..................................... 2-8
Configuration Instructions........................................................................ 2-11
Controlling Costs.................................................................................................... 2-11
Chapter 3
Preparing for CIFS Authentication
Concepts and Terminology ....................................................................................... 3-2
Adding a Proxy User ................................................................................................ 3-2
Specifying the Windows Domain...................................................................... 3-3
Removing the Windows Domain ............................................................... 3-3
Specifying the Username and Password............................................................ 3-4
Removing the Username and Password ..................................................... 3-4
Listing All Proxy Users..................................................................................... 3-5
Showing One Proxy User........................................................................... 3-5
Removing a Proxy User..................................................................................... 3-6
Configuring the NTLM Authentication Server ........................................................ 3-6
Listing NTLM Authentication Servers.............................................................. 3-7
Displaying Detailed Server Status.............................................................. 3-8
Adding an Active-Directory Forest (Kerberos)...................................................... 3-10
Identifying the Forest Root.............................................................................. 3-10
Adding a Redundant Forest Root ............................................................. 3-11
Removing a DC for the Forest Root......................................................... 3-11
Identifying a Dynamic-DNS Server ................................................................ 3-12
Removing a Name Server ........................................................................ 3-13
Adding a Child Domain................................................................................... 3-14
Removing a Child Domain....................................................................... 3-16
Adding a Tree Domain .................................................................................... 3-17
Removing a Tree Domain ........................................................................ 3-18
Establishing Forest-to-Forest Trust ................................................................. 3-18
Dissolving a Forest-to-Forest Trust.......................................................... 3-19
Showing All Active-Directory Forests............................................................ 3-19
Showing One Active-Directory Forest..................................................... 3-21

CLI Storage-Management Guide 2-v
Showing One Active-Directory Domain ..................................................3-21
Showing DC Status...................................................................................3-22
Focusing On a Single Processor ........................................................3-26
Removing an Active-Directory Forest.............................................................3-27
Authorizing Windows-Management (MMC) Access .............................................3-28
Adding a Windows User to the Group.............................................................3-28
Removing a User ......................................................................................3-29
Setting Management Permissions for the Group .............................................3-29
Removing a Permission ............................................................................3-30
Showing All Management-Authorization Groups ...........................................3-31
Focusing on One Group............................................................................3-32
Removing a Management-Authorization Group..............................................3-33
Chapter 4
Preparing for NFS Authentication
Before You Begin......................................................................................................4-1
Adding a NIS Domain...............................................................................................4-1
Identifying a NIS Server for the NIS Domain ...................................................4-2
Removing a NIS Server ..............................................................................4-3
Listing All Configured NIS Domains ................................................................4-3
Showing Details for a NIS Domain ............................................................4-4
Listing Netgroups in a NIS Domain ...........................................................4-4
Showing the Members of One Netgroup ....................................................4-5
Updating the NIS Database.........................................................................4-6
Reading the Update Report..................................................................4-6
Scheduling Regular Updates ...............................................................4-8
Removing the NIS Domain-Server Map............................................................4-9
Adding an NFS Access List ......................................................................................4-9
Listing All NFS Access Lists...........................................................................4-10
Showing One NFS Access List.................................................................4-11
Resolving All Netgroups in the Access List.............................................4-12
Setting the NIS Domain ...................................................................................4-13
Removing the NIS Domain.......................................................................4-13
Adding a Permit Rule.......................................................................................4-14
Permitting a Netgroup...............................................................................4-15
Rule Ordering ...........................................................................................4-16
Allowing Root Access ..............................................................................4-16

2-vi CLI Storage-Management Guide
Removing a Permit Rule .......................................................................... 4-17
Changing the Anonymous User ID ................................................................. 4-18
Changing the Anonymous Group ID ....................................................... 4-18
Reverting to the Default Group ID ................................................... 4-18
Reverting to the Default User ID ............................................................. 4-19
Adding a Deny Rule ........................................................................................ 4-19
Removing a Deny Rule ............................................................................ 4-20
Changing Rule Order....................................................................................... 4-20
Adding a Description....................................................................................... 4-22
Removing the Description........................................................................ 4-22
Removing an Access List ................................................................................ 4-23
Chapter 5
Examining Filers
Examining CIFS Shares............................................................................................ 5-4
Using Proxy-User Credentials........................................................................... 5-6
Showing the Physical Paths for CIFS Shares.................................................... 5-8
Focusing on One Share............................................................................................. 5-9
Showing Connectivity Only ................................................................................... 5-10
Showing Capabilities Only.............................................................................. 5-11
Showing Shares Only ...................................................................................... 5-12
Showing Time Settings.................................................................................... 5-13
Showing CIFS Attributes........................................................................................ 5-13
Probing for CIFS Security ...................................................................................... 5-14
Chapter 6
Adding an External Filer
Providing the Filer’s IP Address............................................................................... 6-2
Providing a Secondary Address (UDP only)..................................................... 6-2
Removing a Secondary Address ................................................................ 6-3
Ignoring a Directory ................................................................................................. 6-3
Re-Instating a Directory .................................................................................... 6-4
Adding a Description (optional) ............................................................................... 6-5

CLI Storage-Management Guide 2-vii
Removing the Description .................................................................................6-5
Setting the CIFS Port (optional)................................................................................6-6
Reverting to the CIFS-Port Default ...................................................................6-6
Listing External Filers...............................................................................................6-6
Showing External-Filer Details..........................................................................6-7
Showing Details for all External Filers..............................................................6-8
Samples - Adding Two Filers....................................................................................6-8
Removing an External Filer ......................................................................................6-9
Next ...........................................................................................................................6-9
Chapter 7
Configuring a Namespace
Concepts and Terminology........................................................................................7-2
Listing All Namespaces ............................................................................................7-3
Showing Namespace Details..............................................................................7-3
Showing Details for All Namespaces ................................................................7-7
Showing Filer Shares Behind the Namespace ...................................................7-7
Showing Shares Behind One Namespace...................................................7-9
Setting the Namespace Protocol(s) ...........................................................................7-9
Removing a Protocol........................................................................................7-10
Creating a Multi-Protocol (NFS and CIFS) Namespace..................................7-10
Changing Protocols After Import.....................................................................7-11
Setting NFS Character Encoding ............................................................................7-11
Setting CIFS Character Encoding ....................................................................7-13
Returning to Default Character Encoding........................................................7-13
Configuring Windows Authentication (CIFS) ........................................................7-14
Using Kerberos for Client Authentication .......................................................7-15
Disabling Kerberos ...................................................................................7-15
Identifying the NTLM Authentication Server .................................................7-16
Multi-Domain Support..............................................................................7-17
Removing an NTLM-Authentication Server ............................................7-18
Opening Windows-Management Access (optional, MMC).............................7-18
Removing a Management-Authorization Group ......................................7-19
Selecting a SAM-Reference Filer ....................................................................7-20
Adding a Volume.....................................................................................................7-21

2-viii CLI Storage-Management Guide
Enabling the Namespace (optional)........................................................................ 7-22
Enabling All Shares in the Namespace ........................................................... 7-23
Taking Ownership of All Managed Shares (optional) ............................. 7-23
Disabling All Shares................................................................................. 7-24
Disabling the Namespace ................................................................................ 7-24
Showing Namespace Configuration ....................................................................... 7-25
Removing a Namespace ......................................................................................... 7-27
Chapter 8
Adding a Direct Volume
Declaring the Volume “Direct”................................................................................. 8-2
Reverting to a Managed Volume ....................................................................... 8-3
Manually Setting the Volume’s Free Space (optional) ............................................. 8-3
Using Automatic Free-Space Calculation ......................................................... 8-4
Setting CIFS Options................................................................................................ 8-4
Disabling CIFS Oplocks (optional)................................................................... 8-6
Allowing the Volume to Automatically Disable Oplocks .......................... 8-6
Reinstating Oplock Support ....................................................................... 8-7
Adding a Share ......................................................................................................... 8-7
Listing Filer Shares............................................................................................ 8-8
Showing Supported Protocols at the Filer.................................................. 8-9
Identifying the Filer and Share ........................................................................ 8-10
Identifying a Multi-Protocol Share .......................................................... 8-11
Disconnecting From the Filer................................................................... 8-11
Using a Managed Volume as a Filer................................................................ 8-12
Disconnecting from the Managed Volume............................................... 8-12
Attaching a Virtual Directory to the Back-End Share ..................................... 8-13
Removing an Attach Point ....................................................................... 8-14
Designating the Share as Critical (optional).................................................... 8-15
Removing Critical-Share Status ............................................................... 8-15
Ignoring the Share’s Free Space (optional) ..................................................... 8-16
Including the Share in the Free-Space Calculation .................................. 8-16
Adjusting the Free-Space Calculation...................................................... 8-17
Erasing the Free-Space Adjustment.................................................. 8-17
Enabling the Share........................................................................................... 8-18
Disabling the Share .................................................................................. 8-18

CLI Storage-Management Guide 2-ix
Removing a Direct Share .................................................................................8-19
Selecting a VPU (optional) .....................................................................................8-19
Default-VPU Assignment ................................................................................8-20
Assigning the Volume to a VPU ......................................................................8-22
Splitting Namespace Processing within a VPU........................................8-23
Reverting to Default-VPU Assignment ....................................................8-24
VPU Limits for Direct Volumes and Shares ....................................................8-24
Showing All VPUs on the Current Switch.......................................................8-25
Showing One VPU....................................................................................8-26
Enabling the Volume ...............................................................................................8-27
Enabling All Shares in the Volume ..................................................................8-28
Disabling All Shares .................................................................................8-28
Disabling the Volume.......................................................................................8-29
Showing the Volume ...............................................................................................8-29
Showing One Share..........................................................................................8-32
Showing Filer Shares Behind One Volume......................................................8-34
Showing the Volume’s Configuration ..............................................................8-35
Sample - Configuring a Direct Volume...................................................................8-36
Removing a Direct Volume .....................................................................................8-37
Chapter 9
Adding a Managed Volume
Storing Volume Metadata on a Dedicated Share.......................................................9-2
Using Multiple Metadata Shares........................................................................9-3
Removing a Metadata Share ..............................................................................9-4
Designating the Metadata Share as Critical (optional) ......................................9-5
Removing Critical-Resource Status............................................................9-5
Migrating Metadata to a New Share After Import.............................................9-6
Dividing the Import into Multiple Scans...................................................................9-6
Protecting Metadata During Import ...................................................................9-7
Reverting to Unprotected Metadata and Faster Import ..............................9-8
Reverting Back to the Faster, Single-Scan Import.............................................9-8
Safe Modes for Share Imports into Pre-Enabled Volumes.................................9-9
Allowing the Volume to Modify on Import ..............................................................9-9
Conditions for Running the modify Command................................................9-10

2-x CLI Storage-Management Guide
Running a No-Modify Import ......................................................................... 9-11
Allowing the Volume to Modify on Re-Import............................................... 9-11
Preventing Modification On or After Re-Import ..................................... 9-12
Preventing Modifications ................................................................................ 9-12
Automatically Synchronizing Metadata (CIFS).............................................. 9-13
Auto-Sync Jobs and Reports .................................................................... 9-13
Allowing Renames on Collision .............................................................. 9-14
Disallowing Renames ....................................................................... 9-15
Disabling File Auto-Synchronization....................................................... 9-15
Manually Setting the Volume’s Free Space (optional) ........................................... 9-16
Using Automatic Free-Space Calculation ....................................................... 9-16
Setting CIFS Options.............................................................................................. 9-17
Supporting Filers with Local Groups .............................................................. 9-18
Disabling CIFS Oplocks (optional)................................................................. 9-18
Allowing the Volume to Automatically Disable Oplocks ........................ 9-19
Reinstating Oplock Support ..................................................................... 9-19
Supporting Subshares and their ACLs ............................................................ 9-20
Required Windows Permissions............................................................... 9-22
Showing a Filer’s Shares and Subshares.................................................. 9-22
Replicating Subshares at all of the Volume’s Filers................................. 9-23
Disabling Filer Subshares......................................................................... 9-25
Adding a Share ....................................................................................................... 9-25
Showing Available Filer Shares ...................................................................... 9-26
Identifying the Filer and Share ........................................................................ 9-27
Identifying a Multi-Protocol Share .......................................................... 9-27
Disconnecting From the Filer Before the Share is Enabled ..................... 9-28
Disconnecting From the Filer After the Share is Enabled ....................... 9-28
Setting Share-Import Options.......................................................................... 9-28
Speeding Up Import by Skipping a Directory Test .................................. 9-28
Reinstating the Directory Test .......................................................... 9-29
Synchronizing Directory Attributes on Import ........................................ 9-29
Disabling Directory-Attribute Synchronization on Import ............... 9-30
Preventing Directory Renames During Import ........................................ 9-31
Allowing Directory Renames on Import........................................... 9-32
Renaming Directories with Non-Mappable Characters (Multi-Protocol)9-32
Preventing File Renames During Import ................................................. 9-33
Allowing File Renames in Import..................................................... 9-34
Enabling SID Translation for a Share (CIFS) ................................................. 9-34
Disabling SID Translation........................................................................ 9-35

CLI Storage-Management Guide 2-xi
Finding SID Translations at All Filers......................................................9-35
Ignoring SID Errors from the Filer (CIFS) ......................................................9-36
Acknowledging SID Errors ......................................................................9-37
Designating the Share as Critical (optional) ....................................................9-38
Removing Critical-Share Status................................................................9-38
Ignoring the Share’s Free Space (optional)......................................................9-39
Including the Share in the Free-Space Calculation...................................9-39
Adjusting the Free-Space Calculation ......................................................9-40
Erasing the Free-Space Adjustment..........................................................9-40
Enabling the Share ...........................................................................................9-40
Taking Ownership of the Share (optional)................................................9-41
Examining the shareEnableSubshareInc Report (CIFS)...........................9-42
Disabling the Share...................................................................................9-44
Removing a Managed-Volume Share...............................................................9-44
Removing the Share After it is Enabled ...................................................9-44
Selecting a VPU (optional) .....................................................................................9-45
Assigning the Volume to a VPU ......................................................................9-45
Splitting Namespace Processing within a VPU........................................9-46
Reverting to Default-VPU Assignment ....................................................9-47
VPU Limits for Managed Volumes and Shares ...............................................9-48
Changing the Number of Reserved Files .........................................................9-49
Reverting to the Default Number of Reserved Files.................................9-50
Showing All VPUs on the Current Switch.......................................................9-50
Showing One VPU....................................................................................9-51
Enabling the Volume ...............................................................................................9-52
Enabling All Shares in the Volume ..................................................................9-53
Taking Ownership of All Shares (optional) ..............................................9-53
Disabling All Shares .................................................................................9-54
Disabling the Volume.......................................................................................9-55
Monitoring the Import.............................................................................................9-55
Import Errors....................................................................................................9-56
Canceling a Share Import.................................................................................9-57
Reviewing the Import Report for a Multi-Protocol Volume ............................9-57
Showing the Volume ...............................................................................................9-61
Showing One Share..........................................................................................9-64
Showing Filer Shares Behind One Volume......................................................9-67
Showing the Volume’s Configuration ..............................................................9-67
Sample - Configuring a Managed Volume ..............................................................9-69

2-xii CLI Storage-Management Guide
Removing a Managed Volume................................................................................ 9-71
Chapter 10
Configuring a Global Server
Concepts and Terminology ..................................................................................... 10-2
Adding a Global Server .......................................................................................... 10-2
Setting the Windows Domain (CIFS Only)..................................................... 10-3
Setting the Pre-Windows2000 Name ....................................................... 10-3
Removing the Windows Domain ............................................................. 10-4
Adding a Virtual Server................................................................................... 10-4
Registering with a WINS Server (CIFS).................................................. 10-5
Removing the WINS-Server Setting................................................. 10-6
Setting the NetBIOS Name (optional, CIFS)........................................... 10-7
Adding a NetBIOS Alias................................................................... 10-8
Removing NetBIOS Aliases ............................................................. 10-8
Reverting to the Default NetBIOS Name ......................................... 10-9
Enabling a Virtual Server ......................................................................... 10-9
Disabling a Virtual Server............................................................... 10-10
Removing a Virtual Server..................................................................... 10-10
Enabling the Global Server ........................................................................... 10-11
Disabling the Global Server ................................................................... 10-11
Showing All Global Servers.......................................................................... 10-11
Showing One Global-Server .................................................................. 10-13
Removing a Global Server ............................................................................ 10-14
Sample - Configuring a Global Server ................................................................. 10-15
Next....................................................................................................................... 10-15
Chapter 11
Configuring Front-End Services
Before You Begin ................................................................................................... 11-2
Configuring NFS .................................................................................................... 11-2
Exporting a Namespace Volume ..................................................................... 11-3
Stopping an NFS Export .......................................................................... 11-4
Disabling NLM (optional)............................................................................... 11-5

CLI Storage-Management Guide 2-xiii
Enabling NLM ..........................................................................................11-6
Enabling NFS Service......................................................................................11-6
Disabling NFS...........................................................................................11-6
Notifications to NLM Clients ...................................................................11-7
Listing All NFS Services .................................................................................11-7
Showing One NFS Service .......................................................................11-8
Showing Details for All NFS Services .....................................................11-8
Sample - Configuring an NFS Front-End Service ...........................................11-9
Removing an NFS Service.............................................................................11-10
Changing the NFS/TCP Timeout Behavior ...................................................11-10
Showing the NFS/TCP Timeout .............................................................11-11
Reverting to the Default Timeout and Behavior.....................................11-11
Configuring CIFS..................................................................................................11-12
Sharing a Namespace Volume........................................................................11-12
Exporting a Filer Subshare (and Using its ACL)....................................11-15
Exposing Hidden Subshares ............................................................11-17
Exporting all Filer Subshares at Once ....................................................11-18
Exposing All Hidden Subshares ......................................................11-20
Adding New Subshares...........................................................................11-21
Stopping a CIFS Share............................................................................11-21
Allowing Clients to Use Windows Management (MMC) .............................11-22
Client Experience: Using MMC to Manage a Namespace .....................11-23
Disallowing Windows-Management Access ..........................................11-24
Setting a Server Description (optional)..........................................................11-25
Removing the Description ......................................................................11-25
Enabling CIFS Service...................................................................................11-26
Disabling CIFS .......................................................................................11-26
Configuring Kerberos (optional)....................................................................11-26
Support for Both NTLM and Kerberos...................................................11-28
Using Dynamic DNS (Kerberos) ...................................................................11-28
Replacing Back-End Services.................................................................11-29
Update Schedule for DNS “A” Records .................................................11-30
Removing a Host Name..........................................................................11-31
Showing Dynamic-DNS Status...............................................................11-31
Clearing Records of Failed Deletes ........................................................11-32
Supporting Aliases with Kerberos .................................................................11-34
Listing CIFS Services ....................................................................................11-35
Focusing on One CIFS Service...............................................................11-35
Showing Details for a CIFS Service................................................11-36
Showing All CIFS Services ....................................................................11-38

2-xiv CLI Storage-Management Guide
Sample - Configuring a CIFS Front-End Service.......................................... 11-39
Removing a CIFS Service ............................................................................. 11-40
Removing All of a Volume’s Front-End Exports ................................................. 11-41
Showing All Front-End Services.......................................................................... 11-42
Showing Front-End Services for One Global-Server.................................... 11-42
Showing Front-End Services per Virtual-Server ........................................... 11-43
Showing the Services at the Redundant Peer ......................................... 11-44
Showing Server Maps........................................................................................... 11-45
With Filer IP Addresses................................................................................. 11-47
Showing the Servers Behind One Virtual Server .......................................... 11-48
Showing the Servers Behind One Namespace .............................................. 11-49
Showing Server Status................................................................................... 11-50
Chapter 12
Policy for Balancing Capacity
Before You Begin ................................................................................................... 12-2
Concepts and Terminology ..................................................................................... 12-2
Showing All Policy Rules....................................................................................... 12-2
Showing Details............................................................................................... 12-3
Focusing on One Namespace .......................................................................... 12-9
Showing Details for the Namespace ...................................................... 12-10
Focusing on One Volume .............................................................................. 12-11
Showing Details for the Volume ............................................................ 12-12
Focusing on One Share Farm or Rule ........................................................... 12-12
Adding a Share Farm............................................................................................ 12-15
Adding a Share to the Farm........................................................................... 12-16
Setting a Placement Weight for a Share ................................................. 12-16
Removing a Share from a Share Farm ................................................... 12-17
Auto Migrating Existing Files....................................................................... 12-18
Disabling Auto Migration ...................................................................... 12-18
Balancing New Files Based on Free Space ................................................... 12-19
Based on Latency (Bandwidth) .............................................................. 12-20
Based on Administrative Weights .......................................................... 12-20
Maintaining Minimum Free Space......................................................... 12-21
New-File Placement When All Shares Reach the Free Space Threshold12-
22

CLI Storage-Management Guide 2-xv
Disabling the Free-Space Threshold................................................12-22
Constraining New Files..................................................................................12-22
Distributing New Files............................................................................12-23
Constraining New Directories ................................................................12-23
Constraining Directories Below a Certain Depth ............................12-24
Not Constraining Directories...........................................................12-25
Distributing When a Share is Unavailable..............................................12-25
Enabling All Share-Farm Rules .....................................................................12-25
Stopping All Share-Farm Rules..............................................................12-26
Removing a Share Farm.................................................................................12-26
Creating a Schedule...............................................................................................12-27
Setting the Interval .........................................................................................12-27
Setting the Duration (optional) ......................................................................12-28
Removing the Duration...........................................................................12-28
Setting the Start Time (optional)....................................................................12-29
Starting Now ...........................................................................................12-29
Showing All Schedules ..................................................................................12-30
Showing One Schedule...........................................................................12-31
Removing a Schedule.....................................................................................12-31
Pausing All Rules in a Volume..............................................................................12-32
Resuming all Policies in a Volume.................................................................12-33
Pausing on a Schedule....................................................................................12-34
Removing the Policy-Pause Schedule ....................................................12-34
Draining One or More Shares ...............................................................................12-35
Identifying the Source Share(s)......................................................................12-36
Choosing the Target Storage ..........................................................................12-37
Balancing Capacity in a Target Share Farm ...........................................12-37
Applying a Schedule (optional) .....................................................................12-38
Removing the Schedule ..........................................................................12-38
Limiting Each Migration (optional)...............................................................12-39
Removing the Limit ................................................................................12-40
Configuring a Progress Report (optional)......................................................12-40
Generating a Verbose Report ..................................................................12-41
Deleting Empty Reports..........................................................................12-41
Disabling Reports ...................................................................................12-42
Retaining Copies of Files on the Share (optional) .........................................12-42
Disabling File Retention .........................................................................12-43
Enabling the Placement Rule .........................................................................12-43
Tentatively Enabling the Rule.................................................................12-44

2-xvi CLI Storage-Management Guide
Disabling the Rule .................................................................................. 12-44
Verifying That All Files Are Removed ......................................................... 12-45
Removing the Placement Rule ...................................................................... 12-46
Removing All Policy Objects from a Namespace ................................................ 12-47
Removing All Policy Objects from a Volume............................................... 12-48
Migrations in a Multi-Protocol Namespace.......................................................... 12-48
File-Attribute Migrations............................................................................... 12-49
From a NetApp Filer, UNIX Qtree ........................................................ 12-50
From a NetApp Filer, NTFS Qtree......................................................... 12-50
From an EMC Filer ................................................................................ 12-52
From a Unix Filer with SMB ................................................................. 12-52
From a UNIX/SMB Filer with ACLs..................................................... 12-53
Some CIFS Applications Block Out Migrations .................................................. 12-54
Chapter 13
Grouping Files into Filesets
Grouping Files by Filename ................................................................................... 13-1
Setting a Directory Path (optional).................................................................. 13-2
Enabling Recursive Matches (optional) ................................................... 13-2
Disabling Recursive Matches............................................................ 13-3
Matching Against a Wildcard String........................................................ 13-3
Using a Complex Regular Expression ..................................................... 13-4
Regular Expression Syntax ...................................................................... 13-5
Character Groups .............................................................................. 13-5
Shorthand for Character Groups ....................................................... 13-6
Creating Bounds for the Match......................................................... 13-6
Adding Complexity........................................................................... 13-6
Regular-Expression Samples ............................................................ 13-7
For More Information ....................................................................... 13-7
Negating the Match .................................................................................. 13-7
Reverting to the Root Path ....................................................................... 13-8
Matching Filenames (optional)........................................................................ 13-9
Excluding Files....................................................................................... 13-10
Removing the Fileset..................................................................................... 13-10
Grouping Files by Size ......................................................................................... 13-11
Selecting Files Based on their Sizes.............................................................. 13-12
Removing a File Selection ..................................................................... 13-12

CLI Storage-Management Guide 2-xvii
Removing the Fileset .....................................................................................13-13
Grouping Files by Age ..........................................................................................13-13
Selecting Files Based on their Ages...............................................................13-14
Removing a File Selection......................................................................13-15
Choosing Last-Accessed or Last-Modified....................................................13-15
Identifying a Source Fileset (optional)...........................................................13-16
Removing the Source Fileset ..................................................................13-16
Setting the Age-Evaluation Interval (optional)..............................................13-17
Reverting to the Default Evaluation Interval..........................................13-18
Setting the File-Selection Start Time (optional) ............................................13-18
Reverting to the Default Start Time........................................................13-19
Removing the Fileset .....................................................................................13-19
Joining Filesets......................................................................................................13-20
Identifying a Source Fileset ...........................................................................13-20
Removing a Source Fileset .....................................................................13-21
Removing All Source Filesets ................................................................13-21
Removing the Fileset .....................................................................................13-22
Intersecting Filesets...............................................................................................13-22
Identifying a Source Fileset ...........................................................................13-23
Removing a Source Fileset .....................................................................13-23
Removing All Source Filesets ................................................................13-24
Removing the Fileset .....................................................................................13-24
Listing all Filesets .................................................................................................13-24
Showing One Global Fileset ..........................................................................13-27
Showing Filesets in a Managed Volume ........................................................13-28
Sample - Configuring Age-Based Filesets ............................................................13-28
Chapter 14
Migrating Filesets
Before You Begin ....................................................................................................14-1
Concepts and Terminology......................................................................................14-1
Directing File Placement.........................................................................................14-2
Identifying the Source Fileset ..........................................................................14-3
Matching Directories Only .......................................................................14-5
Matching and Promoting Directories........................................................14-7
Promoting Directories on a Target Share Farm ......................................14-10

2-xviii CLI Storage-Management Guide
Avoid Promoting CIFS Directories Based on Last-Accessed Time....... 14-10
Matching Directory Trees (Directories and Files) ................................. 14-11
Limiting the Selection to Particular Source Share(s) (optional) ................... 14-13
Removing all Source-Share Restrictions................................................ 14-13
Choosing the Target Storage.......................................................................... 14-14
Balancing Capacity in a Target Share Farm........................................... 14-15
Limiting Each Migration (optional) .............................................................. 14-15
Removing the Limit ............................................................................... 14-16
Applying a Schedule (optional)..................................................................... 14-16
Removing the Schedule.......................................................................... 14-17
Disabling Inline Notifications (optional)....................................................... 14-18
Re-Enabling Inline Notifications ........................................................... 14-18
Configuring Progress Reports ....................................................................... 14-19
Generating Verbose Reports................................................................... 14-20
Deleting Empty Reports ......................................................................... 14-20
Disabling Reports................................................................................... 14-20
Enabling the Placement Rule......................................................................... 14-21
Tentatively Enabling the Rule ................................................................ 14-21
Disabling the Rule .................................................................................. 14-22
Showing the Effects of File Placement ......................................................... 14-22
Removing the Placement Rule ...................................................................... 14-23
Changing Rule Order............................................................................................ 14-23
Moving the Rule to the Beginning or End..................................................... 14-25
Chapter 15
Shadowing a Volume
Before You Begin ................................................................................................... 15-3
Adding a Shadow Volume (Target Switch) ............................................................ 15-3
Compatible Software Releases........................................................................ 15-4
Allowing Modifications................................................................................... 15-5
Adding a Share ................................................................................................ 15-5
Turning Off Shadowing................................................................................... 15-6
Specifying a Fileset to Copy (Source Switch)........................................................ 15-7
Shadow Copies Are Not Cumulative .............................................................. 15-7
Configuring a Shadow-Copy Rule (Source Switch)............................................... 15-8
Identifying the Source Fileset.......................................................................... 15-8

CLI Storage-Management Guide 2-xix
Choosing a Shadow-Volume Target.................................................................15-9
Using a Path in the Shadow Volume.......................................................15-10
Removing the Shadow-Volume Target ...................................................15-11
Applying a Schedule ......................................................................................15-12
Configuring Progress Reports........................................................................15-12
Generating Verbose Reports ...................................................................15-13
Including Identical Files in Reports........................................................15-14
Deleting Empty Reports..........................................................................15-14
Disabling Reports ...................................................................................15-14
Supporting Local Groups (CIFS)...................................................................15-15
Translating Local SIDs ...........................................................................15-16
Failing On SID-Translation Errors ..................................................15-16
Disabling SID Translation ...............................................................15-17
Copying Files Opened through CIFS.............................................................15-17
Allowing Only Reads During the Shadow Copy....................................15-18
Support for Multi-Protocol Volumes..............................................................15-19
File-Attribute Translations......................................................................15-19
Disabling Target Pruning (optional)...............................................................15-19
Enabling Pruning ....................................................................................15-20
Copying Only Directories with Changed Files (optional) .............................15-20
Copying All Directories..........................................................................15-21
Publishing All Files as a Group (optional).....................................................15-21
Publishing Individual Files .....................................................................15-22
Setting a Bandwidth Limit .............................................................................15-22
Removing any Bandwidth Limit.............................................................15-23
Changing the Threshold for Delta Transfers (optional).................................15-23
Reverting to the Default..........................................................................15-24
Enabling the Shadow-Copy Rule ...................................................................15-25
Disabling the Rule ..................................................................................15-25
Showing Shadow-Copy Status.......................................................................15-25
Focusing on One Namespace..................................................................15-28
Focusing on One Volume........................................................................15-28
Focusing on One Rule.............................................................................15-29
Monitoring the Progress of a Shadow Copy ..................................................15-29
Report Format .........................................................................................15-31
Reformatting the Report .........................................................................15-34
Truncating the Report .............................................................................15-35
Copying the Source Volume to Multiple Targets ...........................................15-36
Removing the Shadow-Copy Rule.................................................................15-36

2-xx CLI Storage-Management Guide
Table of contents