Home Page Icon
Home Page
Table of Contents for
IBM SONAS Best Practices
Close
IBM SONAS Best Practices
by Shradha Nayak Thakare, Michael Taylor, John Tarella, John Sing, Joe Roa, Ravikum
IBM SONAS Best Practices
Front cover
Notices
Trademarks
IBM Redbooks promotions
Preface
Authors
Now you can become a published author, too
Comments welcome
Stay connected to IBM Redbooks
Chapter 1. Planning preferred practices
1.1 Worksheet-oriented qualification and sizing review
1.1.1 Environment details
1.1.2 Performance requirements
1.1.3 Client applications and use cases
1.1.4 Client communications protocols
1.1.5 Authentication requirements
1.1.6 NFS protocol requirements
1.1.7 Data protection
1.1.8 Data center requirements
1.1.9 Service requirements
1.2 Staff and training
1.2.1 Staffing considerations
1.2.2 Education
1.3 Environment
1.3.1 Space requirements
1.3.2 Power requirements
1.3.3 Network requirements
1.4 Sizing
Chapter 2. Authentication
2.1 Introduction to authentication preferred practices
2.2 Authentication configuration with asynchronous replication
2.2.1 Authentication requirements for replication
2.2.2 Setting up authentication for asynchronous replication
2.2.3 Consequences of incorrect authentication setup
2.2.4 Correcting an incorrect configuration
2.2.5 Preferred practices for an asynchronous replication configuration
2.3 Preferred practices for migration of data by using the Robocopy tool
2.3.1 Authentication requirements for replication
2.3.2 Setting up SONAS for migration by using the Robocopy tool
2.3.3 Prerequisites for starting migration with the Robocopy tool
2.3.4 Common issues for Robocopy configuration
2.4 Preferred practices for plain Active Directory
2.4.1 ID mapping and range size
2.4.2 Configuring plain AD
2.4.3 Common issues for plain AD configurations
2.5 Preferred practices for AD and Services for UNIX
2.5.1 Range and Schema Mode parameters in SFU
2.5.2 Configuring AD + SFU correctly before data is created on SONAS
2.5.3 Common issues for AD + SFU configurations
2.6 Preferred practices for Lightweight Directory Access Protocol
2.6.1 Tasks before you get started
2.6.2 Prerequisites for configuring the IBM SONAS system with LDAP
2.6.3 Preferred practices for configuring LDAP
2.6.4 Common issues for LDAP setup
2.7 Preferred practices for Network Information Service
2.7.1 Prerequisites for configuring the SONAS system with AD and NIS
2.7.2 Limitations of configuring the SONAS system with AD and NIS
2.7.3 Revisiting key parameters for configuring NIS
2.7.4 Preferred practices when you configure NIS
2.8 Preferred practices for local authentication
2.8.1 Limitations for configuring SONAS with local authentication
2.8.2 Preferred practices for configuring SONAS with local authentication
2.9 Common authentication issues
2.9.1 Issue: No services are running after successful configuration of SONAS
2.10 Troubleshooting authentication issues
2.10.1 CLI commands to check
2.10.2 Logs to check
2.10.3 More logs to collect and check
Chapter 3. Networking
3.1 Terminology
3.1.1 Networking terms
3.1.2 Bonding modes
3.2 SONAS networking
3.2.1 Interface node networking
3.2.2 Understanding your network topology
3.3 Network bonding overview
3.3.1 Link Aggregation Control Protocol
3.3.2 Transmission policies
3.3.3 Jumbo Frames
3.3.4 Configuring a system for high availability and throughput
3.3.5 Bonding examples
3.4 SONAS networking preferred practices
3.4.1 Network naming
3.4.2 Management and data traffic on the same physical network
3.4.3 Management and data traffic on different subnets
3.4.4 Management and data traffic on different physical networks
3.4.5 Using and configuring VLANs
3.5 SONAS routing
Chapter 4. Storage configuration
4.1 General Parallel File System
4.1.1 Overview
4.1.2 Back-end storage design for performance and redundancy
4.1.3 Redundancy considerations
4.1.4 GPFS metadata structures and preferred configurations
4.2 SONAS supported hardware
4.2.1 SONAS appliance with DDN storage
4.2.2 SONAS gateway with XIV (FC 9006)
4.2.3 SONAS gateway with Storwize V7000 (FC 9007)
4.2.4 SONAS gateway with DS8000 storage
4.2.5 SONAS gateway with IBM DCS3700
4.3 Failure groups and storage pools
4.3.1 Failure groups
4.3.2 Storage pools
Chapter 5. File system configuration
5.1 Getting access to file system content
5.1.1 Access rights
5.2 Creating a file system
5.2.1 File system block size
5.2.2 Methods to create the file system
5.2.3 File system options
5.2.4 File system naming option
5.2.5 NSD allocations for a balanced file system
5.2.6 GPFS synchronous replication and failure group definitions
5.2.7 Placing metadata on SSD
5.2.8 Block size considerations
5.2.9 Segment size considerations
5.2.10 Allocation type
5.2.11 Quota enablement set with file system creation
5.2.12 DMAPI enablement
5.2.13 File system logging
5.2.14 Snapshot enablement
5.2.15 inodes and metadata
5.3 Removing a file system
5.4 File system performance and scaling
Chapter 6. Shares, exports, and protocol configuration
6.1 Choices when you are creating a share or export
6.2 Background information for creating shares and exports
6.3 Managing authentication and ID mapping
6.3.1 Authentication server conditions
6.3.2 Server-side authentication configuration
6.3.3 Other authentication elements
6.4 Establishing user and group mapping for client access
6.4.1 Central ID mapping for users and groups
6.4.2 Manual ID mapping for users and groups
6.5 Managing authorization and access control lists
6.5.1 Access Control List and Access Control Entry
6.5.2 ACL permissions
6.5.3 BypassTraversalCheck privilege
6.5.4 POSIX bits
6.5.5 Displaying and changing a file system directory’s owner and group
6.6 Changing shares and exports
6.6.1 GUI navigation
6.6.2 CLI usage
6.7 Working with Common Internet File System (CIFS) shares
6.7.1 Creating a CIFS share
6.7.2 CIFS data integrity options
6.7.3 Connecting by using a CIFS client
6.7.4 Using substitution variables for CIFS shares
6.8 Working with Network File System (NFS) exports
6.8.1 NFS options
6.8.2 NFSv4 support in SONAS 1.5.1
6.8.3 Netgroups
6.8.4 NFS and ID mapping
6.8.5 Connecting with an NFS client
6.9 Connecting with other protocols
6.9.1 Using FTP
6.9.2 Using Secure Copy Protocol
6.9.3 Using HTTPS
Chapter 7. Data protection
7.1 Cluster security
7.1.1 Protection of the cluster service
7.1.2 Compliance with security policies
7.1.3 Protection of the data
7.1.4 Protection of the access to data
7.2 Asynchronous replication
7.2.1 Replication port requirements
7.2.2 Replication requirements
7.2.3 Multi-directional replication
7.2.4 Asynchronous replication preferred practice considerations
7.2.5 Replication status
7.2.6 Recovery point objectives
7.2.7 Replication validation
7.2.8 Asynchronous replication logs
7.2.9 Issues and expectations
7.3 Backup and restore solutions
7.3.1 Tivoli Storage Manager
7.3.2 IBM HSM
7.3.3 Network Data Management Protocol (NDMP)
7.4 Snapshots
7.4.1 Managing snapshots
7.4.2 Traditional backup versions compared to snapshot versions
7.4.3 Snapshot rule preferred practices
7.4.4 Snapshot configuration example
7.5 File clones
7.5.1 Managing clone files
7.6 Management node configuration backup tasks
7.7 External log service
7.7.1 Log server overview
7.7.2 Retrieving system log server information by using the CLI
7.8 Antivirus
7.8.1 Integration considerations
7.8.2 Defining files to be scanned
7.8.3 Defining scan engine pool
7.8.4 Antivirus preferred practices
7.8.5 AntiVirus Summary
7.9 Failover, failback, and disaster recovery
7.9.1 Disaster recovery
7.9.2 Disaster recovery testing and high-level process overview
Chapter 8. Monitoring
8.1 Monitoring daily work
8.1.1 Daily checks
8.1.2 Health and system component check
8.1.3 Monitoring inode use and availability
8.2 Weekly tasks to add to daily monitoring tasks
8.2.1 Cluster node root file system capacity
8.2.2 Audit log review
8.2.3 Monitoring performance and workload balance
8.2.4 Performance monitoring with the SONAS GUI
8.3 Monthly checks for trends, growth planning, and maintenance review
8.4 Monitoring with IBM Tivoli Storage Productivity Center
8.4.1 Summary for monitoring SONAS daily, weekly, and monthly
Chapter 9. Troubleshooting and support
9.1 Creating PMRs
9.1.1 Software PMR
9.1.2 Hardware PMR
9.2 Network troubleshooting
9.2.1 Checking network interface availability
9.2.2 Collecting network data
9.2.3 Working with the network and protocol trace commands
9.2.4 Troubleshooting GPFS and file system issues
9.2.5 Capturing GPFS traces
9.2.6 Recovering from a failed file system
9.2.7 Troubleshooting authentication issues
9.3 Troubleshooting authentication issues
9.3.1 CLI commands to check
9.3.2 Logs to check
9.3.3 More logs to collect and check
9.3.4 Active Directory users denied access due to mapping entry in NIS
9.3.5 NFS share troubleshooting
9.3.6 CIFS share troubleshooting
9.3.7 Power supply LEDs
Related publications
IBM Redbooks
Other publications
Online resources
Help from IBM
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Related publications
Next
Next Chapter
Back cover
IBM SONAS Best Practices
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset