ibm spectrum scale 5.0.0: administration guide€¦ · ibm spectrum scale v ersion 5.0.0 administra...

780
IBM Spectrum Scale Version 5.0.0 Administration Guide SC27-9220-03 IBM

Upload: others

Post on 31-Oct-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

  • IBM Spectrum ScaleVersion 5.0.0

    Administration Guide

    SC27-9220-03

    IBM

  • IBM Spectrum ScaleVersion 5.0.0

    Administration Guide

    SC27-9220-03

    IBM

  • NoteBefore using this information and the product it supports, read the information in “Notices” on page 707.

    This edition applies to version 5 release 0 modification 0 of the following products, and to all subsequent releasesand modifications until otherwise indicated in new editions:v IBM Spectrum Scale ordered through Passport Advantage® (product number 5725-Q01)v IBM Spectrum Scale ordered through AAS/eConfig (product number 5641-GPF)v IBM Spectrum Scale for Linux on Z (product number 5725-S28)v IBM Spectrum Scale for IBM ESS (product number 5765-ESS)

    Significant changes or additions to the text and illustrations are indicated by a vertical line (|) to the left of thechange.

    IBM welcomes your comments; see the topic “How to send your comments” on page xxvii. When you sendinformation to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believesappropriate without incurring any obligation to you.

    © Copyright IBM Corporation 2014, 2018.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

  • Contents

    Tables . . . . . . . . . . . . . . . xi

    About this information. . . . . . . . xiiiPrerequisite and related information. . . . . . xxvConventions used in this information . . . . . xxviHow to send your comments . . . . . . . xxvii

    Summary of changes. . . . . . . . xxix

    Chapter 1. Configuring the GPFS cluster 1Creating your GPFS cluster . . . . . . . . . 1Displaying cluster configuration information . . . 1

    Basic configuration information . . . . . . . 1Information about protocol nodes . . . . . . 2

    Adding nodes to a GPFS cluster . . . . . . . . 2Deleting nodes from a GPFS cluster . . . . . . 3Changing the GPFS cluster configuration data . . . 4Security mode . . . . . . . . . . . . . 16Running IBM Spectrum Scale commands withoutremote root login . . . . . . . . . . . . 17

    Configuring sudo . . . . . . . . . . . 17Configuring the cluster to use sudo wrapperscripts . . . . . . . . . . . . . . . 18Configuring IBM Spectrum Scale GUI to usesudo wrapper . . . . . . . . . . . . 19Configuring a cluster to stop using sudo wrapperscripts . . . . . . . . . . . . . . . 19Root-level processes that call administrationcommands directly . . . . . . . . . . . 19

    Node quorum considerations . . . . . . . . 20Node quorum with tiebreaker considerations . . . 20Displaying and changing the file system managernode. . . . . . . . . . . . . . . . . 21Determining how long mmrestripefs takes tocomplete . . . . . . . . . . . . . . . 21Starting and stopping GPFS . . . . . . . . . 22Shutting down an IBM Spectrum Scale cluster . . . 23

    Chapter 2. Configuring the CES andprotocol configuration . . . . . . . . 25Configuring Cluster Export Services . . . . . . 25

    Setting up Cluster Export Services shared rootfile system. . . . . . . . . . . . . . 25Configuring Cluster Export Services nodes . . . 26Configuring CES protocol service IP addresses . 26CES IP aliasing to network adapters on protocolnodes . . . . . . . . . . . . . . . 27Deploying Cluster Export Services packages onexisting IBM Spectrum Scale 4.1.1 and later nodes 32Verifying the final CES configurations . . . . 32

    Creating and configuring file systems and filesetsfor exports. . . . . . . . . . . . . . . 33Configuring with the installation toolkit . . . . . 33

    Deleting a Cluster Export Services node from anIBM Spectrum Scale cluster . . . . . . . . . 33Setting up Cluster Export Services groups in an IBMSpectrum Scale cluster . . . . . . . . . . . 34

    Chapter 3. Configuring and tuning yoursystem for GPFS . . . . . . . . . . 37General system configuration and tuningconsiderations . . . . . . . . . . . . . 37

    Clock synchronization . . . . . . . . . . 37GPFS administration security . . . . . . . 37Cache usage . . . . . . . . . . . . . 38Access patterns . . . . . . . . . . . . 40Aggregate network interfaces . . . . . . . 40Swap space . . . . . . . . . . . . . 41

    Linux configuration and tuning considerations . . 41updatedb considerations . . . . . . . . . 41Memory considerations . . . . . . . . . 41GPFS helper threads . . . . . . . . . . 42Communications I/O . . . . . . . . . . 42Disk I/O . . . . . . . . . . . . . . 42

    AIX configuration and tuning considerations . . . 43GPFS use with Oracle . . . . . . . . . . 43

    Chapter 4. Parameters for performancetuning and optimization . . . . . . . 45Tuning parameters change history . . . . . . . 48

    Chapter 5. Ensuring high availability ofthe GUI service . . . . . . . . . . . 53

    Chapter 6. Configuring and tuning yoursystem for Cloud services . . . . . . 55Designating the Cloud services nodes . . . . . 55Starting up the Cloud services software . . . . . 56Managing a cloud storage account. . . . . . . 57Defining cloud storage access points (CSAP) . . . 58Creating Cloud services . . . . . . . . . . 59Configuring Cloud services with SKLM (optional) 60Binding your file system or fileset to the Cloudservice by creating a container pair set . . . . . 61Backing up the Transparent cloud tiering databaseto the cloud . . . . . . . . . . . . . . 63Backing up the Cloud services configuration . . . 64Enabling a policy for Cloud data sharing exportservice . . . . . . . . . . . . . . . . 65Tuning Cloud services parameters . . . . . . . 66Integrating Cloud services metrics with theperformance monitoring tool . . . . . . . . 68

    GPFS-based configuration . . . . . . . . 69File-based configuration . . . . . . . . . 70

    Setting up Transparent cloud tiering service on aremotely mounted client . . . . . . . . . . 71Deploying WORM solutions . . . . . . . . . 73

    © Copyright IBM Corp. 2014, 2018 iii

    |||

    ||||||||||||||||

    |||

  • Creating immutable filesets and files . . . . . 73Setting up Transparent cloud tiering for WORMsolutions . . . . . . . . . . . . . . 74

    Chapter 7. Configuring file auditlogging . . . . . . . . . . . . . . 83Enabling file audit logging on a file system. . . . 83Disabling file audit logging on a file system . . . 83Disabling the message queue for the cluster . . . 83Actions taken when enabling the message queueand file audit logging . . . . . . . . . . . 84

    Chapter 8. Configuring Active FileManagement . . . . . . . . . . . . 87Configuration parameters for AFM . . . . . . 87Parallel I/O configuration parameters for AFM . . 91

    Chapter 9. Configuring AFM-based DR 93Configuration parameters for AFM-based DR . . . 93Parallel I/O configuration parameters forAFM-based DR . . . . . . . . . . . . . 94

    Chapter 10. Tuning for Kernel NFSbackend on AFM and AFM DR . . . . 97Tuning the gateway node on the NFS client . . . 97Tuning on both the NFS client (gateway) and theNFS server (the home/secondary cluster) . . . . 97Tuning the NFS server on the home/secondarycluster or the NFS server . . . . . . . . . . 98

    Chapter 11. Performing GPFSadministration tasks . . . . . . . . 101Requirements for administering a GPFS file system 101

    adminMode configuration attribute . . . . . 102Common GPFS command principles . . . . . 103

    Specifying nodes as input to GPFS commands 103Stanza files . . . . . . . . . . . . . 104Listing active IBM Spectrum Scale commands 106

    Chapter 12. Verifying networkoperation with the mmnetverifycommand . . . . . . . . . . . . . 107

    Chapter 13. Managing file systems 109Mounting a file system . . . . . . . . . . 109

    Mounting a file system on multiple nodes . . . 110Mount options specific to IBM Spectrum Scale 110Mounting a file system through GUI. . . . . 111Changing a file system mount point on protocolnodes . . . . . . . . . . . . . . . 112

    Unmounting a file system . . . . . . . . . 112Unmounting a file system on multiple nodes 112Unmounting a file system through GUI . . . 113

    Deleting a file system. . . . . . . . . . . 113Determining which nodes have a file systemmounted . . . . . . . . . . . . . . . 114Checking and repairing a file system . . . . . 114Dynamic validation of descriptors on disk . . . . 116

    Listing file system attributes . . . . . . . . 116Modifying file system attributes . . . . . . . 117Querying and changing file replication attributes 118

    Querying file replication. . . . . . . . . 118Changing file replication attributes . . . . . 118

    Using Direct I/O on a file in a GPFS file system 119File compression . . . . . . . . . . . . 119Setting the Quality of Service for I/O operations(QoS) . . . . . . . . . . . . . . . . 125Restriping a GPFS file system . . . . . . . . 128Querying file system space . . . . . . . . . 129Querying and reducing file system fragmentation 130

    Querying file system fragmentation . . . . . 130Reducing file system fragmentation . . . . . 131

    Protecting data in a file system using backup. . . 132Protecting data in a file system using themmbackup command . . . . . . . . . 132Backing up a file system using the GPFS policyengine . . . . . . . . . . . . . . . 138Backing up file system configurationinformation . . . . . . . . . . . . . 138Using APIs to develop backup applications . . 138

    Scale Out Backup and Restore (SOBAR) . . . . 139Scheduling backups using IBM Spectrum Protectscheduler . . . . . . . . . . . . . . . 139Configuration reference for using IBM SpectrumProtect with IBM Spectrum Scale . . . . . . . 140

    Options in the IBM Spectrum Protectconfiguration file dsm.sys . . . . . . . . 140Options in the IBM Spectrum Protectconfiguration file dsm.opt . . . . . . . . 142Base IBM Spectrum Protect client configurationfiles for IBM Spectrum Scale usage . . . . . 143

    Restoring a subset of files or directories from alocal file system snapshot . . . . . . . . . 144Restoring a subset of files or directories from alocal fileset snapshot . . . . . . . . . . . 145Restoring a subset of files or directories from localsnapshots using the sample script . . . . . . 146Creating and managing file systems using GUI . . 147

    Chapter 14. File system formatchanges between versions of IBMSpectrum Scale . . . . . . . . . . 153

    Chapter 15. Managing disks . . . . . 157Displaying disks in a GPFS cluster . . . . . . 157Adding disks to a file system . . . . . . . . 158Deleting disks from a file system . . . . . . . 158Replacing disks in a GPFS file system . . . . . 160Additional considerations for managing disks . . 162Displaying GPFS disk states . . . . . . . . 162

    Disk availability . . . . . . . . . . . 162Disk status . . . . . . . . . . . . . 162

    Changing GPFS disk states and parameters . . . 163Changing your NSD configuration . . . . . . 165Changing NSD server usage and failback . . . . 166Enabling and disabling Persistent Reserve . . . . 166

    iv IBM Spectrum Scale 5.0.0: Administration Guide

    ||||||||||||

  • Chapter 16. Managing protocolservices. . . . . . . . . . . . . . 169Configuring and enabling SMB and NFS protocolservices . . . . . . . . . . . . . . . 169Configuring and enabling the Object protocolservice. . . . . . . . . . . . . . . . 170

    Performance tuning for object services . . . . 171Configuring and enabling the BLOCK service . . 171Disabling protocol services . . . . . . . . . 173

    Chapter 17. Managing protocol userauthentication . . . . . . . . . . . 175Setting up authentication servers to configureprotocol user access . . . . . . . . . . . 175

    Integrating with AD server . . . . . . . . 175Integrating with LDAP server . . . . . . . 176Integrating with Keystone Identity Service . . 181

    Configuring authentication and ID mapping for fileaccess . . . . . . . . . . . . . . . . 182

    Prerequisite for configuring Kerberos-basedSMB access . . . . . . . . . . . . . 183Configuring AD-based authentication for fileaccess . . . . . . . . . . . . . . . 184Configuring LDAP-based authentication for fileaccess . . . . . . . . . . . . . . . 191Configuring NIS-based authentication . . . . 196Authentication considerations for NFSv4 basedaccess . . . . . . . . . . . . . . . 197Prerequisites for configuring Kerberos basedNFS access . . . . . . . . . . . . . 197

    Managing user-defined authentication . . . . . 198Configuring authentication for object access . . . 202

    Configuring local authentication for objectaccess . . . . . . . . . . . . . . . 203Configuring an AD-based authentication forobject access . . . . . . . . . . . . . 204Configuring an LDAP-based authentication forobject access . . . . . . . . . . . . . 207Configuring object authentication with anexternal keystone server . . . . . . . . . 209Creating object accounts . . . . . . . . . 210Managing object users, roles, and projects . . . 211Deleting expired tokens . . . . . . . . . 214

    Deleting the authentication and the ID mappingconfiguration . . . . . . . . . . . . . 215Listing the authentication configuration . . . . 216Verifying the authentication services configured inthe system . . . . . . . . . . . . . . 217Modifying the authentication method . . . . . 218Authentication limitations . . . . . . . . . 218

    Chapter 18. Managing protocol dataexports . . . . . . . . . . . . . . 223Managing SMB shares . . . . . . . . . . 223

    Creating SMB share . . . . . . . . . . 223Changing SMB share configuration . . . . . 224Creating SMB share ACLs . . . . . . . . 224Removing SMB shares . . . . . . . . . 224Listing SMB shares . . . . . . . . . . 224Managing SMB shares using MMC . . . . . 225

    Managing NFS exports . . . . . . . . . . 229Creating NFS exports. . . . . . . . . . 229Changing NFS export configuration . . . . . 230Removing NFS exports . . . . . . . . . 230Listing NFS exports . . . . . . . . . . 230GUI navigation for NFS exports . . . . . . 231Making bulk changes to NFS exports . . . . 231

    Multiprotocol exports . . . . . . . . . . 233Multiprotocol export considerations . . . . . . 234

    Chapter 19. Managing object storage 237Understanding and managing Object services . . 237Understanding the mapping of OpenStackcommands to IBM Spectrum Scale administratorcommands . . . . . . . . . . . . . . 239Changing Object configuration values . . . . . 240Changing the object base configuration to enableS3 API. . . . . . . . . . . . . . . . 240Configuring OpenStack EC2 credentials . . . . 240Managing OpenStack access control lists using S3API. . . . . . . . . . . . . . . . . 241Managing object capabilities . . . . . . . . 242Managing object versioning . . . . . . . . 243

    Enabling object versioning . . . . . . . . 243Disabling object versioning . . . . . . . . 243Creating a version of an object: Example . . . 243

    Mapping of storage policies to filesets . . . . . 244Administering storage policies for object storage 245

    Creating storage policy for object compression 246Creating storage policy for object encryption 246

    Adding a region in a multi-region objectdeployment . . . . . . . . . . . . . . 247Administering a multi-region object deploymentenvironment. . . . . . . . . . . . . . 249Unified file and object access in IBM SpectrumScale . . . . . . . . . . . . . . . . 250

    Enabling object access to existing filesets . . . 250Identity management modes for unified file andobject access . . . . . . . . . . . . . 252Authentication in unified file and object access 256Validating shared authentication ID mapping 257The objectizer process . . . . . . . . . 258File path in unified file and object access . . . 259Administering unified file and object access . . 260In-place analytics using unified file and objectaccess . . . . . . . . . . . . . . . 268Limitations of unified file and object access . . 268Constraints applicable to unified file and objectaccess . . . . . . . . . . . . . . . 270Data ingestion examples. . . . . . . . . 270curl commands for unified file and object accessrelated user tasks . . . . . . . . . . . 271

    Configuration files for IBM Spectrum Scale forobject storage . . . . . . . . . . . . . 272Backing up and restoring object storage . . . . 275

    Backing up the object storage . . . . . . . 276Restoring the object storage . . . . . . . 278

    Configuration of object for isolated node andnetwork groups . . . . . . . . . . . . 280Enabling the object heatmap policy . . . . . . 282

    Contents v

    ||||||

  • Chapter 20. Managing GPFS quotas 285Enabling and disabling GPFS quota management 285Default quotas . . . . . . . . . . . . . 286Implications of quotas for different protocols . . . 288Explicitly establishing and changing quotas . . . 289Setting quotas for users on a per-project basis . . 290Checking quotas . . . . . . . . . . . . 292Listing quotas . . . . . . . . . . . . . 293Activating quota limit checking . . . . . . . 294Deactivating quota limit checking . . . . . . 295Changing the scope of quota limit checking . . . 295Creating file system quota reports . . . . . . 295Restoring quota files . . . . . . . . . . . 296

    Chapter 21. Managing GUI users . . . 299

    Chapter 22. Managing GPFS accesscontrol lists . . . . . . . . . . . . 303Traditional GPFS ACL administration . . . . . 303

    Setting traditional GPFS access control lists . . 304Displaying traditional GPFS access control lists 305Applying an existing traditional GPFS accesscontrol list . . . . . . . . . . . . . 305Changing traditional GPFS access control lists 306Deleting traditional GPFS access control lists 306

    NFS V4 ACL administration . . . . . . . . 307NFS V4 ACL Syntax . . . . . . . . . . 307NFS V4 ACL translation . . . . . . . . . 309Setting NFS V4 access control lists . . . . . 310Displaying NFS V4 access control lists . . . . 310Applying an existing NFS V4 access control list 310Changing NFS V4 access control lists . . . . 310Deleting NFS V4 access control lists . . . . . 311Considerations when using GPFS with NFS V4ACLs . . . . . . . . . . . . . . . 311

    NFS and GPFS . . . . . . . . . . . . . 311Exporting a GPFS file system using NFS . . . 311NFS usage of GPFS cache . . . . . . . . 315Synchronous writing using NFS . . . . . . 315Unmounting a file system after NFS export . . 315NFS automount considerations . . . . . . 315Clustered NFS and GPFS on Linux . . . . . 316

    Authorizing protocol users . . . . . . . . . 316Authorizing file protocol users . . . . . . 316Authorizing object users. . . . . . . . . 326Authorization limitations . . . . . . . . 332

    Chapter 23. Considerations for GPFSapplications . . . . . . . . . . . . 335Exceptions to Open Group technical standards . . 335Determining if a file system is controlled by GPFS 335Exceptions and limitations to NFS V4 ACLssupport . . . . . . . . . . . . . . . 336

    Linux ACLs and extended attributes. . . . . 336General CES NFS Linux exceptions and limitations 337Considerations for the use of direct I/O(O_DIRECT). . . . . . . . . . . . . . 337NFS protocol node limitations . . . . . . . . 338

    Chapter 24. Accessing a remote GPFSfile system . . . . . . . . . . . . 339Remote user access to a GPFS file system . . . . 341Using NFS/SMB protocol over remote clustermounts . . . . . . . . . . . . . . . 342

    Configuring protocols on a separate cluster . . 343Managing multi-cluster protocol environments 344Upgrading multi-cluster environments . . . . 345Limitations of protocols on remotely mountedfile systems . . . . . . . . . . . . . 345

    Mounting a remote GPFS file system . . . . . 346Managing remote access to a GPFS file system . . 348Using remote access with public and private IPaddresses. . . . . . . . . . . . . . . 348Using multiple security levels for remote access 350Changing security keys with remote access . . . 351NIST compliance . . . . . . . . . . . . 352Important information about remote access . . . 353

    Chapter 25. Information lifecyclemanagement for IBM Spectrum Scale . 355Storage pools . . . . . . . . . . . . . 355

    Internal storage pools . . . . . . . . . 356External storage pools . . . . . . . . . 361

    Policies for automating file management . . . . 362Overview of policies . . . . . . . . . . 362Policy rules . . . . . . . . . . . . . 363The mmapplypolicy command and policy rules 382Policy rules: Examples and tips . . . . . . 386Managing policies . . . . . . . . . . . 391Working with external storage pools. . . . . 394Backup and restore with storage pools . . . . 399ILM for snapshots . . . . . . . . . . . 401

    Filesets . . . . . . . . . . . . . . . 402Fileset namespace . . . . . . . . . . . 402Filesets and quotas . . . . . . . . . . 403Filesets and storage pools . . . . . . . . 403Filesets and global snapshots . . . . . . . 403Fileset-level snapshots . . . . . . . . . 404Filesets and backup . . . . . . . . . . 404Managing filesets . . . . . . . . . . . 405

    Immutability and appendOnly features . . . . . 408

    Chapter 26. Creating and maintainingsnapshots of file systems . . . . . . 413Creating a snapshot . . . . . . . . . . . 413Listing snapshots . . . . . . . . . . . . 414Restoring a file system from a snapshot . . . . 415Reading a snapshot with the policy engine . . . 416Linking to a snapshot . . . . . . . . . . 416Deleting a snapshot . . . . . . . . . . . 417Managing snapshots using IBM Spectrum ScaleGUI . . . . . . . . . . . . . . . . 418

    Chapter 27. Creating and managingfile clones . . . . . . . . . . . . . 421Creating file clones . . . . . . . . . . . 421Listing file clones . . . . . . . . . . . . 422Deleting file clones . . . . . . . . . . . 423

    vi IBM Spectrum Scale 5.0.0: Administration Guide

  • Splitting file clones from clone parents . . . . . 423File clones and disk space management . . . . 423File clones and snapshots . . . . . . . . . 423File clones and policy files . . . . . . . . . 424

    Chapter 28. Scale Out Backup andRestore (SOBAR). . . . . . . . . . 425Backup procedure with SOBAR . . . . . . . 425Restore procedure with SOBAR . . . . . . . 427

    Chapter 29. Data Mirroring andReplication . . . . . . . . . . . . 431General considerations for using storage replicationwith GPFS . . . . . . . . . . . . . . 432Data integrity and the use of consistency groups 432Handling multiple versions of IBM Spectrum Scaledata . . . . . . . . . . . . . . . . 432Continuous Replication of IBM Spectrum Scaledata . . . . . . . . . . . . . . . . 433

    Synchronous mirroring with GPFS replication 433Synchronous mirroring utilizing storage basedreplication . . . . . . . . . . . . . 443Point In Time Copy of IBM Spectrum Scale data 451

    Chapter 30. Implementing a clusteredNFS environment on Linux . . . . . 455NFS monitoring . . . . . . . . . . . . 455NFS failover . . . . . . . . . . . . . . 455NFS locking and load balancing . . . . . . . 455CNFS network setup . . . . . . . . . . . 456CNFS setup . . . . . . . . . . . . . . 456CNFS administration . . . . . . . . . . . 457

    Chapter 31. Implementing ClusterExport Services . . . . . . . . . . 459CES features. . . . . . . . . . . . . . 459

    CES cluster setup . . . . . . . . . . . 459CES network configuration . . . . . . . . 460CES address failover and distribution policies 461CES protocol management . . . . . . . . 462CES management and administration . . . . 462

    CES NFS support . . . . . . . . . . . . 463CES SMB support . . . . . . . . . . . . 465CES OBJ support . . . . . . . . . . . . 466Migration of CNFS clusters to CES clusters . . . 469

    Chapter 32. Identity management onWindows . . . . . . . . . . . . . 473Auto-generated ID mappings . . . . . . . . 473Installing Windows IMU . . . . . . . . . 473Configuring ID mappings in IMU . . . . . . 474

    Chapter 33. Protocols cluster disasterrecovery . . . . . . . . . . . . . 477Protocols cluster disaster recovery limitations andprerequisites. . . . . . . . . . . . . . 477Example setup for protocols disaster recovery . . 478

    Setting up gateway nodes to ensure clustercommunication during failover . . . . . . . 479Creating the inband disaster recovery setup . . . 479Creating the outband disaster recovery setup. . . 481Performing failover for protocols cluster whenprimary cluster fails . . . . . . . . . . . 483

    Re-create file export configuration . . . . . 483Restore file export configuration . . . . . . 483

    Performing failback to old primary for protocolscluster . . . . . . . . . . . . . . . . 484

    Re-create file protocol configuration for oldprimary . . . . . . . . . . . . . . 484Restore file protocol configuration for oldprimary . . . . . . . . . . . . . . 485

    Performing failback to new primary for protocolscluster . . . . . . . . . . . . . . . . 487

    Re-create file protocol configuration for newprimary . . . . . . . . . . . . . . 487Restore file protocol configuration for newprimary . . . . . . . . . . . . . . 490

    Backing up and restoring protocols and CESconfiguration information . . . . . . . . . 493Updating protocols and CES configurationinformation . . . . . . . . . . . . . . 494Protocols and cluster configuration data requiredfor disaster recovery . . . . . . . . . . . 494

    Object data required for protocols cluster DR 494SMB data required for protocols cluster DR . . 500NFS data required for protocols cluster DR . . 502Authentication related data required forprotocols cluster DR . . . . . . . . . . 503CES data required for protocols cluster DR . . 504

    Chapter 34. File Placement Optimizer 507Distributing data across a cluster . . . . . . . 511FPO pool file placement and AFM . . . . . . 511Configuring FPO . . . . . . . . . . . . 511

    Configuring IBM Spectrum Scale Clusters . . . 512Basic Configuration Recommendations . . . . 516Configuration and tuning of Hadoop workloads 527Configuration and tuning of databaseworkloads . . . . . . . . . . . . . 528Configuring and tuning SparkWorkloads . . . 528

    Ingesting data into IBM Spectrum Scale clusters 529Exporting data out of IBM Spectrum Scale clusters 529Upgrading FPO . . . . . . . . . . . . 529Monitoring and administering IBM Spectrum ScaleFPO clusters. . . . . . . . . . . . . . 532

    Rolling upgrades . . . . . . . . . . . 533The IBM Spectrum Scale FPO cluster . . . . 535Failure detection . . . . . . . . . . . 537Disk Failures . . . . . . . . . . . . 537Node failure. . . . . . . . . . . . . 539Handling multiple nodes failure . . . . . . 541Network switch failure . . . . . . . . . 541Data locality. . . . . . . . . . . . . 542Disk Replacement . . . . . . . . . . . 550

    Auto recovery . . . . . . . . . . . . . 552Failure and recovery . . . . . . . . . . 552QoS support for autorecovery . . . . . . . 554

    Restrictions . . . . . . . . . . . . . . 554

    Contents vii

  • Chapter 35. Encryption . . . . . . . 557Encryption keys . . . . . . . . . . . . 557Encryption policies . . . . . . . . . . . 558Encryption policy rules . . . . . . . . . . 558Preparation for encryption . . . . . . . . . 563Establishing an encryption-enabled environment 567

    Simplified setup: Using SKLM with aself-signed certificate . . . . . . . . . . 568Simplified setup: Using SKLM with a certificatechain . . . . . . . . . . . . . . . 575Simplified setup: Valid and invalidconfigurations . . . . . . . . . . . . 584Simplified setup: Accessing a remote file system 587Simplified setup: Doing other tasks . . . . . 591Regular setup: Using SKLM with a self-signedcertificate . . . . . . . . . . . . . . 597Regular setup: Using SKLM with a certificatechain . . . . . . . . . . . . . . . 604Configuring encryption with SKLM v2.7 . . . 614Configuring encryption with the Vormetric DSMkey server . . . . . . . . . . . . . 616Renewing client and server certificates . . . . 623

    Secure deletion . . . . . . . . . . . . . 635Encryption and standards compliance . . . . . 636

    Encryption and FIPS-140-2 certification . . . . 636Encryption and NIST SP800-131A compliance 637

    Encryption in a multicluster environment . . . . 637Encryption in a Disaster Recovery environment 637Encryption and backup/restore . . . . . . . 637Encryption and snapshots . . . . . . . . . 638Encryption and a local read-only cache (LROC)device . . . . . . . . . . . . . . . . 638Encryption requirements and limitations . . . . 638

    Chapter 36. Managing certificates tosecure communications between GUIweb server and web browsers . . . . 641

    Chapter 37. Securing protocol data 643Planning for protocol data security . . . . . . 645Configuring protocol data security . . . . . . 645

    Enabling secured connection between the IBMSpectrum Scale system and authenticationserver . . . . . . . . . . . . . . . 645Securing data transfer . . . . . . . . . 648Securing NFS data transfer . . . . . . . . 648Securing SMB data transfer. . . . . . . . 651Secured object data transfer . . . . . . . 651

    Data security limitations. . . . . . . . . . 651

    Chapter 38. Cloud services:Transparent cloud tiering and Clouddata sharing . . . . . . . . . . . . 653Administering Transparent cloud tiering and Clouddata sharing services . . . . . . . . . . . 653

    Stopping Cloud services software . . . . . 653Monitoring the health of Cloud servicessoftware . . . . . . . . . . . . . . 653Checking the Cloud services version . . . . 655

    Administering files for Transparent cloud tiering 656Applying a policy on a Transparent cloudtiering node . . . . . . . . . . . . . 656Migrating files to the cloud storage tier. . . . 659Pre-migrating files to the cloud storage tier . . 659Recalling files from the cloud storage tier . . . 661Reconciling files between IBM Spectrum Scalefile system and cloud storage tier. . . . . . 661Cleaning up files transferred to the cloudstorage tier . . . . . . . . . . . . . 663Deleting cloud objects . . . . . . . . . 663Listing files migrated to the cloud storage tier 664Restoring files . . . . . . . . . . . . 665Restoring Cloud services configuration . . . . 666Checking the Cloud services database integrity 667Restoring Transparent cloud tiering service on abackup cluster . . . . . . . . . . . . 667Manual recovery of Transparent cloud tieringdatabase . . . . . . . . . . . . . . 668

    Cloud data sharing . . . . . . . . . . . 668Listing files exported to the cloud . . . . . 670Importing cloud objects exported through anold version of Cloud data sharing . . . . . 672

    Scheduling recommendations for Transparent cloudtiering tasks . . . . . . . . . . . . . . 672Known limitations of Cloud services . . . . . 673

    Chapter 39. Managing file auditlogging . . . . . . . . . . . . . . 675Stopping consumers in file audit logging . . . . 675Starting consumers in file audit logging . . . . 675Displaying topics that are registered in the messagequeue for file audit logging . . . . . . . . 675Enabling file audit logging on a new spectrumscalecluster node . . . . . . . . . . . . . . 676

    Chapter 40. Highly available writecache (HAWC) . . . . . . . . . . . 677Applications that can benefit from HAWC. . . . 678Restrictions and tuning recommendations forHAWC . . . . . . . . . . . . . . . 678Using HAWC . . . . . . . . . . . . . 679

    Chapter 41. Local read-only cache 681

    Chapter 42. Miscellaneous advancedadministration topics . . . . . . . . 683Changing IP addresses and host names. . . . . 683Enabling a cluster for IPv6 . . . . . . . . . 684Using multiple token servers . . . . . . . . 684Exporting file system definitions between clusters 685IBM Spectrum Scale port usage . . . . . . . 685Securing the IBM Spectrum Scale system usingfirewall . . . . . . . . . . . . . . . 688

    Firewall recommendations for the IBMSpectrum Scale installation . . . . . . . . 688Firewall recommendations for internalcommunication among nodes . . . . . . . 689Firewall recommendations for protocol access 690

    viii IBM Spectrum Scale 5.0.0: Administration Guide

    |||

    ||

    |||

    |||||||

    ||||||

    |||||||||||||

  • Firewall recommendations for IBM SpectrumScale GUI . . . . . . . . . . . . . 694Firewall recommendations for IBM SKLM . . . 695Firewall recommendations for Vormetric DSM 695Firewall recommendations for the REST API . . 696Firewall recommendations for PerformanceMonitoring tool . . . . . . . . . . . 696Firewall considerations for Active FileManagement (AFM) . . . . . . . . . . 697Firewall considerations for remote mounting offile systems . . . . . . . . . . . . . 697Firewall recommendations for using IBMSpectrum Protect with IBM Spectrum Scale . . 698Firewall considerations for using IBM SpectrumArchive with IBM Spectrum Scale . . . . . 698Firewall recommendations for file audit logging 698Examples of how to open firewall ports . . . 698

    Logging file system activities . . . . . . . . 700Supported web browser versions and web browsersettings for GUI . . . . . . . . . . . . 701

    Chapter 43. GUI limitations . . . . . 703

    Accessibility features for IBMSpectrum Scale . . . . . . . . . . 705Accessibility features . . . . . . . . . . . 705Keyboard navigation . . . . . . . . . . . 705IBM and accessibility . . . . . . . . . . . 705

    Notices . . . . . . . . . . . . . . 707Trademarks . . . . . . . . . . . . . . 708Terms and conditions for product documentation 709IBM Online Privacy Statement. . . . . . . . 709

    Glossary . . . . . . . . . . . . . 711

    Index . . . . . . . . . . . . . . . 717

    Contents ix

  • x IBM Spectrum Scale 5.0.0: Administration Guide

  • Tables

    1. IBM Spectrum Scale library information units xiv2. Conventions . . . . . . . . . . . xxvi3. List of changes in documentation xxxviii4. Configuration attributes on the mmchconfig

    command . . . . . . . . . . . . . 65. Attributes and default values . . . . . . 666. Supported Components . . . . . . . . 677. Configuration parameters at cache and their

    default values at the cache cluster . . . . . 878. Configuration parameters at cache and their

    default values at the cache cluster - Validvalues . . . . . . . . . . . . . . 90

    9. Configuration parameters at cache for parallelI/O . . . . . . . . . . . . . . . 91

    10. Configuration parameters at cache for parallelI/O - valid values . . . . . . . . . . 92

    11. Configuration parameters at primary and theirdefault values . . . . . . . . . . . . 93

    12. Configuration parameters at primary and theirdefault values - Valid values . . . . . . . 94

    13. Configuration parameters at cache for parallelI/O . . . . . . . . . . . . . . . 94

    14. Configuration parameters at cache for parallelI/O - valid values . . . . . . . . . . 95

    15. NFS server parameters . . . . . . . . . 9816. COMPRESSION and illCompressed flags 12317. Set QoS classes to unlimited . . . . . . 12618. Allocate the available IOPS . . . . . . . 12719. Authentication requirements for each file

    access protocol. . . . . . . . . . . . 20020. Object services and object protocol nodes 23921. Object input behavior in unified_mode 25422. Configuration options for [swift-constraints]

    in swift.conf . . . . . . . . . . . . 27023. Configurable options for [DEFAULT] in

    object-server-sof.conf . . . . . . . . . 27224. Configurable options for [capabilities] in

    spectrum-scale-object.conf . . . . . . . 27425. Configuration options for [DEFAULT] in

    spectrum-scale-objectizer.conf . . . . . . 27426. Configuration options for

    [IBMOBJECTIZER-LOGGER] inspectrum-scale-objectizer.conf . . . . . . 274

    27. Configuration options for object-server.conf 27428. Configuration options for

    /etc/sysconfig/memcached. . . . . . . 27529. Configuration options for proxy-server.conf 27530. Removal of a file with ACL entries DELETE

    and DELETE_CHILD . . . . . . . . . 30931. Mapping from SMB Security Descriptor to

    NFSv4 ACL entry . . . . . . . . . . 31832. Mapping from NFSv4 ACL entry to SMB

    Security Descriptor. . . . . . . . . . 31833. ACL permissions required to work on files

    and directories, while using SMB protocol(table 1 of 2) . . . . . . . . . . . . 320

    34. ACL permissions required to work on filesand directories, while using SMB protocol(table 2 of 2) . . . . . . . . . . . . 321

    35. ACL permissions required to work on filesand directories, while using NFS protocol(table 1 of 2) . . . . . . . . . . . . 322

    36. ACL permissions required to work on filesand directories, while using NFS protocol(table 2 of 2) . . . . . . . . . . . . 323

    37. Commands and reference to manage ACLtasks . . . . . . . . . . . . . . 325

    38. ACL options that are available to manipulateobject read ACLs . . . . . . . . . . 330

    39. Summary of commands to set upcross-cluster file system access.. . . . . . 348

    40. The effects of file operations on an immutablefile or an appendOnly file . . . . . . . 409

    41. IAM modes and their effects on fileoperations on immutable files . . . . . . 410

    42. Example for retention period . . . . . . 41843. Example - Time stamp of snapshots that are

    retained based on the retention policy . . . 41844. Valid EncParamString values . . . . . . 55945. Valid combine parameter string values 55946. Valid wrapping parameter string values 55947. Required version of IBM Spectrum Scale 56348. Remote Key Management servers . . . . . 56449. The RKM.conf file . . . . . . . . . . 56550. The client keystore directory . . . . . . 56751. Configuring a node for encryption in the

    simplified setup. . . . . . . . . . . 57052. Configuring a node for encryption in the

    simplified setup. . . . . . . . . . . 57953. Setup of Cluster1 and Cluster2. . . . . . 58754. Managing another key server . . . . . . 59255. Default lifetimes of key server and key client

    certificates . . . . . . . . . . . . 62456. Security features that are used to secure

    authentication server . . . . . . . . . 64357. Sample policy list . . . . . . . . . . 65858. Schedule recommendations . . . . . . . 67259. IBM Spectrum Scale port usage . . . . . 68660. Firewall related information. . . . . . . 68861. Recommended port numbers that can be used

    for installation . . . . . . . . . . . 68962. Recommended port numbers that can be used

    for internal communication . . . . . . . 68963. Recommended port numbers for NFS access 69064. Recommended port numbers for SMB access 69165. Recommended port numbers for iSCSI access 69166. Port numbers for object access . . . . . . 69267. Port numbers for object authentication 69268. Port numbers for Postgres database for object

    protocol . . . . . . . . . . . . . 69369. Consolidated list of recommended ports for

    different functions . . . . . . . . . . 693

    © Copyright IBM Corp. 2014, 2018 xi

    ||

    ||||

    |

    |||

    |||

    ||

  • 70. Firewall recommendations for GUI . . . . 69471. Firewall recommendations for SKLM 69572. Firewall recommendations for SKLM 69573. Firewall recommendations for REST API 69674. Recommended port numbers that can be used

    for Performance Monitoring tool . . . . . 696

    75. Required port number for mmbackup andHSM connectivity to IBM Spectrum Protectserver . . . . . . . . . . . . . . 698

    76. Recommended port numbers that can be usedfor file audit logging . . . . . . . . . 698

    xii IBM Spectrum Scale 5.0.0: Administration Guide

  • About this information

    This edition applies to IBM Spectrum Scale™ version 5.0.0 for AIX®, Linux, and Windows.

    IBM Spectrum Scale is a file management infrastructure, based on IBM® General Parallel File System(GPFS™) technology, which provides unmatched performance and reliability with scalable access tocritical file data.

    To find out which version of IBM Spectrum Scale is running on a particular AIX node, enter:lslpp -l gpfs\*

    To find out which version of IBM Spectrum Scale is running on a particular Linux node, enter:rpm -qa | grep gpfs (for SLES and Red Hat Enterprise Linux)

    dpkg -l | grep gpfs (for Ubuntu Linux)

    To find out which version of IBM Spectrum Scale is running on a particular Windows node, openPrograms and Features in the control panel. The IBM Spectrum Scale installed program name includesthe version number.

    Which IBM Spectrum Scale information unit provides the information you need?

    The IBM Spectrum Scale library consists of the information units listed in Table 1 on page xiv.

    To use these information units effectively, you must be familiar with IBM Spectrum Scale and the AIX,Linux, or Windows operating system, or all of them, depending on which operating systems are in use atyour installation. Where necessary, these information units provide some background information relatingto AIX, Linux, or Windows. However, more commonly they refer to the appropriate operating systemdocumentation.

    Note: Throughout this documentation, the term “Linux” refers to all supported distributions of Linux,unless otherwise specified.

    © Copyright IBM Corp. 2014, 2018 xiii

  • Table 1. IBM Spectrum Scale library information units

    Information unit Type of information Intended users

    IBM Spectrum Scale: Concepts,Planning, and Installation Guide

    This guide provides the followinginformation:

    Product overview

    v Overview of IBM Spectrum Scalev GPFS architecturev Protocols support overview:

    Integration of protocol accessmethods with GPFS

    v Active File Managementv AFM-based Asynchronous Disaster

    Recovery (AFM DR)

    v Data protection and disaster recoveryin IBM Spectrum Scale

    v Introduction to IBM Spectrum ScaleGUI

    v IBM Spectrum Scale management APIv Introduction to Cloud servicesv Introduction to file audit loggingv IBM Spectrum Scale in an OpenStack

    cloud deployment

    v IBM Spectrum Scale product editionsv IBM Spectrum Scale license

    designation

    v Capacity based licensingv IBM Spectrum Storage™ Suite

    Planning

    v Planning for GPFSv Planning for protocolsv Planning for Cloud servicesv Firewall recommendationsv Considerations for GPFS applications

    System administrators, analysts,installers, planners, and programmers ofIBM Spectrum Scale clusters who arevery experienced with the operatingsystems on which each IBM SpectrumScale cluster is based

    xiv IBM Spectrum Scale 5.0.0: Administration Guide

    |

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Concepts,Planning, and Installation Guide

    Installing

    v Steps for establishing and startingyour IBM Spectrum Scale cluster

    v Installing IBM Spectrum Scale onLinux nodes and deploying protocols

    v Installing IBM Spectrum Scale on AIXnodes

    v Installing IBM Spectrum Scale onWindows nodes

    v Installing Cloud services on IBMSpectrum Scale nodes

    v Setting up a Cloud services clusterv Installing and configuring IBM

    Spectrum Scale management API

    v Installing Active File Managementv Installing and upgrading AFM-based

    Disaster Recovery

    v Installing call homev Installing file audit loggingv Steps to permanently uninstall GPFS

    and/or Protocols

    System administrators, analysts,installers, planners, and programmers ofIBM Spectrum Scale clusters who arevery experienced with the operatingsystems on which each IBM SpectrumScale cluster is based

    About this information xv

    ||

    |

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Concepts,Planning, and Installation Guide

    Upgrading

    v IBM Spectrum Scale supportedupgrade paths

    v Upgrading to IBM Spectrum Scale5.0.x from IBM Spectrum Scale 4.2.y

    v Upgrading to IBM Spectrum Scale4.2.y from IBM Spectrum Scale 4.1.x

    v Upgrading to IBM Spectrum Scale4.1.1.x from GPFS V4.1.0.x

    v Upgrading from GPFS 3.5v Online upgrade support for protocols

    and performance monitoring

    v Upgrading object packagesv Upgrading NFS packagesv Upgrading SMB packagesv Manually upgrading pmswiftv Manually upgrading the performance

    monitoring tool

    v Manually upgrading the IBMSpectrum Scale management GUI

    v Upgrading Cloud servicesv Upgrading to IBM Cloud Object

    Storage software level 3.7.2 and above

    v Upgrading IBM Spectrum Scalecomponents with the installationtoolkit

    v Migrating from Express Edition toStandard Edition

    v Completing the upgrade to a newlevel of IBM Spectrum Scale

    v Reverting to the previous level ofIBM Spectrum Scale

    v Coexistence considerationsv Compatibility considerationsv Considerations for IBM Spectrum

    Protect™ for Space Management

    v GUI user role considerationsv Applying maintenance to your GPFS

    system

    System administrators, analysts,installers, planners, and programmers ofIBM Spectrum Scale clusters who arevery experienced with the operatingsystems on which each IBM SpectrumScale cluster is based

    xvi IBM Spectrum Scale 5.0.0: Administration Guide

    |

    ||

    ||

    ||

    ||

    |

    ||

    |

    |

    |

    |

    ||

    ||

    |

    ||

    |||

    ||

    ||

    ||

    |

    |

    ||

    |

    ||

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale:Administration Guide

    This guide provides the followinginformation:

    Configuring

    v Configuring the GPFS clusterv Configuring the CES and protocol

    configuration

    v Configuring and tuning your systemfor GPFS

    v Parameters for performance tuningand optimization

    v Ensuring high availability of the GUIservice

    v Configuring and tuning your systemfor Cloud services

    v Configuring file audit loggingv Configuring Active File Managementv Configuring AFM-based DRv Tuning for Kernel NFS backend on

    AFM and AFM DR

    Administering

    v Performing GPFS administration tasksv Verifying network operation with the

    mmnetverify command

    v Managing file systemsv File system format changes between

    versions of IBM Spectrum Scale

    v Managing disksv Managing protocol servicesv Managing protocol user

    authentication

    v Managing protocol data exportsv Managing object storagev Managing GPFS quotasv Managing GUI usersv Managing GPFS access control listsv Considerations for GPFS applicationsv Accessing a remote GPFS file system

    System administrators or programmersof IBM Spectrum Scale systems

    About this information xvii

    ||

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale:Administration Guide

    v Information lifecycle management forIBM Spectrum Scale

    v Creating and maintaining snapshotsof file systems

    v Creating and managing file clonesv Scale Out Backup and Restore

    (SOBAR)

    v Data Mirroring and Replicationv Implementing a clustered NFS

    environment on Linux

    v Implementing Cluster Export Servicesv Identity management on Windowsv Protocols cluster disaster recoveryv File Placement Optimizerv Encryptionv Managing certificates to secure

    communications between GUI webserver and web browsers

    v Securing protocol datav Cloud services: Transparent cloud

    tiering and Cloud data sharing

    v Managing file audit loggingv Highly-available write cache (HAWC)v Local read-only cachev Miscellaneous advanced

    administration

    v GUI limitations

    System administrators or programmersof IBM Spectrum Scale systems

    xviii IBM Spectrum Scale 5.0.0: Administration Guide

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: ProblemDetermination Guide

    This guide provides the followinginformation:

    Monitoring

    v Performance monitoringv Monitoring system health through the

    IBM Spectrum Scale GUI

    v Monitoring system health by usingthe mmhealth command

    v Monitoring events through callbacksv Monitoring capacity through GUIv Monitoring AFM and AFM DRv GPFS SNMP supportv Monitoring the IBM Spectrum Scale

    system by using call home

    v Monitoring remote cluster throughGUI

    v Monitoring file audit logging

    Troubleshooting

    v Best practices for troubleshootingv Understanding the system limitationsv Collecting details of the issuesv Managing deadlocksv Installation and configuration issuesv Upgrade issuesv Network issuesv File system issuesv Disk issuesv Security issuesv Protocol issuesv Disaster recovery issuesv Performance issuesv GUI issuesv AFM issuesv AFM DR issuesv Transparent cloud tiering issuesv File audit logging issuesv Maintenance proceduresv Recovery proceduresv Support for troubleshootingv References

    System administrators of GPFS systemswho are experienced with thesubsystems used to manage disks andwho are familiar with the conceptspresented in the IBM Spectrum Scale:Concepts, Planning, and Installation Guide

    About this information xix

    ||

    |

    |

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Commandand Programming Reference

    This guide provides the followinginformation:

    Command reference

    v gpfs.snap commandv mmaddcallback commandv mmadddisk commandv mmaddnode commandv mmadquery commandv mmafmconfig commandv mmafmctl commandv mmafmlocal commandv mmapplypolicy commandv mmaudit commandv mmauth commandv mmbackup commandv mmbackupconfig commandv mmblock commandv mmbuildgpl commandv mmcallhome commandv mmces commandv mmcesdr commandv mmchattr commandv mmchcluster commandv mmchconfig commandv mmchdisk commandv mmcheckquota commandv mmchfileset commandv mmchfs commandv mmchlicense commandv mmchmgr commandv mmchnode commandv mmchnodeclass commandv mmchnsd commandv mmchpolicy commandv mmchpool commandv mmchqos commandv mmclidecode commandv mmclone commandv mmcloudgateway commandv mmcrcluster commandv mmcrfileset commandv mmcrfs commandv mmcrnodeclass commandv mmcrnsd commandv mmcrsnapshot command

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    xx IBM Spectrum Scale 5.0.0: Administration Guide

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Commandand Programming Reference

    v mmdefedquota commandv mmdefquotaoff commandv mmdefquotaon commandv mmdefragfs commandv mmdelacl commandv mmdelcallback commandv mmdeldisk commandv mmdelfileset commandv mmdelfs commandv mmdelnode commandv mmdelnodeclass commandv mmdelnsd commandv mmdelsnapshot commandv mmdf commandv mmdiag commandv mmdsh commandv mmeditacl commandv mmedquota commandv mmexportfs commandv mmfsck commandv mmfsctl commandv mmgetacl commandv mmgetstate commandv mmhadoopctl commandv mmhealth commandv mmimgbackup commandv mmimgrestore commandv mmimportfs commandv mmkeyserv commandv mmlinkfileset commandv mmlsattr commandv mmlscallback commandv mmlscluster commandv mmlsconfig commandv mmlsdisk command

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    About this information xxi

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Commandand Programming Reference

    v mmlsfileset commandv mmlsfs commandv mmlslicense commandv mmlsmgr commandv mmlsmount commandv mmlsnodeclass commandv mmlsnsd commandv mmlspolicy commandv mmlspool commandv mmlsqos commandv mmlsquota commandv mmlssnapshot commandv mmmigratefs commandv mmmount commandv mmmsgqueue commandv mmnetverify commandv mmnfs commandv mmnsddiscover commandv mmobj commandv mmperfmon commandv mmpmon commandv mmprotocoltrace commandv mmpsnap commandv mmputacl commandv mmquotaoff commandv mmquotaon commandv mmremotecluster commandv mmremotefs commandv mmrepquota commandv mmrestoreconfig commandv mmrestorefs commandv mmrestripefile commandv mmrestripefs commandv mmrpldisk commandv mmsdrrestore commandv mmsetquota commandv mmshutdown commandv mmsmb commandv mmsnapdir commandv mmstartup commandv mmtracectl commandv mmumount commandv mmunlinkfileset commandv mmuserauth commandv mmwinservctl commandv spectrumscale command

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    xxii IBM Spectrum Scale 5.0.0: Administration Guide

    |

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Commandand Programming Reference

    Programming reference

    v IBM Spectrum Scale DataManagement API for GPFSinformation

    v GPFS programming interfacesv GPFS user exitsv IBM Spectrum Scale management API

    commands

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    About this information xxiii

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Big Data andAnalytics Guide

    This guide provides the followinginformation:

    IBM Spectrum Scale support forHadoop

    v HDFS transparencyv Supported IBM Spectrum Scale

    storage modes

    v Hadoop cluster planningv Installation and configuration of

    HDFS transparency

    v Application interaction with HDFStransparency

    v Upgrading the HDFS Transparencycluster

    v Rolling upgrade for HDFSTransparency

    v Securityv Advanced featuresv Hadoop distribution supportv Limitations and differences from

    native HDFS

    v Problem determination

    BigInsights® 4.2.5 and HortonworksData Platform 2.6

    v Planning– Hardware requirements

    – Preparing the environment

    – Preparing a stanza file

    v Installation– Set up

    – Installation of software stack

    – BigInsights value-add services onIBM Spectrum Scale

    v Upgrading software stack– Migrating from BI IOP to HDP

    – Upgrading IBM Spectrum Scaleservice MPack

    – Upgrading HDFS Transparency

    – Upgrading IBM Spectrum Scale filesystem

    – Upgrading to BI IOP 4.2.5

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    xxiv IBM Spectrum Scale 5.0.0: Administration Guide

    ||

  • Table 1. IBM Spectrum Scale library information units (continued)

    Information unit Type of information Intended users

    IBM Spectrum Scale: Big Data andAnalytics Guide

    v Configuration– Setting up High Availability [HA]

    – IBM Spectrum Scale configurationparameter checklist

    – Dual-network deployment

    – Manually starting services inAmbari

    – Setting up local repository

    – Configuring LogSearch

    – Setting IBM Spectrum Scaleconfiguration for BigSQL

    – Hadoop Kafka/Zookeeper andIBM Spectrum ScaleKafka/Zookeeper

    v Administration– IBM Spectrum Scale-FPO

    deployment

    – Ranger

    – Kerberos

    – Short-circuit read (SSR)

    – Disabling short circuit write

    – IBM Spectrum Scale servicemanagement

    – Ambari node management

    – Restricting root access

    – IBM Spectrum Scale managementGUI

    – IBM Spectrum Scale versus NativeHDFS

    v Troubleshooting– Snap data collection

    v Limitations– Limitations and information

    v FAQ– General

    – Service fails to start

    – Service check failures

    v System administrators of IBMSpectrum Scale systems

    v Application programmers who areexperienced with IBM Spectrum Scalesystems and familiar with theterminology and concepts in theXDSM standard

    Prerequisite and related informationFor updates to this information, see IBM Spectrum Scale in IBM Knowledge Center (www.ibm.com/support/knowledgecenter/STXKQY/ibmspectrumscale_welcome.html).

    For the latest support information, see the IBM Spectrum Scale FAQ in IBM KnowledgeCenter(www.ibm.com/support/knowledgecenter/STXKQY/gpfsclustersfaq.html).

    About this information xxv

    http://www.ibm.com/support/knowledgecenter/STXKQY/ibmspectrumscale_welcome.htmlhttp://www.ibm.com/support/knowledgecenter/STXKQY/ibmspectrumscale_welcome.htmlhttp://www.ibm.com/support/knowledgecenter/STXKQY/gpfsclustersfaq.htmlhttp://www.ibm.com/support/knowledgecenter/STXKQY/gpfsclustersfaq.html

  • Conventions used in this informationTable 2 describes the typographic conventions used in this information. UNIX file name conventions areused throughout this information.

    Note: Users of IBM Spectrum Scale for Windows must be aware that on Windows, UNIX-style filenames need to be converted appropriately. For example, the GPFS cluster configuration data is stored inthe /var/mmfs/gen/mmsdrfs file. On Windows, the UNIX namespace starts under the %SystemDrive%\cygwin64 directory, so the GPFS cluster configuration data is stored in the C:\cygwin64\var\mmfs\gen\mmsdrfs file.

    Table 2. Conventions

    Convention Usage

    bold Bold words or characters represent system elements that you must use literally, such ascommands, flags, values, and selected menu options.

    Depending on the context, bold typeface sometimes represents path names, directories, or filenames.

    bold underlined bold underlined keywords are defaults. These take effect if you do not specify a differentkeyword.

    constant width Examples and information that the system displays appear in constant-width typeface.

    Depending on the context, constant-width typeface sometimes represents path names,directories, or file names.

    italic Italic words or characters represent variable values that you must supply.

    Italics are also used for information unit titles, for the first use of a glossary term, and forgeneral emphasis in text.

    Angle brackets (less-than and greater-than) enclose the name of a key on the keyboard. Forexample, refers to the key on your terminal or workstation that is labeled with theword Enter.

    \ In command examples, a backslash indicates that the command or coding example continueson the next line. For example:

    mkcondition -r IBM.FileSystem -e "PercentTotUsed > 90" \-E "PercentTotUsed < 85" -m p "FileSystem space used"

    {item} Braces enclose a list from which you must choose an item in format and syntax descriptions.

    [item] Brackets enclose optional items in format and syntax descriptions.

    The notation indicates a control character sequence. For example, meansthat you hold down the control key while pressing .

    item... Ellipses indicate that you can repeat the preceding item one or more times.

    | In synopsis statements, vertical lines separate a list of choices. In other words, a vertical linemeans Or.

    In the left margin of the document, vertical lines indicate technical changes to theinformation.

    Note: CLI options that accept a list of option values delimit with a comma and no space between values.As an example, to display the state on three nodes use mmgetstate -N NodeA,NodeB,NodeC. Exceptions tothis syntax are listed specifically within the command.

    xxvi IBM Spectrum Scale 5.0.0: Administration Guide

  • How to send your commentsYour feedback is important in helping us to produce accurate, high-quality information. If you have anycomments about this information or any other IBM Spectrum Scale documentation, send your commentsto the following e-mail address:

    [email protected]

    Include the publication title and order number, and, if applicable, the specific location of the informationabout which you have comments (for example, a page number or a table number).

    To contact the IBM Spectrum Scale development organization, send your comments to the followinge-mail address:

    [email protected]

    About this information xxvii

  • xxviii IBM Spectrum Scale 5.0.0: Administration Guide

  • Summary of changes

    This topic summarizes changes to the IBM Spectrum Scale licensed program and the IBM Spectrum Scalelibrary. Within each information unit in the library, a vertical line (|) to the left of text and illustrationsindicates technical changes or additions that are made to the previous edition of the information.

    Summary of changesfor IBM Spectrum Scale version 5.0.0as updated, November 2018

    This release of the IBM Spectrum Scale licensed program and the IBM Spectrum Scale library includes thefollowing improvements. All improvements are available after an upgrade, unless otherwise specified.

    AFM and AFM DR-related changes

    v Compression policy is supported. For more information, see File compression in IBM SpectrumScale: Administration Guide.

    v ILM for snapshots is supported. For more information, see ILM for snapshots in IBM SpectrumScale: Administration Guide.

    v Throttling the number of filesets to perform recoveries on the gateway node. For moreinformation, see Gateway node failure and recovery in IBM Spectrum Scale: Concepts, Planning, andInstallation Guide.

    v Improved hashing algorithm to load balance filesets across gateway nodes. For moreinformation, see Primary gateway in IBM Spectrum Scale: Concepts, Planning, and InstallationGuide.

    v Configuration parameters have been added - afmMaxParallelRecoveries,afmAsyncOpWaitTimeout, afmSyncOpWaitTimeout, and afmRevalOpWaitTimeout. For moreinformation, see Configuration parameters for AFM and Configuration parameters for AFM-based DRin IBM Spectrum Scale: Administration Guide.

    v Configuration parameters have been modified - afmRPO and afmHashVersion. For moreinformation, see Configuration parameters for AFM and Configuration parameters for AFM-based DRin IBM Spectrum Scale: Administration Guide.

    Authentication: Primary group selection configurable for AD + RFC2307 based authenticationAbility to choose primary group as set in "UNIX attributes" of a user on Active Directoryintroduced with AD + RFC2307 based authentication scheme. Earlier, Windows primary groupwas by default selected as the primary group.

    Big data and analytics changesFor information on changes in IBM Spectrum Scale Big Data and Analytics support, see Big dataand analytics - summary of changes.

    IBM Spectrum Scale management API changesAdded the following new commands:v GET /perfmon/datav GET /filesystems/{filesystemName}/afm/statev DELETE /nodes/{name}v POST /nodesv GET /nodeclassesv POST /nodeclassesv DELETE /nodeclasses/{nodeclassName}v GET /nodeclasses/{nodeclassName}

    © Copyright IBM Corp. 2014, 2018 xxix

    |||

    ||

    |

    ||

    ||

    |||

    |||

    ||||

    |||

    ||||

    |||

    ||

    |

    |

    |

    |

    |

    |

    |

    |

    https://www.ibm.com/support/knowledgecenter/STXKQY_BDA_SHR/bl1bda_soc.htm?cp=STXKQY_5.0.0https://www.ibm.com/support/knowledgecenter/STXKQY_BDA_SHR/bl1bda_soc.htm?cp=STXKQY_5.0.0

  • v PUT /nodeclasses/{nodeclassName}v DELETE /jobs/jobIdv POST /filesystems/{filesystemName}/filesets/{filesetName}/psnapsv DELETE /filesystems/{filesystemName}/filesets/{filesetName}/psnaps/{snapshotName}v GET /thresholdsv GET /thresholds/{name}v POST /thresholdsv DELETE /thresholds/{name}

    For more information on the API commands, see IBM Spectrum Scale management API commands inIBM Spectrum Scale: Command and Programming Reference. You can also access the documentationcorresponding to each API command from the GUI itself. The API documentation is available inthe GUI at: https://:/ibm/api/explorer/. For example:https://scalegui.ibm.com:443/ibm/api/explorer.

    The JSON object structure is modified for the following API commands:

    /clusterrshSudoWrapper, rcpSudoWrapper: Changed type from String to Boolean

    /filesetsMoved filesetName and filesystemName out of the config object.

    /nfs/exportsRemoved the config object and moved the attributes one level up.

    /nsds and /disksRemoved the config object and moved the attributes one level up.

    quorumDisk: Changed type from String to Boolean.

    size, availableBlocks, availableFragments: Changed type from String to Long. Values are nowin bytes.

    /smb/sharesRemoved the config object and moved the attributes one level up.

    /snapshotsRemoved the config object and moved the attributes one level up.

    IBM Spectrum Scale GUI changesThe following changes are made to the GUI:v Added new Networks page to monitor the performance, configuration, and adapters of

    network configurations in the cluster. You can monitor the network performance with respectto the IP and RDMA interfaces used in the configuration. For more information, see Monitoringnetworks in IBM Spectrum Scale: Problem Determination Guide.

    v Added new Monitoring > Thresholds page to create and monitor the threshold rules that aredefined in the system. For more information, see Monitoring thresholds in IBM Spectrum Scale:Problem Determination Guide.

    v Added Access > Remote Connections page to enable the GUI node of the local cluster tomonitor the remote cluster by establishing a connection with the GUI node of the remotecluster. For more information, see Monitoring remote cluster through GUI in IBM Spectrum Scale:Problem Determination Guide.

    v Added Settings > Call Home page to configure call home. Configuring the call home featurehelps the IBM Support to monitor the system. Configuring call home also helps to reduce theresponse time of the IBM Support to resolve any issues.The diagnostic data that is downloaded through the Settings > Diagnostic Data can beuploaded to a problem management record (PMR) by using the call home feature in the

    xxx IBM Spectrum Scale 5.0.0: Administration Guide

    |

    |

    |

    |

    |

    |

    |

    |

    |||||

    |

    ||

    ||

    ||

    ||

    |

    ||

    ||

    ||

    ||

    ||||

    |||

    ||||

    |||

    ||

  • backend. To upload the diagnostic data, right-click the relevant data set from the PreviouslyCollected Diagnostic Data, and select Upload to PMR.For more information, see Configuringcall home using GUI in IBM Spectrum Scale: Problem Determination Guide.

    v Added the file system creation capabilities in GUI. Use the Files > File Systems > Create FileSystem option to launch the Create File System wizard. In the Create File System wizard, youcan specify the following details of the file system:– File system name– Storage pools– NSDs for the file systems– Failure groups– NSD order for data writes– Maximum number of Spectrum Scale clients– Maximum number of inodes of the root fileset– Whether to enable quota and scope for the quota definition– Whether to enable DMAPI– Mount point and automatic mount mode

    For more information, see Creating and managing file systems using GUI in IBM Spectrum Scale:Administration Guide.

    v Added the aggregation levels Access Point and Filesets and removed Account for the resourcetype Transparent Cloud Tiering in the Monitoring > Statistics page.

    v The Files > Transparent Cloud Tiering page now displays the file systems and filesets that aremapped with the TCT services. It also shows the connection of such a container pairconfiguration to a cloud account and the corresponding CSAP that is configured for the cloudaccount.

    v Changed and updated information in the Added DMPs for TIP events page. The DMPs helpthe users resolve issues that are associated with the tip events. For more information, see theDirected maintenance procedures for tip events topic in the IBM Spectrum Scale: ProblemDetermination Guide.

    v Changes to capacity monitoring in the GUIThe following changes are made to the capacity monitoring options in the GUI:– Moved the Capacity page from Monitoring to Files menu in the navigation and renamed

    the GUI page to User Capacity.– Only the file data user capacity can be viewed from the Files > User Capacity page.

    Removed the pools, filesets, file system capacity monitoring options from the Files > UserCapacity page. You can monitor the capacity of these components from the respective GUIpages.

    – Replaced the GPFSPoolCap sensor with the GPFSPool sensor and separate data andmetadata level capacity monitoring are introduced in the performance charts available in theFiles > File Systems and Storage > Pools pages.

    – New GPFSPool-based data and metadata performance monitoring metrics are available forselection in the Files > Statistics > Edit > Capacity section. You need to select theaggregation level as Pool to view these metrics.

    For more information, see Monitoring capacity through GUI in IBM Spectrum Scale: ProblemDetermination Guide.

    v AFM monitoring changes in the GUIThe following AFM monitoring features are introduced:– Provides the number of AFM filesets and the corresponding export server maps. Each export

    map establishes a mapping between the gateway node and the NFS host name to allowparallel data transfers from cache to home.

    Summary of changes xxxi

    |||

    |||

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    ||

    ||

    ||||

    ||||

    |

    |

    ||

    ||||

    |||

    |||

    ||

    |

    |

    |||

  • – By using the Request Access option available in the Files > Active File Management orAccess > Remote Connection page in the GUI, you can now establish connection withremote clusters. After establishing the connection, you can monitor the following AFM andAFM DR configuration details across clusters:- On home and secondary, you can see the AFM relationships configuration, health status,

    and performance values of the Cache and Disaster Recovery grids.- On the Overview tab of the detailed view, the available home and secondary inodes are

    available.- On the Overview tab of the detailed view, the details such as NFS throughput, IOPs, and

    latency details are available, if the protocol is NFS.

    For more information, see Monitoring AFM and AFM DR using GUI in IBM Spectrum Scale:Problem Determination Guide.

    v New option to create AFM peer snapshots through GUI. Use the Create Peer Snapshot optionin the Files > Snapshots page to create peer snapshots. You can view and delete these peersnapshots from the Snapshots page and also from the detailed view of the Files > Active FileManagement page.

    IBM Spectrum Scale functionality to support GDPR requirementsTo understand the requirements of EU General Data Protection Regulation (GDPR) compliancethat are applicable to unstructured data storage and how IBM Spectrum Scale helps to addressthem, see the IBM Spectrum Scale functionality to support GDPR requirements technote.

    Encryption: GSKit V8 improves cryptographic performance on IBM POWER8®

    The IBM Global Security Kit (GSKit) Version 8 and later improves cryptographic performance onIBM POWER8 hardware. For more information, see the IBM article GSKIT V8 Support for PKCS#11device integration and on-CPU acceleration (https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/W746177d414b9_4c5f_9095_5b8657ff8e9d/page/PKCS%2311%20device%20integration). The version of GSKit that is shipped with IBM Spectrum Scale v5.0.0offers better performance on POWER8, compared with the versions shipped with earlier releases.

    File audit loggingFile audit logging is a new capability in IBM Spectrum Scale v5.0.0. File audit logging takeslocally generated file system events and puts them on a multinode message queue from whichthey are consumed and written to a retention enabled fileset. These events, called lightweightevents, occur at the file system level. They are protocol agnostic, which means that they captureall access to a monitored file system from protocol exports to even root access that occurs directlyon nodes. File audit logging is integrated into the system health infrastructure. Alerts aregenerated for elements of the message queue and the processes that consume the events andcreate the audit logs. For more information, see Introduction to file audit logging in the IBMSpectrum Scale: Concepts, Planning, and Installation Guide.

    File compression: The lz4 library provides fast access to compressed dataFile compression supports the lz4 compression library. Lz4 is intended primarily for active dataand favors read-access speed over maximized space saving. For more information, see the topicFile compression in the IBM Spectrum Scale: Administration Guide.

    File data: Smaller subblock sizes improve I/O performance and reduce fragmentationSubblock sizes are smaller relative to block sizes; for example, a 4 MiB block uses 8 KiBsubblocks. The same choice of data block sizes is available, but the default data block size islarger, 4 MiB instead of 256 KiB. A larger block size improves the file system performance and asmaller subblock size reduces the amount of unused space. For many business applications, thedefault value of 4 MiB provides the best balance of improved performance and reducedfragmentation. For more information, see mmcrfs command in the IBM Spectrum Scale: Commandand Programming Reference. This feature is supported only for file systems that are created at filesystem format number 18.00 (IBM Spectrum Scale 5.0.0.0) or later.

    xxxii IBM Spectrum Scale 5.0.0: Administration Guide

    ||||

    ||

    ||

    ||

    ||

    ||||

    ||||

    |||||||

    ||||||||||

    ||||

    |||||||||

    http://w3-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/TD106420https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/W746177d414b9_4c5f_9095_5b8657ff8e9d/page/PKCS%2311%20device%20integrationhttps://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/W746177d414b9_4c5f_9095_5b8657ff8e9d/page/PKCS%2311%20device%20integrationhttps://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/W746177d414b9_4c5f_9095_5b8657ff8e9d/page/PKCS%2311%20device%20integration

  • File encryption: AES-XTS encryption is faster on x86 in non-FIPS modeOn x86 architecture in non-FIPS mode, file encryption with the AES algorithm in XTS mode isfaster than it was. For more information, see the topics Encryption policy rules and Encryption andFIPS-140-2 certification in the IBM Spectrum Scale: Administration Guide.

    File systems: File system rebalancing is fasterRebalancing is implemented by a lenient round-robin method that typically runs faster than thepreviously used method of strict round robin. The strict round robin method is available as anoption. For more information, see the topics mmrestripefs command, mmrestripefile command,mmadddisk command, and mmdeldisk command in the IBM Spectrum Scale: Command and ProgrammingReference.

    Installation toolkit changes

    v The installation toolkit has added support for the installation and the deployment of protocoland client nodes in a cluster that contains Elastic Storage Server (ESS). For more information,see ESS awareness with the installation toolkit in IBM Spectrum Scale: Concepts, Planning, andInstallation Guide.

    v The installation toolkit has added support for enabling and configuring call home. For moreinformation, see Enabling and configuring call home using the installation toolkit in IBM SpectrumScale: Concepts, Planning, and Installation Guide.

    v The installation toolkit has added support for enabling and configuring file audit logging. Formore information, see Enabling and configuring file audit logging using the installation toolkit inIBM Spectrum Scale: Concepts, Planning, and Installation Guide.

    v The installation toolkit has added support for the installation and the deployment of IBMSpectrum Scale on Ubuntu 16.04 LTS nodes.

    v The installation toolkit has added support for the installation and the deployment of IBMSpectrum Scale on Red Hat Enterprise Linux 7.4 nodes.

    v The installation toolkit has added verification of passwordless SSH during prechecks beforeinstallation, deployment, or upgrade.

    v The installation toolkit has added support for cumulative object upgrade.

    mmafmctl commandThe --outband parameter is deprecated.

    mmcallhome command: Enhancements

    Addition of -Y optionThe -Y displays the command output in a parseable format with a colon (:) as a fielddelimiter.

    Addition of --pmr optionThe --pmr option allows you to upload data to existing PMRs using the mmcallhome runSendFile command. For more information, see mmcallhome command in the IBM SpectrumScale: Command and Programming Reference.

    mmchconfig command: Enhancements

    Encrypted files can be copied into an LROC deviceWith the lrocEnableStoringClearText attribute, you can control whether file data fromencrypted files, which is held in memory as cleartext, is copied into a local read-onlycache (LROC) device.

    InfiniBand addresses can be specified for RDMA transfersIn the verbsPorts attribute, you can specify InfiniBand addresses for RDMA transfersbetween an NSD client and server.

    For more information, see mmchconfig command in the IBM Spectrum Scale: Command andProgramming Reference.

    Summary of changes xxxiii

    ||||

    ||||||

    |

    ||||

    |||

    |||

    ||

    ||

    ||

    |

    ||

    |

    |||

    ||||

    |

    ||||

    |||

    ||

  • mmchnsd command: Change NSDs without unmounting the file systemWhen you add or remove NSDs or do other operations with mmchnsd, you do not need tounmount the file system. For more information, see the topic mmchnsd command in the IBMSpectrum Scale: Command and Programming Reference.

    mmcrfs command: Enhancements

    The default data block size is 4 MiB with an 8 KiB subblock sizeIf no block size is specified, a file system is created with a 4 MiB block size and an 8 KiBsubblock size. The minimum release level (minReleaseLevel) of the cluster must be 5.0.0or greater when the file system is created. For more information, see the entry File data:Smaller subblock sizes improve I/O performance and reduce fragmentation earlier inthis topic.

    The default log file size depends on block size and metadata sizeIf the block size is 512 KiB or larger and the metadata block size 256 KiB or larger, thenthe default log file size is 32 MiB. Otherwise, the default log file size is 4 MiB or themetadata block size, whichever is larger. For more information, see the topic mmcrfscommand in the IBM Spectrum Scale: Command and Programming Reference.

    The default method for updating atime is relatimeIf the minimum release level (minReleaseLevel) of the cluster is 5.0.0 or greater when thefile system is created, the default method for updating atime is relatime. For moreinformation, see the topics mmcrfs command and mmchfs command in the IBM SpectrumScale: Command and Programming Reference.

    mmdsh command: Several options are no longer supportedThe --ignoreSignal, -I, and -d options are no longer supported. Do not use these options unlessinstructed to by IBM support personnel. For more information, see the topic mmdsh command inthe IBM Spectrum Scale: Command and Programming Reference.

    mmfsck command: Display an interim status report at any timeWhile a long-running instance of mmfsck is in progress, you can start another instance of mmfsckwith the --status-report parameter to display current status information from all the nodes thatare participating in the mmfsck run. For more information, see the topic mmfsck command in theIBM Spectrum Scale: Command and Programming Reference.

    mmgetstate command: Display the unresponsive stateThe command returns the unresponsive state when the GPFS daemon is running but is notresponding. For more information, see the topic mmgetstate command in the IBM Spectrum Scale:Command and Programming Reference.

    mmhealth command: Addition to measurement optionsMeasurement options for filesystem, SMB node, and NFS node has been added to the mmhealthcommand. For more information, see the topic mmhealth command in the IBM Spectrum Scale:Command and Programming Reference.

    mmkeyserv command: The simplified setup method supports certificate chains from a certificateauthority.

    In the simplified setup, with the --kmip-cert parameter, you can set up encryption with IBM®

    Security Key Lifecycle Manager (SKLM) as the key management server and with a certificatesigned by a certificate authority (CA) on the KMIP port of the SKLM server. For moreinformation, see the topic mmkeyserv command in the IBM Spectrum Scale: Command andProgramming Reference.

    mmnetverify command: Enhancements

    Verify the network operation of nodes in a subnetWith the --subnets parameters, you can specify the subnet addresses of the nodes thatyou want to verify.

    xxxiv IBM Spectrum Scale 5.0.0: Administration Guide

    ||||

    |

    ||||||

    |||||

    |||||

    ||||

    |||||

    ||||

    ||||

    |||||||

    |

    |||

  • Verify that nodes can handle a new MTU sizeWith the ping-packet-size parameter, you can specify the size of the ICMP echo requestpackets that are sent between local node and the target node during the ping test.

    For more information, see mmchconfig command in the IBM Spectrum Scale: Command andProgramming Reference.

    mmpmon command: EnhancementsA new option loc_io_s is added to mmpmon command. It stands for locality I/O statistics.

    mmtracectl command: Display the tracing statusThe --status parameter displays the tracing status of the specified nodes. For more information,see mmtracectl command in the IBM Spectrum Scale: Command and Programming Reference.

    Threshold monitoring enhancementsIf multiple thresholds rules have overlapping entities for the same metrics, only one of theconcurrent rules is made actively eligible. For more information, see the New features for thresholdmonitoring section in Threshold monitoring for system health topic in the IBM Spectrum Scale: ProblemDetermination Guide.

    NFS: Dynamic export changesYou can dynamically change the export configuration without restarting the NFS service. Formore information, see the Changing NFS export configuration topic in the IBM Spectrum Scale:Administration Guide.

    Object changesThe following changes have been done.v Object protocol support is extended to Ubuntu 16.04 LTS.v The sudo wrapper for object is added on Ubuntu 16.04 LTS.v Cumulative object upgrades from older versions are supported.v Object snap enhancement are done to contain Keystone logs.

    Protocol support: EnhancedNFS, SMB, and object support is extended to Ubuntu 16.04 LTS.

    Setting up a system for storing crash files for UbuntuSupport is added to set up a system for storing crash files for Ubuntu. For more information, seethe Setting up an Ubuntu system to capture crash files topic in the IBM Spectrum Scale: ProblemDetermination Guide.

    SMB: DFS redirects for SMB sharesNew option to configure DFS redirects for SMB shares. For more information, see mmsmbcommand in the IBM Spectrum Scale: Command and Programming Reference.

    SMB: SMB server upgrade changesTwo events on CTDB version match/mismatch are added to the RAS events. For moreinformation, see the RAS events topic in the IBM Spectrum Scale: Problem Determination Guide.

    Sudo wrappers: Root-level processes can call administration commands directlyRoot-level background processes, such as cron and callback programs, can successfully calladministration commands directly rather than through sudo when sudo wrappers are enabled.For more information, see Root-level processes that call administration commands directly in the IBMSpectrum Scale: Administration Guide.

    Cloud services changesThe following enhancements are made:v A new robust set of CLI functions, which allow for much greater configuration of the system.v Support for multiple cloud storage accountsv Support for multiple file systems or filesets per node group

    Summary of changes xxxv

    |||

    ||

    ||

    |||

    |||||

    ||||

    ||

    |

    |

    |

    |

    ||

    ||||

    |||

    |||

    |||||

    ||

    |

    |

    |

  • v Enhanced support for large file systems provided by container spilloverv Support for associating file sets with containers for enhanced granularityv Multiple URL and region support at the node levelv Support for creating a Cloud services separately for tiering and sharing operations. For more

    information, see the Creating Cloud services topic in the IBM Spectrum Scale: Administration Guide.v Unique encryption key per cloud containerv Support for remotely mounted clients. For more information, see the Setting up Transparent

    cloud tiering service on a remotely mounted client topic in the IBM Spectrum Scale: AdministrationGuide.

    v Support for Amazon S3 regions requiring Sigv4 security support, including the US governmentcloud region.

    v Ability to enable or disable transparent recall for files for a given file system instantly, withouthaving to rewrite a policy.

    v Support for backing up and restoring the Cloud services configuration in case of any disaster.For more information, see the Backing up the Cloud services configuration topic in the IBMSpectrum Scale: Administration Guide.

    v Support for backing up the Cloud services database to the cloud. For more information, see theBacking up the Cloud services database to the cloud topic in the IBM Spectrum Scale: AdministrationGuide.

    v Support for restoring Transparent cloud tiering service on an identical backup cluster. For moreinformation, see the Restoring Transparent Cloud services on a backup cluster topic in the IBMSpectrum Scale: Administration Guide.

    v Support for checking the integrity of the Cloud services database after any system crash oroutage. For more information, see the Checking the Cloud services database integrity topic in theIBM Spectrum Scale: Administration Guide.

    v Support for auditing events relating to each operation performed in Cloud services. For moreinformation, see the Cloud services audit events topic in the IBM Spectrum Scale: ProblemDetermination Guide.

    Documented commands, structures, and subroutinesThe following lists the modifications to the documented commands, structures, and subroutines:

    New commandsThese commands are new in this release.v mmauditv mmmsgqueue

    New structuresThere are no new structures.

    New subroutinesThere are no new subroutines.

    Changed commandsThe following commands were changed:v mmafmctlv mmadddiskv mmcallhomev mmchattrv mmchclusterv mmchconfigv mmchfsv mmchnsd

    xxxvi IBM Spectrum Scale 5.0.0: Administration Guide

    |

    |

    |

    ||

    |

    |||

    ||

    ||

    |||

    |||

    |||

    |||

    |||

    ||

    ||

    |

    |

    ||

    ||

    ||

    |

    |

    |

    |

    |

    |

    |

    |

  • v mmcloudgatewayv mmcrclusterv mmcrfsv mmdeldiskv mmdshv mmfsckv mmgetstatev mmkeyservv mmnetverifyv mmnfsv mmpmonv mmrestripefilev mmrestripefsv mmsmbv mmtracectlv mmuserauthv spectrumscale

    Changed structuresThere are no changed structures.

    Changed subroutinesThere are no changed subroutines.

    Deleted commandsmmrest

    Deleted structuresThere are no deleted structures.

    Deleted subroutinesThere are no deleted subroutines.

    MessagesThe following are the new, changed, and deleted messages:

    New messages6027-1264, 6027-1757, 6027-2394, 6027-2395, 6027-2396, 6027-2397, 6027-2398, 6027-2399,6027-2400, 6027-2401, 6027-3259, 6027-3408, 6027-3597, 6027-3598, 6027-3599, 6027-3600,6027-3601, 6027-3602, 6027-3603, 6027-3604, 6027-3730, 6027-3921, 6027-3922, 6027-3923,6027-3924, 6027-3925, 6027-3926, 6027-3927, 6027