A Primer on Object Storage

I recently took a new job in the Enterprise storage group at a large company, and as part of my new responsibilities I will be implementing, configuring, and managing our object storage.  We will be using EMC’s ECS solution, however I’ve been researching object storage as a platform in general to learn more about it, it’s capabilities, it’s use cases, and it’s general management. This blog post is a summary of the information I’ve assimilated about object storage along with some additional information about the vendors who offer object storage solutions.

At its core, what is object based storage?  Object based storage is an architecture that manages data as objects as opposed to other architectures such as file systems that manage data as a file hierarchy, and block storage that manages data as blocks within sectors & tracks.  To put it another way, Object Storage is not directly accessed by the operating system and is not seen as a local or remote filesystem by an operating system. Interaction with data occurs only at the application level via an API.  While Block Storage and File Storage are designed to be consumed by your operating system, Object Storage is designed to be consumed by your application.  What are the implications of this?

  • Byte level interaction with data is no longer possible. Data objects are stored or retrieved in their entirety with a single command. This is results in powerful scalability by making all file I/O sequential, which is much higher performance than random I/O.
  • It allows for easier application development by providing a higher level of abstraction than traditional storage platforms.
  • Interaction can happen through a single API endpoint. This removes complex storage network topologies from the design of the application infrastructure, and dramatically reduces security vulnerabilities as the only available access is the HTTP/HTTPS API and the service providing the API functionality.
  • Filesystem level utilities cannot interact directly with Object Storage.
  • Object Storage is one giant volume, resulting in almost all storage management overhead of Block and File Storage being eliminated.

Object storage is designed to be more scalable than traditional block and file storage and it specifically targets unstructured content.  In order to achieve improved scalability over traditional file storage it bundles the data with additional metadata tags and a unique identifier. The metadata is completely customizable, allowing an administrator to input much more identifying information for each data object. The objects are also stored in a flat address space which makes it much easier to locate and retrieve data across geographic regions.

Object storage began as a niche technology for enterprises, however it quickly became one of the basic general underlying technologies of cloud storage.  Object storage has become a valid alternative to file based storage due to rapid data growth and the proliferation of big data in the enterprise, an increased demand for private and hybrid cloud storage and a growing need for customizable and scalable storage infrastructures.  The number of object storage products has been rapidly expanding from both major storage vendors and startup companies in recent years to accommodate the increasing demand.  Because many vendors offer Object Storage platforms that run on commodity hardware, even with data protection overhead the price point is typically very attractive when compared to traditional storage.

WHAT’S THE DIFFERENCE BETWEEN OBJECT AND FILE STORAGE?

Object storage technology has been finding its way into file based use cases at many companies.  In some cases object storage vendors are positioning their products as viable NAS alternatives. To address the inherent limitations of traditional file and block level storage to reliably support a huge amount of data and at the same time be cost-effective, object storage focuses on scalability, resiliency, security and manageability. So, what’s the difference between the two?  In general, the difference is in it’s performance, geographic distribution, scalability, and analytics.

OBJECT STORAGE IS HIGHLY SCALABLE

Scalability is a major issue in storage, and it’s only increasing as time goes on. If you need to scale into the petabytes and beyond, you many need to scale in an order of magnitude greater than what a traditional single storage system is capable of.  As traditional storage systems aren’t going to scale to that magnitude, a different type of storage needs to be considered that can still be cost effective, and object storage fills that need very well.

Object storage overcomes many of the scalability limitations that file storage faces.  I really liked the warehouse example that Cloudian used on their website, so I’m going to summarize that.  If you think of file storage as a large warehouse, when you first store a box of files your warehouse looks almost empty and your available space looks infinite. As your storage needs expand that warehouse fills up before you know it, and being in the big city there’s no room to build another warehouse next to it.  In this case, think of object storage as a warehouse without a roof.  New boxes of files can be added almost indefinitely.

While that warehouse with the infinite amount of space sounds good in theory, you may have some trouble finding a specific box in that warehouse as it expands into infinity. Object storage addresses that limitation by allowing customizable metadata.  While a file storage system may only allow metadata to save the date, owner, location, and size of the box, the object storage system can customize the metadata, and object metadata lives directly in the object, rather than in a separate inode (this is useful as the amount of metadata that is desirable in a storage platform that is tens or hundreds of Petabytes is generally an order of magnitude greater than what conventional storage is designed to handle at scale).  Getting back to the warehouse example, along with the date, owner, location, and size, the object metadata could include the exact coordinates of the box, a detailed log of changes and access, and a list of the contents of the box.  Object storage systems replace the limited and rigid file system attributes of file level storage with highly customizable metadata that captures common object characteristics and can also hold application-specific information. Because object storage uses a flat namespace performance may suffer as your data warehouse explodes in size, but you’re not going to have to worry about finding what you need when you need it.

In addition, object storage systems substitute the locking requirements of file level storage to prevent multiple concurrent updates, which enables rollback features and the undeleting of objects as well as the ability to access prior versions of objects.

Object vs. File.  Here’s a brief overview of the main differences.

  • Performance.  Object storage performs best for big data and high storage throughput, file storage performs better for smaller files.  Scality’s Organic Ring offers high performance configurations for applications such as email and databases, however traditional storage in general still offers better performance for those use cases.
  • Geography.  Object storage data can be storage and shared across multiple geographic regions, file storage data is typically shared locally.  File data spread throughout geographic regions is typically read-only replicated copies of data.
  • Scalability.  Object storage offers almost infinite scalability, file storage does not scale nearly as well when you get into millions of files in a volume and petabytes and beyond of total capacity.
  • Analytics.  Object storage offers customizable metadata in a flat namespace and is not limited in the number of metadata tags, file storage is limited in that respect.

OBJECT STORAGE AND RESILIENCY

So, we now understand that object storage offers much greater scalability than traditional file storage, what about resiliency?  Traditional file storage systems are hampered by their inherent limitations in supporting massive capacity, most importantly with a sufficient amount of data protection.  As any backup administrator would know, it’s unrealistic to try and back up hundreds of petabytes (or more) of data in any reasonable amount of time.  Object systems directly address that issue as they are designed to not need backups. They aren’t intended to be backed up.  Rather than using traditional backups, an object storage infrastructure is designed to store data with sufficient redundancy so that data is never lost even when multiple components of the infrastructure have failed.

How is this achieved? The primary way this is achieved is by keeping multiple replicas of objects, ideally across a wide geographic area.  Because of the additional storage that replication requires, object storage systems implement an efficient erasure coding data protection method to supplement data replication. What is erasure coding? It uses an algorithm to create additional information that allows for recreating data from a subset of the original data, similar to RAID protection’s parity bits.  The degree of resiliency is generally configurable on all object storage systems. The higher the level of resiliency that the administrator chooses of course results in a larger storage capacity requirement. Erasure coding saves capacity but impacts performance, especially if erasure coding is performed across geographically dispersed nodes. Different vendors handle the performance balance between erasure coding and replication differently.  Geographic erasure coding is generally supported, however only using it locally and replicating data geographically with data reduction seems to strike a good balance between performance and resiliency.

OBJECT STORAGE EASES MANAGEMENT

Object storage systems are designed to minimize storage administration through automation, policy engines and self-correcting capabilities. They are designed for zero downtime and across all vendors administration tasks can be performed without service disruption.  This includes adding capacity, hardware maintenance and upgrades, and even migrating to a different data center.  The object storage policy engines enable the automation of object storage features such as when to change the number of replicas to address spikes in usage, when to use replication vs. erasure coding, and which data centers to store objects based on the relevant metadata.

OBJECT STORAGE AND APPLICATION ACCESSIBILITY

As you might expect, each object storage vendor has implemented its own proprietary APIs Object storage utilizing the REST API to use the various storage functions.  All object storage products also support the industry standard Amazon S3 API, which enjoys perhaps the largest level of application support.  It’s not surprising as Amazon S3 has extensive capabilities and supports complex storage operations.  Be aware that some object storage vendors only support an S3 API subset, and understanding the S3 API implementation’s limitations is absolutely key to ensuring the widest level of application support in your environment.

In addition to S3 most object storage vendors also support the OpenStack Swift API.  File system protocol support is common in object storage systems, but implementations of course vary by product.  As I mentioned earlier, the company I work for went with ECS.  EMC ECS has geo distributed active/active NFS support, a key feature, and it offers Hadoop HDFS interfaces which allows Hadoop to directly access data in an object stores.  With the ECS system’s consistency support it’s a very strong geo-distributed NAS product.  Different vendors of course have different strengths and weaknesses.  A strong competitor of EMC, Scality, claims that it has EMC Isilon-level NAS performance (although I haven’t tested that), and the NetApp StorageGRID Webscale now offers protocol duality by having a one-to-one relationship between objects and files.  Other object storage products provide different unique features as well.  Some offer file system support through their own or third-party cloud storage gateways, and some provide S3 compliant connectors that allow Hadoop to use object storage as an alternative to HDFS.

OBJECT STORAGE AND DATA ENCRYPTION

Public cloud storage is a very common use case for object storage, and encryption is obviously a must for public cloud storage.  Most object storage products support both at-rest and in-transit encryption, and most use an at-rest encryption approach where encryption keys are generated dynamically without a need for a separate key management system.  Some vendors (such as Cloudian and Amplidata) support client-managed encryption keys in addition to server-side managed encryption keys which gives cloud providers an option to allow their customers to manage their own keys.  LDAP and Active Directory authentication support of users accessing the object store are also commonly supported in current object storage systems.  If support of AWS v2 or v4 authentication is needed to provide access to vaults and vault objects, do your research as support is less common.

THE BEST USE CASES FOR OBJECT STORAGE

The ability of object storage to scale and accessibility via APIs makes them suitable in use cases where traditional storage systems just can’t compete, even in the NAS arena.  So, now that you know what object storage is, what can it be used for, and how can you take advantage of the improved scalability and accessibility?  While object storage is typically not well suited for relational database or any data that requires a large amount of random I/O, it has many possible use cases that I’ve outlined below.

Advantages

  • Highly Scalable capacity and performance
  • Low cost on commodity hardware at petabyte scale
  • Simplified management
  • Single Access Point/namespace for data

Disadvantages

  • No random access to files
  • Lower performance on a per-object basis compared to traditional storage
  • Integration may require modification of application and workflow logic
  • POSIX utilities will not work directly with object storage

Use Cases

  • Logging.  It is often used to capture large amounts of log data generated by devices and applications which are ingested into the object store via a message broker.
  • NAS.  Many companies are considering object storage as a NAS alternative, most notably if there is another use case that requires an object storage system and the two use cases can be combined.
  • Big Data.  Several object storage products offer certified S3 Hadoop Distributed File System interfaces that allow Hadoop to directly access data on the object store.
  • Content distribution network.  Many companies use an object storage implementation to globally distribute content (like media files) using policies to govern access, along with features like automatic object deletion based on expiration dates.
  • Backup and Archive of structured and semi-structured data.  Because object storage systems are cost-effective, many companies are looking to them as highly scalable backup and archive solution.
  • Content Repositories.  Object storage is often used as a content repository for images, videos and general media content accessed directly through applications or through file system protocols.
  • Enterprise Collaboration.  Because of the scale and resiliency of object storage across large geographic regions, distributed object storage systems are often used as collaboration platforms in large enterprises where content is accessed and shared around the globe.
  • Storage as a Service (SaaS).  Object storage is often used for private and public clouds of enterprises and internet service providers.

OBJECT STORAGE VENDORS AND PRODUCTS

There are numerous object storage vendors in the market today.  You can purchase a detailed vendor comparison of all the object storage vendors at the Evaluator Group (Evaluator Group Object Storage Comparison Matrix) , and view the Gartner Object storage comparison matrix for more detailed information.  According to Gartner, DellEMC, Scality, and IBM are the current market leaders with Hitachi as the strongest challenger.

Gartner Market Leaders for Object Storage:

EMC Elastic Cloud Storage (ECS)

EMC Delivers ECS as a  turnkey integrated appliance or as a software package to be installed and run on commodity hardware.  It features highly efficient strong consistency on access of geodistributed objects, and is designed from the ground up with geodistribution in mind.

Scality RING

It is provided as delivered software only to run on commodity hardware, it stores metadata in a custom-developed distributed database, and they claim EMC Isilon performance when it’s used as NAS.

IBM Clould Object Storage

It is provided as delivered software only to run on certified hardware, it is a multi-tiered architecture with no centralized servers, and it offers extreme scalability enabled by peer-to-peer communication of storage nodes.

Other Object Storage Vendors:

Hitachi Content Platform (HCP)

It is delivered as a turnkey integrated appliance or as a software package to run on commodity hardware or as a managed service hosted by HDS.  It offers extreme density with a single cluster able to support up to 800 million objects and 497 PB of addressable capacity, and an integrated portfolio: HCP cloud storage, HCP Anywhere File Sync & Share, and Hitachi Data Ingestor (HDI) for remote and branch offices.

NetApp StorageGRID Webscale

It is delivered as software appliance or as a turnkey integrated appliance, it stores metadata (including the physical location of objects) in a distributed NoSQL Cassandra database.

DDN WOS Object Storage

It is delivered as turnkey integrated appliance or as a software package to run on commodity hardware, It can be configured as small as one node to start and it is able to scale to hundreds of petabytes.

Caringo Swarm 8

It is delivered as a software package to run on commodity hardware. It offers out-of-box integration with Elastic search for fast object searching.

Red Hat Ceph

It is delivered as a software package to run on commodity hardware and is based on the open-source Reliable Autonomic Distributed Object Store (RADOS).  It features strong consistency on write performance.

Cloudian HyperStore

It is delivered as turnkey integrated appliance or as a software package to run on commodity hardware.  It stores metadata with objects but also in a distributed NoSQL Cassandra database for speed.

HGST Amplidata

It is delivered as a turnkey rack-level system and uses HGST Helium filled hard drives for power efficiency, reliability and capacity.

SwiftStack Object Storage System

It is delivered as a software package to run on commodity hardware and is based on OpenStack Swift, which is the enterprise offering of Swift with cluster and management tools and 24×7 support.

VNX NAS Files incorrectly report as Locked for Editing

When opening a shared Microsoft Office file, you may see the error message “File in Use, file_name is locked for editing by user_name“, when in fact no other user is currently using the file.

We had users that would view files with the preview pane, it would create a lock on the file, and then when the explorer window was closed the lock would remain.  The next time the file was accessed it would state that it was locked even though the user didn’t have it open.  Below are some steps you can take to troubleshoot and resolve the issue.  Note that changing some of these parameters can have a performance impact, so make these changes at your own risk.  Oplocks let clients lock files and locally cache information while preventing another user from changing the file. This increases performance for many file operations.

1. Disable Oplocks on the VNX

Disabling oplocks can affect client performance. It will increase the number of metadata requests that are sent to the server because when you use SMB with oplocks, the client caches the data that is locked to speed up access to frequently accessed files. When oplocks are disabled, the client does not cache data and all reads are made directly to the NAS server.

Syntax for disabling oplocks and verifying the change:

[nasadmin@VNX1 ~]$ server_mount vdm_file_system -o nooplock test_file_system01_fs /test_file_system01
vdm_file_system : done

[nasadmin@VNX1 ~]$ server_mount vdm_file_system | grep test_file_system01_fs
test_file_system01_fs on /test_file_system01 uxfs,perm,rw,noprefetch,nonotify,accesspolicy=NATIVE,nooplock

2. Disable caching on the Windows client

The Windows client setting controls the cache lifetime. As stated earlier, if caching is disabled on the windows client then all reads are to the NAS server directly. In order to to disable caching on the windows client rather than disabling oplocks on the VNX Data Mover, the following three registry changes would need to be made:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters\

– Directory cache,  set DirectoryCacheLifetime to Zero.
– File Not Found cache, set FileNotFoundCacheLifetime to Zero.
– File information cache, set FileInfoCacheLifetime to Zero.

3. Apply a Microsoft hotfix

The Microsoft KB article http://support.microsoft.com/kb/942146 describes the problem and the fix in detail.  It directly addresses the issue with files locking from the preview pane.  It applies to all versions of Windows Vista and 7 as well as Windows Server 2008.

Using isi_vol_copy_vnx for VNX to Isilon data migration

For most data migrations from VNX to Isilon EMC recommends that you use the OneFS migration tool isi_vol_copy_vnx. It can often be more efficient than host-based tools (such as EMCopy and Robocopy) because the performance of host-based tools performance is dependent on the network connectivity of the host, while isi_vol_copy_vnx depends only on the network connection between the source device and the Isilon cluster. Below is a basic outline of the syntax, the steps required, and a few troubleshooting tips.

You might consider migrating data with a host based tool if one or more of the following conditions apply to your migration:

  • The source device and Isilon cluster are on separate networks.
  • Security restrictions prevent the source device and Isilon cluster from communicating directly.

Command Syntax:

isi_vol_copy_vnx --help

The source must contain a source host, a colon, and then the absolute source path name.

 isi_vol_copy_vnx <src_filer>:<src_dir> <dest_dir>
                 [-sa user: | user:password]
                 [-sport ndmp_src_port]
                 [-dport ndmp_data_port]
                 [-full | -incr] [-level_based]
                 [-dhost dest_ip_addr]
                 [-no_acl]

 isi_vol_copy_vnx -list [migration-id] | [[-detail] [-state=<state>] [-destination=<pathname>]]
 isi_vol_copy_vnx -cleanup <migration-id> [-everything [-noprompt]]
 isi_vol_copy_vnx -get_config
 isi_vol_copy_vnx -set_config <name>=<value>
 isi_vol_copy_vnx -h | -help
 Defaults:
   src_auth_user       = root
   src_auth_password   =
   ndmp_src_port       = 0  (0 means NDMP default, usually 10000)
   ndmp_data_port      = any
   dest_ip_addr        = none

Note: This tool uses NDMP to transfer the data from the source VNX to the Isilon.

Migration Steps:

  1. Configure NDMP User

Create a new NDMP user on the source VNX. Log in to the control station and run the following command:

/nas/sbin/server_user -add <new_username> -ndmp_md5 -passwd

Select the defaults when prompted and be sure to make note of the password.

  1. Determine the absolute path of your filesystems and shares

If you’re using virtual data movers it changes the root path of your filesystem.  Issue the following command to review your file systems and mount paths:

server_mount ALL

Note the the specific path for the file system that is targed for migration. The path when using a VDM will be similar to this:

FILESYSTEM1 on /root_vdm_1/FILESYSTEM1 uxfs,perm,rw

In this case the path will be /root_vdm_1/FILESYSTEM1, which will be used for the source path in the isi_vol_copy_vnx command.

    3. Determine the target Isilon Data Location

Determine the destination location on the Isilon in the /ifs/data folder where the data will migrated.  If the destination folder doesn’t exist on the Isilon, it will create it with the exact same NTFS permissions as the source.  Create the command with the following syntax:

isi_vol_copy_vnx <datamoverIP>:<source_path> <target Isilon path> -sa : <-full or -incr>

isi_vol_copy_vnx 10.10.10.10:/root_vdm_1/FILESYSTEM1 /ifs/data/FILESYSTEM1 -sa ndmpuser1: -full
  1. Migrate the Data

The command outlined above will run a full copy using the ndmpuser1 account and will prompt for a password, it does not have to be shown in plain text. The password can be specified in the command by using the appropriate syntax (<ndmpuser:password>), however you will still be required to follow the username with a colon.

If successful, the message “msg SnapSure file system creation succeeds” will appear, which means the NDMP session created a checkpoint successfully and is starting to copy data from that checkpoint.

Note that this does not migrate shares, just data.  Sharedupe can be utilized for that or the CIFS shares/NFS exports can be manually re-created.  It is recommended that any other data migrations on the source VNX be disabled prior to the copy so that you don’t run into performance issues.

Caveats:

  • There is no bandwidth throttling option with this command, it will consume all available bandwidth.
  • Isilon does not  support Historical SIDs in versions 8.0.0 or earlier, which may result in permission issues due to being unable to resolve historical SIDs post migration from other platforms (see KB468562).  If SIDHistory is in use on the source, then this is not the proper tool.   From the comments section, please note that OneFS does support Security Identifier (SID) history beginning in 8.0.1 and later releases, and 8.0.0.3 and later releases (see latest docu44518_Isilon-Supportability-and-Compatibility-Guide).
  • If fs_dedupe is enabled on the Celerra or VNX, you will need to change the backup threshold to zero for each filesystem.  This means that when sending the data over NDMP send the full file, not the compressed or de-duped version.  Note that there is a risk here of inflating existing backup sets if they are being done over NDMP.
  • On the source the account performing the copy needs local administrator or backup operators permissions to the source CIFS Server, and full control over the source share.
  • Standard NDMP backups and isi_vol_copy_vnx can affect each other and the data backed up by the two NDMP clients.  See KB187008 for a workaround.

Troubleshooting Tips:

  1. Checkpoint Creation on the VNX

The most common issue when running the isi_vol_copy_vnx command is with checkpoint creation on the source VNX.

If you are receiving a message that’s similar to msg SnapSure file system creation failed during a copy session, the command is failing to create a snapshot of the source file system. It could be due to many reasons including a lack of available disk space. Try manually creating a snapshot on the source VNX file system to see if it fails, below is the syntax to do so:

#fs_ckpt Test_FS -name Test_FS-ckpt01 –Create
  1. Permission or Connection Issues.

In general the error message itself will be self explanatory. Make sure you are using the correct credentials for the NDMP user in the migration command. The user should have sufficient rights on the source system and target systems. The logged in user should be able to create and modify directories and the files contained within.  As an example, in the case below, NDMP Port 53169 is blocked between the VNX and the Isilon.  Opening the port on the firewall resolved the issue.

ISILON568-1# isi_vol_copy_vnx 10.10.10.10:/Volcopytest /ifs/data/Volcopytest -sa Volcopytest:Volcopytest -sport 53169 -full -dhost 10.10.10.11
system call (connect): Connection refused
Could not open NDMP connection to host 10.10.10.10
isi_vol_copy_vnx did not run properly

3.  32bit Unix Application Issues.

If your app is 32bit, 32bit settings on the new NFS export must be enabled.

ISILON# isi nfs exports modify EXPID –zone=NFSZone –return-32bit-file-ids=yes

Replace the EXPID with the ID of the target export, verify the bit settings by viewing the export.

ISILON# isi nfs exports view EXPID –zone=NFSZone | grep -i return

ISILON# _

4. Snapshot creation on the target Isilon array.

Snapshots can fail for many reasons, but most often it’s due to lack of available space. In the example below the snapshot creation failed because there was an existing snapshot with the same name.

ISILON568# isi_vol_copy_vnx VNX-SERVER3:/Test_FS/NFS01 /ifs/data/Test_NFS01 -sa ndmp:NDMPpassword -incr
Snapshot with conflicting name ‘isi_vol_copy.011.1.snap’ found. Remove/Rename the conflicting snapshot to continue with further migration runs.
snapshot already exists
ISILON568-1#

Either delete or rename the existing snap to resolve the issue.  In the example below the snapshot was deleted.

ISILON568-1# isi snapshot snapshots list| grep isi_vol_copy.011
134 isi_vol_copy.011.0.snap /ifs/.ifsvar/modules/isi_vol_copy/011/persistent_store
136 isi_vol_copy.011.1.snap /ifs/.ifsvar/modules/isi_vol_copy/011/persistent_store
ISILON568-1#

ISILON568-1# isi snapshot snapshots delete –snapshot=134
Are you sure? (yes/[no]): y
ISILON568-1#

Isilon CLI Command Reference

Below is a command reference for almost all of the CLI commands available in the Isilon OneFS CLI.  The basic commands are outlined and in many cases multiple samples of using the commands are provided.  This information was gathered as an easier to use, more condensed reference than the 1000+ page long CLI Administration guide provided by EMC, however I recommend you refer to that guide for more specific information on the commands.  The information gathered here applies to OneFS 8.0.0.0.

Device Commands
isi devices drive firmware list Displays a list of firmware details for the data drives in a node.
isi devices drive firmware list –node-lnn all View the drive firmware status of all the nodes.
isi devices drive firmware list –node-lnn View the drive firmware status of drives on a specific node.
isi devices drive firmware update start all –node-lnn all Update the drive firmware for your entire cluster.
isi devices drive firmware update start all –node-lnn Update the drive firmware for a specific node only.
isi devices -d Confirm that a node has finished updating.
isi devices firmware list Displays a list of firmware details for the data drives in a node.
isi devices drive firmware update list Ensure that no drive firmware updates are currently in progress.
isi devices firmware update start Updates firmware on one or more drives in a node.
isi devices firmware update view Displays info about a drive firmware update for a node.
isi devices firmware view { | –lnum } Displays information about the firmware on a single drive
isi devices node list Identify the serial number of the node.
isi devices node add Join a node to the cluster.
isi devices node smartfail Smartfails a node and removes it from the cluster.
isi devices node stopfail Discontinues the smartfail process on a node.
isi devices –action smartfail –device 3 This command removes a node with a logical node number (LNN) of 3.
lnnset 22 83 switches the LNN of a node from 22 to 83
isi devices add Scans for available drives and adds the drives
isi devices drive add Scans for available drives and adds the drives to the node.
isi devices drive view Displays information about a single drive.
isi devices drive format Formats a drive so you can add it to a node.
isi devices drive list Displays a list of data drives in a node.
isi devices drive suspend Temporarily suspends all activities for a drive.
isi devices drive purposelist Displays a list of possible use cases for drives.
isi devices drive smartfail Smartfails a drive so you can remove it from a node.
isi devices drive stopfail Discontinues the smartfail process on a drive.
isi devices drive suspend Temporarily suspends all activities for a drive.
isi readonly list Displays a list of read-only status by node.
isi readonly modify Modifies a node’s read-only status.
isi readonly view Displays the read-only status of a node.
isi servicelight list Displays a list of service LEDs in the cluster by node and the status of each service LED.
isi servicelight modify Turns a node’s service LED on or off.
isi servicelight view Displays the status of a node’s service LED.
isi devices drive purpose Assigns a use case to a drive. For example, you can designate a drive for normal data
  storage operations, or you can designate the drive for L3 caching instead of storage.
System Commands
reboot Reboots the cluster.
reboot 8 Reboots a single node, in this case node 8.
shutdown all shuts down all nodes on the cluster.
isi email settings modify Modify email settings for the cluster.
isi email settings view View cluster email settings.
isi services [-l | -a]  [ [{enable | disable}]] Displays a list of available services.
isi set Works similar to chmod, providing a mechanism to adjust OneFS-specific file attributes
isi version [–format {list | json}]  –verbose Displays cluster version information.
isi_for_array Runs commands on multiple nodes in an array, either in parallel or in serial.
isi_gather_info Collects and uploads the most recent cluster log information to ESRS
isi_phone_home Modify the settings for the isi_phone_home feature.
isi license licenses view View information about the current status of any optional Isilon software modules.
isi status Cluster node and drive health, storage data sizes, ip addresses, throughput, critical events and job status
isi status -n 1 Displays status info about a specific logical node.
isi batterystatus list View the status of all NVRAM batteries and charging systems on the node.
isi snmp settings Modify SNMP settings for a cluster.
isi snmp settings view View snmp settings.
isi get Displays information about a set of files, including the requested protection, current
isi batterystatus list Displays a list of batteries in the cluster by node & the status of each battery.
isi batterystatus view Displays the status of a node’s batteries.
  actual protection, and whether write-coalescing is enabled.
Config Commands
isi config Opens a new prompt where node and cluster settings can be altered, only isi config commands are valid
changes Displays a list of changes to the configuration that have not been committed.
commit Commits configuration settings and then exits isi config.
date Displays or sets the current date and time on the cluster.
encoding [list] Sets the default encoding character set for the cluster.
exit Exits the isi config subsystem.
help Displays a list of all isi config commands.
interface {enable | disable} Displays the IP ranges, netmask, and MTU and enables or disables internal interfaces.
iprange Displays a list of internal IP addresses that can be assigned to nodes, or adds addresses to the list.
joinmode Displays the setting for how nodes are added to the current cluster.
migrate Displays a list of IP address ranges that can be assigned to nodes or both adds and removes IP ranges from that list.
mtu Displays the size of the maximum transmission unit (MTU) that the cluster uses
name Displays the names currently assigned to clusters when run with no arguments, or assigns new name.
netmask []] Displays or sets the subnetmask on the cluster.
quit Exits the isi config subsystem.
reboot [{ | all}] Reboots one or more nodes, specified by LNN.
shutdown [{ | all}] Shuts down one or more nodes, specified by LNN.
status [advanced] Displays current information on the status of the cluster.
timezone [] Displays the current time zone or specifies new time zones.
version Displays information about the current OneFS version.
wizard Activates a wizard on unconfigured nodes.
deliprange Displays a list of internal network IP addresses that can be assigned to nodes or
  removes specified addresses from the list.
lnnset Displays a table of logical node number (LNN), device ID, and internal IP address for
  each node in the cluster when run without arguments. Changes the LNN when specified.
Statistics Commands
isi statistics client Displays the most active, by throughput, clients accessing the cluster for each supported protocol.
isi statistics drive Displays performance information by drive.
isi statistics heat Displays the most active /ifs paths for varous metrics.
isi statistics query current Displays current statistics.
isi statistics query history Displays available historical statistics.
isi statistics list keys Displays a list of all available keys.
isi statistics list operations Displays a list of valid arguments for the –operations option.
isi statistics protocol Displays statistics by protocol, such as NFSv3 and HTTP.
isi statistics pstat Displays a selection of cluster-wide and protocol data.
isi statistics system Displays general cluster statistics & op rates for supported protocols, network & disk traffic.
Access Zones
isi zone zones create Isolates data and restrict which users can access the data
isi zone zones create DevZone /ifs/hr/data Creates an access zone named DevZone and sets the base directory to /ifs/hr/data.
isi zone zones modify –add-auth-providers : Add an authentication provider.
isi zone zones modify DevZone –clear-auth-providers Remove all authentication providers.
isi zone zones delete DevZone Delete any access zone except the built-in System zone.
isi zone zones list View a list of all access zones on the cluster.
isi zone zones view TestZone Display the setting details of TestZone.
isi zone restrictions create Prohibits user or group access to the /ifs directory.
isi zone restrictions delete Removes a restriction that prohibits user or group access to the /ifs directory.
isi zone restrictions list Displays a list of users or groups that are prohibited from accessing the /ifs directory.
Authentication/Active Directory
isi auth ads create Create an Active Directory provider.
isi auth ads list Displays a list of Active Directory providers.
isi auth ads view Displays the properties of an Active Directory provider.
isi auth ads create –name=adserver.corp.com \ –user=admin –groupnet=group5 Specific example of adding a domain.
isi auth ads modify Modify the advanced settings for an Active Directory provider.
isi auth ads delete Delete an Active Directory provider.
isi auth ldap create Create an LDAP provider.
isi auth ldap modify Modify any setting for an LDAP provider (except its name).
isi auth ldap delete Delete an LDAP provider.
isi auth ldap list Displays a list of LDAP providers.
isi auth ldap view Displays the properties of an LDAP provider.
isi auth nis create Configure a NIS provider.
isi auth nis modify Modify any setting for an NIS provider (except its name).
isi auth nis delete Delete a NIS provider.
isi auth nis list Displays a list of NIS providers and indicates whether a provider is functioning correctly.
isi auth nis view Displays the properties of an NIS provider.
isi auth krb5 create { | –keytab-file } Creates an MIT Kerberos provider and joins a user to an MIT Kerberos realm.
isi auth krb5 delete [–force] Deletes an MIT Kerberos authentication provider and removes the user from an MIT Kerberos realm.
isi auth krb5 list Displays a list of MIT Kerberos authentication providers.
isi auth krb5 view Displays the properties of an MIT Kerberos authentication provider.
isi auth krb5 domain create [–realm ] Creates an MIT Kerberos domain mapping.
isi auth krb5 domain delete [–force] Deletes an MIT Kerberos domain mapping.
isi auth krb5 domain list Displays a list of MIT Kerberos domain mappings.
isi auth krb5 domain modify [–realm ] Modifies an MIT Kerberos domain mapping.
isi auth krb5 domain view Displays the properties of an MIT Kerberos domain mapping.
isi auth krb5 realm create Creates an MIT Kerberos realm.
isi auth krb5 realm modify Modify an MIT Kerberos realm.
isi auth krb5 realm list View a list of all Kerberos realms configured on the cluster.
isi auth krb5 realm view View a list of all Kerberos realms configured on the cluster.
isi auth krb realm view TEST.corp.COM View a list for a specific domain.
isi auth krb5 realm delete Delete an MIT Kerberos realm.
isi auth krb5 domain create Add an MIT Kerberos domain to an MIT Kerberos realm.
isi auth krb5 domain modify Modify a Kerberos domain.
isi auth krb5 domain modify –realm Example of modifying a Kerberos domain by specificing an alternate realm.
isi auth krb5 domain view View the properties of an MIT Kerberos domain mapping.
isi auth krb5 domain list List one or more MIT Kerberos domains.
isi auth krb5 domain delete Delete one or more MIT Kerberos domain mappings.
isi auth krb5 spn list View the service principal names (SPNs) and their associated keys that are registered for an MIT Kerberos provider.
isi auth krb5 spn delete –all Delete all keys for a specified SPN or a specific version of a key.
isi auth krb5 spn create Add or update keys for an SPN.
isi auth krb5 spn check Compare the list of registered SPNs against the list of discovered SPNs.
isi auth krb5 spn fix Fix the missing SPNs.
isi auth krb5 spn fix Add missing SPNs for an MIT Kerberos service provider
isi auth krb5 spn import Import the keys of a keytab file.
isi auth ads spn check Checks valid service principal names (SPNs).
isi auth ads spn create Adds one or more service principal names (SPNs) for a machine account.
isi auth ads spn delete Deletes one or more SPNs that are registered against a machine account.
isi auth ads spn fix Adds missing service principal names (SPNs) for an Active Directory provider.
isi auth ads spn list Displays a list of service principal names (SPNs) that are registered against a machine account.
isi auth krb5 spn create Creates or updates keys for an MIT Kerberos provider.
isi auth krb5 spn delete { | –all} Deletes keys from an MIT Kerberos provider.
isi auth krb5 spn check Checks for missing service principal names (SPNs) for an MIT Kerberos provider.
isi auth krb5 spn fix Adds the missing service principal names (SPNs) for an MIT Kerberos provider.
isi auth krb5 spn import Imports keys from a keytab file for an MIT Kerberos provider.
isi auth krb5 spn list Lists the service principal names (SPNs) and keys registered for an MIT Kerberos provider.
isi auth ads trusts controllers list Displays a list of domain controllers for a trusted domain.
isi auth ads trusts list Displays a list of trusted domains.
isi auth ads trusts view Displays the properties of a trusted domain.
isi auth error Displays error code definitions from the authentication log files.
isi auth file create Creates a file provider.
isi auth file delete Deletes a file provider.
isi auth file list Displays a list of file providers.
isi auth file modify Modifies a file provider.
isi auth file view Displays the properties of a file provider.
isi auth mapping create {| –source-uid Creates a manual mapping between a source identity and target identity
isi auth mapping delete {| –source-uid Deletes one or more identity mappings.
isi auth mapping dump Displays or prints the kernel mapping database.
isi auth mapping flush Flushes the cache for one or all identity mappings.
isi auth mapping import Imports mappings from a source file to the ID mapping database.
isi auth mapping list Displays the ID mapping database for an access zone.
isi auth mapping modify Sets or modifies a mapping between two identities.
isi auth mapping token Displays the access token that is calculated for a user during authentication.
isi auth mapping view Displays mappings for an identity.
isi auth netgroups view Displays information about a netgroup.
isi auth privileges Displays a list of system privileges.
isi auth refresh Refreshes authentication system configuration settings.
isi auth roles create Creates an empty role.  Run the isi auth roles modify command to add items.
isi auth roles delete Deletes a role.
isi auth roles list [–verbose] Displays a list of roles.
isi auth roles members list Displays a list of the members of a role.
isi auth roles modify Modifies a role.
isi auth roles privileges list Displays a list of privileges that are associated with a role.
isi auth roles view Displays the properties of a role.
isi auth settings acls modify Modifies access control list (ACL) settings for OneFS.
isi auth settings acls view Displays access control list (ACL) settings for OneFS.
isi auth settings global modify Modifies the global authentication settings.
isi auth settings global view Displays global authentication settings.
isi auth settings krb5 modify Modifies the global settings of an MIT Kerberos authentication provider.
isi auth settings krb5 view Displays MIT Kerberos provider authentication settings.
isi auth settings mapping modify Modifies identity mapping settings.
isi auth settings mapping view [–zone ] Displays identity mapping settings in an access zone.
isi auth status Displays provider status,available authentication providers, and which are functioning.
isi auth privileges –verbose To view a list of all privileges.
isi auth id To view a list of your privileges.
isi auth mapping token To view a list of privileges for another user.
Managing file providers
isi auth file create Specify replacement files for any combination of users, groups, and netgroups.
pwd_mkdb /ifs/test.passwd Generates an spwd.db file in the /etc directory.
isi auth file modify Modify any setting for a file provider, including its name.
isi auth file delete Delete a file provider.
Managing local users and groups
isi auth users create Creates a user account.
isi auth users delete { | –uid | –sid } Deletes a local user from the system.
isi auth users flush Flushes cached user information.
isi auth users list Displays a list of users.
isi auth users modify { | –uid | –sid } Modifies a local user.
isi auth users view { | –uid | –sid } Displays the properties of a user.
isi auth users list –provider=”:” View a list of users and groups for a specified provider.
isi auth users list –provider=”lsa-ldap-provider:Unix LDAP” List users and groups for an LDAP provider type that is named Unix LDAP.
isi auth users create –provider=”local:” \ –password=”” Create a local user.
isi auth groups create –provider “local:” Create a local group.
isi auth local view system View the current password settings.
isi auth local list Displays a list of local providers.
isi auth local modify Modifies a local provider.
isi auth local view Displays the properties of a local provider.
isi auth log-level modify [–verbose] Specifies the logging level for the authentication service on the node.
isi auth log-level view Displays the logging level for the authentication service on the node.
isi auth users modify Modify any setting for a local user account except the user name.
isi auth groups modify Add or remove members from a local group.
isi auth users delete Delete a local user.
isi auth groups delete Delete a local group.
isi auth groups flush Flushes cached group information.
isi auth groups list Displays a list of groups.
isi auth groups members list { | –gid | –sid } Displays a list of members that are associated with a group.
isi auth groups modify { | –gid | –sid } Modifies a local group.
isi auth groups view { | –gid | –sid } Displays the properties of a group.
isi auth id Displays your access token.
isi auth access /ifs/ Lists the permissions that a user has to access a given file or directory.
SMB
isi smb settings global view View the global SMB settings.
isi smb settings global modify Modify SMB Global Settings.
isi smb shares create Create SMB Shares.
isi smb shares modify Modify SMB Shares.
isi smb shares modify Share2 –file-filtering-enabled=yes \ file-filter-extensions=.wav,.mpg Enables file filtering on a share, denies .wav and .mpg.
isi smb shares list Displays a list of SMB shares.
isi smb shares permission create Creates permissions for an SMB share.
isi smb shares permission delete Deletes user or group permissions for an SMB share.
isi smb shares permission list Displays a list of permissions for an SMB share.
isi smb shares permission modify Modifies permissions for an SMB share.
isi smb shares permission view Displays a single permission for an SMB share.
isi smb shares view [–zone ] Displays information about an SMB share.
isi smb settings shares view View the default SMB share settings specific to an access zone.
isi smb settings shares modify Configure SMB share settings specific to each access zone.
isi smb settings global modify –zone=TestZone –impersonate-guest=never Specifies that guests are never allowed access to shares in zone 5.
isi smb shares delete Share1 –zone=zone-5 Deletes a share named Share1 from the access zone named zone-5.
isi smb shares permission modify Modify SMB Share Permissions.
isi smb shares permission list ifs List permissions on a share.
isi smb log-level filters create Creates a new SMB log filter.
isi smb log-level filters delete Deletes SMB log filters.
isi smb log-level filters list Lists SMB log filters.
isi smb log-level filters view View an individual SMB log-level filter.
isi smb log-level modify [–verbose] Sets the log level for the SMB service.
isi smb log-level view Shows the current log level for the SMB service.
isi smb openfiles list View a list of open files.
isi smb openfiles close [–force] Closes an open file.
isi smb openfiles list Displays a list of files that are open in SMB shares.
isi smb sessions delete [{–user | –uid | –sid }] [–force] Deletes SMB sessions, filtered first by computer and then optionally by user.
isi smb sessions delete computer1 Deletes all SMB sessions associated with a computer named computer1.
isi smb sessions delete computer1 –user=user1 Deletes all SMB sessions associated with a computer named computer1 and a user named user1.
isi smb sessions delete-user { | –uid | –sid } [–computer-name ] Deletes SMB sessions, filtered first by user then optionally by computer.
isi smb sessions list Displays a list of open SMB sessions.
isi smb settings global modify Modifies global SMB settings.
isi smb settings global view Displays the default SMB configuration settings.
isi smb settings shares modify Modifies default settings for SMB shares.
isi smb settings shares view [–zone ]
NFS
isi nfs settings global view View the global NFS settings that are applied to all nodes in the cluster.
isi nfs settings global modify Configure NFS file sharing.
isi nfs settings global modify –nfsv4-enabled=yes Enables NFSv4 support.
isi nfs settings export view [–zone ] View the current default export settings.
isi nfs settings export modify Configure default NFS export settings.
isi nfs settings export modify –max-file-size 1099511627776 Specifies a maximum export file size of one terabyte.
isi nfs settings export modify –revert-max-file-size Restores the maximum export file size to the system default.
isi nfs exports view View NFS Exports.
isi nfs exports view 1 Displays the settings of the default export.
isi nfs exports modify 1 –map-root-enabled true –map-root nobody Enable root-squash for the default NFS export.
isi nfs exports list List NFS Exports.
isi nfs exports create Create NFS exports to share files in OneFS.
isi nfs exports create /ifs/data/projects,/ifs/home –all-dirs=yes Creates an export supporting client access to multiple paths and their subdirectories.
isi nfs exports check Check for errors in NFS exports, conflicting export rules, invalid paths, etc.
isi nfs exports modify Modify the settings for an existing NFS export.
isi nfs exports modify 2 –add-read-write-clients 10.1.1.100 For example, the following adds a client with read-write access to NFS export 2
isi nfs exports delete Delete unneeded NFS exports.
isi nfs exports delete 2 Deletes an export whose ID is 2.
isi nfs exports delete 3 –force Deletes an export whose ID is 3 without displaying a confirmation prompt
isi nfs exports reload Reloads the NFS exports configuration.
isi nfs aliases create Create an NFS alias to map a long directory path to a simple pathname.
isi nfs aliases create /home /ifs/data/offices/hq/home –zone hq-home Creates an alias to a full pathname in OneFS in an access zone named hq-home
isi nfs aliases modify Modify an NFS alias.
isi nfs aliases modify /home –zone hq-home –name /home1 Changes the name of an alias in the access zone hq-home.
isi nfs aliases delete Delete an NFS alias.
isi nfs aliases delete /home –zone hq-home Deletes the alias /home in an access zone named hq-home.
isi nfs aliases list [–zone] View a list of NFS aliases that have already been defined for a particular zone.
isi nfs aliases view List NFS Aliases.
isi nfs aliases view /projects –zone hq-home –check Provides information on an alias in the access zone, hqhome, including the health of the alias.
isi nfs log-level modify Sets the logging level for the NFS service.
isi nfs log-level view Shows the logging level for the NFS service.
isi nfs netgroup check Updates the NFS netgroup cache.
isi nfs netgroup flush Flushes the NFS netgroup cache.
isi nfs netgroup modify Modifies the NFS netgroup cache settings.
isi nfs nlm locks list Applies to NFSv3 only. Displays a list of NFS Network Lock Manager (NLM) advisory locks.
isi nfs nlm locks waiters List of clients waiting to place a Network Lock Manager (NLM) lock on a currently locked file.
isi nfs nlm sessions check Searches for lost locks.
isi nfs nlm sessions delete Delete NFS NLM Sessions.
isi nfs nlm sessions list Displays a list of clients holding NFS Network Lock Manager (NLM) locks.
isi nfs nlm sessions refresh Refreshes an NFS Network Lock Manager (NLM) client.
isi nfs nlm sessions view Displays information about NFS Network Lock Manager (NLM) client connections.
isi nfs settings zone modify Modifies the default NFS zone settings for the NFSv4 ID mapper.
isi nfs settings zone view Displays the default NFSv4-related access zone settings.
FTP
isi ftp settings view View a list of current FTP configuration settings.
isi services vsftpd enable Enable FTP.  The FTP service, vsftpd, is disabled by default.
isi ftp settings modify Modify FTP Settings.
isi ftp settings modify –server-to-server=yes Enables server-to-server transfers.
isi ftp settings modify –allow-anon-upload=no Disables anonymous uploads.
HTTP and HTTPS
isi http settings modify Modifies HTTP global settings.
isi http settings modify –service=enabled –dav=yes \ basic-authentication=yes Enables the HTTP service, WebDAV, and basic authentication.
isi_gconfig -t http-config https_enabled=true Enable HTTPS.
isi_gconfig -t http-config https_enabled=false Disable HTTPS.
isi http settings view Displays HTTP global settings.
File Filtering
isi file-filter settings modify
isi file-filter settings view View file filtering settings in an access zone.
isi file-filter settings view –zone=DevZone Displays file filtering settings in the DevZone access zone.
isi file-filter settings modify –zone=DevZone \ file-filtering-enabled=yes file-filter-type=allow \ Enables file filtering in the DevZone access zone and allows users to write only to specific file types.
  file-filter-extensions=.xml,.html,.txt
isi file-filter settings modify –zone=DevZone \ file-filtering-enabled=yes file-filter-type=deny \ Enables file filtering in DevZone and denies users write access only to specific file types.
  file-filter-extensions=.xml,.html,.txt
Auditing
isi_audit_viewer View both configuration audit and protocol audit logs.
isi_audit_viewer -t protcol View protocol access audit logs.
isi_audit_viewer -t config View system configuration logs.
isi audit settings global modify [–protocol-auditing-enabled {yes | no}] Modify the types of protocol access events to be audited.
isi audit settings modify –syslog-forwarding-enabled Enable forwarding of protocol access events to syslog.
isi audit settings modify –syslog-forwarding-enabled=no –zone=DevZone Disables forwarding of audited protocol access events from the DevZone access zone.
isi audit settings global modify –config-auditing-enabled=yes Enables system configuration auditing on the cluster.
isi audit settings global modify –config-syslog-enabled=yes Enables forwarding of system configuration changes.
isi audit settings global modify –config-syslog-enabled=no Disables forwarding of system configuration changes.
isi audit settings modify –audit-failure=create,close,delete –zone=DevZone Creates a filter that audits the failure of create, close, and delete events in the DevZone access zone.
isi audit settings global view Displays global audit settings configured on the EMC Isilon cluster.
isi audit settings view [–zone] [–verbose] Displays audit filter settings in an access zone and whether syslog forwarding is enabled.
isi audit topics list Displays a list of configured audit topics, which are internal collections of audit data.
isi audit topics modify Modifies the properties of an audit topic.
isi audit topics view Displays the properties of an audit topic.
Snapshots
It is recommended that you do not create more than 1,000 snapshots of a single directory to avoid performance degradation.
You can create up to 20,000 snapshots on a cluster at a time.
isi snapshot snapshots modify Modify the name and expiration date of a snapshot.
isi snapshot snapshots modify HourlyBackup_07-15-2014_22:00 \ –expires 2014-07-25T01:30 Causes HourlyBackup_07-15-2014_22.00 to expire on 1.30PM on July 25th, 2014.
isi snapshot snapshots modify Modify the alias of a snapshot to assign an alternative name for the snapshot.
isi snapshot snapshots modify HourlyBackup_03-15-2017_22:00 \ –alias LastKnownGood Assigns an alias of LastKnownGood to HourlyBackup_03-15-2017_22.00.
isi snapshot snapshots list View a list of snapshots or detailed information about a specific snapshot.
isi snapshot snapshots view Displays the properties of an individual snapshot.
isi snapshot snapshots delete –snapshot newSnap1 Deletes newSnap1.
isi job jobs start snaprevert –snapid 46 Reverts HourlyBackup_07-15-2014_23.00
isi snapshot schedules modify Modify a snapshot schedule.
isi snapshot schedules modify hourly_media_snap –duration 14D Snapshots created with the schedule hourly_media_snap are deleted 14 days after creation.
isi snapshot schedules delete [–force] [–verbose] Deletes a snapshot schedule.
isi snapshot schedules delete hourly_media_snap Deletes a snapshot schedule named hourly_media_snap.
isi snapshot schedules view Displays information about a snapshot schedule.
isi snapshot schedules view every-other-hour Displays detailed information about the snapshot schedule every-other-hour
isi snapshot schedules modify WeeklySnapshot –alias LatestWeekly Configures the alias LatestWeekly for the snapshot schedule WeeklySnapshot.
isi snapshot schedules create Creates a snapshot schedule.
isi snapshot schedules pending list Displays a list of snapshots that are scheduled to be generated by snapshot schedules.
isi snapshot aliases create [–verbose] Assigns a snapshot alias to a snapshot or to the live version of the file system.
isi snapshot aliases create latestWeekly Weekly-01-30-2017 Creates a snapshot alias for Weekly-01-30-2017.
isi snapshot aliases modify latestWeekly –target LIVE Reassigns the latestWeekly alias to the live file system.
isi snapshot aliases delete { | –all} [–force] [–verbose] Deletes a snapshot alias.
isi snapshot aliases list View a list of all snapshot aliases by running the following command.
isi snapshot aliases view latestWeekly Displays information about latestWeekly.
isi snapshot locks create Creates a snapshot lock.
isi snapshot locks create SnapshotApril2016 –expires 1M \ –comment “Maintenance Lock” Applies a snapshot lock to SnapshotApril2016, sets expiration in one month, and adds a description.
isi snapshot locks modify Modify the expiration date of a snapshot lock.
isi snapshot locks modify SnapshotApril2014 1 –expires 3D Sets an expiration date three days from the present date for a snapshot lock with an ID of 1.
isi snapshot locks delete Delete a snapshot lock.
isi snapshot locks delete Snapshot2014Apr16 1 Deletes a snapshot lock that is applied to SnapshotApril2014 with a lock id of 1
isi snapshot locks view Displays information about a snapshot lock.
isi snapshot locks list View snapshot lock information.
isi snapshot settings view View current SnapshotIQ settings.
isi snapshot settings modify –reserve 30 Sets the snapshot reserve to 30%.
isi job jobs start ChangelistCreate –older-snapid 3 –newersnapid 7 Create a changelist that shows what data was changed between snapshots.
isi_changelist_mod -k 21_23 Deletes changelist 21_23.
isi_changelist_mod -l View the IDs of changelists.
isi_changelist_mod -a 2_6 Displays the contents of a changelist named 2_6.
isi job jobs start domainmark –root /ifs/data/media \ –dm-type SnapRevert Creates a SnapRevert domain for /ifs/data/media.
isi snapshot snapshots create /ifs/data/media –name media-snap Creates a snapshot for /ifs/data/media.
isi snapshot snapshots delete OldSnapshot Deletes a snapshot named OldSnapshot.
isi snapshot schedules create hourly /ifs/data/media \ Creates a snapshot schedule for /ifs/data/media.
 HourlyBackup_%m-%d-%Y_%H:%M “Every day every hour” \ –duration 1M
isi job jobs start snapshotdelete Increase the speed at which deleted snapshot data is freed on the cluster, use this command
isi job jobs start shadowstoredelete Increase the speed at which deleted data shared between deduplicated and cloned
  files are freed on the cluster.
Deduplication
isi dedupe settings modify –assess-paths /ifs/data/archive Assess the amount of disk space you will save by deduplicating a directory.
isi job jobs start dedupeassessment Start the assessment job by running the following command.
isi dedupe reports list Identify the ID of the assessment report by running the following command.
isi dedupe reports view View prospective space savings by running the isi dedupe reports view.
isi dedupe settings modify –paths /ifs/data/media,/ifs/data/archive This command targets /ifs/data/archive and /ifs/data/media for deduplication.
isi job types Dedupe –schedule “Every Friday at 11:00 PM” Configures the deduplication job to be run every Friday at 11PM.
isi dedupe stats View the amount of disk space that you are currently saving with deduplication.
isi dedupe settings view Displays current deduplication settings.
Data Replication
isi sync settings modify Configure default settings for replication policies.
isi sync settings modify –report-max-age 3Y Configures SyncIQ to delete replication reports that are older than three years.
isi sync settings view Displays global replication settings.
isi sync policies resolve [–force] Resolving a replication policy enables you to run the policy again.
isi sync policies reset { | –all} [–verbose] If you cannot resolve the issue that caused the error, you can reset the replication policy.
isi sync policies delete { | –all} Deletes a replication policy.
isi sync policies modify Modify the settings of a replication policy.
isi sync policies modify newPolicy \ –target-compare-initial-sync on Enables differential synchronization, Run the policy by running isi sync jobs start.
isi sync policies modify dailySync –schedule “” Ensures that the policy dailySync runs only manually.
isi sync policies delete dailySync Eeletes dailySync from the source cluster.
isi sync policies enable dailySync Enables dailySync.
isi sync policies disable dailySync Disables dailySync.
isi sync policies list View information about replication policies.
isi sync policies view dailySync Displays detailed information about dailySync.
isi job jobs start domainmark –root /ifs/data/media \ –dm-type SyncIQ Start Domainmark.
isi sync jobs start dailySync –test Creates a report about how much data will be transferred when dailySync is run.
isi sync reports view dailySync 1 Displays the assessment report for dailySync.
isi sync jobs start dailySync Starts ‘dailySync’ replication job.
isi sync jobs start dailySync \ –source-snapshot HourlyBackup_07-15-2013_23:00 Replicates the source directory of dailySync according to snapshot HourlyBackup_07-15-2013_23.00.
isi sync jobs pause dailySync Pauses ‘dailySync’ replication job.
isi sync jobs resume dailySync Resumes ‘dailySync’ replication job.
isi sync jobs cancel dailySync Cancels ‘dailySync’ replication job.
isi sync jobs list View all active replication jobs.
isi sync jobs reports list Displays information about running replication jobs targeting the local cluster.
isi sync jobs reports view Displays information about a running replication job targeting the local cluster.
isi sync jobs view dailySync Displays detailed information about a replication job.
isi sync recovery allow-write dailySync Enables replicated directories and files specified in the dailySync policy to be writable.
isi sync recovery allow-write newPolicy –revert Reverts a failover operation for newPolicy.
isi sync recovery resync-prep dailySync Creates a mirror policy for dailySync.
isi sync jobs start dailySync_mirror Runs a mirror policy named dailySync_mirror immediately.
isi sync modify dailySync_mirror –enabled yes –schedule “every day at 12:01 AM” Schedules a mirror policy named dailySync_mirror to run daily at 12.01 AM.
isi sync recovery allow-write dailySync_mirror Allows writes to the directories specified in the dailySync_mirror policy.
isi sync recovery resync-prep dailySync_mirror Complete failback for dailySync_mirror, places secondary clust into RO mode, checks consistency.
isi sync recovery allow-write SmartLockSync Enables writes to the target directory of SmartLockSync.
isi worm domains modify –domain /ifs/data/smartlock \ –autocommit-offset 1m Automatically commits all files in /ifs/data/ smartlock to a WORM state after one minute.
isi sync target cancel Cancel a replication job that is targeting the local cluster.
isi sync target cancel dailySync Cancels a replication job created according to dailySync
isi sync target cancel –all Cancel all jobs targeting the local cluster.
isi sync target break Break local target association.
isi sync target break dailySync Breaks the association between dailySync and the local cluster.
isi sync target list View information about replication policies that are currently replicating data.
isi sync target view dailySync Displays detailed information about dailySync.
isi sync target reports list Displays information about completed replication jobs targeting the local cluster.
isi sync target reports view Displays information about a completed replication job that targeted the local cluster.
isi sync target reports subreports list Displays subreports about completed replication jobs targeting the local cluster.
isi sync target reports subreports view Displays a subreport about a completed replication job targeting the local cluster.
isi sync rules create Create a network traffic rule
isi sync rules create bandwidth 9:00-17:00 M-F 100 Creates a network traffic rule that limits bandwidth (100 KB per second from 9AM to 5PM weekdays).
isi sync rules create file_count 9:00-17:00 M-F 3 limits the file-send rate to 3 files per second from 9.00 AM to 5.00 PM every weekday
isi sync rules list Identify the ID of the performance rule.
isi sync rules view Displays information about a replication performance rule.
isi sync rules modify bw-0 –days X,S Performance rule with an ID of bw-0 to be enforced only on Saturday and Sunday.
isi sync rules delete { | –all | –type } [–force] [–verbose] Deletes a replication performance rule.
isi sync rules delete bw-0 Deletes a performance rule with an ID of bw-0.
isi sync rules modify bw-0 –enabled true Enables a performance rule with an ID of bw-0..
isi sync rules modify bw-0 –enabled false Disables a performance rule with an ID of bw-0.
isi sync reports list View a list of all replication reports.
isi sync reports view dailySync 2 Displays a replication report for dailySync.
isi sync reports subreports list dailySync 1 Displays subreports for dailySync.
isi sync reports subreports view dailySync 1 2 Displays a subreport for dailySync.
isi sync reports rotate [–verbose] Causes excess reports to be deleted immediately.
isi sync policies create Create a replication policy with SyncIQ.
isi sync policies create mypolicy sync /ifs/data/source Creates a policy that replicates the directory /ifs/data/
  10.1.99.36 /ifs/data/target –schedule “Every Sunday at 12:00 AM”   source on the source cluster to /ifs/data/target on target cluster 10.1.99.36
  –target-snapshot-archive on –target-snapshot-expiration 1Y   every week. The command also creates archival snapshots on the target cluster.
  –target-snapshot-pattern “%{PolicyName}-%{SrcCluster}-%Y-%m-%d   creates a SyncIQ domain for /ifs/data/source.
NDMP
isi ndmp settings global modify –service=yes Enable NDMP backup.
isi ndmp settings global modify –dma=emc configures OneFS to interact with EMC NetWorker.
isi ndmp settings global modify service=no Disable NDMP backup.
isi ndmp settings global view View NDMP backup settings.
isi ndmp settings diagnostics modify Modifies NDMP diagnostics settings.
isi ndmp settings diagnostics view [–format {list | json}] Displays NDMP diagnostic settings.
isi ndmp users create NDMPuser –password=1234 Creates an NDMP user account called NDMPuser.
isi ndmp users modify NDMPuser –password=5678 Modifies the password of a user named NDMPuser.
isi ndmp users delete NDMPuser Deletes a user named NDMPuser.
isi ndmp users view View NDMP user accounts.
isi ndmp users view Displays information about the account for a specific user.
isi tape rescan –node=18 Detects devices on node 18.
isi tape rescan –reconcile Remove entries for devices and paths that have become inaccessible.
isi tape modify tape003 –new-name=tape005 Modify the name of an NDMP device entry.
isi tape delete –name=tape001 Disconnects tape001 from the cluster.
isi tape list –node=18 –tape List tape devices on node 18.
isi tape view Displays information about a tape or media changer device.
isi fc settings modify 5.1 –topology=ptp Configures port 1 on node 5 to support a point-to-point Fibre Channel topology.
isi fc settings modify 5.1 –state=enable | disable Enable or disable an NDMP backup port.
isi fc settings view 5.1 View Fibre Channel port settings for port 1 on node 5.
isi fc settings list Lists Fibre Channel port settings.
isi fc settings view Displays settings for a specific Fibre Channel port.
isi ndmp sessions list Retrieve the ID of the NDMP session that you want to end.
isi ndmp sessions delete View the status of NDMP sessions or terminate a session that is in progress.
isi ndmp sessions delete 4.36339 –force Ends an NDMP session with an ID of 4.36339.
isi ndmp sessions view View NDMP Sessions.
isi ndmp list View information about active NDMP sessions.
isi ndmp contexts list –type bre View NDMP restartable backup contexts that have been configured.
isi ndmp contexts view View detailed information about a specific restartable backup context.
isi ndmp contexts delete Delete a restartable backup context.
isi ndmp settings global modify Specify the number of restartable backup contexts that OneFS can retain, up to 1024.
isi ndmp settings global modify –bre_max_num_contexts=128 Modify max number of contexts.
isi ndmp settings variables modify Modify default NDMP variable settings.
isi ndmp settings variables list view the default NDMP settings for a path.
isi ndmp settings variables create Sets the default value for an NDMP environment variable for a given path.
isi ndmp dumpdates delete [–name ] Delete snapshots created for snapshot-based incremental backups.
isi ndmp dumpdates list View snapshots generated for snapshot-based incremental backups.
File Retention
isi worm cdate set Set the compliance clock.
isi worm cdate view View the current time of the compliance clock.
isi job jobs start DomainMark –root /ifs/data/smartlock –dm-type Worm Creates a SmartLock enterprise domain
isi worm domains create Creates a SmartLock directory.
isi worm domains modify /ifs/data/SmartLock/prod_dir \  –default-retention 1Y Sets the default retention period to one year.
isi worm domains view View detailed information about a specific SmartLock directory.
isi worm domains modify /ifs/data/SmartLock/prod_dir \ –override-date 2014-06-01 Overrides the retention period expiration date of /ifs/data/SmartLock/prod_dir to June 1, 2014.
isi worm domains modify –privileged-delete Modify smartlock directory to allow deletion.
isi worm files view /ifs/data/SmartLock/prod_dir/file Displays the WORM status of a file.
isi worm files delete Deletes a file committed to a WORM state.
isi worm domains list Displays a list of WORM directories.
Protection Domains
isi job jobs start domainmark –root /ifs/data/media \ –dm-type SyncIQ Creates a SyncIQ domain for /ifs/data/source.
isi job jobs start domainmark –root /ifs/data/media \ –dm-type SyncIQ –delete Deletes a SyncIQ domain for /ifs/data/source.
Data-at-rest-encryption
isi_reformat_node Securely deletes the authentication keys on an entire cluster, smartfails each node,
  and runs the isi_reformat_node command on the last node.
SmartQuotas
isi quota quotas create –help Information about the parameters and options that can be used.
isi quota quotas create Create an accounting quota.
isi quota quotas create /ifs/data/test_1 directory \ –advisory-threshold=10M –enforced=false Creates an informative quota for the /test_1 directory.
isi job events list –job-type quotascan Verify that no QuotaScan jobs are in progress.
isi quota quotas list –help For information about the parameters and options that you can use.
isi quota quotas list –path=/ifs/data/quota_test_1 Finds all quotas that monitor the /ifs/data/quota_test_1 directory.
isi quota quotas list -v –path=/ifs/data/quota_test_2 \ –include-snapshots=”yes” Provides current usage information for the root user.
isi quota reports list -v Lists all info in the quota report.
isi quota reports delete Deletes a specified report.
isi quota quotas delete /ifs/data/quota_test_2 directory Deletes the specified directory-type quota.
isi quota quotas modify /ifs/dir-1 user –linked=false –user=admin Unlinks a user quota.
isi_classic quota list –export The quota configuration file displays as raw XML.
isi_classic quota import –from-file= Import quota settings in the form of a configuration file.
isi quota settings notifications modify –help Information about the parameters and options.
isi quota settings notifications modify advisory exceeded \ –action-alert=true Generate an alert when the advisory threshold is exceeded.
isi quota settings reports modify –schedule=”Every 2 days” Creates a quota report schedule that runs every two days.
isi quota settings mappings create -v Creates a SmartQuotas email mapping rule.
isi quota settings mappings delete Deletes SmartQuotas email mapping rules.
isi quota settings mappings list Lists SmartQuotas email mapping rules.
isi quota settings mappings modify Modifies an existing SmartQuotas email mapping rule.
si quota settings mappings view View a SmartQuotas email mapping rule.
isi quota reports create -v Creates an ad-hoc quota report.
isi quota quotas view Displays detailed properties of a single file system quota.
isi quota quotas notifications create /ifs/data/test_2 \ directory advisory exceeded –holdoff=10W Advisory quota notification rule, specifies length of time to wait before creating a notification.
isi quota quotas notifications delete –path Deletes a quota notification rule.
isi quota quotas notifications disable Disables all quota notifications.
isi quota quotas notifications list Displays a list of quota notification rules.
isi quota quotas notifications modify Modifies a notification rule for a quota.
isi quota quotas notifications view Displays the properties of a quota notification rule.
isi quota quotas notifications clear Clears rules for a quota and uses system notification settings.
Storage Pools
isi storagepool compatibilities class active create Create a node class compatibility.
isi storagepool compatibilities class active create N400 N410 creates a compatibility between Isilon NL400 and NL410 nodes.
isi storagepool compatibilities class active list lists active compatibilities and their ID numbers
isi storagepool compatibilities class available list Lists node class compatibilities that are available, but not yet created.
isi storagepool compatibilities class active delete 9 deletes a node class compatibility with an ID number of 9.
isi storagepool compatibilities class active view Displays the details of an active node class compatibility.
isi storagepool compatibilities ssd active create S200 Creates an SSD class compatibility for Isilon S200 nodes that have different capacity SSDs.
isi storagepool compatibilities ssd active delete 1 Deletes an SSD compatibility with an ID number of 1.
isi storagepool compatibilities ssd active list Lists SSD compatibilities that have been created.
isi storagepool compatibilities ssd active view Displays the details of an active SSD compatibility.
isi storagepool compatibilities ssd available list Lists SSD compatibilities that are available, but not yet created.
isi storagepool nodepools create Create a node pool manually
isi storagepool nodepools create PROJECT-TEST –lnns 1,2,3 Creates a node pool by specifying the LNNs of three nodes to be included.
isi storagepool nodepools delete Deletes a node pool and autoprovisions the affected nodes into the appropriate node pool.
isi storagepool nodepools modify PROJECT-TEST –lnns 3-4, 11 Adds nodes with the LNNs (logical node numbers) of 3, 4, and 11 to an existing node pool.
isi storagepool nodepools modify PROJECT-TEST –set-name PROD-PROJECT \ –protection-policy +2:1 Changes the name and protection policy of a node pool.
isi storagepool nodepools modify PROD_ARCHIVE –remove-lnns 7,9 Removes two nodes, identified by its LNNs.
isi storagepool nodepools modify PROD-PROJECT –tier PROD_ARCHIVE Adds a node pool named PROD-PROJECT to a tier.
isi storagepool nodepools list Displays a list of node pools.
isi storagepool nodepools view Displays details for a node pool.
isi storagepool settings modify Modify default storage pool settings
isi storagepool settings view Lays global SmartPools settings.
isi storagepool settings modify –ssd-l3-cache-default-enabled yes Sets L3 cache enabled as the default for new node pools that are added.
isi storagepool nodepools modify hq_datastore –l3 true Enables L3 cache on a node pool named hq_datastore.
isi storagepool nodepools create Creates a manually managed node pool (use with assistance of technical support personnel)
isi storagepool tiers create PROD_ARCHIVE –children hq_datastore1 –children hq_datastore2 Creates a tier named PROD_ARCHIVE, and adds node pools to the tier.
isi storagepool tiers modify PROD_ARCHIVE –set-name ARCHIVE_TEST Renames a tier from PROD_ARCHIVE to ARCHIVE_TEST.
isi storagepool tiers delete ARCHIVE_TEST Deletes a tier named ARCHIVE_TEST.
isi storagepool tiers list Displays a list of tiers.
isi storagepool tiers view Displays details for a tier.
isi filepool policies create Create a file pool policy.
isi filepool policies delete Deletes a file pool policy.
isi filepool policies list view a list of available file pool policies.
isi filepool policies view View the current settings of a file pool policy.
isi filepool policies view OLD_ARCHIVE Displays the settings of a file pool policy named OLD_ARCHIVE.
isi filepool default-policy view Display the current default file pool policy settings.
isi filepool default-policy modify Change default settings
isi filepool policies modify PERFORMANCE –apply-order 1 Changes the priority of a file pool policy named PERFORMANCE.
isi filepool policies delete PROD_ARCHIVE Deletes a file pool policy named PROD_ARCHIVE.
isi storagepool health –verbose Displays a tabular description of storage pool health.
isi storagepool list Displays node pools and tiers in the cluster.
isi filepool apply Applies all file pool policies to the specified file or directory path.
isi filepool policies delete Delete a custom file pool policy. The default file pool policy cannot be deleted.
isi filepool templates list Lists available file pool policy templates.
isi filepool templates view View the detailed settings in a file pool policy template.
CloudPools
CloudPools can seamlessly connect to EMC-based cloud storage systems and to popular third-party providers, Amazon S3 and Microsoft Azure.
isi cloud pools create cp_az azure csa_azure1 –vendor Microsoft Creates an Azure-based CloudPool.
isi cloud pools view cp_az View the result of this operation of the CloudPool that you created.
isi cloud pools list View a list of CloudPools that have been created on your cluster.
isi cloud pools view cah_s3_cp Information on the CloudPool named cah_s3_cp.
isi cloud pools modify c_pool_azure –remove-accounts c_acct2 –description “Secondary archive” modifies a CloudPool named c_pool_azure, removing its cloud storage acct.
isi cloud pools delete c_pool_azure Deletes the CloudPool named c_pool_azure.
isi cloud archive Archive specific files directly to the cloud.
isi cloud archive /ifs/data/shared/images/*.* –recursive yes Specifies a directory and all of its subdirectories and files to be archived.
isi cloud access add Adds cloud write access to the cluster.
isi cloud access list List the GUIDs of clusters that are accessible for SyncIQ failover or restore operations.
isi cloud access add ac7dd991261e33e382240801204c9a66 Enables a secondary cluster, identified by GUID, to have write access to cloud data.
 isi cloud access remove Remove previously granted access to SmartLink files.
isi cloud access view View the details of a cluster with, or eligible for, write access to cloud data.
isi cloud jobs list List all CloudPools jobs.
isi cloud jobs view View information about a CloudPools job.
isi cloud jobs pause Pause a running CloudPools job.
isi cloud jobs resume Resume a cloud job that has been paused.
isi cloud jobs cancel Cancel a running CloudPools job.
isi cloud jobs files list Displays the list of files matched by the specified CloudPools job.
isi cloud settings view View the top-level settings for CloudPools.
isi cloud settings modify Modify default CloudPools settings.
isi cloud settings modify –default-archive-snapshot-files=no Disables archival of files that have snapshot versions.
isi cloud settings modify –default-encryption-enabled=yes Enables both encryption and compression of cloud data.
isi cloud settings regenerate-encryption-key –verbose Generate a new master encryption key.
isi cloud recall [–recursive {yes | no}] [–verbose] Specify one or more files to be recalled from the cloud.
isi cloud restore_coi Restores the cloud object index (COI) for a cloud storage account on the cluster.
isi cloud settings regenerate-encryption-key –verbose Generates a new master encryption key for data to be archived to the cloud.
isi cloud accounts create Create a cloud storage account.
isi cloud accounts delete Delete a cloud storage account.
isi cloud accounts list List all cloud storage accounts created on your cluster.
isi cloud accounts view CloudAcct3 Displays account information for the CloudAcct3 account.
isi cloud accounts modify CloudAcct3 –name=CloudAcct5 Changes the name of the cloud storage account CloudAcct3 to CloudAcct5
isi cloud accounts delete OldRecords –acknowledge yes Deletes the cloud storage account OldRecords.
isi cloud accounts create –name=c-acct1 –type=azure Creates a Microsoft Azure cloud storage account.
  –uri=https://admin2.blob.core.windows.net –account-username=adm1
System Jobs
isi job jobs start
isi job jobs start Collect –policy MEDIUM –priority 2 Runs the Collect job with a stronger impact policy and a higher priority.
isi job jobs start multiscan –priority 8 –policy high Starts a MultiScan job with a priority of 8 and a high impact policy.
isi job jobs pause 7 Pauses a job with an ID of 7.
isi job jobs pause Collect Pauses an active job.
isi job jobs list –state paused_user Lists jobs that have been manually paused.
isi job jobs list –format csv > /ifs/data/joblist.csv Outputs a CSV-formatted list of jobs to a file in the /ifs/data path.
isi job jobs list Displays information about active jobs.
isi job jobs view Displays information about a running or queued job, including the state, impact policy, priority, and schedule.
isi job jobs modify Changes the priority level or impact policy of a queued, running, or paused job.
isi job pause Collect Pauses collect job.
isi job jobs modify 7 –priority 3 –policy medium Updates the priority and impact policy of an active job.
isi job jobs modify Collect –priority 3 –policy medium Job type can be specified instead of the job id.
isi job jobs resume 7 Resumes a job with the ID number 7.
isi job jobs resume Collect Job type can be specified instead of the job id.
isi job jobs cancel 7 Cancels a job with the ID number 7.
isi job jobs cancel Collect Job type can be specified instead of the job id.
isi job types modify mediascan –priority 2 –policy medium Modifies the default priority level and impact level for the MediaScan job type.
isi job types modify mediascan –schedule ‘every Saturday at 09:00’ –force Schedules the MediaScan job to run every Saturday morning.
isi job types modify mediascan –clear-schedule –force Removes the schedule for a job type that is scheduled.
isi job types list Displays a list of job types and default settings.
isi job types view Displays the parameters of a specific job type
isi job jobs list View active jobs.
isi job events list –job-type multiscan Displays the activity of the MultiScan job type.
isi job events list –begin 2013-09-16 View all jobs within a specific time frame.
isi job events list –begin 2013-09-15 –end 2013-09-16 > /ifs/data/report1.txt Outputs job history for a specific two-week period.
isi job policies create MY_POLICY –impact medium –begin ‘Saturday 00:00’ –end ‘Sunday 23:59’ Creates a custom policy defining a specific time frame and impact level.
isi job policies view MY_POLICY Displays the impact policy settings of the custom impact policy MY_POLICY.
isi job policies modify MY_POLICY –reset-intervals Resets the policy interval settings to the base defaults.  Low impact and anytime operation.
isi job policies delete MY_POLICY Deletes a custom impact policy named MY_POLICY.
isi job policies list –verbose Displays the names and descriptions of job impact policies.
isi job statistics view –job-id 857 View statistics for a job in progress.
isi job statistics list Displays a statistical summary of active jobs in the Job Engine queue.
isi job reports view 857 Displays the report of a Collect job with an ID of 857.
isi job reports list Displays information about successful job operations.
isi job status [–verbose] Displays a summary of active, completed, and failed jobs.
Networking
Run the isi config command, The command-line prompt changes to indicate that you are in the isi config subsystem. Run the commit command to complete.
iprange int-a 192.168.101.10-192.168.101.20 Adds an IP range to the int-a internal network.
deliprange int-a 192.168.101.15-192.168.101.20 Deletes an existing IP address range from the int-a internal network.
netmask int-a 255.255.255.0 Changes the int-a internal network netmask.
netmask int-b 255.255.255.0 Changes the int-b internal network netmask.
iprange int-b 192.168.101.21-192.168.101.30 Adds an IP range to the int-b internal network.
iprange failover 192.168.101.31-192.168.101.40 Adds an IP range to the internal failover network.
interface int-b enable Specifies the interface name as int-b and enables it.
interface int-b disable Specifies the int-b interface and disables it.
isi network groupnet create Create a groupnet and configure DNS client settings.
isi network groupnet create ProdGroupNet \ –dns-servers=192.0.2.0 –dns-cache-enabled=true Creates a groupnet named ProdGroupNet that supports one DNS server and enables DNS caching
isi network groupnet modify Modify groupnet attributes.
isi network groupnet modify ProdGroupNet \ –dns-search=dat.corp.com,stor.corp.com Modifies ProdGroupNet to enable DNS search on three suffixes.
isi network groupnet modify ProdGroupNet \ –add-dns-servers=192.0.2.1 –dns-options=rotate Modifies ProdGroupNet to support a second DNS server and to enable rotation through the configured DNS resolvers
isi network groupnet delete Delete a groupnet.
isi network groupnet delete ProdGroupNet Deletes a groupnet named ProdGroupNet.
isi network groupnets list Retrieve and sort a list of all groupnets on the system.
isi network groupnets list –sort=id –descending Sorts the list of groupnets by ID in descending order.
isi network groupnets view ProdGroupNet Displays the details of a groupnet named ProdGroupNet.
isi network groupnets modify Modifies a groupnet which defines the DNS settings applied to services that connect through the groupnet.
isi network subnets create Add a subnet to the external network of an EMC Isilon cluster.
isi network subnets create \ ProdGroupNet.subnetX ipv4 255.255.255.0 Creates a subnet associated with ProdGroupNet.
isi network subnets list identify the ID of the external subnet.
isi network subnets modify ProdGroupNet.subnetX \ –name=subnet5 Changes the name of subnetX under ProdGroupNet to subnet5.
isi network subnets modify g1.sbet3 –mtu=1500 –gateway=198.162.205.10 –gateway-priority=1 Sets the MTU to 1500, sets GW to 198.162.205.10, sets GW priority to 1.
isi network subnets delete ProdGroupNet.subnetX Deletes subnetX under ProdGroupNet.
isi network subnets view view the details of a specific subnet.
isi network subnets view ProdGroupNet.subnetX displays details for subnetX under ProdGroupNet.
isi network subnets modify ProdGroupNet.subnetX \ –sc-service-addr=198.11.100.15 Specifies the SmartConnect service IP address on subnetX under ProdGroupNet.
isi networks modify subnet Enable or disable VLAN tagging on the external subnet.
isi network subnets modify ProdGroupNet.subnetX \ –vlan-enabled=true –vlan-id=256 Enables VLAN tagging on subnetX under ProdGroupNet, sets VLAN ID to 256.
isi network subnets modify ProdGroupNet.subnetX \ –vlan-enabled=false Disables VLAN tagging on subnetX under ProdGroupNet.
isi network subnets modify ProdGroupNet.subnetX \ –add-dsr-addrs=198.11.100.20 Adds a DSR address to subnetX under ProdGroupNet.
isi network subnets modify ProdGroupNet.subnetX \ –remove-dsr-addrs=198.11.100.20 removes a DSR address from subnetX under ProdGroupNet.
isi network pools create Create an IP address pool.
isi network pools create ProdGroupNet.subnetX.ProdPool1 Creates a pool named ProdPool1 and assigns it to subnetX under ProdGroupNet.
isi network pools create ProdGroupNet.subnetX.ProdPool1 \ –access-zone=zoneB Creates a pool named ProdPool1, assigns it to ProdGroupNet.subnetX, specifies zoneB as the access zone.
isi networks modify pool Modify IP address pools to update pool settings.
isi network pools modify ProdGroupNet.subnetX.pool3 –name=ProdPool1 Changes the name of the pool from pool3 to ProdPool1.
isi networks delete pool Delete an IP address pool that you no longer need.
isi network pools delete ProdGroupNet.subnetX.ProdPool1 Deletes the pool name ProdPool1 from ProdGroupNet.subnetX.
isi network pools list View all IP address pools within a groupnet or subnet
isi network pools list ProdGroupNet.subnetX Displays all IP address pools under ProdGroupNet.subnetX.
isi network pools view ProdGroupNet.subnetX.ProdPool1 Displays the setting details of ProdPool1 under ProdGroupNet.subnetX.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –add-ranges=192.0.102.12-192.0.102.22 Adds an address range to ProdPool1 under ProdGroupNet.subnetX
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –remove-ranges=192.0.102.12-192.0.102.14 Deletes an address range from ProdPool1
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –alloc-method=dynamic Specifies dynamic distribution of IP addresses in ProdPool1 under ProdGroupNet.subnet 3.
isi networks modify pool .. Configures a SmartConnect DNS zone.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –sc-dns-zone=www.corp.com Specifies a SmartConnect DNS zone in ProdPool1 under subnetX and ProdGroupNet.
isi networks modify pool Configures a SmartConnect DNS zone alias.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –add-sc-dns-zone-aliases=data.corp.com Specifies SmartConnect DNS aliases in ProdPool1 under subnetX and ProdGroupNet.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –remove-dns-zone-aliases=data.corp.com removes a SmartConnect DNS aliases from ProdPool1 under subnetX and ProdGroupNet.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –sc-subnet=subnet0 specifies subnet0 as the a SmartConnect service subnet of ProdPool1 under subnetX and ProdGroupNet.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 –add-ifaces=1-3:ext-1 modifies ProdPool1 under ProdGroupNet.subnetX to add the first external network interfaces on nodes 1 through 3.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 –remove-ifaces=3:ext-1 Removes the first network interface on node 3 from ProdPool1.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 –aggregation-mode-fec Modifies ProdPool1 under Pnet1.subnetX to specify FEC as the aggregation mode for all aggregated interfaces in the pool.
isi network pools modify Pnet1.subnetX.ProdPool1 –add-ifaces=1:ext-agg –aggregation-mode=lacp Modifies ProdPool1 under Pnet1.subnetX to add ext-agg on node 1 and specify LACP as the aggregation mode.
isi network pools modify Pnet1.snet3.ProdPool1 –add-static-routes=192.168.100.0/24-192.168.205.2 Adds an IPv4 static route to ProdPool1 and assigns the route to all network interfaces that are members of the pool.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –sc-connect-policy=conn_count Specifies a connection balancing policy based on connection count in ProdPool1 under subnet 3 and ProdGroupNet.
isi network pools modify groupnet0.subnetX.ProdPool1 \ –sc-failover-policy=cpu_usage Specifies a IP failover policy based on CPU usage in ProdPool1 under subnet 3 and groupnet0.
isi network pools modify ProdGroupNet.subnetX.ProdPool1 \ –rebalance-policy=manual Specifies manual rebalancing of IP addresses in ProdPool1 under ProdGroupNet.subnet 3.
isi network pools sc-suspend-nodes .. Suspends DNS query responses for an node.
isi network pools rebalance-ips .. Manually rebalances a specific IP address pool.
isi network pools rebalance-ips ProdGroupNet.subnetX.ProdPool1 Rebalances the IP addresses in ProdPool1.
isi network pools sc-suspend-nodes ProdGroupNet.subnetX.ProdPool1 3 Suspends DNS query responses on node 3.
isi network pools sc-resume-nodes Resumes DNS query responses for an IP address pool.
isi network pools sc-resume-nodes ProdGroupNet.subnetX.ProdPool1 3 Resumes DNS query responses on node 3.
isi network external view Displays configuration settings for the external network.
isi network external modify Modifies global external network settings on the EMC Isilon cluster.
isi network external modify –sc-balance-delay Specifies a rebalance delay (in seconds) that passes after a qualifying event prior to an automatic rebalance.
isi network sc-rebalance-all Rebalances all IP address pools.
isi networks modify pool .. Configure which network interfaces are assigned to an IP address pool.
isi network interfaces list Retrieve and sort a list of all external network interfaces on the EMC Isilon cluster.
isi network interfaces list –nodes=1,3 Displays interfaces only on nodes 1 and 3.
isi network rules create … Creates a node provisioning rule.
isi network rules create ProdGroupNet.subnetX.ProdPool1.rule7 \ –iface=ext-1 –node-type=accelerator Creates a rule (rule7) that assigns the first external network if on each new accelerator node to Pnet1.subnetX.ProdPool1
isi network rules modify … Modifies node provisioning rules settings.
isi network rules modify ProdGroupNet.subnetX.ProdPool1.rule7 \ –name=rule7accelerator Changes the name of rule7 to rule7accelerator.
isi network rules modify ProdGroupNet.subnetX.ProdPool1.rule7 \ –node-type=backup-accelerator Changes rule7 so that it applies only to backup accelerator nodes.
isi networks delete rule … Delete an node provisioning rule that are no longer needed.
isi network rules delete ProdGroupNet.subnetX.ProdPool1.rule7 Deletes rule7 from ProdPool1.
isi network rules list Lists all of the provisioning rules in the system.
isi network rules list –groupnet=ProdGroupNet Lists rules in ProdGroupNet.
isi network rules view ProdGroupNet.subnetX.ProdPool1.rule7 Displays the setting details of rule7 under ProdGroupNet.subnetX.ProdPool1.
isi network external modify –sbr=true Enablessource-based routing on the cluster.
isi network external modify –sbr=false Disables source-based routing on the cluster.
isi network dnscache flush [–verbose] Simultaneously flushes the DNS cache of each groupnet that has enabled DNS caching.
isi network dnscache modify Modifies global DNS cache settings for each DNS cache that is enabled per groupnet.
isi network dnscache view Displays DNS cache settings.
Hadoop
isi hdfs settings modify The HDFS service (enabled by default after you activate an HDFS license) can be enabled or disabled per access zone.
isi hdfs settings modify –service=yes –zone=DevZone Enables the HDFS service in DevZone.
isi hdfs settings modify –service=no –zone=DevZone Disables the HDFS service in DevZone.
isi hdfs settings modify Configure HDFS service settings in each zone to improve performance for HDFS workflows.
isi hdfs settings modify –default-block-size=256K –zone=DevZone Sets the block size to 256 KB in the DevZone access zone  (Suffixes K, M, and G are allowed).
isi hdfs settings modify –default-checksum-type=crc32 –zone=DevZone Sets the checksum type to crc32 in the DevZone access zone.
isi hdfs settings view View HDFS settings in an access zone.
isi hdfs settings view –zone=ProdZone Displays the HDFS settings in the ProdZone access zone.
isi hdfs log-level modify Sets the default logging level of HDFS services events.
isi hdfs log-level modify –set=trace Sets the HDFS log level to trace on the node.
isi hdfs log-level view View the default logging level of HDFS services events.
isi hdfs settings modify –root-directory=/ifs/DevZone/hadoop –DevZone Grant access to the /ifs/data/hadoop directory.
isi hdfs settings modify –authentication-mode=simple_only –DevZone Clients connecting to DevZone must be identified through the simple authentication method.
isi zone zones modify DevZone –authentication-mode=kerberos_only Clients connecting to DevZone must be identified through the Kerberos authentication method.
isi hdfs settings modify –webhdfs-enabled=yes –zone=DevZone Enables WebHDFS in DevZone.
isi hdfs settings modify –webhdfs-enabled=no –zone=DevZone Disables WebHDFS in DevZone.
isi hdfs proxyusers create Creates a proxy user.
isi hdfs proxyusers create hadoop-HDPUser –zone=ProdZone Designates hadoop-HDPUser in ProdZone as a new proxy user.
isi hdfs proxyusers modify Modifies the list of members that a proxy user securely impersonates.
isi hdfs proxyusers delete Deletes a proxy user from an access zone.
isi hdfs proxyusers delete hadoop-HDPUser –zone=ProdZone Deletes the proxy user hadoop-HDPUser from the ProdZone access zone.
isi hdfs proxyusers members list Lists the members of a proxy user.
isi hdfs proxyusers list –zone=ProdZone Displays a list of all proxy users configured in ProdZone.
isi hdfs proxyusers view View the configuration details for a specific proxy user.
isi hdfs proxyusers view hadoop-HDPUser –zone=ProdZone displays the configuration details for the hadoop-HDPUser.
isi hdfs racks create Create a virtual HDFS rack of nodes.
isi hdfs racks create /hdfs-rack2 –zone=TestZone Creates a rack named /hdfs-rack2 in the TestZone access zone.
isi hdfs racks modify Modify the settings of a virtual HDFS rack.
isi hdfs racks modify /hdfs-rack2 –new-name=/hdfs-rack5 –zone=DevZone Renames a rack named /hdfs-rack2 in the DevZone access zone to /hdfs-rack5.
isi hdfs racks delete Delete a virtual HDFS rack from an access zone.
isi hdfs racks delete /hdfs-rack2 –zone=ProdZone Deletes the virtual HDFS rack named /hdfs-rack2 from the ProdZone access zone.
isi hdfs racks list View a list of all virtual HDFS racks in an access zone.
isi hfds racks list –zone=ProdZone Lists all HDFS racks configured in the ProdZone access zone.
isi hdfs racks view /hdfs-rack2 –zone=ProdZone View the setting details for a specific virtual HDFS rack.
ESRS Commands
isi remotesupport connectemc modify Enable and configure ESRS.
isi remotesupport connectemc modify –enabled=no Disables ESRS.
isi remotesupport connectemc view View ESRS Config.
Antivirus
isi antivirus settings modify Target specific files for scans by antivirus policies.
isi antivirus settings modify –glob-filters-enabled true \ –glob-filters .txt Configures OneFS to scan only files with the .txt extension.
isi antivirus settings modify –scan-on-close true \ –path-prefixes /ifs/data/media Configures OneFS to scan files and directories under /ifs/data/media when they are closed.
isi antivirus settings modify –repair true –quarantine true Configures OneFS and ICAP servers to attempt to repair infected files and quarantine files that cannot be repaired.
isi antivirus settings modify –report-expiry 12w Configures OneFS to delete antivirus reports older than 12 weeks.
isi antivirus settings modify –service enable Enables antivirus scanning.
isi antivirus settings modify –service disable Dsables antivirus scanning.
isi antivirus servers create Add and connect to an ICAP server.
isi antivirus servers create icap://192.168.1.100 –enabled yes Adds and connects to an ICAP server at 192.168.1.100.
isi antivirus servers modify icap://192.168.1.100 –enabled yes Temporarily disconnects from the ICAP server.
isi antivirus servers modify icap://192.168.1.100 –enabled no Reconnects to an ICAP server.
isi antivirus servers delete icap://192.168.1.100 Removes an ICAP server with an ID of icap.//192.168.1.100.
isi antivirus policies create Create a  policy that causes specific files to be scanned for viruses each time the policy is run.
isi antivirus policies create HolidayVirusScan –paths /ifs/d \ –schedule “Every Friday at 12:00 PM” Creates an antivirus policy that scans /ifs/data every Friday at 12.00 PM.
isi antivirus policies modify HolidayVirusScan \ –schedule “Every Friday at 12:00 PM” Modifies a policy called HolidayVirusScan to be run on Saturday at 12.00 PM.
isi antivirus policies delete HolidayVirusScan Deletes a policy called HolidayVirusScan.
isi antivirus policies modify HolidayVirusScan –enabled yes Enables a policy called HolidayVirusScan.
isi antivirus policies modify HolidayVirusScan –enabled no Eisables a policy called HolidayVirusScan.
isi antivirus policies list View antivirus policies.
isi antivirus scan Manually scan an individual file for viruses.
isi antivirus scan /ifs/data/virus_file Scans the /ifs/data/virus_file file for viruses.
isi antivirus quarantine Quarantine a file to prevent the file from being accessed by users.
isi antivirus quarantine /ifs/data/badFile.txt Quarantines /ifs/data/badFile.txt.
isi antivirus scan /ifs/data/virus_file Scans /ifs/data/virus_file.
isi antivirus release /ifs/data/newFile Removes /ifs/data/badFile.txt from quarantine.
isi antivirus reports threats list View files that have been identified as threats by an ICAP server.
isi antivirus reports scans list View antivirus reports.
isi event events list View events that relate to antivirus activity.
Event Commands
isi event groups list Identify the group ID of the event group that you want to view.
isi event groups view View the details of a specific group.
isi event alerts list Identify the alert ID of the alert that you want to view.
isi event alerts delete Deletes an alert.
isi event alerts view NewExternal View the details of a specific alert, the name of the alert is case-sensitive.
isi event channels list Identify the name of the channel that you want to view
isi event channels view Support View the details of a channel
isi event settings view View your storage and maintenance settings.
isi event test create “Test message” Manually generate a test alert.
isi event settings modify Change the frequency that a heartbeat event is generated.
isi event alerts create Hardware NEW-EVENTS –channel RemoteSupport This command creates an alert named Hardware, sets the alert condition to
  NEW_EVENTS, and sets the channel that will broadcast the event as RemoteSupport
Isilon Technical Support Commands
isi_auth_expert
isi_bootdisk_finish
isi_bootdisk_provider_dev
isi_bootdisk_status
isi_bootdisk_unlock
isi_checkjournal
isi_clean_idmap
isi_client_stats
isi_cpr
isi_cto_update
isi_disk_firmware_reboot
isi_dmi_info
isi_dmilog
isi_dongle_sync
isi_drivenum
isi_dsp_install
isi_dumpjournal
isi_eth_mixer_d
isi_evaluate_provision_drive
isi_fcb_vpd_tool
isi_flexnet_info
isi_flush
isi_for_array
isi_fputil
isi_gather_info
isi_gather_auth_info
isi_gather_cluster_info
isi_gconfig
isi_get_itrace
isi_get_profile
isi_hangdump
isi_hw_check
isi_hw_status
isi_ib_bug_info
isi_ib_fw
isi_ib_info
isi_ilog
isi_imdd_status
isi_inventory_tool
isi_ipmicmc
isi_job_d
isi_kill_busy
isi_km_diag
isi_lid_d
isi_linmap_mod
isi_logstore
isi_lsiexputil
isi_make_abr
isi_mcp
isi_mps_fw_status
isi_netlogger
isi_nodes
isi_ntp_config
isi_ovt_check
isi_patch_d
isi_promptsupport
isi_radish
isi_rbm_ping
isi_repstate_mod
isi_restill
isi_rnvutil
isi_sasphymon
isi_save_itrace
isi_savecore
isi_sed
isi_send_abr
isi_smbios
isi_stats_tool
isi_transform_tool
isi_ufp
isi_umount_ifs
isi_update_cto
isi_update_serialno
isi_vitutil
isi_vol_copy
isi_vol_copy_vnx

Block and File VNX Password Change Procedure

Below is the procedure for changing the passwords on a Unified VNX on both the block and file sides.

Please note that Changing the Global VNX administrator password can cause communication failures between the Control Station and the array, the issue is documented in emc261195 and is the reason I’m adding this post, I was researching how to avoid the issue. The article notes that in DART OS versions newer than v7.0.14 the synchronization was automated and the cached credentials are updated automatically, in DART OS v7.0.14 and prior you must do it manually on the active control station.

Whenever a change is made to the active Control Station always verify that the standby control station configuration matches on takeover.  Takeover is initiated by the standby control station, failover is initiated by the active control station. As an example, if the time zone is changed on the active control station it is not part of the synchronization during the failover process. Time zone changes needs to be configured separately on each one and is a setting that requires a reboot to take effect. Unisphere will prompt you to do so as a reminder, however on takeover/failover the newly promoted control station never reboots.

Block Side: Change the sysadmin global domain account

A) Updating global domain account password

1) Log into Unisphere with the sysadmin global account, using the control station IP

2) From the “All Systems” page select “Domains”

3) Select “Manage Global Users”

4) Highlight sysadmin and click on “Modify”

5) Change the password

B) Update Security on Control Station

1) Open a putty session to the primary control station and run the commands below. They should be as is, however a possible exception would be the first 2 might make you add userid/password info before it would be accepted (add -user sysadmin –password “pswd ” –scope 0 to the commands below).

/nas/sbin/naviseccli -h spa -AddUserSecurity -user sysadmin -scope 0

/nas/sbin/naviseccli -h spb -AddUserSecurity -user sysadmin -scope 0

nas_storage –modify id=1 –security

 C) Verify the updated sysadmin password in the following locations:

1) Via Unisphere (Log in with the newly changed password)

2) Verify communication between the control station and storage processors on each array:

* Log in to the active control station via putty using the nasadmin local account

* Run the following commands:

/nas/sbin/navicli -h SPA getagent

nas_storage -check -all

The NAS storage check command should respond with “done”.

File Side: Change the nasadmin and root local accounts

A) Local accounts need to be modified on each array individually

1) Log into Unisphere with the sysadmin global account

2) Select the desired array

3) Click on “Settings” -> “Security” -> “Local Users for File”

4) Highlight nasadmin click on “Properties”

5) Change the password

6) Highlight root, click on Properties

7) Change the password

Note that the password for the local nasadmin and root accounts can also be changed from the CLI:

[root@fakevnxprompt ~]# passwd nasadmin
Changing password for user nasadmin. 
New UNIX password: <enter a password>
BAD PASSWORD: it is based on a dictionary word 
Retype new UNIX password: 
passwd: all authentication tokens updated successfully. 
[root@fakevnxprompt ~]#

B) Verify both passwords

1) Log in to the active control station via putty as nasadmin, verify your newly changed password

2) run the su command and verify your newly changed root password

C) Propagate changes to the standby control station

At this point the standby control station local account passwords have not yet been updated. It’s now time to test control station failover.  You can review one of my related prior blog posts on control station failover here.

1) While logged in to the active control station with root privileges, run this command:

/nas/sbin/cs_standby -failover

This will synchronize the control stations, reboot the active control station, and then make the standby control station active.

Caveats: Please note the expected issues listed below as part of out-of-band communication without an online, active control station:

* In-band production data will not be disrupted

* Data mover failover cannot occur

* Auto-extension of filesystems will not occur

* Scheduled checkpoints will not occur

* Replication sessions may be disrupted

2) Log in to the active control station (the previous standby control station)

3) Verify the new nasadmin password

4) su and verify the root password

5) Fail back to the original primary control station:

/nas/sbin/cs_standby -failover

 

 

 

Pure Storage data reduction report

I had a request to publish a daily report that outlines our data reduction numbers for each LUN on our production Pure storage arrays.  I wrote a script that will log in to the Pure CLI and issue the appropriate command, using ‘expect’ to do a screen grab and output the data to a csv file.  The csv file is then converted to an HTML table and published on our internal web site.

The ‘expect’ commands (saved as purevol.exp in the same directory as the bash script)

#!/usr/bin/expect -f
spawn ssh pureuser@10.10.10.10
expect “logon as: ”
send “pureuser\r”
expect “pureuser@10.10.10.10’s password: ”
send “password\r”
expect “pureuser@pure01> ”
send “purevol list –space\r”
expect “pureuser@pure01> ”
send “exit\r”

.

The bash script (saved as purevol.sh):

#!/bin/bash

# Pure Data Reduction Report Script
# 11/28/16

#Define a timestamp function
#The output looks like this: 6-29-2016/8:45:12
timestamp() {
date +”%m-%d-%Y/%H:%M:%S”
}

#Remove existing output file
rm /home/data/pure/purevol_532D.txt

#Run the expect script to create the output file
/usr/bin/expect -f /home/data/pure/purevol.exp > /home/data/pure/purevol_532D.txt

#Remove the first ten lines of the output file
#The first 12 lines contain login and command execution info not needed in the report
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt
sed -i ‘1d’ /home/data/pure/purevol_532D.txt

#Remove the last line of the output file
#This is because the expect script leaves a CLI prompt as the last line of the output
sed -i ‘$ d’ /home/data/pure/purevol_532D.txt

#Add date to output file, remove previous temp files
rm /home/data/pure/purevol_532D-1.csv
rm /home/data/pure/purevol_532D-2.csv
echo -n “Run time: ” > /home/data/pure/purevol_532D-1.csv
echo $(timestamp) >> /home/data/pure/purevol_532D-1.csv

#Add titles to new csv file
echo “Volume”,”Size”,”Thin Provisioning”,”Data Reduction”,” “,” “,”Total Reduction”,” “,” “,”Volume”,”Snapshots”,”Shared Space”,”System”,”Total” >> /home/data/pure/purevol_532D-1.csv

#Convert the space delimited file into a comma delimited file
sed -r ‘s/^\s+//;s/\s+/,/g’ /home/data/pure/purevol_532D.txt > /home/data/pure/purevol_532D-2.csv

#Combine the csv files into one
cat /home/data/pure/purevol_532D-1.csv /home/data/pure/purevol_532D-2.csv > /home/data/pure/purevol_532D.csv

#Use the csv2htm perl script to convert the csv to an html table
#csv2html script available here:  http://web.simmons.edu/~boyd3/imap/csv2html/
./csv2htm.pl -e -T -i /home/data/pure/purevol_532D.csv -o /home/data/pure/purevol_532D.html

#Copy the html file to the www folder to publish it
cp /home/data/pure/purevol_532D.html /cygdrive/C/inetpub/wwwroot

Below is an example of what the output looks like after the script is run and the output is converted to an HTML table.  Note there are columns missing to the right in order to fit the formatting of this post.  Also included are the numbers for Total reduction and snapshots.

Name Size Thin Provisioning Data Reduction
LUN001_PURE_0025_ESX_5T 5T 78% 16.4 to 1
LUN002_PURE_0025_ESX_5T 5T 75% 7.8 to 1
LUN003_PURE_0025_ESX_5T 5T 71% 9.3 to 1
LUN004_PURE_0025_ESX_5T 5T 87% 10.5 to 1

 

 

 

 

NetApp FAS Zero disk procedure

We recently had a need to zero out and reinstall a NetApp FAS 8080 in order to move it from test to production.  Below are the steps to zero out the disks in the array.

Steps:

  1. SSH to each nodes service-processor
  2. Halt each node.
    1. system node halt -node Node1 -inhibit-takeover true
    2. system node halt -node Node2
  3. At the Loader prompt for each node boot ONTAP (You might want to do these one at a time so you don’t miss the CTRL-C for the Boot Menu)
    1. LOADER A> boot_ontap
    2. LOADERB> boot_ontap
  4. Press Ctrl + C when you see the message below to enter the Boot Menu and select option 4 to wipe the configuration and zero disks (Do this on each node)
******************************* 
*                             * 
* Press Ctrl-C for Boot Menu. * 
*                             * 
******************************* 

(1) Normal Boot.
(2) Boot without /etc/rc. 
(3) Change password. 
(4) Clean configuration and initialize all disks. 
(5) Maintenance mode boot. 
(6) Update flash from backup config. 
(7) Install new software first. 
(8) Reboot node. Selection (1-8)? 4

5. Enter y to the questions that follow:

Zero disks, reset config and install a new file system?: y

This will erase all the data on the disks, are you sure?: y

The node will reboot and start initializing the disks.  Once the disks are zeroed the system should reboot to the cluster setup.

EMC Proven Professional