Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA Informations techniques

Naviguer en ligne ou télécharger Informations techniques pour Logiciel Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA. Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA System information Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 238
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Red Hat Subject Matter ExpertsJosef Bacik
Kamil Dudka Hans de Goede Doug Ledford
Daniel Novotny Nathan Straz David Wysochanski
Contributors Michael Christie Sachin Prabhu
Rob Evers David Howells David Lehman
Jeff Moyer Eric Sandeen Mike Snitzer
Red Hat Enterprise Linux 6
Storage Administration Guide
Deploying and configuring single-node storage in Red Hat Enterprise Linux
6
Edition 2
Vue de la page 0
1 2 3 4 5 6 ... 237 238

Résumé du contenu

Page 1 - Storage Administration Guide

Red Hat Subject Matter ExpertsJosef BacikKamil Dudka Hans de Goede Doug LedfordDaniel Novotny Nathan Straz David WysochanskiContributors Michael Chris

Page 2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 3 - Edition 2

WarningDo not attempt to resize a partition on a device that is in use.Pro ced u re 13.4 . Resiz e a part it ion1. Before resizing a partition, boot

Page 4 - Edited by

Chapter 14. LVM (Logical Volume Manager)LVM is a tool for logical volume management which includes allocating disks, striping, mirroring andresizing l

Page 5 - Abstract

Fig ure 14 .2. Lo g ical Vo lu mesOn the other hand, if a system is partitioned with the ext3 file system, the hard drive is divided intopartitions of

Page 6 - Table of Contents

In the example used in this section, the following are the details for the volume group that wascreated during the installation:Examp le 14 .1. Creat

Page 7

Fig ure 14 .4 . Ph ysical View Win d o wThe figure below illustrates the logical view for the selected volume group. The individual logicalvolume size

Page 8

Volume window from which you can modify the Logical volume name, size (in extents, gigabytes,megabytes, or kilobytes) and also use the remaining space

Page 9

In this example, partition 3 will be initialized and added to an existing volume group. To initialize apartition or unpartioned space, select the part

Page 10

Fig ure 14 .7. Un allo cat ed Vo lu mesClicking on the Ad d to Exi sti ng Vo l ume G ro up button will display a pop-up window listingthe existing

Page 11

select one of the existing logical volumes and increase the extents (see Section 14.2.6, “ Extendinga Volume Group” ),select an existing logical volum

Page 12

Fig ure 14 .9 . Lo g ical view o f vo lu me g roup14 .2.3. Migrat ing Ext ent sTo migrate extents from a physical volume, select the volume from the

Page 13 - 1. Document Convent ions

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 14 - 1.2. Pull-quot e Convent ions

Fig ure 14 .10. Mig rat e Ext en t sThe figure below illustrates a migration of extents in progress. In this example, the extents weremigrated to &apo

Page 15 - Important

Fig ure 14 .12. Lo g ical an d p h ysical view o f vo lu me g ro u p14 .2.4 . Adding a New Hard Disk Using LVMIn this example, a new IDE hard disk w

Page 16 - 2.2. We Need Feedback

Fig ure 14 .13. U n init ializ ed h ard d isk14 .2.5. Adding a New Volume GroupOnce initialized, LVM will add the new volume to the list of unalloca

Page 17

The figure below illustrates the physical view of the new volume group. The new logical volumenamed 'Backups' in this volume group is also l

Page 18 - Network Block Storage

In this example, the objective was to extend the new volume group to include an uninitialized entity(partition). Doing so increases the size or number

Page 19 - ⁠Part I. File Systems

Fig ure 14 .16 . Lo g ical an d p h ysical view o f an ext en ded vo lu me gro u p14 .2.7. Edit ing a Logical VolumeThe LVM utility allows you to

Page 20 - 2.1.1. FHS Organiz at ion

Fig ure 14 .17. Edit lo g ical volu meIf you wish to mount the volume, select the 'Mount' checkbox indicating the preferred mount point. To

Page 21

Fig ure 14 .18. Edit lo g ical volu me - specif yin g mo u n t o p t io n sThe figure below illustrates the logical and physical view of the volum

Page 22

Fig ure 14 .19 . Ed it lo g ical vo lu me14 .3. LVM ReferencesUse these sources to learn more about LVM.Installed Documentationrpm -q d l vm2 — This

Page 23

Chapter 15. Swap SpaceSwap space in Linux is used when the amount of physical memory (RAM) is full. If the system needsmore memory resources and the R

Page 24

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 25

existing LVM2 logical volume. It is recommended that you extend an existing logical volume.15.1.1. Ext ending Swap on an LVM2 Logical VolumeBy default

Page 26

# swapo n -v /d ev/Vo l G ro up0 0 /Lo gVo l 02To test if the logical volume was successfully created, use cat /pro c/swaps or free to inspect theswap

Page 27

To reduce an LVM2 swap logical volume (assuming /d ev/Vo l G ro up0 0 /Lo g Vo l 0 1 is the volumeyou want to reduce):Pro ced u re 15.3. Red u cin g

Page 28

# swapo ff -v /swapfi l e2. Remove its entry from the /etc/fstab file.3. Remove the actual file:# rm /swapfi le15.3. Moving Swap SpaceTo move swap s

Page 29 - 2.4. Discard unused blocks

Chapter 16. Disk QuotasDisk space can be restricted by implementing disk quotas which alert a system administrator before auser consumes too much disk

Page 30

none /sys sysfs defaults 0 0 /dev/VolGroup00/LogVol02 /home ext3 defaults,usrquota,grpquota 1 2 /dev/VolGrou

Page 31 - 3.2. Addit ional Informat ion

If neither the -u or -g options are specified, only the user quota file is created. If only -g is specified,only the group quota file is created.Aft

Page 32 - Chapter 4. Btrfs

The first column is the name of the file system that has a quota enabled for it. The second columnshows how many blocks the user is currently using. T

Page 33

16.1.6. Set t ing t he Grace Period for Soft Limit sIf a given quota has soft limits, you can edit the grace period (i.e. the amount of time a soft l

Page 34

Creating a disk usage report entails running the repq uo ta utility.Examp le 16 .5. O u t p u t o f repq uo ta comman dFor example, the command repq

Page 35

Preface1. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of in

Page 36

An alternative way to safely run q uo tacheck is to boot the system into single-user mode toprevent the possibility of data corruption in quota files

Page 37

Chapter 17. Redundant Array of Independent Disks (RAID)The basic idea behind RAID is to combine multiple small, inexpensive disk drives into an array

Page 38

Software RAIDSoftware RAID implements the various RAID levels in the kernel disk (block device) code. It offers thecheapest possible solution, as exp

Page 39 - Write Barriers

capacity of the smallest member disk in a Hardware RAID or the capacity of smallestmember partition in a Software RAID multiplied by the number of dis

Page 40 - Writ e Barriers

two drives in the array. This complex parity scheme creates a significantly higher CPUburden on software RAID devices and also imposes an increased bu

Page 41

dmraidDevice-mapper RAID or d mrai d refers to device-mapper kernel code that offers the mechanism topiece disks together into a RAID set. This same k

Page 42

As the name suggests, d mrai d is used to manage device-mapper RAID sets. The d mrai d tool findsATARAID devices using multiple metadata format han

Page 43

[5] RAID level 1 c o mes at a hig h c o st b ecause yo u write the same info rmatio n to all o f the d isks in thearray, p ro vid es d ata reliab il

Page 44

Chapter 18. Using the mo unt CommandOn Linux, UNIX, and similar operating systems, file systems on different partitions and removabledevices (CD s, DV

Page 45

To list such mount points using the fi nd mnt command, type:~]$ fi nd mnt -t ext4TARGET SOURCE FSTYPE OPTIONS/ /dev/sda2 ext4 rw,realtime,se

Page 46

C haracter T abl e. Double-click this highlighted character to place it in the T ext to co py field and then click the Co py button. Now switch back

Page 47

Note: Determining the UUID and Label of a Particular DeviceTo determine the UUID and—if the device uses it—the label of a particular device, use the b

Page 48

Older USB flash drives often use the FAT file system. Assuming that such drive uses the /d ev/sd c1 device and that the /med i a/fl ashd isk/ director

Page 49

18.2.3. Sharing Mount sOccasionally, certain system administration tasks require access to the same file system from morethan one place in the directo

Page 50 - Setting Project Limits

~]# mo unt /d ev/cd ro m /med ia/cd ro m~]# l s /med i a/cd ro mEFI GPL isolinux LiveOS~]# l s /mnt/cd ro mEFI GPL isolinux LiveOSSimilarly, it

Page 51

~]# l s /mnt/cd ro mEFI GPL isolinux LiveOSAlso verify that file systems mounted in the /mnt directory are not reflected in /med i a.For instance,

Page 52 - Set t in g Project Limit s

It is also possible to verify that file systems mounted in the /mnt directory are notreflected in /med i a. For instance, if a non-empty USB flash dri

Page 53

An NFS storage contains user directories and is already mounted in /mnt/userd i rs/. As ro o t,move this mount point to /ho me by using the following

Page 54 - Simple Mode for xfsrest ore

The following resources provide an in-depth documentation on the subject.18.4 .1. Manual Page Document at ionman 8 mo unt — The manual page for the mo

Page 55

Chapter 19. The vo l ume_key functionThe volume_key function provides two tools, libvolume_key and vo l ume_key. libvolume_key is alibrary for manipul

Page 56

This operation does not permanently alter the volume by adding a new passphrase, forexample. The user can access and modify the decrypted volume, modi

Page 57 - 9.2. pNFS

before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out;

Page 58

vo l ume_key --save /path/to/volume -o escro w-packetA prompt will then appear requiring an escrow packet passphrase to protect the key.2. Save the

Page 59 - 9.4. auto fs

At this point it is possible to choose an NSS database password. Each NSS database canhave a different password so the designated users do not need to

Page 60

After providing the NSS database password, the designated user chooses a passphrase forencrypting escro w-packet-o ut. This passphrase can be differen

Page 61

Chapter 20. Access Control ListsFiles and directories have permission sets for the owner of the file, the group associated with the file,and all other

Page 62

4. For users not in the user group for the fileThe setfacl utility sets ACLs for files and directories. Use the -m option to add or modify the ACL o

Page 63

To set a default ACL, add d : before the rule and specify a directory instead of a file name.Examp le 20.3. Set t in g d ef au lt ACLsFor example,

Page 64

addition, the -a option (equivalent to -d R --preserve= al l ) of cp also preserves ACLs during abackup along with other information such as timestam

Page 65

man acl — D escription of ACLsman g etfacl — Discusses how to get file access control listsman setfacl — Explains how to set file access control li

Page 66

Chapter 21. Solid-State Disk Deployment GuidelinesSolid-state disks (SSD ) are storage devices that use NAND flash chips to persistently store data. T

Page 67

As of Red Hat Enterprise Linux 6.4, ext4 and XFS are the only fully-supported file systems thatsupport d i scard . Previous versions of Red Hat Enterp

Page 68

Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software andtechnology. You can find a list of publicly availa

Page 69

Chapter 22. Write BarriersA write barrier is a kernel mechanism used to ensure that file system metadata is correctly written andordered on persistent

Page 70

To mitigate the risk of data corruption during power loss, some storage devices use battery-backedwrite caches. Generally, high-end arrays and some ha

Page 71

Most controllers use vendor-specific tools to query and manipulate target drives. For example, theLSI Megaraid SAS controller uses a battery-backed wr

Page 72

Chapter 23. Storage I/O Alignment and SizeRecent enhancements to the SCSI and ATA standards allow storage devices to indicate theirpreferred (and in s

Page 73 - 9.7.5. NFS over RDMA

Storage vendors can also supply I/O hints about the preferred minimum unit for random I/O(mi ni mum_i o _si ze) and streaming I/O (o pti mal _i o _si

Page 74 - 9.8. Securing NFS

BLKSSZG ET : l o g i cal _bl o ck_si zeBLKIO MIN: mi ni mum_i o _si zeBLKIO OP T : o pti mal _i o _si ze23.3. St andardsThis section describes I/O sta

Page 75

All layers of the Linux I/O stack have been engineered to propagate the various I/O parameters up thestack. When a layer consumes an attribute or aggr

Page 76 - 9.9. NFS and rpcbi nd

determine the I/O parameters of a device for optimal placement of all partitions. The fd i sk utility willalign all partitions on a 1MB boundary.parte

Page 77

Chapter 24. Setting Up A Remote Diskless SystemThe Network Booting Service (provided by system-co nfi g -netbo o t) is no longer available inRed Hat E

Page 78 - Related Books

After configuring a tftp server, you need to set up a DHCP service on the same host machine. Referto the Red Hat Enterprise Linux 6 Deployment Guide f

Page 79 - Chapter 10. FS-Cache

Chapter 1. OverviewThe Storage Administration Guide contains extensive information on supported file systems and datastorage features in Red Hat Enter

Page 80 - 10.2. Set t ing Up a Cache

# cp /boot/vmlinuz-kernel-version /var/lib/tftpboot/3. Create the ini trd (i.e. ini tramfs-kernel-version. i mg ) with network support:# dracut init

Page 81 - 10.3.1. Cache Sharing

Chapter 25. Online Storage ManagementIt is often desirable to add, remove or re-size storage devices while the operating system is running,and withou

Page 82 - ⁠Chapt er 1 0 . FS- Cache

po rt_name — 64-bit port nameRemo t e Po rt : /sys/cl ass/fc_remo te_po rts/rpo rt-H: B-R/po rt_i dno d e_namepo rt_named ev_l o ss_tmo — number of s

Page 83

Remote Port d ev_l o ss_tmoX X X X XRemote Port fast_i o _fai l _tmoX X ⁠X ⁠XHost po rt_i d X X X X XHost i ssue_l i pX X Xl pfc q l a2xxx zfcp mptfc

Page 84 - 10.6. References

This command displays the session/device state, session ID (sid), some negotiated parameters, andthe SCSI devices accessible through the session.For s

Page 85

servi ce tg td startSt o p p in g t he t g t d serviceTo stop the tgtd service, run:servi ce tg td sto pIf there are open connections, use:servi c

Page 86

In addition, path-based names are system-specific. This can cause unintended data changes whenthe device is accessed by multiple systems, such as in a

Page 87 - 11.3. Special Considerat ions

When the user_fri end l y_names feature (of device- map p er- mu lt ip at h ) is used, the WWID ismapped to a name of the form /d ev/mapper/mpathn. By

Page 88

Pro ced u re 25.1. En su rin g a Clean D evice Remo val1. Close all users of the device and backup device data as needed.2. Use umo unt to unmount

Page 89

Pro ced u re 25.2. Remo vin g a Pat h t o a St o rag e Device1. Remove any reference to the device's path-based name, like /d ev/sd or /d ev

Page 90 - Chapter 12. File System Check

The ext4 file system is fully supported in this release. It is now the default file system of Red HatEnterprise Linux 6, supporting an unlimited numbe

Page 91

NoteThe older form of this command, echo "scsi ad d -si ng l e-d evi ce 0 0 0 0 " > /pro c/scsi /scsi , is deprecated.a. In some Fi

Page 92 - 12.2.2. XFS

another device that is already configured on the same path as the new device. This can bedone with various commands, such as l sscsi , scsi _i d , mul

Page 93

NoteThese commands will only work if the d cbd settings for the Ethernet interface were notchanged.5. Load the FCoE device now using:# ifconfig ethX

Page 94 - 12.2.3. Bt rfs

Pro ced u re 25.5. Co n f ig u re FCo E t arg et1. Setting up an FCoE target requires the installation of the fco e-targ et-uti l s package,along wit

Page 95 - Chapter 13. Partitions

/> tcm_fc/ create 00:11:22:33:44:55:66:77If FCoE interfaces are present on the system, tab-completing after create will list availableinterfaces. I

Page 96

mount_fcoe_disks_from_fstab() { local timeout=20 local done=1 local fcoe_disks=($(egrep 'by-path\/fc-.*_netdev' /etc/fstab | cut

Page 97

25.9. Scanning St orage Int erconnect sThere are several commands available that allow you to reset and/or scan one or moreinterconnects, potentially

Page 98 - 13.2.3. Add t o /etc/fstab

The default iSCSI configuration file is /etc/i scsi /i scsi d. co nf. This file contains iSCSIsettings used by i scsi d and i scsi ad m.During target

Page 99 - 13.4 . Resizing a Part it ion

$ ping -I ethX target_IPIf pi ng fails, then you will not be able to bind a session to a NIC. If this is the case, check the networksettings first.25

Page 100 - ⁠Chapt er 1 3. Part it ions

For software iSCSI, each i face configuration must have a unique name (with less than 65characters). The i face_name for network devices that support

Page 101

⁠Part I. File SystemsThe File Systems section explains file system structure followed by two technology previews: eCryptfsand Btrfs. This is followed

Page 102 - 14 .1. What is LVM2?

# iscsiadm -m iface -I iface_name --op=update -n iface.setting -v hw_addressExamp le 25.12. Set MAC ad d ress o f i face0For example, to set the MAC

Page 103

This behavior was implemented for compatibility reasons. To override this, use the -I iface_nameto specify which portal to bind to an i face, as in:#

Page 104

The output will appear in the following format:target_IP:port,target_portal_group_tag proper_target_nameExamp le 25.14 . Usin g i scsi ad m t o issu

Page 105

If your device supports multiple targets, you will need to issue a send targ ets command to the hoststo find new portals for each target. Then, rescan

Page 106

Examp le 25.17. Fu ll i scsi ad m co mman dUsing our previous example (where proper_target_name is eq ual l o g i c-i scsi 1), the fullcommand would b

Page 107

In most cases, fully resizing an online logical unit involves two things: resizing the logical unit itselfand reflecting the size change in the corres

Page 108

NoteYou can also re-scan iSCSI logical units using the following command:# iscsiadm -m node -R -I interfaceReplace interface with the corresponding in

Page 109 - 14 .2.3. Migrat ing Ext ent s

1. Dump the device mapper table for the multipathed device using:d msetup tabl e multipath_device2. Save the dumped device mapper table as table_nam

Page 110

To change the R/W state, use the following procedure:Pro ced u re 25.7. Ch an g e t h e R /W st at e1. To move the device from RO to R/W, see step 2.

Page 111

# mul ti path -rThe mul ti path -11 command can then be used to confirm the change.25.1 4 .4 .3. Do cument at io nFurther information can be found in

Page 113

Chapter 2. File System Structure and MaintenanceThe file system structure is the most basic level of organization in an operating system. The way anop

Page 114

Pro ced u re 25.8. Det ermin in g T h e St at e o f a Remo t e Po rt1. To determine the state of a remote port, run the following command:$ cat/sys

Page 115

When d m-mul ti path is being used, the SCSI layer will fail those running commands and defer themto the multipath layer. The multipath layer then ret

Page 116

ImportantWhether your considerations are failover speed or security, the recommended value for repl acement_ti meo ut will depend on other factors. Th

Page 117

The Linux SCSI layer sets a timer on each command. When this timer expires, the SCSI layer willquiesce the host bus adapter (HBA) and wait for all out

Page 118 - Useful Websites

Pro ced u re 25.10. Wo rkin g Aro und St ale Lo g ical U n it s1. Determine which mpath link entries in /etc/l vm/cache/. cache are specific tothe s

Page 119 - Chapter 15. Swap Space

Chapter 26. Device Mapper Multipathing and Virtual StorageRed Hat Enterprise Linux 6 also supports DM-Multipath and virtual storage. Both features are

Page 120 - ⁠Chapt er 1 5. Swap Space

(the cable, switch, or controller) fails, DM-Multipath switches to an alternate path.Impro ved Perf ormanceDM-Multipath can be configured in active/a

Page 121

Revision HistoryRevisio n 2- 52 Wed Mar 25 2015 Jacq u elynn EastAdded ext back up and restore chaptersRevisio n 2- 51 T h u O ct 9 2014 Jacq u

Page 122 - 15.2.3. Removing a Swap File

Added fsck section BZ #904902.Revisio n 2- 27 T h u Sep 05 2013 Jacq u elyn n EastEdited Chapter 9: Network File System (NFS).Revisio n 2- 26 Mon

Page 123 - 15.3. Moving Swap Space

BZ #894697 Updated sections regarding FCoE.Revisio n 2- 4 Mon Jan 14 2013 Jacq u elyn n EastBZ #894891 As pNFS is coming out of tech preview statu

Page 124 - Chapter 16. Disk Quotas

11675568 6272120 4810348 57% / /dev/sda1 100691 9281 86211 10% /bootnone 32

Page 125

- enabling disk quotas with, Enabling Quotas/local/d irect o ry ( clien t co n f ig u rat io n , mo u n t in g )- NFS, NFS Client Configuration/p ro

Page 126 - ⁠Chapt er 1 6 . Disk Q uot as

addin g p at h s t o a st o rag e d evice, Ad d in g a St o rag e Device o r Pat haddin g /remo vin g- LUN (logical unit number), Adding/Removing a

Page 127

- I/O alignment and size, Block Device ioctlsb lo cked d evice, verif yin g- fibre channel- modifying link loss behavior, Fibre Channelb ru n ( cach

Page 128 - 16.2. Managing Disk Quot as

Ch an g in g the read /writ e st at e- Online logical units, Changing the Read/Write State of an Online Logical Unitchan n el co mman d wo rd ( CCW

Page 129

- solid state disks, Solid-State Disk Deployment Guidelinesd et ermin in g remo t e p o rt st at es- fibre channel- modifying link loss behavior, Fi

Page 130 - 16.3. Disk Quot a References

d isab lin g writ e cach es- write barriers, Disabling Write Cachesd isco very- iSCSI, iSCSI D iscovery Configurationd isk q u o t as, Disk Q uo t as

Page 131 - Hardware RAID

e2f sck, Revert in g t o an Ext 2 File Syst eme2imag e ( o t h er ext 4 f ile syst em ut ilit ies)- ext4, Other Ext4 File System Utilitiese2lab el-

Page 132 - Software RAID

ext4- allocation features, The Ext4 File System- creating, Creating an Ext4 File System- debugfs (other ext4 file system utilities), Other Ext4 File S

Page 133

f ib re- ch an n el o ver et hern et- storage considerations during installation, Updates to Storage Configuration DuringInstallationf ile syst em- FH

Page 134 - 17.3. Linux RAID Subsyst ems

- ext4, The Ext4 File System- XFS, The XFS File SystemGg et f acl , Ret rievin g ACLsG FS2- file system types, Global File System 2- gfs2.ko, Global

Page 135 - 17.5. Configuring RAID Set s

Fig ure 2.1. G N O ME Syst em Mo n it o r File Syst ems t ab2.1 .1 .2 . T he /bo o t/ Direct o ryThe /bo o t/ directory contains static files required

Page 136

- tools (for partitioning and other file system functions), Partition and File SystemTools- userspace access, Userspace AccessI/O limit pro cessin g

Page 137

- auto-partitioning and /home, Updates to Storage Configuration During Installation- basic path, Updates to Storage Configuration During Installation-

Page 138

iSCSI lo g ical un it , resiz in g , Resiz in g an iSCSI Lo g ical Un itiSCSI root- iSCSI configuration, iSCSI Rootissu e_lip- fibre channel API, Fi

Page 139

- adding a new volume group, Adding a New Volume Group- additional resources, LVM References- documentation, LVM References- editing a logical volume,

Page 140

- fibre channel, Fibre Channelmo unt (clien t co nf igurat ion)- NFS, NFS Client Configurationmo unt (co mman d ) , Usin g the mo u n t Co mman d-

Page 141

- autofs version 5, Improvements in autofs Version 5 over Version 4- client- autofs , autofs- configuration, NFS Client Configuration- mount options,

Page 142 - 18.2.3. Sharing Mount s

- FS-Cache, Using the Cache With NFSn o b arrier mo u n t o pt io n- ext4, Mounting an Ext4 File System- XFS, Write BarriersNO P- O u t req uest s-

Page 143

Parallel N FS- pNFS, pNFSp aramet ers f o r st o rag e access- I/O alignment and size, Parameters for Storage Accessp arit y- RAID, RAID Levels and Li

Page 144

- overview, I/O Limit Processingp ro ject limit s ( set t in g )- XFS, Setting Project Limitsp ro p er n sswit ch conf ig u rat io n ( au t o f s v

Page 145

- NFS, NFS over RDMAREAD CAPAC ITY( 16 )- I/O alignment and size, SCSIreco rd t yp es- discovery- iSCSI, iSCSI D iscovery ConfigurationRed Hat En t

Page 146

drive), and a pop-up window displaying the contents appears.T able 2.1. Examp les of co mmo n f iles in t h e /d ev d irect o ryFile Descrip t io n

Page 147 - 18.4 .2. Useful Websit es

- LUN (logical unit number), Adding/Removing a Logical Unit Throughrescan-scsi-bus.shresiz e2f s, Revert ing t o an Ext 2 File Syst emresiz e2f s (

Page 148 - 19.1. Commands

- storage considerations during installation, Separate Partitions for /home, /opt,/usr/localserver (clien t co n f igurat ion, mo u n t in g )- NFS,

Page 149

- FS-Cache, Statistical Informationst o rag e access p aramet ers- I/O alignment and size, Parameters for Storage Accessst o rag e co n sid erat io ns

Page 150

- XFS, Suspending an XFS File Systemsw ( mkf s.xf s su b - o p t io n s)- XFS, Creating an XFS File Systemswap ( t u n in g)- solid state disks, Swap

Page 151

t f t p service, co nf igurin g- diskless systems, Configuring a tftp Service for Diskless Clientst h ro u g h p u t classes- solid state disks, Sol

Page 152 - 19.4. vo l ume_key References

- LVM, Utilizing Uninitialized EntitiesUn iversally Un iq u e Id ent if ier (UUID )- persistent naming, UUID and Other Persistent Identifiersu n moun

Page 153 - 20.2. Set t ing Access ACLs

volu me_key- commands, Commands- individual user, Using volume_key as an individual userWwh at ' s n ew- storage considerations during installati

Page 154 - 20.3. Set t ing Default ACLs

- report (xfs_quota expert mode), XFS Quota Management- simple mode (xfsrestore), Simple Mode for xfsrestore- su (mkfs.xfs sub-options), Creating an X

Page 155 - 20.4. Ret rieving ACLs

xf s_md rest o re- XFS, Other XFS File System Utilitiesxf s_met ad u mp- XFS, Other XFS File System Utilitiesxf s_q u o t a- XFS, XFS Quota Management

Page 156 - 20.7. ACL References

/o pt/packagename/man/.2.1 .1 .9 . T he /pro c/ Direct o ryThe /pro c/ directory contains special files that either extract information from the kerne

Page 157

NoteThe default httpd install uses /var/www/html for served content.2.1 .1 .1 2 . T he /sys/ Dire ct o ryThe /sys/ directory utilizes the new sysfs

Page 158

/usr/srcThis directory stores source code./usr/tmp lin ked t o /var/tmpThis directory stores temporary files.The /usr/ directory should also contain

Page 159 - Virtual Memory

/var/ftp//var/g d m//var/kerbero s//var/l i b//var/l o cal //var/l o ck//var/l o g //var/mai l linked to /var/spo ol /mai l //var/mai l man//var/name

Page 160 - How Write Barriers Work

/var/spo o l /po stfi x//var/spo o l /repackag e//var/spo o l /rwho //var/spo o l /samba//var/spo o l /sq ui d //var/spo o l /sq ui rrel mai l //var/s

Page 161 - Battery-Backed Write Caches

Contains current information on multiple-disk or RAID configurations on the system, if theyexist./p ro c/mo u n t sLists all mounts currently used by

Page 162 - High-End Arrays

Red Hat Enterprise Linux 6 Storage Administration GuideDeploying and configuring single-node storage in Red Hat Enterprise Linux6Edition 2Jo sef Bacik

Page 163

Chapter 3. Encrypted File SystemRed Hat Enterprise Linux 6 provides a technology preview of eCryptfs, a "pseudo-file system" whichprovides d

Page 164 - Block Device ioctls

After the last step of an interactive mount, mo unt will display all the selections made and perform themount. This output consists of the command-lin

Page 165 - 23.3. St andards

Chapter 4. BtrfsBtrfs is a new local file system under active development. It aims to provide better performance andscalability which will in turn ben

Page 166 - 23.5. Logical Volume Manager

Chapter 5. The Ext3 File SystemThe ext3 file system is essentially an enhanced version of the ext2 file system. These improvementsprovide the followin

Page 167 - File System tools

The Red Hat Enterprise Linux 6 version of ext3 features the following updates:Def au lt Inod e Siz es Ch an g edThe default size of the on-disk inode

Page 168

NoteA default installation of Red Hat Enterprise Linux uses ext4 for all file systems. However, toconvert ext2 to ext3, always use the e2fsck utility

Page 169

# mo unt -t ext2 /dev/mapper/VolGroup00-LogVol02 /mount/pointIn the above command, replace /mount/point with the mount point of the partition.NoteIf a

Page 170

Chapter 6. The Ext4 File SystemThe ext4 file system is a scalable extension of the ext3 file system, which was the default file system ofRed Hat Enter

Page 171 - 25.1. Fibre Channel

The ext4 file system also supports the following:Extended attributes (xattr) — This allows the system to associate several additionalname and value pa

Page 172

For striped block devices (for example, RAID5 arrays), the stripe geometry can be specified at the timeof file system creation. Using proper stripe ge

Page 173 - 25.2. iSCSI

[email protected] Sto rageDavid HowellsServer Development Hardware Enablementdho [email protected] LehmanBase Operating System Insta

Page 174

By default, ext4 uses write barriers to ensure file system integrity even when power is lost to a devicewith write caches enabled. For devices without

Page 175 - 25.3. Persist ent Naming

LABEL=/data /data ext3 defaults 0 0tmpfs /dev/shm tmpfs defaults 0 0devpts /dev/pt

Page 176 - 25.3.1. WWID

NoteIf using standard redirection, the '-f' option must be passed separately.# dump -0u -f - /dev/sda1 | ssh root@ remoteserver.example.com

Page 177

# mkdir /mnt/sda3# mount -t ext3 /dev/sda3 /mnt/sda3# mkdir /backup-files# mount -t ext3 /dev/sda6 /backup-files6. Restore the data.# cd /mnt/sda1# r

Page 178

e2imag eSaves critical ext2, ext3, or ext4 file system metadata to a file.For more information about these utilities, refer to their respective man pa

Page 179

Chapter 7. Global File System 2The Red Hat Global File System 2 (GFS2) is a native file system that interfaces directly with the Linuxkernel file syst

Page 180

Chapter 8. The XFS File SystemXFS is a highly scalable, high-performance file system which was originally designed at SiliconGraphics, Inc. It was cre

Page 181

Examp le 8.1. mkfs. xfs co mmand ou t p u tBelow is a sample output of the mkfs. xfs command:meta-data=/dev/device isize=256 agcount=4,

Page 182

# mo unt /d ev/device /mount/pointXFS also supports several mount options to influence behavior.XFS allocates inodes to reflect their on-disk location

Page 183

d fShows free and used counts for blocks and inodes.In contrast, xfs_q uo ta also has an expert mode. The sub-commands of this mode allow actualconfig

Page 184

Legal NoticeCo pyright © 20 13 Red Hat Inc. and others.This do cument is licensed by Red Hat under the Creative Commo ns Attributio n-ShareAlike 3.0U

Page 185

ImportantWhile real-time blocks (rtbhard /rtbso ft) are described in man xfs_q uo ta as valid unitswhen setting quotas, the real-time sub-volume is no

Page 186

# xfs_repai r /dev/deviceThe xfs_repai r utility is highly scalable and is designed to repair even very large file systems withmany inodes efficiently

Page 187

XFS file system backup and restoration involves two utilities: xfsd ump and xfsresto re.To backup or dump an XFS file system, use the xfsd ump utility

Page 188

start: ino 0 offset 0 end: ino 1 offset 0 interrupted: NO media files: 1 media file 0: mfile index: 0 mfile type: data mfile siz

Page 189

For more information about dumping and restoring XFS file systems, refer to man xfsd ump and man xfsresto re.8.8. Ot her XFS File Syst em Ut ilit iesR

Page 190

Chapter 9. Network File System (NFS)A Network File System (NFS) allows remote hosts to mount file systems over a network and interactwith those file s

Page 191

ImportantIn order for NFS to work with a default installation of Red Hat Enterprise Linux with a firewallenabled, configure IPTables with the default

Page 192

The following RPC processes facilitate NFS services:rp c.mo untdThis process is used by an NFS server to process MO UNT requests from NFSv2 and NFSv3

Page 193

$ l smo d | g rep nfs_l ayo ut_nfsv4 1_fi l esAnother way to verify a successful NFSv4.1 mount is with the mo unt command. The mount entry inthe out

Page 194

9.3.1. Mount ing NFS File Syst ems using /etc/fstabAn alternate way to mount an NFS share from another machine is to add a line to the /etc/fstabfile.

Page 195

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 196

ImportantThe nfs-utils package is now a part of both the 'NFS file server' and the 'Network File SystemClient' groups. As such, it

Page 197

increasingly better at handling the NSS configuration, it is still not complete. Autofs version5, on the other hand, is a complete implementation.Refe

Page 198

The following is a sample line from /etc/auto .master file (displayed with cat /etc/auto .master):/home /etc/auto.miscThe general format of maps is si

Page 199 - 25.16.1. Fibre Channel

# servi ce auto fs status9.4 .3. Overriding or Augment ing Sit e Configurat ion FilesIt can be useful to override site defaults for a specific mount

Page 200

This last example works as expected because auto fs does not include the contents of a file map ofthe same name as the one it is reading. As such, aut

Page 201 - SCSI Error Handler

# /home, auto.master, example.comdn: automountMapName=auto.master,dc=example,dc=comobjectClass: automountcn: /homeautomountKey: /homeautomountInformat

Page 202

lo o ku p cach e= modeSpecifies how the kernel should manage its cache of directory entries for a given mountpoint. Valid arguments for mode are al l

Page 203 - Command Timer

setting is sec= sys, which uses local UNIX UID s and GIDs by using AUT H_SY S toauthenticate NFS operations.sec= krb5 uses Kerberos V5 instead of loca

Page 204

# servi ce nfs restartThe co nd restart (conditional restart) option only starts nfs if it is currently running. This option isuseful for scripts,

Page 205 - 26.2. DM-Mult ipat h

It is possible to specify multiple hosts, along with specific options for each host. To do so, list themon the same line as a space-delimited list, wi

Page 206

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 207 - Revision History

By default, access control lists (ACLs) are supported by NFS under Red Hat Enterprise Linux. Todisable this feature, specify the no _acl option when

Page 208 - Revision Hist ory

Causes all directories listed in /etc/expo rts to be exported by constructing a new exportlist in /etc/l ib/nfs/etab. This option effectively refreshe

Page 209

Controls which TCP and UD P port mo untd (rpc. mo untd ) uses.ST AT D _P O R T = portControls which TCP and UD P port status (rpc. statd ) uses.LO C

Page 210

# mount myserver:/ /mnt/#cd /mnt/exports# ls exportsfoobarOn servers that support both NFSv4 and either NFSv2 or NFSv3, both methods will work and giv

Page 211

2. Ensure the package that provides the nfs-rdma service is installed and the service is enabledwith the following command:# yum i nstal l rd ma; ch

Page 212

Wildcards should be used sparingly when exporting directories through NFS, as it is possible for thescope of the wildcard to encompass more systems th

Page 213

Another important security feature of NFSv4 is the removal of the use of the MO UNT protocol formounting file systems. This protocol presented possib

Page 214

# rpci nfo -pExamp le 9 .7. rpci nfo -p co mman d ou t p u tThe following is sample output from this command:program vers proto port service 1

Page 215

Useful Websiteshttp://linux-nfs.org — The current site for developers where project status updates can be viewed.http://nfs.sourceforge.net/ — The old

Page 216

Chapter 10. FS-CacheFS-Cache is a persistent local cache that can be used by file systems to take data retrieved from overthe network and cache it on

Page 217

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 218

To provide caching services, FS-Cache needs a cache back-end. A cache back-end is a storagedriver configured to provide caching services (i.e. cachefi

Page 219

File systems that support functionalities required by FS-Cache cache back-end include the Red HatEnterprise Linux 6 implementations of the following f

Page 220

Level 1: Server detailsLevel 2: Some mount options; security type; FSID; uniquifierLevel 3: File HandleLevel 4: Page number in fileTo avoid coherency

Page 221

Opening a file from a shared file system for direct I/O will automatically bypass the cache. This isbecause this type of access must be direct to the

Page 222

ImportantCulling depends on both bxxx and fxxx pairs simultaneously; they can not be treatedseparately.10.5. St at ist ical Informat ionFS-Cache also

Page 223

⁠Part II. Storage AdministrationThe Storage Administration section starts with storage considerations for Red Hat Enterprise Linux 6.Instructions rega

Page 224

Chapter 11. Storage Considerations During InstallationMany storage device and file system settings can only be configured at install time. Other setti

Page 225

Ext3 16TB 2TB 32,000 8 Yes Chapter 5,The Ext3 FileSystemExt4 16TB 16TB ⁠Unlimited⁠8 Yes Chapter 6,The Ext4 FileSystemXFS 100TB 100TB ⁠Unlimited 8 Yes

Page 226

Encrypting Block Devices Using LUKSFormatting a block device for encryption using LUKS/d m-crypt will destroy any existing formattingon that device. A

Page 227

This will cause the I/O to later fail with a checksum error. This problem is common to all block device(or file system-based) buffered I/O or mmap(2)

Page 228

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 229

Chapter 12. File System CheckFilesystems may be checked for consistency, and optionally repaired, with filesystem-specificuserspace tools. These tools

Page 230

NoteLater phases of consistency checking may print extra errors as it discoversinconsistencies which would have been fixed in early phases if it were

Page 231

crash.If these filesystems encounter metadata inconsistencies while mounted, they will record this fact in thefilesystem superblock. If e2fsck finds t

Page 232

NoteAlthough an fsck. xfs binary is present in the xfsprogs package, this is present only tosatisfy initscripts that look for an fsck. filesystem bina

Page 233

6. Link count checks.7. Freemap checks.8. Superblock checks.These phases, as well as messages printed during operation, are documented in depth in

Page 234

Chapter 13. PartitionsThe utility parted allows users to:View the existing partition tableChange the size of existing partitionsAdd partitions from f

Page 235

rm minor-num Remove the partitionsel ect device Select a different device to configureset minor-num flag state Set the flag on a partition; state is e

Page 236

hp-ufssun-ufsxfsIf a Fi l esystem of a device shows no value, this means that its file system type is unknown.The Fl ag s column lists the flags set f

Page 237

# mkpart pri mary ext3 10 24 20 4 8NoteIf you use the mkpartfs command instead, the file system is created after the partition iscreated. However, pa

Page 238

The first column should contain UUID = followed by the file system's UUID. The second columnshould contain the mount point for the new partition

Commentaires sur ces manuels

Pas de commentaire