Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA Informacje Techniczne

Przeglądaj online lub pobierz Informacje Techniczne dla Oprogramowanie Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA. Red Hat ENTERPRISE LINUX - ONLINE STORAGE RECONFIGURATION GUIDE BETA System information Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 238
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
Red Hat Subject Matter ExpertsJosef Bacik
Kamil Dudka Hans de Goede Doug Ledford
Daniel Novotny Nathan Straz David Wysochanski
Contributors Michael Christie Sachin Prabhu
Rob Evers David Howells David Lehman
Jeff Moyer Eric Sandeen Mike Snitzer
Red Hat Enterprise Linux 6
Storage Administration Guide
Deploying and configuring single-node storage in Red Hat Enterprise Linux
6
Edition 2
Przeglądanie stron 0
1 2 3 4 5 6 ... 237 238

Podsumowanie treści

Strona 1 - Storage Administration Guide

Red Hat Subject Matter ExpertsJosef BacikKamil Dudka Hans de Goede Doug LedfordDaniel Novotny Nathan Straz David WysochanskiContributors Michael Chris

Strona 2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 3 - Edition 2

WarningDo not attempt to resize a partition on a device that is in use.Pro ced u re 13.4 . Resiz e a part it ion1. Before resizing a partition, boot

Strona 4 - Edited by

Chapter 14. LVM (Logical Volume Manager)LVM is a tool for logical volume management which includes allocating disks, striping, mirroring andresizing l

Strona 5 - Abstract

Fig ure 14 .2. Lo g ical Vo lu mesOn the other hand, if a system is partitioned with the ext3 file system, the hard drive is divided intopartitions of

Strona 6 - Table of Contents

In the example used in this section, the following are the details for the volume group that wascreated during the installation:Examp le 14 .1. Creat

Strona 7

Fig ure 14 .4 . Ph ysical View Win d o wThe figure below illustrates the logical view for the selected volume group. The individual logicalvolume size

Strona 8

Volume window from which you can modify the Logical volume name, size (in extents, gigabytes,megabytes, or kilobytes) and also use the remaining space

Strona 9

In this example, partition 3 will be initialized and added to an existing volume group. To initialize apartition or unpartioned space, select the part

Strona 10

Fig ure 14 .7. Un allo cat ed Vo lu mesClicking on the Ad d to Exi sti ng Vo l ume G ro up button will display a pop-up window listingthe existing

Strona 11

select one of the existing logical volumes and increase the extents (see Section 14.2.6, “ Extendinga Volume Group” ),select an existing logical volum

Strona 12

Fig ure 14 .9 . Lo g ical view o f vo lu me g roup14 .2.3. Migrat ing Ext ent sTo migrate extents from a physical volume, select the volume from the

Strona 13 - 1. Document Convent ions

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 14 - 1.2. Pull-quot e Convent ions

Fig ure 14 .10. Mig rat e Ext en t sThe figure below illustrates a migration of extents in progress. In this example, the extents weremigrated to &apo

Strona 15 - Important

Fig ure 14 .12. Lo g ical an d p h ysical view o f vo lu me g ro u p14 .2.4 . Adding a New Hard Disk Using LVMIn this example, a new IDE hard disk w

Strona 16 - 2.2. We Need Feedback

Fig ure 14 .13. U n init ializ ed h ard d isk14 .2.5. Adding a New Volume GroupOnce initialized, LVM will add the new volume to the list of unalloca

Strona 17

The figure below illustrates the physical view of the new volume group. The new logical volumenamed 'Backups' in this volume group is also l

Strona 18 - Network Block Storage

In this example, the objective was to extend the new volume group to include an uninitialized entity(partition). Doing so increases the size or number

Strona 19 - ⁠Part I. File Systems

Fig ure 14 .16 . Lo g ical an d p h ysical view o f an ext en ded vo lu me gro u p14 .2.7. Edit ing a Logical VolumeThe LVM utility allows you to

Strona 20 - 2.1.1. FHS Organiz at ion

Fig ure 14 .17. Edit lo g ical volu meIf you wish to mount the volume, select the 'Mount' checkbox indicating the preferred mount point. To

Strona 21

Fig ure 14 .18. Edit lo g ical volu me - specif yin g mo u n t o p t io n sThe figure below illustrates the logical and physical view of the volum

Strona 22

Fig ure 14 .19 . Ed it lo g ical vo lu me14 .3. LVM ReferencesUse these sources to learn more about LVM.Installed Documentationrpm -q d l vm2 — This

Strona 23

Chapter 15. Swap SpaceSwap space in Linux is used when the amount of physical memory (RAM) is full. If the system needsmore memory resources and the R

Strona 24

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 25

existing LVM2 logical volume. It is recommended that you extend an existing logical volume.15.1.1. Ext ending Swap on an LVM2 Logical VolumeBy default

Strona 26

# swapo n -v /d ev/Vo l G ro up0 0 /Lo gVo l 02To test if the logical volume was successfully created, use cat /pro c/swaps or free to inspect theswap

Strona 27

To reduce an LVM2 swap logical volume (assuming /d ev/Vo l G ro up0 0 /Lo g Vo l 0 1 is the volumeyou want to reduce):Pro ced u re 15.3. Red u cin g

Strona 28

# swapo ff -v /swapfi l e2. Remove its entry from the /etc/fstab file.3. Remove the actual file:# rm /swapfi le15.3. Moving Swap SpaceTo move swap s

Strona 29 - 2.4. Discard unused blocks

Chapter 16. Disk QuotasDisk space can be restricted by implementing disk quotas which alert a system administrator before auser consumes too much disk

Strona 30

none /sys sysfs defaults 0 0 /dev/VolGroup00/LogVol02 /home ext3 defaults,usrquota,grpquota 1 2 /dev/VolGrou

Strona 31 - 3.2. Addit ional Informat ion

If neither the -u or -g options are specified, only the user quota file is created. If only -g is specified,only the group quota file is created.Aft

Strona 32 - Chapter 4. Btrfs

The first column is the name of the file system that has a quota enabled for it. The second columnshows how many blocks the user is currently using. T

Strona 33

16.1.6. Set t ing t he Grace Period for Soft Limit sIf a given quota has soft limits, you can edit the grace period (i.e. the amount of time a soft l

Strona 34

Creating a disk usage report entails running the repq uo ta utility.Examp le 16 .5. O u t p u t o f repq uo ta comman dFor example, the command repq

Strona 35

Preface1. Document Convent ionsThis manual uses several conventions to highlight certain words and phrases and draw attention tospecific pieces of in

Strona 36

An alternative way to safely run q uo tacheck is to boot the system into single-user mode toprevent the possibility of data corruption in quota files

Strona 37

Chapter 17. Redundant Array of Independent Disks (RAID)The basic idea behind RAID is to combine multiple small, inexpensive disk drives into an array

Strona 38

Software RAIDSoftware RAID implements the various RAID levels in the kernel disk (block device) code. It offers thecheapest possible solution, as exp

Strona 39 - Write Barriers

capacity of the smallest member disk in a Hardware RAID or the capacity of smallestmember partition in a Software RAID multiplied by the number of dis

Strona 40 - Writ e Barriers

two drives in the array. This complex parity scheme creates a significantly higher CPUburden on software RAID devices and also imposes an increased bu

Strona 41

dmraidDevice-mapper RAID or d mrai d refers to device-mapper kernel code that offers the mechanism topiece disks together into a RAID set. This same k

Strona 42

As the name suggests, d mrai d is used to manage device-mapper RAID sets. The d mrai d tool findsATARAID devices using multiple metadata format han

Strona 43

[5] RAID level 1 c o mes at a hig h c o st b ecause yo u write the same info rmatio n to all o f the d isks in thearray, p ro vid es d ata reliab il

Strona 44

Chapter 18. Using the mo unt CommandOn Linux, UNIX, and similar operating systems, file systems on different partitions and removabledevices (CD s, DV

Strona 45

To list such mount points using the fi nd mnt command, type:~]$ fi nd mnt -t ext4TARGET SOURCE FSTYPE OPTIONS/ /dev/sda2 ext4 rw,realtime,se

Strona 46

C haracter T abl e. Double-click this highlighted character to place it in the T ext to co py field and then click the Co py button. Now switch back

Strona 47

Note: Determining the UUID and Label of a Particular DeviceTo determine the UUID and—if the device uses it—the label of a particular device, use the b

Strona 48

Older USB flash drives often use the FAT file system. Assuming that such drive uses the /d ev/sd c1 device and that the /med i a/fl ashd isk/ director

Strona 49

18.2.3. Sharing Mount sOccasionally, certain system administration tasks require access to the same file system from morethan one place in the directo

Strona 50 - Setting Project Limits

~]# mo unt /d ev/cd ro m /med ia/cd ro m~]# l s /med i a/cd ro mEFI GPL isolinux LiveOS~]# l s /mnt/cd ro mEFI GPL isolinux LiveOSSimilarly, it

Strona 51

~]# l s /mnt/cd ro mEFI GPL isolinux LiveOSAlso verify that file systems mounted in the /mnt directory are not reflected in /med i a.For instance,

Strona 52 - Set t in g Project Limit s

It is also possible to verify that file systems mounted in the /mnt directory are notreflected in /med i a. For instance, if a non-empty USB flash dri

Strona 53

An NFS storage contains user directories and is already mounted in /mnt/userd i rs/. As ro o t,move this mount point to /ho me by using the following

Strona 54 - Simple Mode for xfsrest ore

The following resources provide an in-depth documentation on the subject.18.4 .1. Manual Page Document at ionman 8 mo unt — The manual page for the mo

Strona 55

Chapter 19. The vo l ume_key functionThe volume_key function provides two tools, libvolume_key and vo l ume_key. libvolume_key is alibrary for manipul

Strona 56

This operation does not permanently alter the volume by adding a new passphrase, forexample. The user can access and modify the decrypted volume, modi

Strona 57 - 9.2. pNFS

before, " "so cannot be deassigned\n", __func__); r = -EINVAL; goto out;

Strona 58

vo l ume_key --save /path/to/volume -o escro w-packetA prompt will then appear requiring an escrow packet passphrase to protect the key.2. Save the

Strona 59 - 9.4. auto fs

At this point it is possible to choose an NSS database password. Each NSS database canhave a different password so the designated users do not need to

Strona 60

After providing the NSS database password, the designated user chooses a passphrase forencrypting escro w-packet-o ut. This passphrase can be differen

Strona 61

Chapter 20. Access Control ListsFiles and directories have permission sets for the owner of the file, the group associated with the file,and all other

Strona 62

4. For users not in the user group for the fileThe setfacl utility sets ACLs for files and directories. Use the -m option to add or modify the ACL o

Strona 63

To set a default ACL, add d : before the rule and specify a directory instead of a file name.Examp le 20.3. Set t in g d ef au lt ACLsFor example,

Strona 64

addition, the -a option (equivalent to -d R --preserve= al l ) of cp also preserves ACLs during abackup along with other information such as timestam

Strona 65

man acl — D escription of ACLsman g etfacl — Discusses how to get file access control listsman setfacl — Explains how to set file access control li

Strona 66

Chapter 21. Solid-State Disk Deployment GuidelinesSolid-state disks (SSD ) are storage devices that use NAND flash chips to persistently store data. T

Strona 67

As of Red Hat Enterprise Linux 6.4, ext4 and XFS are the only fully-supported file systems thatsupport d i scard . Previous versions of Red Hat Enterp

Strona 68

Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software andtechnology. You can find a list of publicly availa

Strona 69

Chapter 22. Write BarriersA write barrier is a kernel mechanism used to ensure that file system metadata is correctly written andordered on persistent

Strona 70

To mitigate the risk of data corruption during power loss, some storage devices use battery-backedwrite caches. Generally, high-end arrays and some ha

Strona 71

Most controllers use vendor-specific tools to query and manipulate target drives. For example, theLSI Megaraid SAS controller uses a battery-backed wr

Strona 72

Chapter 23. Storage I/O Alignment and SizeRecent enhancements to the SCSI and ATA standards allow storage devices to indicate theirpreferred (and in s

Strona 73 - 9.7.5. NFS over RDMA

Storage vendors can also supply I/O hints about the preferred minimum unit for random I/O(mi ni mum_i o _si ze) and streaming I/O (o pti mal _i o _si

Strona 74 - 9.8. Securing NFS

BLKSSZG ET : l o g i cal _bl o ck_si zeBLKIO MIN: mi ni mum_i o _si zeBLKIO OP T : o pti mal _i o _si ze23.3. St andardsThis section describes I/O sta

Strona 75

All layers of the Linux I/O stack have been engineered to propagate the various I/O parameters up thestack. When a layer consumes an attribute or aggr

Strona 76 - 9.9. NFS and rpcbi nd

determine the I/O parameters of a device for optimal placement of all partitions. The fd i sk utility willalign all partitions on a 1MB boundary.parte

Strona 77

Chapter 24. Setting Up A Remote Diskless SystemThe Network Booting Service (provided by system-co nfi g -netbo o t) is no longer available inRed Hat E

Strona 78 - Related Books

After configuring a tftp server, you need to set up a DHCP service on the same host machine. Referto the Red Hat Enterprise Linux 6 Deployment Guide f

Strona 79 - Chapter 10. FS-Cache

Chapter 1. OverviewThe Storage Administration Guide contains extensive information on supported file systems and datastorage features in Red Hat Enter

Strona 80 - 10.2. Set t ing Up a Cache

# cp /boot/vmlinuz-kernel-version /var/lib/tftpboot/3. Create the ini trd (i.e. ini tramfs-kernel-version. i mg ) with network support:# dracut init

Strona 81 - 10.3.1. Cache Sharing

Chapter 25. Online Storage ManagementIt is often desirable to add, remove or re-size storage devices while the operating system is running,and withou

Strona 82 - ⁠Chapt er 1 0 . FS- Cache

po rt_name — 64-bit port nameRemo t e Po rt : /sys/cl ass/fc_remo te_po rts/rpo rt-H: B-R/po rt_i dno d e_namepo rt_named ev_l o ss_tmo — number of s

Strona 83

Remote Port d ev_l o ss_tmoX X X X XRemote Port fast_i o _fai l _tmoX X ⁠X ⁠XHost po rt_i d X X X X XHost i ssue_l i pX X Xl pfc q l a2xxx zfcp mptfc

Strona 84 - 10.6. References

This command displays the session/device state, session ID (sid), some negotiated parameters, andthe SCSI devices accessible through the session.For s

Strona 85

servi ce tg td startSt o p p in g t he t g t d serviceTo stop the tgtd service, run:servi ce tg td sto pIf there are open connections, use:servi c

Strona 86

In addition, path-based names are system-specific. This can cause unintended data changes whenthe device is accessed by multiple systems, such as in a

Strona 87 - 11.3. Special Considerat ions

When the user_fri end l y_names feature (of device- map p er- mu lt ip at h ) is used, the WWID ismapped to a name of the form /d ev/mapper/mpathn. By

Strona 88

Pro ced u re 25.1. En su rin g a Clean D evice Remo val1. Close all users of the device and backup device data as needed.2. Use umo unt to unmount

Strona 89

Pro ced u re 25.2. Remo vin g a Pat h t o a St o rag e Device1. Remove any reference to the device's path-based name, like /d ev/sd or /d ev

Strona 90 - Chapter 12. File System Check

The ext4 file system is fully supported in this release. It is now the default file system of Red HatEnterprise Linux 6, supporting an unlimited numbe

Strona 91

NoteThe older form of this command, echo "scsi ad d -si ng l e-d evi ce 0 0 0 0 " > /pro c/scsi /scsi , is deprecated.a. In some Fi

Strona 92 - 12.2.2. XFS

another device that is already configured on the same path as the new device. This can bedone with various commands, such as l sscsi , scsi _i d , mul

Strona 93

NoteThese commands will only work if the d cbd settings for the Ethernet interface were notchanged.5. Load the FCoE device now using:# ifconfig ethX

Strona 94 - 12.2.3. Bt rfs

Pro ced u re 25.5. Co n f ig u re FCo E t arg et1. Setting up an FCoE target requires the installation of the fco e-targ et-uti l s package,along wit

Strona 95 - Chapter 13. Partitions

/> tcm_fc/ create 00:11:22:33:44:55:66:77If FCoE interfaces are present on the system, tab-completing after create will list availableinterfaces. I

Strona 96

mount_fcoe_disks_from_fstab() { local timeout=20 local done=1 local fcoe_disks=($(egrep 'by-path\/fc-.*_netdev' /etc/fstab | cut

Strona 97

25.9. Scanning St orage Int erconnect sThere are several commands available that allow you to reset and/or scan one or moreinterconnects, potentially

Strona 98 - 13.2.3. Add t o /etc/fstab

The default iSCSI configuration file is /etc/i scsi /i scsi d. co nf. This file contains iSCSIsettings used by i scsi d and i scsi ad m.During target

Strona 99 - 13.4 . Resizing a Part it ion

$ ping -I ethX target_IPIf pi ng fails, then you will not be able to bind a session to a NIC. If this is the case, check the networksettings first.25

Strona 100 - ⁠Chapt er 1 3. Part it ions

For software iSCSI, each i face configuration must have a unique name (with less than 65characters). The i face_name for network devices that support

Strona 101

⁠Part I. File SystemsThe File Systems section explains file system structure followed by two technology previews: eCryptfsand Btrfs. This is followed

Strona 102 - 14 .1. What is LVM2?

# iscsiadm -m iface -I iface_name --op=update -n iface.setting -v hw_addressExamp le 25.12. Set MAC ad d ress o f i face0For example, to set the MAC

Strona 103

This behavior was implemented for compatibility reasons. To override this, use the -I iface_nameto specify which portal to bind to an i face, as in:#

Strona 104

The output will appear in the following format:target_IP:port,target_portal_group_tag proper_target_nameExamp le 25.14 . Usin g i scsi ad m t o issu

Strona 105

If your device supports multiple targets, you will need to issue a send targ ets command to the hoststo find new portals for each target. Then, rescan

Strona 106

Examp le 25.17. Fu ll i scsi ad m co mman dUsing our previous example (where proper_target_name is eq ual l o g i c-i scsi 1), the fullcommand would b

Strona 107

In most cases, fully resizing an online logical unit involves two things: resizing the logical unit itselfand reflecting the size change in the corres

Strona 108

NoteYou can also re-scan iSCSI logical units using the following command:# iscsiadm -m node -R -I interfaceReplace interface with the corresponding in

Strona 109 - 14 .2.3. Migrat ing Ext ent s

1. Dump the device mapper table for the multipathed device using:d msetup tabl e multipath_device2. Save the dumped device mapper table as table_nam

Strona 110

To change the R/W state, use the following procedure:Pro ced u re 25.7. Ch an g e t h e R /W st at e1. To move the device from RO to R/W, see step 2.

Strona 111

# mul ti path -rThe mul ti path -11 command can then be used to confirm the change.25.1 4 .4 .3. Do cument at io nFurther information can be found in

Strona 113

Chapter 2. File System Structure and MaintenanceThe file system structure is the most basic level of organization in an operating system. The way anop

Strona 114

Pro ced u re 25.8. Det ermin in g T h e St at e o f a Remo t e Po rt1. To determine the state of a remote port, run the following command:$ cat/sys

Strona 115

When d m-mul ti path is being used, the SCSI layer will fail those running commands and defer themto the multipath layer. The multipath layer then ret

Strona 116

ImportantWhether your considerations are failover speed or security, the recommended value for repl acement_ti meo ut will depend on other factors. Th

Strona 117

The Linux SCSI layer sets a timer on each command. When this timer expires, the SCSI layer willquiesce the host bus adapter (HBA) and wait for all out

Strona 118 - Useful Websites

Pro ced u re 25.10. Wo rkin g Aro und St ale Lo g ical U n it s1. Determine which mpath link entries in /etc/l vm/cache/. cache are specific tothe s

Strona 119 - Chapter 15. Swap Space

Chapter 26. Device Mapper Multipathing and Virtual StorageRed Hat Enterprise Linux 6 also supports DM-Multipath and virtual storage. Both features are

Strona 120 - ⁠Chapt er 1 5. Swap Space

(the cable, switch, or controller) fails, DM-Multipath switches to an alternate path.Impro ved Perf ormanceDM-Multipath can be configured in active/a

Strona 121

Revision HistoryRevisio n 2- 52 Wed Mar 25 2015 Jacq u elynn EastAdded ext back up and restore chaptersRevisio n 2- 51 T h u O ct 9 2014 Jacq u

Strona 122 - 15.2.3. Removing a Swap File

Added fsck section BZ #904902.Revisio n 2- 27 T h u Sep 05 2013 Jacq u elyn n EastEdited Chapter 9: Network File System (NFS).Revisio n 2- 26 Mon

Strona 123 - 15.3. Moving Swap Space

BZ #894697 Updated sections regarding FCoE.Revisio n 2- 4 Mon Jan 14 2013 Jacq u elyn n EastBZ #894891 As pNFS is coming out of tech preview statu

Strona 124 - Chapter 16. Disk Quotas

11675568 6272120 4810348 57% / /dev/sda1 100691 9281 86211 10% /bootnone 32

Strona 125

- enabling disk quotas with, Enabling Quotas/local/d irect o ry ( clien t co n f ig u rat io n , mo u n t in g )- NFS, NFS Client Configuration/p ro

Strona 126 - ⁠Chapt er 1 6 . Disk Q uot as

addin g p at h s t o a st o rag e d evice, Ad d in g a St o rag e Device o r Pat haddin g /remo vin g- LUN (logical unit number), Adding/Removing a

Strona 127

- I/O alignment and size, Block Device ioctlsb lo cked d evice, verif yin g- fibre channel- modifying link loss behavior, Fibre Channelb ru n ( cach

Strona 128 - 16.2. Managing Disk Quot as

Ch an g in g the read /writ e st at e- Online logical units, Changing the Read/Write State of an Online Logical Unitchan n el co mman d wo rd ( CCW

Strona 129

- solid state disks, Solid-State Disk Deployment Guidelinesd et ermin in g remo t e p o rt st at es- fibre channel- modifying link loss behavior, Fi

Strona 130 - 16.3. Disk Quot a References

d isab lin g writ e cach es- write barriers, Disabling Write Cachesd isco very- iSCSI, iSCSI D iscovery Configurationd isk q u o t as, Disk Q uo t as

Strona 131 - Hardware RAID

e2f sck, Revert in g t o an Ext 2 File Syst eme2imag e ( o t h er ext 4 f ile syst em ut ilit ies)- ext4, Other Ext4 File System Utilitiese2lab el-

Strona 132 - Software RAID

ext4- allocation features, The Ext4 File System- creating, Creating an Ext4 File System- debugfs (other ext4 file system utilities), Other Ext4 File S

Strona 133

f ib re- ch an n el o ver et hern et- storage considerations during installation, Updates to Storage Configuration DuringInstallationf ile syst em- FH

Strona 134 - 17.3. Linux RAID Subsyst ems

- ext4, The Ext4 File System- XFS, The XFS File SystemGg et f acl , Ret rievin g ACLsG FS2- file system types, Global File System 2- gfs2.ko, Global

Strona 135 - 17.5. Configuring RAID Set s

Fig ure 2.1. G N O ME Syst em Mo n it o r File Syst ems t ab2.1 .1 .2 . T he /bo o t/ Direct o ryThe /bo o t/ directory contains static files required

Strona 136

- tools (for partitioning and other file system functions), Partition and File SystemTools- userspace access, Userspace AccessI/O limit pro cessin g

Strona 137

- auto-partitioning and /home, Updates to Storage Configuration During Installation- basic path, Updates to Storage Configuration During Installation-

Strona 138

iSCSI lo g ical un it , resiz in g , Resiz in g an iSCSI Lo g ical Un itiSCSI root- iSCSI configuration, iSCSI Rootissu e_lip- fibre channel API, Fi

Strona 139

- adding a new volume group, Adding a New Volume Group- additional resources, LVM References- documentation, LVM References- editing a logical volume,

Strona 140

- fibre channel, Fibre Channelmo unt (clien t co nf igurat ion)- NFS, NFS Client Configurationmo unt (co mman d ) , Usin g the mo u n t Co mman d-

Strona 141

- autofs version 5, Improvements in autofs Version 5 over Version 4- client- autofs , autofs- configuration, NFS Client Configuration- mount options,

Strona 142 - 18.2.3. Sharing Mount s

- FS-Cache, Using the Cache With NFSn o b arrier mo u n t o pt io n- ext4, Mounting an Ext4 File System- XFS, Write BarriersNO P- O u t req uest s-

Strona 143

Parallel N FS- pNFS, pNFSp aramet ers f o r st o rag e access- I/O alignment and size, Parameters for Storage Accessp arit y- RAID, RAID Levels and Li

Strona 144

- overview, I/O Limit Processingp ro ject limit s ( set t in g )- XFS, Setting Project Limitsp ro p er n sswit ch conf ig u rat io n ( au t o f s v

Strona 145

- NFS, NFS over RDMAREAD CAPAC ITY( 16 )- I/O alignment and size, SCSIreco rd t yp es- discovery- iSCSI, iSCSI D iscovery ConfigurationRed Hat En t

Strona 146

drive), and a pop-up window displaying the contents appears.T able 2.1. Examp les of co mmo n f iles in t h e /d ev d irect o ryFile Descrip t io n

Strona 147 - 18.4 .2. Useful Websit es

- LUN (logical unit number), Adding/Removing a Logical Unit Throughrescan-scsi-bus.shresiz e2f s, Revert ing t o an Ext 2 File Syst emresiz e2f s (

Strona 148 - 19.1. Commands

- storage considerations during installation, Separate Partitions for /home, /opt,/usr/localserver (clien t co n f igurat ion, mo u n t in g )- NFS,

Strona 149

- FS-Cache, Statistical Informationst o rag e access p aramet ers- I/O alignment and size, Parameters for Storage Accessst o rag e co n sid erat io ns

Strona 150

- XFS, Suspending an XFS File Systemsw ( mkf s.xf s su b - o p t io n s)- XFS, Creating an XFS File Systemswap ( t u n in g)- solid state disks, Swap

Strona 151

t f t p service, co nf igurin g- diskless systems, Configuring a tftp Service for Diskless Clientst h ro u g h p u t classes- solid state disks, Sol

Strona 152 - 19.4. vo l ume_key References

- LVM, Utilizing Uninitialized EntitiesUn iversally Un iq u e Id ent if ier (UUID )- persistent naming, UUID and Other Persistent Identifiersu n moun

Strona 153 - 20.2. Set t ing Access ACLs

volu me_key- commands, Commands- individual user, Using volume_key as an individual userWwh at ' s n ew- storage considerations during installati

Strona 154 - 20.3. Set t ing Default ACLs

- report (xfs_quota expert mode), XFS Quota Management- simple mode (xfsrestore), Simple Mode for xfsrestore- su (mkfs.xfs sub-options), Creating an X

Strona 155 - 20.4. Ret rieving ACLs

xf s_md rest o re- XFS, Other XFS File System Utilitiesxf s_met ad u mp- XFS, Other XFS File System Utilitiesxf s_q u o t a- XFS, XFS Quota Management

Strona 156 - 20.7. ACL References

/o pt/packagename/man/.2.1 .1 .9 . T he /pro c/ Direct o ryThe /pro c/ directory contains special files that either extract information from the kerne

Strona 157

NoteThe default httpd install uses /var/www/html for served content.2.1 .1 .1 2 . T he /sys/ Dire ct o ryThe /sys/ directory utilizes the new sysfs

Strona 158

/usr/srcThis directory stores source code./usr/tmp lin ked t o /var/tmpThis directory stores temporary files.The /usr/ directory should also contain

Strona 159 - Virtual Memory

/var/ftp//var/g d m//var/kerbero s//var/l i b//var/l o cal //var/l o ck//var/l o g //var/mai l linked to /var/spo ol /mai l //var/mai l man//var/name

Strona 160 - How Write Barriers Work

/var/spo o l /po stfi x//var/spo o l /repackag e//var/spo o l /rwho //var/spo o l /samba//var/spo o l /sq ui d //var/spo o l /sq ui rrel mai l //var/s

Strona 161 - Battery-Backed Write Caches

Contains current information on multiple-disk or RAID configurations on the system, if theyexist./p ro c/mo u n t sLists all mounts currently used by

Strona 162 - High-End Arrays

Red Hat Enterprise Linux 6 Storage Administration GuideDeploying and configuring single-node storage in Red Hat Enterprise Linux6Edition 2Jo sef Bacik

Strona 163

Chapter 3. Encrypted File SystemRed Hat Enterprise Linux 6 provides a technology preview of eCryptfs, a "pseudo-file system" whichprovides d

Strona 164 - Block Device ioctls

After the last step of an interactive mount, mo unt will display all the selections made and perform themount. This output consists of the command-lin

Strona 165 - 23.3. St andards

Chapter 4. BtrfsBtrfs is a new local file system under active development. It aims to provide better performance andscalability which will in turn ben

Strona 166 - 23.5. Logical Volume Manager

Chapter 5. The Ext3 File SystemThe ext3 file system is essentially an enhanced version of the ext2 file system. These improvementsprovide the followin

Strona 167 - File System tools

The Red Hat Enterprise Linux 6 version of ext3 features the following updates:Def au lt Inod e Siz es Ch an g edThe default size of the on-disk inode

Strona 168

NoteA default installation of Red Hat Enterprise Linux uses ext4 for all file systems. However, toconvert ext2 to ext3, always use the e2fsck utility

Strona 169

# mo unt -t ext2 /dev/mapper/VolGroup00-LogVol02 /mount/pointIn the above command, replace /mount/point with the mount point of the partition.NoteIf a

Strona 170

Chapter 6. The Ext4 File SystemThe ext4 file system is a scalable extension of the ext3 file system, which was the default file system ofRed Hat Enter

Strona 171 - 25.1. Fibre Channel

The ext4 file system also supports the following:Extended attributes (xattr) — This allows the system to associate several additionalname and value pa

Strona 172

For striped block devices (for example, RAID5 arrays), the stripe geometry can be specified at the timeof file system creation. Using proper stripe ge

Strona 173 - 25.2. iSCSI

[email protected] Sto rageDavid HowellsServer Development Hardware Enablementdho [email protected] LehmanBase Operating System Insta

Strona 174

By default, ext4 uses write barriers to ensure file system integrity even when power is lost to a devicewith write caches enabled. For devices without

Strona 175 - 25.3. Persist ent Naming

LABEL=/data /data ext3 defaults 0 0tmpfs /dev/shm tmpfs defaults 0 0devpts /dev/pt

Strona 176 - 25.3.1. WWID

NoteIf using standard redirection, the '-f' option must be passed separately.# dump -0u -f - /dev/sda1 | ssh root@ remoteserver.example.com

Strona 177

# mkdir /mnt/sda3# mount -t ext3 /dev/sda3 /mnt/sda3# mkdir /backup-files# mount -t ext3 /dev/sda6 /backup-files6. Restore the data.# cd /mnt/sda1# r

Strona 178

e2imag eSaves critical ext2, ext3, or ext4 file system metadata to a file.For more information about these utilities, refer to their respective man pa

Strona 179

Chapter 7. Global File System 2The Red Hat Global File System 2 (GFS2) is a native file system that interfaces directly with the Linuxkernel file syst

Strona 180

Chapter 8. The XFS File SystemXFS is a highly scalable, high-performance file system which was originally designed at SiliconGraphics, Inc. It was cre

Strona 181

Examp le 8.1. mkfs. xfs co mmand ou t p u tBelow is a sample output of the mkfs. xfs command:meta-data=/dev/device isize=256 agcount=4,

Strona 182

# mo unt /d ev/device /mount/pointXFS also supports several mount options to influence behavior.XFS allocates inodes to reflect their on-disk location

Strona 183

d fShows free and used counts for blocks and inodes.In contrast, xfs_q uo ta also has an expert mode. The sub-commands of this mode allow actualconfig

Strona 184

Legal NoticeCo pyright © 20 13 Red Hat Inc. and others.This do cument is licensed by Red Hat under the Creative Commo ns Attributio n-ShareAlike 3.0U

Strona 185

ImportantWhile real-time blocks (rtbhard /rtbso ft) are described in man xfs_q uo ta as valid unitswhen setting quotas, the real-time sub-volume is no

Strona 186

# xfs_repai r /dev/deviceThe xfs_repai r utility is highly scalable and is designed to repair even very large file systems withmany inodes efficiently

Strona 187

XFS file system backup and restoration involves two utilities: xfsd ump and xfsresto re.To backup or dump an XFS file system, use the xfsd ump utility

Strona 188

start: ino 0 offset 0 end: ino 1 offset 0 interrupted: NO media files: 1 media file 0: mfile index: 0 mfile type: data mfile siz

Strona 189

For more information about dumping and restoring XFS file systems, refer to man xfsd ump and man xfsresto re.8.8. Ot her XFS File Syst em Ut ilit iesR

Strona 190

Chapter 9. Network File System (NFS)A Network File System (NFS) allows remote hosts to mount file systems over a network and interactwith those file s

Strona 191

ImportantIn order for NFS to work with a default installation of Red Hat Enterprise Linux with a firewallenabled, configure IPTables with the default

Strona 192

The following RPC processes facilitate NFS services:rp c.mo untdThis process is used by an NFS server to process MO UNT requests from NFSv2 and NFSv3

Strona 193

$ l smo d | g rep nfs_l ayo ut_nfsv4 1_fi l esAnother way to verify a successful NFSv4.1 mount is with the mo unt command. The mount entry inthe out

Strona 194

9.3.1. Mount ing NFS File Syst ems using /etc/fstabAn alternate way to mount an NFS share from another machine is to add a line to the /etc/fstabfile.

Strona 195

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 196

ImportantThe nfs-utils package is now a part of both the 'NFS file server' and the 'Network File SystemClient' groups. As such, it

Strona 197

increasingly better at handling the NSS configuration, it is still not complete. Autofs version5, on the other hand, is a complete implementation.Refe

Strona 198

The following is a sample line from /etc/auto .master file (displayed with cat /etc/auto .master):/home /etc/auto.miscThe general format of maps is si

Strona 199 - 25.16.1. Fibre Channel

# servi ce auto fs status9.4 .3. Overriding or Augment ing Sit e Configurat ion FilesIt can be useful to override site defaults for a specific mount

Strona 200

This last example works as expected because auto fs does not include the contents of a file map ofthe same name as the one it is reading. As such, aut

Strona 201 - SCSI Error Handler

# /home, auto.master, example.comdn: automountMapName=auto.master,dc=example,dc=comobjectClass: automountcn: /homeautomountKey: /homeautomountInformat

Strona 202

lo o ku p cach e= modeSpecifies how the kernel should manage its cache of directory entries for a given mountpoint. Valid arguments for mode are al l

Strona 203 - Command Timer

setting is sec= sys, which uses local UNIX UID s and GIDs by using AUT H_SY S toauthenticate NFS operations.sec= krb5 uses Kerberos V5 instead of loca

Strona 204

# servi ce nfs restartThe co nd restart (conditional restart) option only starts nfs if it is currently running. This option isuseful for scripts,

Strona 205 - 26.2. DM-Mult ipat h

It is possible to specify multiple hosts, along with specific options for each host. To do so, list themon the same line as a space-delimited list, wi

Strona 206

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 207 - Revision History

By default, access control lists (ACLs) are supported by NFS under Red Hat Enterprise Linux. Todisable this feature, specify the no _acl option when

Strona 208 - Revision Hist ory

Causes all directories listed in /etc/expo rts to be exported by constructing a new exportlist in /etc/l ib/nfs/etab. This option effectively refreshe

Strona 209

Controls which TCP and UD P port mo untd (rpc. mo untd ) uses.ST AT D _P O R T = portControls which TCP and UD P port status (rpc. statd ) uses.LO C

Strona 210

# mount myserver:/ /mnt/#cd /mnt/exports# ls exportsfoobarOn servers that support both NFSv4 and either NFSv2 or NFSv3, both methods will work and giv

Strona 211

2. Ensure the package that provides the nfs-rdma service is installed and the service is enabledwith the following command:# yum i nstal l rd ma; ch

Strona 212

Wildcards should be used sparingly when exporting directories through NFS, as it is possible for thescope of the wildcard to encompass more systems th

Strona 213

Another important security feature of NFSv4 is the removal of the use of the MO UNT protocol formounting file systems. This protocol presented possib

Strona 214

# rpci nfo -pExamp le 9 .7. rpci nfo -p co mman d ou t p u tThe following is sample output from this command:program vers proto port service 1

Strona 215

Useful Websiteshttp://linux-nfs.org — The current site for developers where project status updates can be viewed.http://nfs.sourceforge.net/ — The old

Strona 216

Chapter 10. FS-CacheFS-Cache is a persistent local cache that can be used by file systems to take data retrieved from overthe network and cache it on

Strona 217

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 218

To provide caching services, FS-Cache needs a cache back-end. A cache back-end is a storagedriver configured to provide caching services (i.e. cachefi

Strona 219

File systems that support functionalities required by FS-Cache cache back-end include the Red HatEnterprise Linux 6 implementations of the following f

Strona 220

Level 1: Server detailsLevel 2: Some mount options; security type; FSID; uniquifierLevel 3: File HandleLevel 4: Page number in fileTo avoid coherency

Strona 221

Opening a file from a shared file system for direct I/O will automatically bypass the cache. This isbecause this type of access must be direct to the

Strona 222

ImportantCulling depends on both bxxx and fxxx pairs simultaneously; they can not be treatedseparately.10.5. St at ist ical Informat ionFS-Cache also

Strona 223

⁠Part II. Storage AdministrationThe Storage Administration section starts with storage considerations for Red Hat Enterprise Linux 6.Instructions rega

Strona 224

Chapter 11. Storage Considerations During InstallationMany storage device and file system settings can only be configured at install time. Other setti

Strona 225

Ext3 16TB 2TB 32,000 8 Yes Chapter 5,The Ext3 FileSystemExt4 16TB 16TB ⁠Unlimited⁠8 Yes Chapter 6,The Ext4 FileSystemXFS 100TB 100TB ⁠Unlimited 8 Yes

Strona 226

Encrypting Block Devices Using LUKSFormatting a block device for encryption using LUKS/d m-crypt will destroy any existing formattingon that device. A

Strona 227

This will cause the I/O to later fail with a checksum error. This problem is common to all block device(or file system-based) buffered I/O or mmap(2)

Strona 228

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 229

Chapter 12. File System CheckFilesystems may be checked for consistency, and optionally repaired, with filesystem-specificuserspace tools. These tools

Strona 230

NoteLater phases of consistency checking may print extra errors as it discoversinconsistencies which would have been fixed in early phases if it were

Strona 231

crash.If these filesystems encounter metadata inconsistencies while mounted, they will record this fact in thefilesystem superblock. If e2fsck finds t

Strona 232

NoteAlthough an fsck. xfs binary is present in the xfsprogs package, this is present only tosatisfy initscripts that look for an fsck. filesystem bina

Strona 233

6. Link count checks.7. Freemap checks.8. Superblock checks.These phases, as well as messages printed during operation, are documented in depth in

Strona 234

Chapter 13. PartitionsThe utility parted allows users to:View the existing partition tableChange the size of existing partitionsAdd partitions from f

Strona 235

rm minor-num Remove the partitionsel ect device Select a different device to configureset minor-num flag state Set the flag on a partition; state is e

Strona 236

hp-ufssun-ufsxfsIf a Fi l esystem of a device shows no value, this means that its file system type is unknown.The Fl ag s column lists the flags set f

Strona 237

# mkpart pri mary ext3 10 24 20 4 8NoteIf you use the mkpartfs command instead, the file system is created after the partition iscreated. However, pa

Strona 238

The first column should contain UUID = followed by the file system's UUID. The second columnshould contain the mount point for the new partition

Komentarze do niniejszej Instrukcji

Brak uwag