onefs99cliref
onefs99cliref
August 2024
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2010 - 2024 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Tables......................................................................................................................................... 25
Contents 3
isi antivirus release............................................................................................................................................................ 53
isi antivirus reports delete............................................................................................................................................... 53
isi antivirus reports scans list......................................................................................................................................... 54
isi antivirus reports scans view...................................................................................................................................... 55
isi antivirus reports threats list...................................................................................................................................... 56
isi antivirus reports threats view................................................................................................................................... 57
isi antivirus scan.................................................................................................................................................................57
4 Contents
isi auth groups members list.......................................................................................................................................... 101
isi auth groups modify.................................................................................................................................................... 102
isi auth groups view........................................................................................................................................................ 103
isi auth id............................................................................................................................................................................104
isi auth krb5 create......................................................................................................................................................... 104
isi auth krb5 delete..........................................................................................................................................................105
isi auth krb5 domain create...........................................................................................................................................105
isi auth krb5 domain delete........................................................................................................................................... 106
isi auth krb5 domain list................................................................................................................................................. 106
isi auth krb5 domain modify.......................................................................................................................................... 106
isi auth krb5 domain view.............................................................................................................................................. 107
isi auth krb5 list................................................................................................................................................................ 107
isi auth krb5 realm create.............................................................................................................................................. 108
isi auth krb5 realm delete.............................................................................................................................................. 108
isi auth krb5 realm list.....................................................................................................................................................109
isi auth krb5 realm modify............................................................................................................................................. 109
isi auth krb5 realm view.................................................................................................................................................. 110
isi auth krb5 spn check................................................................................................................................................... 110
isi auth krb5 spn create.................................................................................................................................................. 110
isi auth krb5 spn delete....................................................................................................................................................111
isi auth krb5 spn fix...........................................................................................................................................................111
isi auth krb5 spn import.................................................................................................................................................. 112
isi auth krb5 spn list......................................................................................................................................................... 112
isi auth krb5 view..............................................................................................................................................................113
isi auth ldap create........................................................................................................................................................... 113
isi auth ldap delete...........................................................................................................................................................120
isi auth ldap list.................................................................................................................................................................120
isi auth ldap modify.......................................................................................................................................................... 121
isi auth ldap view..............................................................................................................................................................129
isi auth local list................................................................................................................................................................ 130
isi auth local modify.........................................................................................................................................................130
isi auth local view............................................................................................................................................................. 132
isi auth log-level modify..................................................................................................................................................133
isi auth log-level view......................................................................................................................................................133
isi auth mapping create.................................................................................................................................................. 134
isi auth mapping delete...................................................................................................................................................135
isi auth mapping dump....................................................................................................................................................136
isi auth mapping flush..................................................................................................................................................... 136
isi auth mapping import.................................................................................................................................................. 137
isi auth mapping list......................................................................................................................................................... 137
isi auth mapping modify..................................................................................................................................................138
isi auth mapping token....................................................................................................................................................138
isi auth mapping view..................................................................................................................................................... 139
isi auth netgroups view.................................................................................................................................................. 140
isi auth nis create.............................................................................................................................................................140
isi auth nis delete............................................................................................................................................................. 143
isi auth nis list................................................................................................................................................................... 143
isi auth nis modify............................................................................................................................................................ 144
isi auth nis view................................................................................................................................................................ 148
isi auth privileges..............................................................................................................................................................149
Contents 5
isi auth refresh..................................................................................................................................................................149
isi auth roles create.........................................................................................................................................................150
isi auth roles delete......................................................................................................................................................... 150
isi auth roles list................................................................................................................................................................ 151
isi auth roles members list.............................................................................................................................................. 151
isi auth roles modify........................................................................................................................................................ 152
isi auth roles privileges list.............................................................................................................................................154
isi auth roles view............................................................................................................................................................ 155
isi auth settings acls modify..........................................................................................................................................155
isi auth settings acls view..............................................................................................................................................159
isi auth settings global modify...................................................................................................................................... 159
isi auth settings global view........................................................................................................................................... 161
isi auth settings krb5 modify.........................................................................................................................................162
isi auth settings krb5 view.............................................................................................................................................164
isi auth settings mapping modify................................................................................................................................. 164
isi auth settings mapping view..................................................................................................................................... 165
isi auth sso idps create...................................................................................................................................................166
isi auth sso idps delete....................................................................................................................................................167
isi auth sso idps list..........................................................................................................................................................167
isi auth sso idps modify.................................................................................................................................................. 168
isi auth sso idps view...................................................................................................................................................... 169
isi auth sso settings modify...........................................................................................................................................169
isi auth sso settings view...............................................................................................................................................169
isi auth sso sp................................................................................................................................................................... 170
isi auth sso sp modify......................................................................................................................................................170
isi auth sso sp signing-key.............................................................................................................................................. 171
isi auth sso sp signing-key dump.................................................................................................................................. 171
isi auth sso sp signing-key rekey.................................................................................................................................. 172
isi auth sso sp signing-key status................................................................................................................................ 172
isi auth sso sp signing-key settings............................................................................................................................. 172
isi auth sso sp signing-key settings modify............................................................................................................... 173
isi auth sso sp signing-key settings view................................................................................................................... 174
isi auth sso sp view..........................................................................................................................................................175
isi auth status....................................................................................................................................................................175
isi auth users change-password................................................................................................................................... 176
isi auth users create........................................................................................................................................................ 176
isi auth users delete.........................................................................................................................................................178
isi auth users flush........................................................................................................................................................... 178
isi auth users list...............................................................................................................................................................179
isi auth users modify....................................................................................................................................................... 180
isi auth users reset-password.......................................................................................................................................182
isi auth users view........................................................................................................................................................... 182
6 Contents
isi certificate authority import...................................................................................................................................... 187
isi certificate authority list............................................................................................................................................. 187
isi certificate authority modify......................................................................................................................................188
isi certificate authority view..........................................................................................................................................188
isi certificate server delete............................................................................................................................................189
isi certificate server import........................................................................................................................................... 189
isi certificate server list..................................................................................................................................................190
isi certificate server modify...........................................................................................................................................190
isi certificate server view............................................................................................................................................... 191
isi certificate settings modify........................................................................................................................................ 191
isi certificate settings view............................................................................................................................................192
Contents 7
Chapter 8: isi cluster commands......................................................................................... 222
isi cluster atime modify.................................................................................................................................................. 223
isi cluster atime view...................................................................................................................................................... 223
isi cluster config.............................................................................................................................................................. 223
isi cluster config exports............................................................................................................................................... 224
isi cluster config exports create.................................................................................................................................. 224
isi cluster config exports list.........................................................................................................................................224
isi cluster config exports view..................................................................................................................................... 225
isi cluster config imports............................................................................................................................................... 226
isi cluster config imports create.................................................................................................................................. 226
isi cluster config imports list.........................................................................................................................................227
isi cluster config imports view......................................................................................................................................227
isi cluster config lock......................................................................................................................................................228
isi cluster config lock modify........................................................................................................................................228
isi cluster config lock view............................................................................................................................................228
isi cluster contact modify..............................................................................................................................................229
isi cluster contact view..................................................................................................................................................230
isi cluster encoding list.................................................................................................................................................. 230
isi cluster encoding modify........................................................................................................................................... 230
isi cluster encoding view................................................................................................................................................ 231
isi cluster identity modify............................................................................................................................................... 231
isi cluster identity view................................................................................................................................................... 231
isi cluster internal-networks modify........................................................................................................................... 232
isi cluster internal-networks view............................................................................................................................... 233
isi cluster join-mode modify..........................................................................................................................................233
isi cluster join-mode view..............................................................................................................................................233
isi cluster lnnset modify................................................................................................................................................. 234
isi cluster lnnset view..................................................................................................................................................... 234
isi cluster maintenance components view................................................................................................................ 234
isi cluster maintenance history view.......................................................................................................................... 235
isi cluster maintenance settings modify.................................................................................................................... 235
isi cluster maintenance settings view........................................................................................................................ 236
isi cluster maintenance status..................................................................................................................................... 236
isi cluster reboot..............................................................................................................................................................236
isi cluster shutdown........................................................................................................................................................237
isi cluster time modify.................................................................................................................................................... 237
isi cluster time view........................................................................................................................................................ 237
isi cluster time timezone modify..................................................................................................................................238
isi cluster time timezone view......................................................................................................................................238
8 Contents
Chapter 11: isi config-catalog............................................................................................246
isi config-catalog modify............................................................................................................................................... 246
isi config-catalog view................................................................................................................................................... 246
Contents 9
Chapter 15: isi dm commands..................................................................................................273
isi dm accounts................................................................................................................................................................ 273
isi dm accounts create................................................................................................................................................... 274
isi dm accounts delete................................................................................................................................................... 275
isi dm accounts list......................................................................................................................................................... 276
isi dm accounts modify.................................................................................................................................................. 276
isi dm accounts view...................................................................................................................................................... 278
isi dm base-policies......................................................................................................................................................... 278
isi dm base-policies create............................................................................................................................................279
isi dm base-policies delete............................................................................................................................................ 280
isi dm base-policies list................................................................................................................................................... 281
isi dm base-policies modify............................................................................................................................................281
isi dm base-policies view............................................................................................................................................... 283
isi dm certificates............................................................................................................................................................283
isi dm certificates ca................................................................................................................................................ 284
isi dm certificates identity....................................................................................................................................... 287
isi dm datasets.................................................................................................................................................................290
isi dm datasets list........................................................................................................................................................... 291
isi dm datasets view........................................................................................................................................................291
isi dm historical-jobs.......................................................................................................................................................292
isi dm historical-jobs delete.......................................................................................................................................... 292
isi dm historial-jobs list...................................................................................................................................................293
isi dm jobs......................................................................................................................................................................... 293
isi dm jobs list...................................................................................................................................................................294
isi dm jobs modify........................................................................................................................................................... 295
isi dm jobs view............................................................................................................................................................... 295
isi dm policies................................................................................................................................................................... 295
isi dm policies create...................................................................................................................................................... 296
isi dm policies delete...................................................................................................................................................... 299
isi dm policies list............................................................................................................................................................ 300
isi dm policies modify...................................................................................................................................................... 301
isi dm policies view......................................................................................................................................................... 304
isi dm throttling............................................................................................................................................................... 304
isi dm throttling bw-rules........................................................................................................................................ 304
isi dm throttling settings..........................................................................................................................................307
10 Contents
isi esrs telemetry modify................................................................................................................................................ 315
isi esrs telemetry view.................................................................................................................................................... 316
Contents 11
isi filepool policies list..................................................................................................................................................... 356
isi filepool policies modify.............................................................................................................................................. 357
isi filepool policies view...................................................................................................................................................361
isi filepool templates list................................................................................................................................................ 362
isi filepool templates view............................................................................................................................................. 363
12 Contents
isi hdfs proxyusers view................................................................................................................................................ 399
isi hdfs racks create....................................................................................................................................................... 400
isi hdfs racks delete........................................................................................................................................................ 401
isi hdfs racks list...............................................................................................................................................................401
isi hdfs racks modify.......................................................................................................................................................402
isi hdfs racks view...........................................................................................................................................................403
isi hdfs ranger-plugin settings modify........................................................................................................................403
isi hdfs ranger-plugin settings view............................................................................................................................404
isi hdfs settings modify..................................................................................................................................................404
isi hdfs settings view......................................................................................................................................................406
isi http settings modify..................................................................................................................................................406
isi http settings view...................................................................................................................................................... 407
Contents 13
isi ipmi nodes list.............................................................................................................................................................. 431
isi ipmi nodes view.......................................................................................................................................................... 432
isi ipmi settings modify.................................................................................................................................................. 432
isi ipmi settings view...................................................................................................................................................... 433
isi ipmi user modify......................................................................................................................................................... 433
isi ipmi user view............................................................................................................................................................. 434
14 Contents
isi keymanager sed migrate server..............................................................................................................................467
isi keymanager sed settings modify............................................................................................................................468
isi keymanager sed settings view................................................................................................................................468
isi keymanager sed status.............................................................................................................................................469
Contents 15
Chapter 36: isi network.........................................................................................................493
isi network dnscache flush........................................................................................................................................... 494
isi network dnscache modify........................................................................................................................................494
isi network dnscache view............................................................................................................................................496
isi network external modify.......................................................................................................................................... 496
isi network external view.............................................................................................................................................. 498
isi network firewall dscp list......................................................................................................................................... 498
isi network firewall dscp modify.................................................................................................................................. 499
isi network firewall reset-global-policy...................................................................................................................... 500
isi network firewall policies clone................................................................................................................................500
isi network firewall policies create...............................................................................................................................501
isi network firewall policies delete............................................................................................................................... 501
isi network firewall policies list.................................................................................................................................... 502
isi network firewall policies modify............................................................................................................................. 502
isi network firewall policies view................................................................................................................................. 504
isi network firewall reset-dscp-setting......................................................................................................................504
isi network firewall rules create.................................................................................................................................. 505
isi network firewall rules delete................................................................................................................................... 506
isi network firewall rules list......................................................................................................................................... 506
isi network firewall rules modify.................................................................................................................................. 507
isi network firewall rules view......................................................................................................................................509
isi network firewall services list...................................................................................................................................509
isi network firewall settings modify.............................................................................................................................510
isi network firewall settings view.................................................................................................................................510
isi network groupnets create.........................................................................................................................................511
isi network groupnets delete........................................................................................................................................ 512
isi network groupnets list...............................................................................................................................................512
isi network groupnets modify....................................................................................................................................... 513
isi network groupnets view........................................................................................................................................... 515
isi network interfaces list...............................................................................................................................................515
isi network pools create ................................................................................................................................................ 517
isi network pools delete..................................................................................................................................................521
isi network pools list....................................................................................................................................................... 522
isi network pools modify................................................................................................................................................523
isi network pools rebalance-ips................................................................................................................................... 528
isi network pools sc-resume-nodes............................................................................................................................ 528
isi network pools sc-suspend-nodes.......................................................................................................................... 529
isi network pools status.................................................................................................................................................529
isi network pools view....................................................................................................................................................530
isi network rules create.................................................................................................................................................. 531
isi network rules delete.................................................................................................................................................. 531
isi network rules list........................................................................................................................................................532
isi network rules modify.................................................................................................................................................533
isi network rules view.....................................................................................................................................................534
isi network sc-rebalance-all..........................................................................................................................................534
isi network subnets create........................................................................................................................................... 535
isi network subnets delete............................................................................................................................................536
isi network subnets list.................................................................................................................................................. 537
isi network subnets modify...........................................................................................................................................538
16 Contents
isi network subnets view...............................................................................................................................................540
Contents 17
isi performance filters apply..........................................................................................................................................591
isi performance filters list............................................................................................................................................. 592
isi performance filters modify...................................................................................................................................... 592
isi performance filters remove..................................................................................................................................... 593
isi performance filters view.......................................................................................................................................... 593
isi performance metrics list.......................................................................................................................................... 593
isi performance metrics view....................................................................................................................................... 594
isi performance settings modify.................................................................................................................................. 594
isi performance settings view...................................................................................................................................... 595
isi performance workloads list..................................................................................................................................... 595
isi performance workloads modify.............................................................................................................................. 596
isi performance workloads pin..................................................................................................................................... 597
isi performance workloads unpin.................................................................................................................................597
isi performance workloads view.................................................................................................................................. 597
18 Contents
Chapter 42: isi s3.................................................................................................................. 636
isi s3 buckets create...................................................................................................................................................... 636
isi s3 buckets delete....................................................................................................................................................... 637
isi s3 buckets list............................................................................................................................................................. 637
isi s3 buckets modify......................................................................................................................................................638
isi s3 buckets view..........................................................................................................................................................639
isi services s3 disable..................................................................................................................................................... 639
isi services s3 enable......................................................................................................................................................639
isi s3 keys create.............................................................................................................................................................640
isi s3 keys delete............................................................................................................................................................. 640
isi s3 log-level................................................................................................................................................................... 641
isi s3 log-level modify......................................................................................................................................................641
isi s3 log-level view..........................................................................................................................................................641
isi s3 mykeys create....................................................................................................................................................... 642
isi s3 mykeys delete........................................................................................................................................................642
isi s3 mykeys view ......................................................................................................................................................... 643
isi s3 settings global modify..........................................................................................................................................643
isi s3 settings global view..............................................................................................................................................643
isi s3 settings zone modify .......................................................................................................................................... 644
isi s3 settings zone view............................................................................................................................................... 644
Contents 19
isi smb openfiles close................................................................................................................................................... 662
isi smb openfiles list........................................................................................................................................................663
isi smb sessions delete...................................................................................................................................................663
isi smb sessions delete-user.........................................................................................................................................664
isi smb sessions list.........................................................................................................................................................665
isi smb settings global modify...................................................................................................................................... 666
isi smb settings global view.......................................................................................................................................... 669
isi smb settings shares modify.....................................................................................................................................669
isi smb settings shares view......................................................................................................................................... 673
isi smb settings zone modify........................................................................................................................................ 674
isi smb settings zone view............................................................................................................................................ 675
isi smb shares create......................................................................................................................................................675
isi smb shares delete...................................................................................................................................................... 678
isi smb shares list............................................................................................................................................................ 679
isi smb shares modify.....................................................................................................................................................680
isi smb shares permission create................................................................................................................................ 685
isi smb shares permission delete................................................................................................................................. 686
isi smb shares permission list....................................................................................................................................... 687
isi smb shares permission modify................................................................................................................................688
isi smb shares permission view....................................................................................................................................689
isi smb shares view.........................................................................................................................................................689
20 Contents
Chapter 49: isi snmp............................................................................................................... 715
isi snmp settings modify.................................................................................................................................................715
isi snmp settings view.....................................................................................................................................................716
Contents 21
isi supportassist telemetry view.................................................................................................................................. 756
22 Contents
isi sync service policies reset....................................................................................................................................... 809
isi sync service policies resolve................................................................................................................................... 809
isi sync service policies view.........................................................................................................................................810
isi sync service recovery allow-write.......................................................................................................................... 810
isi sync service recovery resync-prep......................................................................................................................... 811
isi sync service target break.......................................................................................................................................... 811
isi sync service target cancel........................................................................................................................................812
isi sync service target list.............................................................................................................................................. 812
isi sync service target view........................................................................................................................................... 813
isi sync settings modify.................................................................................................................................................. 813
isi sync settings view...................................................................................................................................................... 815
isi sync target break........................................................................................................................................................815
isi sync target cancel...................................................................................................................................................... 816
isi sync target list.............................................................................................................................................................816
isi sync target reports list.............................................................................................................................................. 817
isi sync target reports subreports list.........................................................................................................................819
isi sync target reports subreports view.....................................................................................................................820
isi sync target reports view.......................................................................................................................................... 820
isi sync target view..........................................................................................................................................................821
Contents 23
isi upgrade cluster resume............................................................................................................................................ 838
isi upgrade cluster retry-last-action........................................................................................................................... 838
isi upgrade cluster rollback........................................................................................................................................... 839
isi upgrade cluster reboot............................................................................................................................................. 839
isi upgrade cluster settings...........................................................................................................................................839
isi upgrade cluster start.................................................................................................................................................840
isi upgrade cluster to-version....................................................................................................................................... 841
isi upgrade cluster unblock............................................................................................................................................ 841
isi upgrade cluster view..................................................................................................................................................841
isi upgrade patches abort..............................................................................................................................................842
isi upgrade patches install.............................................................................................................................................842
isi upgrade patches list.................................................................................................................................................. 843
isi upgrade patches uninstall........................................................................................................................................ 843
isi upgrade patches view...............................................................................................................................................844
24 Contents
Tables
1 Syntax diagrams.......................................................................................................................................................26
2 Wildcards................................................................................................................................................................... 48
3 <type>.......................................................................................................................................................................196
4 id................................................................................................................................................................................208
5 <account-type>..................................................................................................................................................... 274
6 Values....................................................................................................................................................................... 277
7 --operator=<value>.............................................................................................................................................. 353
8 --operator=<value>.............................................................................................................................................. 358
9 --service-id.............................................................................................................................................................. 410
10 --enabled <boolean>............................................................................................................................................. 410
11 Encoding values..................................................................................................................................................... 549
12 Encoding values.....................................................................................................................................................560
13 Logging levels.........................................................................................................................................................566
14 --encoding...............................................................................................................................................................575
15 Operator values......................................................................................................................................................785
Tables 25
1
Introduction to this guide
This chapter describes this reference guide, and provides information about how to get assistance from Isilon technical support.
Topics:
• About this guide
• Syntax diagrams
• Where to get help
Syntax diagrams
The format of each command is described in a syntax diagram.
The following conventions apply for syntax diagrams:
Each isi command is broken into three parts: command, required options, and optional options. Required options are positional,
meaning that you must specify them in the order that they appear in the syntax diagram. However, you can specify a required
option in an alternative order by preceding the text displayed in angle brackets with a double dash. For example, consider isi
snapshot snapshots create.
Shortened versions of commands are accepted as long as the command is unambiguous and does not apply to multiple
commands. For example, isi snap snap c newSnap /onefs_root/data is equivalent to isi snapshot
snapshots create newSnap /onefs_root/data because the root of each word belongs to one command exclusively.
If a word belongs to more than one command, the command fails. For example, isi sn snap c newSnap /onefs_root/
data is not equivalent to isi snapshot snapshots create newSnap /onefs_root/data because the root of isi
sn could belong to either isi snapshot or isi snmp.
If you begin typing a word and then press TAB, the rest of the word automatically appears as long as the word is unambiguous
and applies to only one command. For example, isi snap completes to isi snapshot because that is the only valid
possibility. However, isi sn does not complete, because it is the root of both isi snapshot and isi snmp.
Syntax
Options
--timeout <integer>
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi antivirus cava filters <action>
[--timeout <integer>]
Options
--timeout <integer>
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi antivirus cava filters list
[{--limit | -l}<integer>]
[--sort (zone_name |
filter_enabled | open_on_fail |
scan_profile | scan_cloudpool_files)]
[{--descending | -d}]
[--format (table | json
| csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Syntax
isi antivirus cava filters modify<zone>
[{--filter-enabled | -e}<boolean>]
[{--open-on-fail | -f} <boolean>]
[{--file-extensions | -t} <string> | --add-file-extensions <string> | --remove-file-
extensions
<string>]
[--revert-file-extensions]
[{--add-common-file-extensions | -n}]
[{--file-extension-action | -a} (include | exclude)]
[{--scan-if-no-extension | -o}<boolean>]
[{--paths-to-exclude | -x} <string> | --clear-paths-to-exclude |--add-paths-to-
exclude <string>
| --remove-paths-to-exclude <string>]
[{--scan-cloudpool-files | -c} <boolean>]
[{--scan-profile | -s}(standard | strict)]
[--revert-scan-profile]
[{--verbose | -v}]
Options
<zone>
Displays the access zone
[{--filter-enabled | -e}<boolean>]
Enables access zone for AV scanning.
[{--open-on-fail | -f} <boolean>]
Allows access to files when scanning fails.
[{--file-extensions | -t} <string>
Displays an array of file extensions to use in scanning decision (include list or exclude list). Specify the
--file-extensions for each additional array of file extensions to use in scanning decision (include
list or exclude list).
Syntax
isi antivirus cava filters view <zone>
Options
<zone>
Displays the access zone.
Syntax
isi antivirus cava jobs <action>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi antivirus cava jobs create <job-name>
[{--description | -d} <string>]
[{--enabled | -e} <boolean>]
[{--schedule | -s} (schedule | avsigupdate)]
[{--impact | -i} <string>]
[{--ignore-previous-scan-status | -f}]
[{--file-extensions | -t} <string>]
[{--add-common-file-extensions | -A}]
[{--file-extension-action | -a} (include | exclude)]
[{--scan-if-no-extension | -o} <boolean>]
[{--paths-to-include | -p} <path>]
[{--paths-to-exclude | -x} <string>]
[{--scan-cloudpool-files | -c} <boolean>]
[{--verbose | -v}]
Options
<job-name>
Displays the unique shortname of the antivirus job.
[{--description | -d} <string>]
Displays the free-form customer description of job.
[{--enabled | -e} <boolean>]
Refers to the job being enabled.
[{--schedule | -s} (schedule | avsigupdate)]
Displays the schedule for running jobs in isi-schedule format or avsigupdate tag. Examples of isi-schedule
include: 'every Friday' or 'every day at 4:00'. Special avsigupdate tag kicks off job when the virus
signature file on the antivirus server(s) is updated.
[{--impact | -i} <string>
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH,
OFF_HOURS, or a custom impact policy that you created.
[{--ignore-previous-scan-status | -f}]
Syntax
isi antivirus cava jobs delete { <job-name> | --all }
[{--verbose | -v}]
[{--force | -f}]
Options
<job-name>
Displays the unique shortname of the antivirus job.
--all
Deletes all CEE/CAVA jobs.
[{--verbose | -v}]
Displays more detailed information.
[{--force | -f}]
Does not ask for confirmation.
Syntax
isi antivirus cava jobs list
[{--limit | -l} <integer>]
[--sort (job_name |
paths_to_include | paths_to_exclude
|schedule | enabled)]
[{--descending | -d}]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
[{--limit | -l} <integer>]
Displays the number of antivirus cava jobs.
[--sort (job_name | paths_to_include | paths_to_exclude |schedule | enabled)]
Sorts data by the specified field.
[{--descending | -d}]
Sorts data in descending order.
[--format (table | json | csv | list)]
Displays antivirus cava jobs in table, JSON, CSV, or list format.
[{--no-header | -a}]
Does not display headers in CSV or table formats.
[{--no-footer | -z}]
Does not display table summary footer information.
[{--verbose | -v}]
Displays more detailed information.
Syntax
isi antivirus cava jobs modify <job-name>
[{--new-name | -n} <string>]
[{--description | -d} <string>]
[{--enabled | -e} <boolean>]
[{--schedule | -s} (<schedule> | avsigupdate)]
[{--impact | -i} <string>]
[--revert-impact]
[{--ignore-previous-scan-status | -f}]
[--revert-ignore-previous-scan-status]
[{--file-extensions | -t} <string> | --add-file-extensions <string>
| --remove-file-extensions <string>]
[--revert-file-extensions]
[{--add-common-file-extensions | -A}]
[{--file-extension-action | -a} (include | exclude)]
Options
<job-name>
Displays a unique shortname of the antivirus job.
[{--new-name | -n} <string>]
Changes the job shortname to <string>.
[{--description | -d} <string>]
Displays the free-form customer description of job.
[{--enabled | -e}<boolean>]
Enables the antivirus job.
[{--schedule | -s} (<schedule> | avsigupdate)]
Displays the schedule for running jobs in isi-schedule format or avsigupdate tag. Examples of isi-
scheduleinclude: 'every Friday' or 'every day at 4:00'. Special avsigupdate tag kicks off job when the
virus signature file on the antivirus server(s) is updated.
--impact | -i} <string>]
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH,
OFF_HOURS, or a custom impact policy that you created.
[--revert-impact]
Sets value to system default for --impact.
[{--ignore-previous-scan-status | -f}]
Forces files to be scanned regardless of whether the file was recently scanned.
[--revert-ignore-previous-scan-status]
Sets value to system default for --ignore-previous-scan-status.
[{--file-extensions | -t} <string>
Displays an array of file extensions to use in scanning decision (include list or exclude list). Specify the
--file-extensions for each additional array of file extensions to use in scanning decision (include
list or exclude list).
[--add-file-extensions <string>]
Adds an array of file extensions to use in scanning decision (include list or exclude list). Specify --add-
file-extensions for each additional item to add.
[--remove-file-extensions <string>]
Removes an array of file extensions to use in scanning decision (include list or exclude list). Specify
--remove-file-extensions for each additional item to remove.
[--revert-file-extensions]
Sets value to system default for --file-extensions.
[{--add-common-file-extensions | -n}]
Adds a list of 50+ common file extensions to use in scanning decision.
[{--file-extension-action | -a} (include | exclude)]
Determines whether to include or exclude a file when it matches an entry in the list of file extensions.
[{--scan-if-no-extension | -o} <boolean>]
Scans files without extensions.
{--paths-to-include | -p} <path>
Syntax
isi antivirus cava jobs start <job-name>
[--report-id <string>]
[{--ignore-previous-scan-status | -f}]
Options
<job-name>
Displays a unique shortname of the antivirus job.
[--report-id <string>]
Displays an optional ID for the scan report.
[{--ignore-previous-scan-status | -f}]
Forces files to be scanned regardless of whether the file was recently scanned.
Syntax
isi antivirus cava jobs view <job-name>
Options
<job-name>
Displays a unique shortname of the antivirus job.
Syntax
isi antivirus cava servers <action>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi antivirus cava servers create <server-name> <server-uri>
[{--enabled | -e} <boolean>]
[{--verbose | -v}]
Options
server-name
Displays a unique shortname of the CEE/CAVA server.
server-uri
Refers to the URI to CEE/CAVA server.
[{--enabled | -e} <boolean>]
Determines if the CAVA server enabled is enabled.
[{--verbose | -v}]
Syntax
isi antivirus cava servers delete { <server-name> | --all }
[{--verbose | -v}]
[{--force | -f}]
Options
server-name
Displays a unique shortname of the CEE/CAVA server.
--all
Deletes all CEE/CAVA servers.
[{--verbose | -v}]
Displays more detailed information.
[{--force | -f}]
Does not ask for confirmation.
Syntax
isi antivirus cava servers list
[{--limit | -l} <integer>]
[--sort (server_name | server_uri | enabled | server_type)]
[{--descending | -d}]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
[{--limit | -l} <integer>]
Displays the number of antivirus cava servers.
[--sort (server_name | server_uri | enabled | server_type)]
Sorts data by the specified field.
[{--descending | -d}]
Sorts data in descending order.
[--format (table | json | csv | list)]
Displays antivirus cava servers in table, JSON, CSV, or list format.
[{--no-header | -a}]
Syntax
isi antivirus cava servers modify <server-name>
[{--new-name | -n} <string>]
[{--server-uri | -u} <server_uri>]
[{--enabled | -e} <boolean>]
[{--verbose | -v}]
Options
server-name
Displays a unique shortname of the CEE/CAVA server.
[{--new-name | -n} <string>]
Displays a new unique shortname for the CEE/CAVA server.
[{--server-uri | -u} <server_uri>]
Refers to the URI to CEE/CAVA server.
[{--enabled | -e} <boolean>]
Determines if the CAVA server enabled is enabled.
[{--verbose | -v}]
Displays more detailed information.
Syntax
isi antivirus cava servers view <server-name>
Options
server-name
Displays a unique shortname of the CEE/CAVA server.
Syntax
isi antivirus cava settings <action>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi antivirus cava settings modify
[{--service-enabled | -e} <boolean>]
[{--scan-all-zones | -Z} | {--scan-zones | -z} <access_zone> | --clear-scan-
zones |
--add-scan-zones <access_zone> | --remove-scan-zones <access_zone>]
[{--ip-pool | -i} <string>]
[--revert-ip-pool]
[{--report-expiry | -r} <duration>]
[--revert-report-expiry]
[{--scan-timeout | -t} <duration>]
[--revert-scan-timeout]
[{--scan-cloudpool-timeout | -c} <duration>]
[--revert-scan-cloudpool-timeout]
[{--scan-size-maximum | -m} <SIZE>]
[--revert-scan-size-maximum]
[{--force | -f}]
[{--verbose | -v}]
Options
[{--service-enabled | -e} <boolean>]
Determines whether the CAVA antivirus service is on or off.
--scan-all-zones | -Z
Adds all access zones to list of access zones enabled for scanning.
{--scan-zones | -z} <access_zone>
Displays a list of access zones that are enabled for antivirus scanning. Specify --scan-zones for each
additional list of access zones that are enabled for antivirus scanning.
--clear-scan-zones
Clears the value for list of access zones that are enabled for antivirus scanning.
{--add-scan-zones} <access_zone>
Adds a list of access zones that are enabled for antivirus scanning. Specify --add-scan-zones for
each additional item to add.
Syntax
isi antivirus cava settings view
[--format (list | json)]
Options
[--format (list | json)]
Displays antivirus cava settings in list or JSON format.
Syntax
isi antivirus cava status
[{--servers | -s} | {--system-stats | -i}]
[{--verbose | -v}]
[--format (table | json | csv | list)]
Options
--servers | -s
Displays status and extended information for each CAVA server.
--system-stats | -i
Displays general scan statistics of the CAVA antivirus system.
--verbose | -v
Displays more detailed information.
--format (table | json | csv | list
Displays antivirus cavas in table, JSON, CSV, or list format.
Syntax
isi antivirus icap policies create <name>
[--description <string>]
[--enabled {true | false}]
[--schedule <schedule>]
[--impact <impact-policy>]
[--force-run {yes | no}]
[--paths <path>...]
[--recursion-depth <integer>]
[--verbose]
Options
<name>
Specifies a name for the policy.
--description <string>
Specifies a description for the policy.
{--enabled | -e} {true | false}
Determines whether the policy is enabled or disabled. If set to true, the policy is enabled. The default
value is false.
{--schedule | -s} <schedule>
Specifies when the policy is run.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"Saturday" and "sat" are valid.
{--impact | -i} <impact_policy>
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH,
OFF_HOURS, or a custom impact policy that you created.
{--force-run | -r} {yes | no}
Determines whether to force policy scans. If a scan is forced, all files are scanned regardless of whether
OneFS has marked files as having been scanned, or if global settings specify that certain files should not
be scanned.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths, repeat the --path
option. For example:
--recursion-depth <integer>
NOTE: This option has been deprecated and will not impact antivirus scans if specified.
Syntax
isi antivirus icap policies delete {<name> | --all}
[--force]
[--verbose]
Options
{<name> | --all}
Deletes the specified policy or all policies.
{--force | -f}
Does not prompt you to confirm that you want to delete the policy.
{--verbose | -v}
Displays a message confirming that the antivirus policy was deleted.
Syntax
isi antivirus icap policies list
[--limit <integer>]
[--sort {name | description | enabled}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Syntax
isi antivirus icap policies modify <id>
[--name <new-name>]
[--description <string>]
[--enabled {true | false}]
[--schedule <schedule>]
[--clear-schedule]
[--impact <impact-policy>]
[--clear-impact]
[--force-run {true | false}]
[--paths <path>
[--clear-paths]
[--add-paths <path>]
[--remove-paths <path>]
[--recursion-depth <integer>]
Options
<id>
Modifies the policy with the specified policy identification number.
{--name | -n} <new-name>
Specifies a new name for this policy.
--description <string>
Specifies a description for the policy.
{--enabled | -e} {true | false}
Determines whether this policy is enabled or disabled. If set to true, the policy is enabled. The default
value is false.
{--schedule | -s} <schedule>
Specifies when the policy is run.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"Saturday" and "sat" are valid.
--clear-schedule
Deletes the current schedule for the policy.
{--impact | -i} <impact_policy>
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH,
OFF_HOURS, or a custom impact policy that you created.
--clear-impact
Clears the current impact policy for antivirus scan jobs.
{--force-run | -r} {yes | no}
Determines whether to force policy scans. If a scan is forced, all files are scanned regardless of whether
OneFS has marked files as having been scanned, or if global settings specify that certain files should not
be scanned.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths, repeat the --path
option. For example:
NOTE: If you specify this option, the specified paths will replace all previously specified paths in the
list.
--clear-paths
Clears the list of paths to scan.
--add-paths <path>
Adds the specified path to the list of paths to scan.
--remove-paths <path>
Removes the specified path from the list of paths to scan.
{--verbose | -v}
Displays a message confirming that the antivirus policy was modified.
Syntax
isi antivirus icap policies start <policy>
[--report-id <id>]
[--force-run {true | false}]
[--update {yes | no}]
Options
<policy>
Runs the specified policy.
--report-id <id>
Assigns the specified ID to the report generated for this run of the ICAP avscan policy. If you do not
specify an ID, OneFS automatically assigns one.
{ --force-run | -r} {true | false}
Determines whether to force the scan. If the scan is forced, all files are scanned regardless of whether
OneFS has marked files as having been scanned, or if global settings specify that certain files should not
be scanned.
--update {yes | no}
Specifies whether to update the last run time in the policy file. The default value is yes.
Syntax
isi antivirus icap policies view <name>
Options
<name>
Displays information about the named policy.
Syntax
isi antivirus icap settings modify
[--fail-open {true | false}]
[{--glob-filters <string>... | --clear-glob-filters
| --add-glob-filters <string> | --remove-glob-filters <string>}]
Options
--fail-open {true | false}
If --scan-on-open is set to true, determines whether users can access files that cannot be
scanned. If this option is set to false, users cannot access a file until the file is scanned by an ICAP
server.
If --scan-on-open is set to true, this option has no effect.
--glob-filter <string>
Specifies a file name or extension. To specify multiple filters, you must include multiple --glob-
filter options within the same command. Specifying this option will remove any existing glob filters.
All strings that include wildcards must be enclosed in quotes, for example, "*.jpg". You can include the
following wildcards:
Table 2. Wildcards
Wildca Description
rd
charac
ter
* Matches any string in place of the asterisk.
For example, specifying "m*" would match "movies" and "m123"
NOTE: If you specify this option, the specified filters will replace all previously specified filters in the
list.
--clear-glob-filters
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi antivirus icap settings view
Options
There are no options for this command.
Syntax
isi antivirus icap servers create <url>
[--description <string>]
[--enabled {yes | no}]
[--verbose]
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--enabled | -n} {yes | no}
Determines whether the ICAP server is enabled.
{--verbose | -v}
Displays a message confirming that the server has been added.
Syntax
isi antivirus icap servers delete {<url> | --all}
[--verbose]
[--force]
Options
<url>
Deletes the specified ICAP antivirus server.
--all
Deletes all ICAP antivirus servers.
{--verbose | -v}
Displays a message confirming that OneFS has disconnected from the ICAP server.
{--force | -f}
Does not display a confirmation prompt.
Syntax
isi antivirus icap servers list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
Syntax
isi antivirus icap servers view <url>
Options
<url>
Displays information about the specified ICAP server.
Syntax
isi antivirus icap servers modify <url>
[--enabled {yes | no}]
[--description <string>]
[--verbose]
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--enabled | -n} {yes | no}
Determines whether the ICAP server is enabled.
{--verbose | -v}
Displays a message confirming that the server has been added.
Syntax
isi antivirus quarantine <file>
[--verbose]
Options
<file>
Quarantines the specified file. Specify as an absolute file path within the /ifs file system.
{--verbose | -v}
Displays a message confirming that the file has been quarantined.
Syntax
isi antivirus release <file>
[--verbose]
Options
<file>
Removes the specified file from quarantine. Specify as a file path within the /ifs file system.
{--verbose | -v}
Displays a message confirming that the file was removed from quarantine.
Syntax
isi antivirus reports delete {<scan-id> | --all}
[--age <integer><time>]
[--verbose]
[--force]
Options
<scan-id>
Deletes the antivirus report with the specified ID.
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
{--verbose | -v}
Displays a message confirming that the reports have been deleted.
{--force | -f}
Does not display a confirmation prompt.
Syntax
isi antivirus reports scans list
[--policy-id <string>]
[--status <status>]
[--limit <integer>]
[--offset <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--policy-id <string>
Filters output based on the ID of the policy.
--status <status>
Filters output based on the current status of the scan job.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi antivirus reports scans view <id>
Options
<id>
Displays the antivirus report of the specified ID.
Syntax
isi antivirus reports threats list
[--scan-id <string>]
[--file <string>]
[--remediation <string>]
[--limit <integer>]
[--offset <integer>]
[--sort {scan_id | file | remediation | threat | time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--scan-id <string>
Unique identifier for the scan report.
--file <string>
Name of the file containing the threat report.
--remediation <string>
Description of action taken to remediate threat.
{--limit | -l} <integer>
Maximum number of antivirus threats to display.
{--offset | -o} <integer>
Number of threat report entries to bypass from the beginning.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Syntax
isi antivirus reports threats view <id>
Options
<id>
Displays information about the threat with the specified ID.
Syntax
isi antivirus scan <file>
[--policy <id>]
[--report-id <id>]
[--ignore-previous-scan-status {yes | no}]
Options
<file>
Scans the specified file.
{--policy | -p} <id> (ICAP only)
Assigns a policy ID for this scan. The default ID is MANUAL.
--report-id <id>
Assigns the specified ID to the report generated for this antivirus scan. If you do not specify an ID,
OneFS will automatically assign one.
{ --ignore-previous-scan-status} {true | false} (ICAP only)
Force the scan even if it conflicts with the ICAP policy. If the scan is forced, all files are scanned
regardless of whether OneFS has marked files as having been scanned, or if global settings specify that
certain files should not be scanned.
Syntax
isi audit certificates syslog delete <id>
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Options
<id>
Identifies the certificate that you want to delete. The value is either the system-assigned certificate id or
adminitrator-assigned certificate name. The isi audit certificates syslog list command
shows assigned IDs and current names.
{--force | -f}
Deletes without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi audit certificates syslog import <certificate-path> <certificate-key-path>
[--name <string>]
[--set-certificate-key-password]
[{--verbose | -v}]
[{--help | -h}]
Options
<certificate-path>
Specifies an absolute path within the /ifs file system for the TLS certificate file. The file must be in
PEM, DER, or PCKS#12 format. The certificate is copied into the certificate store. You may remove the
certificate from the local file system after importing.
<certificate-key-path>
Specifies an absolute path within the /ifs file system for the TLS certificate key file. The key file must
be in PEM, DER, or PCKS#12 format. The certificate key file is copied into the certificate store. For
security reasons, you should remove the key file from the local file system after importing.
--name <string>
Specifies a user-friendly name that identifies the certificate. If you do not provide a name, the value
defaults to the CN in the certificate.
--set-certificate-key-password
Sets the password for the certificate key if the private key is password encrypted.
{--verbose | -v}
Shows more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi audit certificates syslog list
[{--limit | -l} <integer> ]
[--format {table | csv | list | json}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
{--limit | -l} <integer>
Specifies the number of audit syslog certificates to display.
Syntax
isi audit certificates syslog modify <id>
[--name <string>]
[--description <string>]
[{--verbose | -v}]
[{--help | -h}]
Options
<id>
Identifies the certificate that you want to modify. The value is either the system-assigned certificate
id or administrator-assigned certificate name. The isi audit certificates syslog list
command shows assigned IDs and current names.
--name <string>
Renames the certificate using the specified value.
--description <string>
Redefines the description of this certificate.
{--verbose | -v}
Shows more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi audit certificates syslog view <id>
[--format {list | json}]
[{--help | -h}]
Syntax
isi audit progress global view
Syntax
isi audit progress view
[--lnn <integer>]
Options
[--lnn <integer>]
Displays a logical node number view of the progress of delivery of the protocol audit events to the CEE
server and syslog. The view includes the timestamp of the last captured protocol audit event and the
timestamp of the last event sent to the CEE server and syslog corresponding to the node.
The following command displays the progress of delivery of the protocol audit events to the CEE server and syslog for the
current node:
Syntax
isi audit settings global modify
[--protocol-auditing-enabled {yes | no}]
[--audited-zones <zones>]
[--clear-audited-zones]
[--add-audited-zones <zones>]
[--remove-audited-zones <zones>]
[--cee-server-uris <uris>]
[--clear-cee-server-uris]
[--add-cee-server-uris <uris>]
[--remove-cee-server-uris <uris>]
[--hostname <string>]
[--config-auditing-enabled {yes | no}]
[--config-syslog-enabled {yes | no}]
[--cee-log-time <string>]
[--syslog-log-time <string>]
[--config-syslog-servers <string>]
[--clear-config-syslog-servers]
[--add-config-syslog-servers <string>]
[--remove-config-syslog-servers <string>]
[--config-syslog-tls-enabled {yes | no}]
[--config-syslog-certificate-id <string>]
[--protocol-syslog-servers <string>]
[--clear-protocol-syslog-servers]
[--add-protocol-syslog-servers <string>]
[--remove-protocol-syslog-servers <string>
[--protocol-syslog-tls-enabled {yes | no}]
[--protocol-syslog-certificate-id <string>]
[--system-syslog-enabled {yes | no}]
[--system-syslog-servers <string>]
[--clear-system-syslog-servers]
[--add-system-syslog-servers <string>]
[--remove-system-syslog-servers <string>]
[--system-syslog-tls-enabled {yes | no}]
[--system-syslog-certificate-id <string>]
[--auto-purging-enabled {yes | no}]
[--retention-period <integer>]
[--system-auditing-enabled {yes | no}]
[{--verbose | -v}]
[{--help | -h}]
Options
--protocol-auditing-enabled {yes | no}
Enables or disables the auditing of data-access requests through the SMB, NFS, S3, and HDFS
protocols.
--audited-zones <access zones>
Specifies one or more access zones, separated by commas, which will be audited if protocol auditing is
enabled. This option overwrites all entries in the list of access zones; to add or remove access zones
without affecting current entries, use --add-audited-zones or --remove-audited-zones.
--clear-audited-zones
Clears the entire list of access zones to be audited if protocol auditing is enabled.
--add-audited-zones <access zones>
Adds one or more access zones, separated by commas, to the list of zones that will be audited if
protocol auditing is enabled.
--remove-audited-zones <access zones>
[protocol]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
--syslog-log-time <date>
Specifies a date after which the audit syslog forwarder will forward logs. To forward SMB, NFS, and
HDFS traffic logs, specify protocol. To forward configuration change logs, specify config. Specify
<date> in the following format:
[protocol|config]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
--config-syslog-servers <string>
Specifies a list of remote servers to which config audit logs are forwarded. You must specify the
--config-syslog-servers option for each server you want to add to the list.
Specify <string> in one of the following formats:
● <ip_address>
● <hostname>
● <ip_address>:<port>
● <hostname>:<port>
A custom TCP port can be specified by using the <ip_address>:<port> or the
<hostname>:<port> format.
--clear-config-syslog-servers
Clears the list of remote servers to which configuration change audit logs are forwarded for logging in
syslog.
--add-config-syslog-servers <string>
Syntax
isi audit settings global view
Options
There are no options for this command.
Syntax
isi audit settings modify
[--audit-failure <event types>]
[--clear-audit-failure]
[--add-audit-failure <event types>]
[--remove-audit-failure <event types>]
[--audit-success <event types>]
[--clear-audit-success]
[--add-audit-success <event types>]
[--remove-audit-success <event types>]
[--syslog-audit-events <event types>]
[--clear-syslog-audit-events]
[--add-syslog-audit-events <event types>]
[--remove-syslog-audit-events <event types>]
[--syslog-forwarding-enabled {yes | no}]
[--zone<access zone>]
[--verbose]
Options
--audit-failure <event types>
Specifies one or more filters, separated by commas, for auditing protocol event types that failed. The
following event types are valid:
● close
● create
● delete
Syntax
isi audit settings view
[--zone<string>]
Options
--zone <string>
Specifies the name of the access zone to view.
Examples
The following command displays the audit settings configured in the zoneA access zone:
Syntax
isi audit topics list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi audit topics modify <name>
[--max-cached-messages <integer>]
[--verbose]
Options
<name>
Specifies the name of the audit topic to modify. Valid values are protocol and config.
--max-cached-messages <integer>
Syntax
isi audit topics view <name>
Options
<name>
Specifies the name of the audit topic whose properties you want to view. Valid values are protocol
and config.
Syntax
isi auth access {<user> | --uid <integer> | --sid <string>} <path>
[--zone <string>]
[--share <string>]
[--numeric]
[--verbose]
Options
<user>
Specifies the user name.
--sid <string>
Specifies the user by SID.
--uid <integer>
Specifies the user by UID
<path>
Specifies the path of the file or directory under /ifs.
--zone <string>
Specifies the access zone.
--share <string>
Specifies an SMB share name for which to report share configurations and file/directory access
information.
{--numeric | -n}
Displays the numeric identifier of the user.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth ads create <name> <user>
[--machine-account <string>]
[--instance <string>]
[--password <string>]
[--organizational-unit <string>]
[--kerberos-nfs-spn {yes | no} ]
[--kerberos-hdfs-spn {yes | no} ]
[--dns-domain <dns-domain>]
[--groupnet <groupnet>]
[--allocate-gids {yes | no}]
[--allocate-uids {yes | no}]
[--assume-default-domain {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--domain-offline-alerts {yes | no}]
[--findable-groups <string>...]
[--findable-users <string>...]
[--home-directory-template <path>]
[--ignore-all-trusts {yes | no}]
[--ignored-trusted-domains <dns-domain>...]
[--include-trusted-domains <dns-domain>...]
[--ldap-sign-and-seal {yes | no}]
[--login-shell <path>]
[--lookup-domains <dns-domain>...]
[--lookup-groups {yes | no}]
[--lookup-normalize-groups {yes | no}]
[--lookup-normalize-users {yes | no}]
[--lookup-users {yes | no}]
[--machine-password-changes {yes | no}]
[--machine-password-lifespan <duration>]
[--node-dc-affinity <string>]
[--node-dc-affinity-timeout <timestamp>]
[--nss-enumeration {yes | no}]
[--restrict-findable {yes | no}]
[--rpc-call-timeout <integer>]
[--server-retry-limit <duration>]
[--sfu-support {none | rfc2307}]
[--store-sfu-mappings {true | false}]
[--unfindable-groups <string>...]
[--unfindable-users <string>...]
[--verbose]
Options
<name>
Specifies the fully-qualified Active Directory domain name, which can be resolved to an IPv4 or an IPv6
address. The domain name will also be used as the provider name.
<user>
Specifies the user name of an account that has permission to join machine accounts to the Active
Directory domain.
--machine-account <string>
The machine account name to be used by Active Directory. The default value is the cluster name.
--instance <string>
Sets the Active Directory name for this instance.
--password <string>
Syntax
isi auth ads delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Examples
To leave an Active Directory domain named some.domain.org and delete the authentication provider that is associated with it,
run the following command:
Syntax
isi auth ads list
[--limit <integer>]
[--format {table | json | csv | list}]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all the Active Directory providers that the cluster is joined to, run the following command:
Syntax
isi auth ads modify <provider-name>
[--reset-schannel {yes | no}]
[--domain-controller <string>]
[--authentication {yes | no}]
[--allocate-gids {yes | no}]
[--allocate-uids {yes | no}]
[--assume-default-domain {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--domain-offline-alerts {yes | no}]
[--findable-groups <string>...]
[--clear-findable-groups]
[--add-findable-groups <string>...]
[--remove-findable-groups <string>...]
[--findable-users <string>...]
[--clear-findable-users]
[--add-findable-users <string>...]
[--remove-findable-users <string>...]
[--home-directory-template <path>]
[--ignore-all-trusts {yes | no}]
[--ignored-trusted-domains <dns-domain>]
[--clear-ignored-trusted-domains]
[--add-ignored-trusted-domains <dns-domain>]
[--remove-ignored-trusted-domains <dns-domain>]
[--include-trusted-domains <dns-domain>]
[--clear-include-trusted-domains]
Options
<provider-name>
Specifies the domain name that the Active Directory provider is joined to, which is also the Active
Directory provider name.
--reset-schannel {yes | no}
Resets the secure channel to the primary domain.
--domain-controller <dns-domain>
Specifies a domain controller.
--authentication {yes | no}
Enables the use of the provider for authentication and identity.
--allocate-gids {yes | no}
Enables or disables GID allocation for unmapped Active Directory groups. Active Directory groups
without GIDs can be proactively assigned a GID by the ID mapper. If this option is disabled, GIDs are not
assigned proactively, but when a user's primary group does not include a GID, the system may allocate
one.
--allocate-uids {yes | no}
Enables or disables UID allocation for unmapped Active Directory users. Active Directory users without
UIDs can be proactively assigned a UID by the ID mapper. If this option is disabled, UIDs are not assigned
proactively, but when a user's identity does not include a UID, the system may allocate one.
--assume-default-domain {yes | no}
Enables lookup of unqualified user names in the primary domain.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>{Y|M|W|D|H|m|s}.
--create-home-directory {yes | no}
Specifies whether to create a home directory the first time a user logs in, if a home directory does not
already exist for the user.
--domain-offline-alerts {yes | no}
Syntax
isi auth ads spn check <provider-name>
[--check-duplicates]
Options
<provider-name>
Specifies the Active Directory provider name.
--check-duplicates
Syntax
isi auth ads spn create <provider-name> <spn>
[--user <string>]
[--password <string>]
Options
<provider-name>
Specifies the Active Directory provider name.
<spn>
Specifies the service principal name.
{--user | -U} <string>
Specifies an administrative user account name with permission to create SPNs in the Active Directory
domain.
{--password | -P} <string>
Specifies the administrative user account password.
Syntax
isi auth ads spn delete <provider-name> <spn>
[--user <string>]
[--password <string>]
Options
<provider-name>
Specifies the Active Directory provider name.
<spn>
Specifies the service principal name.
{--user | -U} <string>
Specifies an administrative user account name with permission modify SPNs in the Active Directory
domain.
{--password | -P} <string>
Specifies the administrative user account password.
Syntax
isi auth ads spn fix <provider-name>
[--spn <string>]
[--user <string>]
[--password <string>]
[--noremove
Options
<provider-name>
Specifies the Active Directory provider name.
--spn <string>
Specifies the service principal name.
--user <string>
Specifies an administrative user account name with permission to add SPNs for the Active Directory
domain.
--password <string>
Specifies the administrative user account password.
--noremove
Specifies not to remove any unexpected SPNs, but to add missing SPNs.
Syntax
isi auth ads spn list <provider-name>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<provider-name>
Specifies the Active Directory provider name.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Syntax
isi auth ads trusts controllers list <provider-name>
[--dc-site <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<provider-name> <string>
Specifies an Active Directory provider.
--dc-site
Specifies a domain controller site.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of trusted domains in an Active Directory provider named ad.isilon.com:
Syntax
isi auth ads trusts list <provider-name>
Options
<provider-name>
Specifies an Active Directory provider.
Syntax
isi auth ads view <provider-name>
[--verbose]
Options
<provider-name>
Specifies the name of the provider to view.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth duo modify
[--autopush <boolean>]
[--enabled <boolean>]
[--failmode <string>]
[--fallback-local-ip <boolean>]
[--groups <string>]
[--http-proxy <string>]
[--https-timeout <integer>]
[--prompts <integer>]
[--pushinfo <boolean>]
[--host <string>]
[--ikey <string>]
[--set-skey]
[{--verbose | -v}]
[{--help | -h}]
Syntax
isi auth error <error-code>
Options
<error-code>
Specifies the error code to convert.
4 = ERROR_TOO_MANY_OPEN_FILES
Syntax
isi auth file create <name>
[--password-file <path>]
[--group-file <path>]
[--authentication {yes | no}]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--findable-users <string>]
[--group-domain <string>]
[--home-directory-template <path>]
[--listable-groups <string>]
[--listable-users <string>]
[--login-shell <path>]
[--modifiable-groups <string>]
[--modifiable-users <string>]
[--netgroup-file <path>]
[--password-hash-type {NTHash | SHA256 | SHA512}
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--ntlm-support {all | v2only | none}]
[--provider-domain <string>]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--restrict-modifiable {yes | no}]
[--unfindable-groups <string>]
[--unfindable-users <string>]
[--unlistable-groups <string>]
[--unlistable-users <string>]
[--unmodifiable-groups <string>]
[--unmodifiable-users <string>]
[--user-domain <string>]
[--verbose]
Options
<name>
Sets the file provider name.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
Specifies the path to a group replacement file.
Syntax
isi auth file delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
Syntax
isi auth file list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth file modify <provider-name>
[--name <string>]
[--password-file <path>]
[--group-file <path>]
[--authentication {yes | no}]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
Options
<provider-name>
Specifies the name of the file provider to modify. This setting cannot be modified.
--name <string>
Specifies an new name for the authentication provider.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
Syntax
isi auth file view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth groups create <name>
[--gid <integer>]
[--add-user <name>]
[--add-group <name>]
[--add-gid <integer>]
[--add-uid <integer>]
[--add-sid <string>
[--add-wellknown <name>]
[--zone <string>]
[--provider <string>]
[--verbose]
[--force]
Options
<name>
Specifies the group name.
--gid <integer>
Overrides automatic allocation of the UNIX group identifier (GID) with the specified value. Setting this
option is not recommended.
--add-user <name>
Syntax
isi auth groups delete {<group> | --gid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--force]
[--verbose]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
<group>
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies the name of the access zone that contains the group.
--provider <string>
Specifies the group's authentication provider.
{--force | -f}
Syntax
isi auth groups flush
Options
There are no options for this command.
Examples
To flush all cached group information, run the following command:
Syntax
isi auth groups list
[--domain <string>]
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--domain <string>
Specifies the provider domain.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Syntax
isi auth groups members list {<group> | --gid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth groups modify {<group> | --gid <integer> | --sid <string>}
[--new-gid <integer>]
[--add-uid <integer>]
[--remove-uid <integer>]
[--add-user <name>]
[--add-group <name>]
[--add-gid <integer>
[--remove-user <name>]
[--remove-group <name>]
[--remove-gid <integer>]
[--add-sid <string>]
[--remove-sid <string>]
[--add-wellknown <name>]
[--remove-wellknown <name>]
[--zone <string>]
[--provider <string>]
[--verbose]
[--force]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by security identifier (SID).
--new-gid <integer>
Specifies a new GID for the group. Setting this option is not recommended.
--add-uid <integer>
Specifies the UID of a user to add to the group. Repeat this option to specify multiple list items.
--remove-uid <integer>
Specifies the UID of a user to remove from the group. Repeat this option to specify multiple list items.
--add-user <name>
Specifies the name of a user to add to the group. Repeat this option to specify multiple list items.
--remove-user <name>
Specifies the name of a user to remove from the group. Repeat this option to specify multiple list items.
--add-group <name>
Specifies the name of the group to add to this group. Repeat this option to specify multiple groups to
add.
--remove-group <name>
Specifies the name of the group to remove from this group. Repeat this option to specify multiple
groups to remove.
--add-gid <integer>
Specifies the GID of the group to add to this group. Repeat this option to specify multiple GIDs to add.
--remove-gid <integer>
Syntax
isi auth groups view {<group> | --gid <integer> | --sid <string>}
[--cached]
[--provider <string>]
[--show-groups]
[--zone <string>]
Options
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--cached
Displays cached information.
isi auth id
Displays your access token.
Syntax
isi auth id
Options
There are no options for this command.
Syntax
isi auth krb5 create <realm> {<user> | --keytab-file <string> }
[--password <string>]
[--spn <string>]
[--groupnet <groupnet>]
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
[--verbose]
Options
<realm>
Specifies the Kerberos realm name.
<user>
Specifies the name of a user with permission to create service principal names (SPNs) in the Kerberos
realm.
--keytab-file <string>
Specifies the keytab file to import.
--password <string>
Specifies the password used for joining a Kerberos realm.
--spn <string>
Specifies the SPNs to register. Specify --spn for each additional SPN that you want to register.
--groupnet <groupnet>
Syntax
isi auth krb5 delete <provider-name>
[--force]
Options
<provider-name>
Specifies the Kerberos provider name.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 domain create <domain> <realm>
Options
<domain>
Specifies the name of the Kerberos domain.
<realm>
Specifies the name of the Kerberos realm.
Syntax
isi auth krb5 domain delete <domain>
[--force]
Options
<domain>
Specifies the name of the Kerberos domain.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 domain list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos domain mappings to display.
--format {table | json | csv | list}
Specifies whether to display the Kerberos domain mappings in a tabular, JSON, CSV, or list formats.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 domain modify <domain>
[--realm <string>]
Syntax
isi auth krb5 domain view <domain>
Options
<domain>
Specifies the Kerberos domain name.
Syntax
isi auth krb5 list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos providers to display.
--format {table | json | csv | list}
Specifies to display the Kerberos providers in a tabular, JSON, CSV, or list format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 realm create <realm>
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
Options
<realm>
Specifies the name of the Kerberos realm.
--is-default-realm {yes | no}
Specifies whether the Kerberos realm is the default realm.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution Center (KDC). Specify
--kdc for each additional KDC you want to add to the realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative server (maun KDC).
--default-domain <string>
Specifies the default domain for the realm used for translating principal names.
Syntax
isi auth krb5 realm delete <realm>
[--force]
Options
<realm>
Specifies the Kerberos realm name.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 realm list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos realms to display.
--format {table | json | csv | list}
Specifies whether to display the Kerberos realms in a tabular, JSON, CSV, or list format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 realm modify <realm>
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
Options
<realm>
Specifies the Kerberos realm name.
--is-default-realm {yes | no}
Specifies whether the Kerberos realm is the default.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution Center (KDC). Specify
--kdc for each additional KDC you want to add to the realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative server (main KDC).
--default-domain <string>
Specifies the default domain for the Kerberos realm used for translating principal names.
Syntax
isi auth krb5 realm view <realm>
Options
<realm>
Specifies the Kerberos realm name.
Syntax
isi auth krb5 spn check <provider-name>
Options
<provider-name>
Specifies the Kerberos provider name.
Syntax
isi auth krb5 spn create <provider-name> <user> <spn>
[--password <string>]
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to create the service principal names (SPNs) in the Kerberos
realm.
<spn>
Specifies the SPN.
--password <string>
Specifies the password used during the modification of a Kerberos realm.
Syntax
isi auth krb5 spn delete <provider-name> <spn> {<kvno> | --all}
Options
<provider-name>
Specifies the Kerberos provider name.
<spn>
Specifies the service principal name (SPN).
<kvno>
Specifies the key version number.
--all
Deletes all the key versions.
Syntax
isi auth krb5 spn fix <provider-name> <user>
[--password <string>]
[--force]
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to join clients to the given Kerberos domain.
--password <string>
Specifies the password that was used when modifying the Kerberos realm.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 spn import <provider-name> <keytab-file>
Options
<provider-name>
Specifies the Kerberos provider name.
<keytab-file>
Specifies the keytab file to import.
Syntax
isi auth krb5 spn list <provider-name>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
<provider-name>
Specifies the Kerberos provider name.
{--limit | -l} <integer>
Specifies the number of SPNs and keys to display.
--format {table | json | csv | list}
Specifies to display the SPNs and keys in a tabular, JSON, CSV, or list format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 view <provider-name>
Options
<provider-name>
Specifies the Kerberos provider name.
Syntax
isi auth ldap create <name>
[--base-dn <string>]
[--server-uris <string>]
[--alternate-security-identities-attribute <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--bind-dn <string>]
[--bind-timeout <integer>]
[--certificate-authority-file <string>]
[--check-online-interval <duration>]
[--cn-attribute <string>]
[--create-home-directory {yes | no}]
[--crypt-password-attribute <string>]
[--email-attribute <string>]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--findable-users <string>]
[--gecos-attribute <string>]
[--gid-attribute <string>]
[--group-base-dn <string>]
[--group-domain <string>]
[--group-filter <string>]
[--group-members-attribute <string>]
[--group-search-scope <scope>]
[--home-directory-template <string>]
[--homedir-attribute <string>]
[--ignore-tls-errors {yes | no}]
[--listable-groups <string>]
[--listable-users <string>]
[--login-shell <string>]
[--member-lookup-method {default | rfc2307bis}
[--member-of-attribute <string>]
[--name-attribute <string>]
[--netgroup-base-dn <string>]
[--netgroup-filter <string>]
[--netgroup-members-attribute <string>]
[--netgroup-search-scope <scope>]
[--netgroup-triple-attribute <string>]
[--normalize-groups {yes | no}]
Options
<name>
Sets the LDAP provider name.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example,
CN=Users,DC=mycompany,DC=com.
--server-uris <string>
Specifies a list of LDAP server URIs to be used when accessing the server. Repeat this option to specify
multiple list items.
Specify the LDAP server URI in the format ldaps://<server>:<port> for secure LDAP or ldap://
<server>:<port> for non-secure LDAP.
The server can be specified as an IPv4 address, an IPv6 address, or a hostname.
If you do not specify a port number, the default port is used; 389 for secure LDAP or 636 for non-secure
LDAP.
NOTE: If you specify non-secure LDAP, the bind password is transmitted to the server in clear text.
--alternate-security-identities-attribute <string>
Specifies the name to be used when searching for alternate security identities. This name is used when
OneFS attempts to resolve a Kerberos principal to a user.
--authentication {yes | no}
Enables or disables the use of the provider for authentication as well as identity. The default value is
yes.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs
and can include special character sequences that are dynamically replaced with strings at home directory
creation time that represent specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information about home directory
variables, see Home directories.
--homedir-attribute <string>
Specifies the LDAP attribute that contains home directories. The default value is homeDirectory.
--ignore-tls-errors {yes | no}
Specifies whether to continue secure connection when certificate errors occur. The default setting is no.
If TLS is enabled ( --require-secure-connection is set to yes) and --ignore-tls-errors
is set to yes, the LDAP provider uses TLS regardless of errors. TLS may issue certificate verification
errors but the LDAP provider continues to use the certificate and TLS communication. TLS logs the
errors.
--listable-groups <string>
Specifies a list of groups that can be viewed in this provider if --restrict-listable is enabled.
Repeat this option to specify multiple list items. If populated, groups that are not included in this list
cannot be viewed.
--listable-users <string>
Specifies a list of users that can be viewed in this provider if --restrict-listable is enabled.
Repeat this option to specify multiple list items. If populated, users that are not included in this list
cannot be viewed.
--login-shell <path>
Specifies the pathname of the user's login shell for users who access the file system through SSH.
--member-lookup-method {default | rfc2307bis}
Sets the method by which group member lookups are performed. Use caution when changing this option
directly.
--member-of-attribute <string>
Sets the attribute to be used when searching LDAP for reverse memberships. This LDAP value should
be an attribute of the user type posixAccount that describes the groups in which the POSIX user is a
member.
--name-attribute <string>
Specifies the LDAP attribute that contains UIDs, which are used as login names. The default value is
uid.
--netgroup-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for netgroups.
--netgroup-filter <string>
Sets the LDAP filter for netgroup objects.
--netgroup-members-attribute <string>
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is nisNetgroupTriple.
--normalize-groups {yes | no}
Normalizes group names to lowercase before lookup.
--normalize-users {yes | no}
Normalizes user names to lowercase before lookup.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly used value is
ntpasswdhash.
--ntlm-support {all | v2only | none}
For users with NTLM-compatible credentials, specifies which NTLM versions to support.
--ocsp-server-uris <uri-list>
Specifies the location of revocation information for TLS certificates. This is an optional parameter to use
with --tls-revocation-check-level. Revocation information is contained in Online Certificate
Status Protocol (OCSP) responder URIs. If this option is not set, then the LDAP provider looks for the
OCSP responder URI within the certificates.
The <uri-list> is a comma-separated list of URIs.
--provider-domain <string>
Specifies the domain that the provider will use to qualify user and group names.
--require-secure-connection {yes | no}
Specifies whether to require a TLS connection. If set to yes, --certificate-authority-file is
required.
--restrict-findable {yes | no}
Specifies whether to check the provider for filtered lists of findable and unfindable users and groups.
--restrict-listable {yes | no}
Specifies whether to check the provider for filtered lists of listable and unlistable users and groups.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform LDAP searches.
The following values are valid:
--search-timeout <integer>
strict Requires valid and current revocation information for all certificates received from
the LDAP server in the TLS handshake. If any certificates do not comply, the
LDAP provider ends the TLS session.
allowNoSrc Accepts certificates from the LDAP server if no revocation retrieval information is
available for them. A warning is logged for such certificates. Otherwise, the LDAP
provider ends the TLS session if either of the following is true for any certificate:
● It is not possible to retrieve the revocation information
● The revocation state indicates that the certificate is not valid and current
allowNoData Accepts certificates from the LDAP server if it is not possible to retrieve the
revocation state. A warning is logged for such certificates. If revocation state
is successfully retrieved, then it must indicate that the certificate is valid and
current. Otherwise the LDAP provider ends the TLS session.
none No revocation checking is performed. This is the default setting.
default Applies the search scope that is defined in the default query settings.
base Searches only the entry at the base DN.
onelevel Searches all entries exactly one level below the base DN.
subtree Searches the base DN and all entries below it.
children Searches all entries below the base DN, excluding the base DN itself.
--groupnet <groupnet>
Specifies the groupnet referenced by the LDAP provider. The groupnet is a top-level networking
container that manages hostname resolution against DNS nameservers and contains subnets and IP
address pools. The groupnet specifies which networking properties the LDAP provider will use when
communicating with external servers.
--template {default | rfc-2307 | ad-idmu | ldapsam}
Specifies a template to be used to configure the LDAP provider. The templates provide pre-selected
attributes. The templates are: RFC 2307, Active Directory Identity Management for UNIX (ad-idmu), and
LDAP for Samba (ldapsam).
--bind-password <string>
Sets the password for the distinguished name that is used when binding to the LDAP server. To set the
password interactively, use the --set-bind-password option instead.
--set-bind-password
Interactively sets the password for the distinguished name that is used when binding to the LDAP
server. This option cannot be used with --bind-password.
[--force | -f
Specifies to ignore warnings when creating or modifying an LDAP provider.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi auth ldap delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
<provider-name>
Specifies the name of the provider to delete.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth ldap list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth ldap modify <provider-name>
[--name <string>]
[--base-dn <string>]
[--server-uris <string>]
[--add-server-uris <string>]
[--remove-server-uris <string>]
[--alternate-security-identities-attribute <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--bind-dn <string>]
[--bind-timeout <integer>]
[--certificate-authority-file <string>]
[--check-online-interval <duration>]
[--cn-attribute <string>]
[--create-home-directory {yes | no}]
[--crypt-password-attribute <string>]
[--email-attribute <string>]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
[--add-findable-users <string>]
[--remove-findable-users <string>]
[--gecos-attribute <string>]
[--gid-attribute <string>]
[--group-base-dn <string>]
[--group-domain <string>]
[--group-filter <string>]
[--group-members-attribute <string>]
[--group-search-scope <scope>]
[--homedir-attribute <string>]
[--home-directory-template <string>]
[--ignore-tls-errors {yes | no}]
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
[--clear-listable-users]
[--add-listable-users <string>]
[--remove-listable-users <string>]
[--login-shell <string>]
[--member-lookup-method {default | rfc2307bis}]
[--member-of-attribute <string>]
[--name-attribute <string>]
[--netgroup-base-dn <string>]
[--netgroup-filter <string>]
[--netgroup-members-attribute <string>]
[--netgroup-search-scope <scope>]
[--netgroup-triple-attribute <string>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--nt-password-attribute <string>]
[--ntlm-support {all | v2only | none}]
[--ocsp-server-uris <uri-list>]
[--provider-domain <string>]
[--require-secure-connection {yes | no}]
[--restrict-findable {yes | no}]
Options
<provider-name>
Specifies the name of the LDAP provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example,
CN=Users,DC=mycompany,DC=com.
--server-uris <string>
Specifies a list of LDAP server URIs to be used when accessing the server. Repeat this option to specify
multiple list items.
Specify the LDAP server URI in the format ldaps://<server>:<port> for secure LDAP or ldap://
<server>:<port> for non-secure LDAP.
The server can be specified as an IPv4 address, an IPv6 address, or a hostname.
If you do not specify a port number, the default port is used; 389 for secure LDAP or 636 for non-secure
LDAP.
NOTE: If you specify non-secure LDAP, the bind password is transmitted to the server in clear text.
--add-server-uris <string>.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs
and can include special character sequences that are dynamically replaced with strings at home directory
creation time that represent specific variables. For example, %U, %D, and %Z are replaced with the
user name, provider domain name, and zone name, respectively. For more information, see the Home
directories section.
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is nisNetgroupTriple.
--normalize-groups {yes | no}
Normalizes group names to lowercase before lookup.
--normalize-users {yes | no}
Normalizes user names to lowercase before lookup.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly used value is
ntpasswdhash.
--ntlm-support {all | v2only | none}
For users with NTLM-compatible credentials, specifies which NTLM versions to support.
The following values are valid:
all
v2only
none
--ocsp-server-uris <uri-list>
Specifies the location of revocation information for TLS certificates. This is an optional parameter to use
with --tls-revocation-check-level. Revocation information is contained in Online Certificate
Status Protocol (OCSP) responder URIs. If this option is not set, then the LDAP provider looks for the
OCSP responder URI within the certificates.
The <uri-list> is a comma-separated list of URIs.
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--require-secure-connection {yes | no}
Specifies whether to require a TLS connection.
--restrict-findable {yes | no}
Specifies whether to check this provider for filtered lists of findable and unfindable users and groups.
--restrict-listable {yes | no}
Specifies whether to check this provider for filtered lists of viewable and unviewable users and groups.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform LDAP searches.
The following values are valid:
--search-timeout <integer>
Specifies the number of seconds after which to stop retrying and fail a search. The default value is 100.
--shadow-user-filter <string>
Sets the LDAP filter for shadow user objects.
--shadow-expire-attribute <string>
Sets the attribute name that indicates the absolute date to expire the account.
--shadow-flag-attribute <string>
Sets the attribute name that indicates the section of the shadow map that is used to store the flag
value.
--shadow-inactive-attribute <string>
Sets the attribute name that indicates the number of days of inactivity that is allowed for the user.
--shadow-last-change-attribute <string>
Sets the attribute name that indicates the last change of the shadow information.
--shadow-max-attribute <string>
Sets the attribute name that indicates the maximum number of days a password can be valid.
--shadow-min-attribute <string>
Sets the attribute name that indicates the minimum number of days between shadow changes.
--shadow-warning-attribute <string>
Sets the attribute name that indicates the number of days before the password expires to warn the
user.
--shell-attribute <string>
Specifies the LDAP attribute that is used when searching for a user's UNIX login shell. The default value
is loginShell.
--ssh-public-key-attribute <string>
Sets the attribute name used that contains the user's SSH Public Key.
--tls-revocation-check-level {strict | allowNoSrc | allowNoData | none}
When TLS is enabled, enforces additional verifications of certificates received from the LDAP server in
the TLS handshake. Valid values are:
strict Requires valid and current revocation information for all certificates received from
the LDAP server in the TLS handshake. If any certificates do not comply, the
LDAP provider ends the TLS session.
allowNoSrc Accepts certificates from the LDAP server if no revocation retrieval information is
available for them. A warning is logged for such certificates. Otherwise, the LDAP
provider ends the TLS session if either of the following is true for any certificate:
● It is not possible to retrieve the revocation information
● The revocation state indicates that the certificate is not valid and current
allowNoData Accepts certificates from the LDAP server if it is not possible to retrieve the
revocation state. A warning is logged for such certificates. If revocation state
is successfully retrieved, then it must indicate that the certificate is valid and
current. Otherwise the LDAP provider ends the TLS session.
none No revocation checking is performed. This is the default setting.
Syntax
isi auth ldap view <provider-name>
Syntax
isi auth local list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth local modify <provider-name>
[--authentication {yes | no}]
[--create-home-directory {yes | no}]
[--home-directory-template <string>]
[--lockout-duration <duration>]
[--lockout-threshold <integer>]
[--lockout-window <duration>]
[--login-shell <string>]
[--machine-name <string>]
[--min-password-age <duration>]
[--max-password-age <duration>]
[--min-password-length <integer>]
[--password-prompt-time <duration>]
[--password-complexity{lowercase | uppercase |
numeric | symbol | repeat}]
Options
<provider-name>
Specifies the name of the local provider to modify.
--authentication {yes | no}
Uses the provider for authentication as well as identity. The default setting is yes.
--create-home-directory {yes | no}
Creates a home directory the first time a user logs in.
--home-directory-template <string>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs
and can include special character sequences that are dynamically replaced with strings at home directory
creation time that represent specific variables. For example, %U, %D, and %Z are replaced with the
user name, provider domain name, and zone name, respectively. For more information, see the Home
directories section.
--lockout-duration <duration>
Sets the length of time that an account will be inaccessible after multiple failed login attempts.
--lockout-threshold <integer>
Specifies the number of failed login attempts after which an account will be locked out.
--lockout-window <duration>
Sets the time in which the number of failed attempts specified by the --lockout-threshold option
must be made for an account to be locked out. Duration is specified in the format <integer>[{Y | M | W |
D | H | m | s}].
--login-shell <string>
Specifies the path to the UNIX login shell.
--machine-name <string>
Specifies the domain to use to qualify user and group names for the provider.
--min-password-age <duration>
Sets the minimum password age, in the format <integer>[{Y | M | W | D | H | m | s}].
--max-password-age <duration>
Sets the maximum password age, in the format <integer>[{Y | M | W | D | H | m | s}].
--min-password-length <integer>
Sets the minimum password length.
--password-prompt-time <duration>
Sets the remaining time until a user is prompted for a password change, in the format <integer>[{Y | M |
W | D | H | m | s}].
--password-complexity {lowercase | uppercase | numeric | symbol | repeat}
Specifies the conditions that a password is required to meet. A password must contain at least one
character from each specified option to be valid. For example, if lowercase and numeric are
specified, a password must contain at least on lowercase character and one digit to be valid. Symbols
are valid, excluding # and @. Specify --password-complexity for each additional complexity option.
Syntax
isi auth local view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth log-level modify <level>
[--verbose]
Options
<level>
Sets the log level for the current node. The log level determines how much information is logged.
The following values are valid and are organized from least to most information:
● always
● error
● warning
● info
● verbose
● debug
● trace
NOTE: Levels verbose, debug, and trace may cause performance issues. Levels debug and
trace log information that likely will be useful only when consulting EMC Isilon Technical Support.
{--verbose | -v}
Displays detailed information.
Syntax
isi auth log-level view
Options
There are no options for this command.
Syntax
isi auth mapping create {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string>}
[{--uid | --gid | --sid}]
[--on-disk]
[--2way]
[{--target <string> | --target-uid <integer>
| --target-gid <string> | --target-sid <string>}]
[--zone<string>]
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--uid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped UID.
--gid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped GID.
--sid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped SID.
--on-disk
Specifies that the source on-disk identity should be represented by the target identity.
--2way
Specifies a two-way, or reverse, mapping.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--zone<string>
Specifies the access zone that the ID mapping is applied to. If no access zone is specified, the mapping
is applied to the default System zone.
Syntax
isi auth mapping delete {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string> | --all}
[{--only-generated | --only-external | --2way | --target <string>
| --target-uid <integer> | --target-gid <integer> | --target-sid <string>}]
[--zone<string>]
[{--force | -f}]
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--all
Deletes all identity mappings in the specified access zone. Can be used in conjunction with --only-
generated and --only-external for additional filtering.
--only-generated
Only deletes identity mappings that were created automatically and that include a generated UID or GID
from the internal range of user and group IDs. Must be used in conjunction with --all.
--only-external
Only deletes identity mappings that were created automatically and that include a UID or GID from an
external authentication source. Must be used in conjunction with --all.
--2way
Specifies or deletes a two-way, or reverse, mapping.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--zone<string>
Deletes identity mappings in the specified access zone. If no access zone is specified, mappings are
deleted from the default System zone.
{--force | -f}
Does not prompt you for confirmation that you want to delete the mapping.
Syntax
isi auth mapping dump <file>
[--zone <string>]
[{--verbose | -v}]
Options
If no option is specified, the full kernel mapping database is displayed.
<file>
Dumps the database to the specified local file, where <file> is an absolute path within the /ifs file
system. If the file does not exist, it will be created. If the file does exist, it will be overwritten.
--zone <string>
Displays the database from the specified access zone. If no access zone is specified, displays all
mappings.
Examples
To view the kernel mapping database, run the following command:
Syntax
isi auth mapping flush {--all | --source <string>
| --source-uid <integer> | --source-gid <integer>
| --source-sid <string>}
[--zone<string>]
Options
You must specify either --all or one of the source options.
--all
Flushes all identity mappings on the cluster.
Syntax
isi auth mapping import <file>
[{--replace | -r}]
[{--verbose]| -v}]
Options
<file>
Specifies the full path to the file to import. File content must be in the same format as the output that
is displayed by running the isi auth mapping dump command. File must specify an absolute path
within the /ifs file system.
{--replace | -r}
Overwrites existing entries in the mapping database file with the file content.
{--verbose | -v}
Displays detailed information.
Syntax
isi auth mapping list
[--zone <string>]
Options
--zone <string>
Specifies an access zone.
Syntax
isi auth mapping modify {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string> | --target <string>
| --target-uid <integer> | --target-gid <string> | --target-sid <string>}
[--on-disk]
[--2way]
[--zone<string>]
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--on-disk
Specifies that the source on-disk identity should be represented by the target identity.
--2way
Specifies a two-way, or reverse, mapping.
--zone<string>
Specifies the access zone that the ID mapping is applied to. If no access zone is specified, the mapping
is applied to the default System zone.
Syntax
isi auth mapping token {<user> | --uid <integer>
| --kerberos-principal <string>}
[--zone <string>]
Options
This command requires <user> or --uid <integer> or --kerberos-principal <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--kerberos-principal <string>
Specifies the Kerberos principal by name. For example, [email protected].
--zone <string>
Specifies the name of the access zone that contains the mapping.
--primary-gid <integer>
Specifies the primary GID.
--gid <integer>
Specifies a token GID. Repeat this option to specify multiple GIDs.
Syntax
isi auth mapping view {<id>| --uid <integer>
| --gid <integer> | --sid <string>}
[--nocreate]
[--zone <string>]
Options
<id>
Specifies the ID of the source identity type in the format <type>:<value>—for example, UID:2002.
--uid <integer>
Specifies the mapping source by UID.
--gid <integer>
Specifies the mapping source by GID.
--sid <string>
Specifies the mapping source by SID.
--nocreate
Specifies that nonexistent mappings should not be created.
--zone
Specifies the access zone of the source identity. If no access zone is specified, OneFS displays mappings
from the default System zone.
Type Mapping
---------- ----------------------------------------------
Name test1
On-disk UID:2002
Unix UID 2002
Unix GID None
SMB S-1-5-21-1776575851-2890035977-2418728619-1004
NFSv4 test1
Syntax
isi auth netgroups view <netgroup>
[--zone <string>]
[--provider <string>]
[--recursive {true | false}]
[--ignore-errors {true | false}]
Options
<netgroup>
Specifies the netgroup name.
--zone <string>
Specifies the access zone.
--provider <string>
Specifies the authentication provider.
--recursive {true | false}
Specifies wether to recursively resolve nested netgroups. The default value is true.
--ignore {true | false}
Specifies whether to ignore errors and unresolvable netgroups. The default value is false.
Syntax
isi auth nis create <name>
[--nis-domain <string>]
[--servers <string>]
[--authentication {yes | no}]
Options
<name>
Sets the name of the NIS provider.
--nis-domain <string>
Specifies the NIS domain name.
--servers <string>
Specifies a list of NIS servers to be used by this provider. Specify the NIS server as an IPv4 address or
hostname. Repeat this option to specify multiple list items.
--authentication {yes | no}
Enables or disables the use of the provider for authentication as well as identity. The default value is
yes.
--balance-servers {yes | no}
Makes the provider connect to a random server on each request.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M | W | D | H | m | s}].
--create-home-directory {yes | no}
Specifies whether to create a home directory the first time a user logs in, if a home directory does not
already exist for the user.
--enabled {yes | no}
Enables or disables the provider.
--enumerate-groups {yes | no}
Specifies whether to allow the provider to enumerate groups.
--enumerate-users {yes | no}
Specifies whether to allow the provider to enumerate users.
--findable-groups <string>
Syntax
isi auth nis delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Returns a success or fail message after running the command.
Syntax
isi auth nis list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi auth nis modify <provider-name>
[--name <string>]
[--nis-domain <string>]
[--servers <string>]
[--add-servers <string>]
[--remove-servers <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
[--add-findable-users <string>]
[--remove-findable-users <string>]
[--group-domain <string>]
[--home-directory-template <string>]
[--hostname-lookup {yes | no}]
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
[--clear-listable-users]
[--add-listable-users <string>]
[--remove-listable-users <string>]
[--login-shell <string>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--provider-domain <string>]
[--ntlm-support {all | v2only | none}]
[--request-timeout <integer>]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--retry-time <integer>]
[--unfindable-groups <string>]
Options
<provider-name>
Specifies the name of the NIS provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--nis-domain <string>
Specifies the NIS domain name.
--servers <string>
Specifies a list of NIS server to be used by this provider. Repeat this option to specify multiple list
items. Specify the NIS server as an IPv4 address or hostname. This option overwrites the entries in the
NIS servers list; to add or remove servers without affecting current entries, use --add-servers or
--remove-servers.
--add-servers <string>
Adds an entry to the list of NIS servers. Repeat this option to specify multiple items.
--remove-servers <string>
Removes an entry from the list of NIS servers. Repeat this option to specify multiple items.
--authentication {yes | no}
Enables or disables the use of this provider for authentication as well as identity. The default value is
yes.
--balance-servers {yes | no}
Makes this provider connect to a random server on each request.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M | W | D | H | m | s}].
--create-home-directory {yes | no}
Specifies whether to create a home directory the first time a user logs in, if a home directory does not
already exist for the user.
--enabled {yes | no}
Enables or disables this provider.
--enumerate-groups {yes | no}
Specifies whether to allow this provider to enumerate groups.
--enumerate-users {yes | no}
Specifies whether to allow this provider to enumerate users.
--findable-groups <string>
Specifies a group that can be found in this provider if --restrict-findable is enabled. Repeat
this option to specify multiple list items. If populated, groups that are not included in this list cannot be
Syntax
isi auth nis view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth privileges
[--zone <string>
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone for which to display system privileges.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
NOTE: When using the --verbose option, the output Permission: w grants write, execute,
and read access privileges to a role or user. The role or user can view, create, modify, and delete a
configuration subsystem such as statistics, snapshots, or quotas. The output Permission: r
The --verbose option displays the permissions granted to the role or user:
● Permission: w grants write, execute, and read access privileges to a role or user. The role or user can view, create,
modify, and delete a configuration subsystem such as statistics, snapshots, or quotas.
● Permission: r grants read access privilege to a role or user. The role or user can view a configuration subsystem but
cannot modify configuration settings. Read permission allows performing the API operation GET.
● Permission: x grants execute and read access privileges to a role or user. The role or user can initiate API operations for
specific URIs on a configuration subsystem without granting write privileges to that role or user. API operations include PUT,
POST, and DELETE.
● Permission: - does not grant the privilege to the role or user. The role or user has no access to the privilege.
See the PowerScale OneFS CLI Administration Guide for OneFS 9.3.0.0 and later releases for details.
Syntax
isi auth refresh
Syntax
isi auth roles create <name>
[--description <string>]
[--zone <string>]
[--verbose]
Options
<name>
Specifies the name of the role.
--description <string>
Specifies a description of the role.
--zone <string>
Specifies the name of the access zone in which to create the role.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi auth roles delete <role>
[--zone <string>
[--force]
[--verbose]
Options
<role>
Specifies the name of the role to delete.
--zone <string>
Specifies the name of the access zone from which to delete the role.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Syntax
isi auth roles list
[--zone <string>]
[--limit <integer>]
[--sort {id | name | description}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone for which to list roles.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort {id | name | description}
Specfies the field on which to sort data.
{--descending | -d}
Specifies to sort data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth roles members list <role>
[--zone <string>]
[--limit <integer>]
[--sort {id | name | type}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[--no-header]
Options
<role>
Specifies a role by name.
--zone <string>
Specifies the access zone for which to display members of a role.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort {id | name | type}
Sorts data by the specified field.
{--descending | -d}
Sorts data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view the members of the SystemAdmin role, run the following command:
In the following sample output, the SystemAdmin role currently contains one member, a user named admin:
Type Name
----------
user admin
----------
Total: 1
Syntax
isi auth roles modify <role>
[--zone <string>]
[--name <string>]
[--description <string>]
[--add-group <string>]
[--remove-group <string>]
[--add-gid <integer>]
[--remove-gid <integer>]
Options
<role>
Specifies the name of the role to modify.
--zone <string>
Specifies the name of the zone in which to modify the role.
--name <string>
Specifies a new name for the role. Applies to custom roles only.
--description <string>
Specifies a description of the role.
--add-group <string>
Adds a group with the specified name to the role. Repeat this option for each additional item.
--remove-group <string>
Removes a group with the specified name from the role. Repeat this option for each additional item.
--add-gid <integer>
Adds a group with the specified GID to the role. Repeat this option for each additional item.
--remove-gid <integer>
Removes a group with the specified GID from the role. Repeat this option for each additional item.
--add-uid <integer>
Adds a user with the specified UID to the role. Repeat this option for each additional item.
--remove-uid <integer>
Removes a user with the specified UID from the role. Repeat this option for each additional item.
--add-user <string>
Adds a user with the specified name to the role. Repeat this option for each additional item.
--remove-user <string>
Removes a user with the specified name from the role. Repeat this option for each additional item.
--add-sid <string>
Adds a user or group with the specified SID to the role. Repeat this option for each additional item.
--remove-sid <string>
Removes a user or group with the specified SID from the role. Repeat this option for each additional
item.
--add-wellknown <string>
Adds a well-known SID with the specified name—for example, Everyone—to the role. Repeat this option
for each additional item.
--remove-wellknown <string>
Removes a well-known SID with the specified name from the role. Repeat this option for each additional
item.
Syntax
isi auth roles privileges list <role>
[--zone <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<role>
Specifies a role by name.
--zone <string>
Specifies the role's access zone.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Examples
To list the privileges that are associated with the integrated role SecurityAdmin, run the following command:
ID
----------------------
ISI_PRIV_LOGIN_CONSOLE
ISI_PRIV_LOGIN_PAPI
ISI_PRIV_LOGIN_SSH
ISI_PRIV_AUTH
ISI_PRIV_ROLE
----------------------
Total: 5
Syntax
isi auth roles view <role>
[--zone <string>
Options
<role>
Specifies the name of the role to view.
--zone <string>
Specifies the role's access zone.
Syntax
isi auth settings acls modify
[--create-over-smb {allow | disallow}]
[--chmod {remove | replace | replace_users_and_groups | merge |
merge_with_ugo_priority | deny | ignore}]
[--chmod-inheritable {yes | no}]
[--chown {owner_group_and_acl | owner_group_only | ignore}]
[--access {unix | windows}]
[--rwx {retain | full_control}]
[--group-owner-inheritance {native | parent | creator}]
[--chmod-007 {default | remove}]
[--calcmode-owner {owner_aces | owner_only}]
[--calcmode-group {group_aces | group_only}]
[--synthetic-denies {none | remove}]
Options
--create-over-smb {allow | disallow}
Specifies whether to allow or deny creation of ACLs over SMB.
NOTE: Inheritable ACLs on the system take precedence over this setting. If inheritable ACLs are set
on a folder, any new files and folders created in that folder will inherit the folder's ACL. Disabling this
setting does not remove ACLs currently set on files. If you want to clear an existing ACL, run the
chmod -b <mode> <file> command to remove the ACL and set the correct permissions.
remove For chmod operations, removes any existing ACL and instead sets the chmod
permissions. Select this option only if you do not need permissions to be set from
Windows.
replace Removes the existing ACL and creates an ACL equivalent to the UNIX
permissions. Select this option only if you want to remove Windows permissions
but do not want files to have synthetic ACLs.
replace_users_an Removes the existing ACL and creates an ACL equivalent to the UNIX permissions
d_groups for all users/groups referenced in old ACL. Select this option only if you want to
remove Windows permissions but do not want files to have synthetic ACLs.
merge Merges permissions that are applied by chmod with existing ACLs. An ACE for
each identity (owner, group, and everyone) is either modified or created, but all
other ACEs are unmodified. Inheritable ACEs are also left unmodified to enable
Windows users to continue to inherit appropriate permissions. UNIX users can set
specific permissions for each of those three standard identities, however.
merge_with_ugo Merges the new permissions with the existing ACLs, marking any corresponding
_priority inherited and inheritable ACEs on the directory as inherit-only.
deny Prevents users from making NFS and local chmod operations. Enable this setting
if you do not want to allow permission sets over NFS.
ignore Ignores the chmod operation if file has an existing ACL, which prevents an NFS
client from making changes to the ACL. Select this option if you defined an
inheritable ACL on a directory and want to use that ACL for permissions.
CAUTION: If you attempt to run the chmod command on the same permissions that are
currently set on a file with an ACL, you may cause the operation to silently fail. The
operation appears to be successful, but if you were to examine the permissions on the
cluster, you would notice that the chmod command had no effect. As an alternative,
you can run the chmod command away from the current permissions and then perform
a second chmod command to revert to the original permissions. For example, if your file
shows 755 UNIX permissions and you want to confirm this number, you could run chmod
700 file; chmod 755 file.
ownder_group_a Modifies only the owner or group, which enables the chown or chgrp operation
nd_acl to perform as it does in UNIX. Enabling this setting modifies any ACEs in the ACL
associated with the old and new owner or group.
owner_group_onl Modifies the owner or group and ACL permissions, which enables the NFS chown
y or chgrp operation to function as it does in Windows. When a file owner is
changed over Windows, no permissions in the ACL are changed.
ignore Ignores the chown and chgrp operations if file has an existing ACL, which
prevents an NFS client from making changes to the owner or group.
NOTE: Over NFS, the chown or chgrp operation changes the permissions and user or group that
has ownership. For example, a file owned by user Joe with rwx------ (700) permissions indicates rwx
permissions for the owner, but no permissions for anyone else. If you run the chown command to
change ownership of the file to user Bob, the owner permissions are still rwx but they now represent
the permissions for Bob, rather than for Joe, who lost all of his permissions. This setting does not
affect UNIX chown or chgrp operations performed on files with UNIX permissions, and it does not
affect Windows chown or chgrp operations, which do not change any permissions.
unix Allows only the file owner to change the mode or owner of the file, which enable
chmod and chown access checks to operate with UNIX-like behavior.
windows Allow the file owner and users with WRITE_DAC and WRITE_OWNER permissions
to change the mode or owner of the file, which enables chmod and chown access
checks to operate with Windows-like behavior.
retain Retains rwx permissions and generates an ACE that provides only read, write, and
execute permissions.
full_control Treats rwx permissions as full control and generates an ACE that provides the
maximum Windows permissions for a user or a group by adding the change
permissions right, the take ownership right, and the delete right.
owner_aces Approximates owner mode bits using all possible group ACEs. This causes the
owner permissions to appear more permissive than the actual permissions on the
file.
owner_only Approximates owner mode bits using only the ACE with the owner ID. This
causes the owner permissions to appear more accurate, in that you see only the
permissions for a particular owner and not the more permissive set. This may
cause access-denied problems for UNIX clients, however.
group_aces Approximates group mode bits using all possible group ACEs. This causes the
group permissions to appear more permissive than the actual permissions on the
file.
group_only Approximates group mode bits using only the ACE with the owner ID. This
causes the group permissions to appear more accurate, in that you see only the
permissions for a particular group and not the more permissive set. This may
cause access-denied problems for UNIX clients, however.
none Does not modify synthetic ACLs and mode bit approximations, which prevents
modifications to synthetic ACL generation and allows “deny” ACEs to be
generated when necessary.
CAUTION: This option can lead to permissions being reordered,
permanently denying access if a Windows user or an application
performs an ACL get, an ACL modification, and an ACL set to and from
Windows.
remove Removes deny ACEs when generating synthetic ACLs. This setting can cause
ACLs to be more permissive than the equivalent mode bits.
only_owner Allows only owners to change utimes to client-specific times, which complies with
the POSIX standard.
owner_and_write Allows owners as well as users with write access to modify utimes to client-
specific times, which is less restrictive.
deny_smb Denies permission to modify files with DOS read-only attribute over SMB only.
deny_smb_nfs Denies permission to modify files with DOS read-only attribute through both NFS
and SMB.
approx Specifies to use ACL to approximate mode bits. Displays the approximation of the
NFS mode bits that are based on ACL permissions.
777 Specifies to always display 777 if an ACL exists. If the approximated NFS
permissions are less permissive than those in the ACL, you may want to use this
setting so the NFS client does not stop at the access check before performing its
operation. Use this setting when a third-party application may be blocked if the
ACL does not provide the proper access.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth settings acls view
Options
There are no options for this command.
Syntax
isi auth settings global modify
[--send-ntlmv2 {yes | no}]
[--revert-send-ntlmv2]
[--space-replacement <character>]
[--revert-space-replacement]
[--workgroup <string>]
[--revert-workgroup]
[--provider-hostname-lookup {dns-first | nis-first | disabled}]
[--user-object-cache-size <size>]
Options
--send-ntlmv2 {yes | no}
Specifies whether to send only NTLMv2 responses to an SMB client. The default value is no. Valid
values are yes, no. The default value is no.
--revert-send-ntlmv2
Reverts the --send-ntlmv2 setting to the system default value.
--space-replacement <character>
For clients that have difficulty parsing spaces in user and group names, specifies a substitute character.
Be careful to choose a character that is not in use.
--revert-space-replacement
Reverts the --space-replacement setting to the system default value.
--workgroup <string>
Specifies the NetBIOS workgroup. The default value is WORKGROUP.
--revert-workgroup
Reverts the --workgroup setting to the system default value.
--provider-hostname-lookup {dns-first | nis-first | disabled}
Allows hostname lookup through authentication providers. Applies to NIS only. The default value is
disabled.
--user-object-cache-size <size>
Specifies the maximum size (in bytes) of the security object cache in the authentication service.
--revert-user-object-cache-size
Reverts the --user-object-cache-size setting to the system default value.
--on-disk-identity <string>
Controls the preferred identity to store on disk. If OneFS is unable to convert an identity to the
preferred format, it is stored as is. This setting does not affect identities that are already stored on disk.
The accepted values are listed below.
native Allows OneFS to determine the identity to store on disk. This is the recommended
setting.
unix Always stores incoming UNIX identifiers (UIDs and GIDs) on disk.
sid Stores incoming Windows security identifiers (SIDs) on disk unless the SID was
generated from a UNIX identifier. If the SID was generated from a UNIX identifier,
OneFS converts it back to the UNIX identifier and stores it on disk.
NOTE: To prevent permission errors after changing the on-disk identity, run the Repair Permissions
job with the convert mode specified.
Syntax
isi auth settings global view
Options
There are no options for this command.
Send NTLMv2: No
Space Replacement:
Workgroup: WORKGROUP
Provider Hostname Lookup: disabled
Alloc Retries: 5
User Object Cache Size: 47.68M
On Disk Identity: native
RPC Block Time: Now
RPC Max Requests: 64
RPC Timeout: 30s
Default LDAP TLS Revocation Check Level: none
System GID Threshold: 80
System UID Threshold: 80
Min Mapped Rid: 2147483648
Group UID: 4294967292
Null GID: 4294967293
Null UID: 4294967293
Unknown GID: 4294967294
Unknown UID: 4294967294
Failed Login Delay Time: Now
Concurrent Session Limit: 0
Syntax
isi auth settings krb5 modify
[--always-send-preauth <boolean>]
[--revert-always-send-preauth]
[--default-realm <string>]
[--default-tgs-enctypes <string> | --clear-default-tgs-enctypes | --add-default-tgs-
enctypes <string> | --remove-default-tgs-enctypes <string>]]
[--revert-default-tgs-enctypes]
[--default-tkt-enctypes <string> | --clear-default-tkt-enctypes | --add-default-tkt-
enctypes <string> | --remove-default-tkt-enctypes <string>]]
[--revert-default-tkt-enctypes]
[--dns-lookup-kdc <boolean> | --revert-dns-lookup-kdc]
[--dns-lookup-realm <boolean> | --revert-dns-lookup-realm]
[--permitted-enctypes <string> | --clear-permitted-enctypes | --add-permitted-enctypes
<string> | --remove-permitted-enctypes <string> ]]
[--revert-permitted-enctypes]
[--preferred-enctypes <string> | --clear-preferred-enctypes | --add-preferred-enctypes
<string> | --remove-preferred-enctypes <string>]]
[--revert-preferred-enctypes]
[--udp-preference-limit <integer>]
[--revert-udp-preference-limit]
[--verbose | -v]
Options
--always-send-preauth <boolean>
Specifies whether to send preauthorization.
Syntax
isi auth settings krb5 view
Syntax
isi auth settings mapping modify
[--gid-range-enabled {yes | no}]
[--gid-range-min <integer>]
[--gid-range-max <integer>]
[--gid-range-next <integer>]
[--uid-range-enabled {yes | no}]
[--uid-range-min <integer>]
[--uid-range-max <integer>]
[--uid-range-next <integer>]
[--zone <string>]
[--verbose]
Options
If no option is specified, the kernel mapping database is displayed.
Syntax
isi auth settings mapping view
[--zone <string>]
Options
--zone <string>
Displays mapping settings from the specified access zone. If no access zone is specified, displays
mappings from the default System zone.
Syntax
isi auth sso idps create <id>
[--zone <string>]
[--metadata-location <string> | --metadata <string>]
[--entity-id <string>]
[--signing-certificate-path <string> | --signing-certificate <string> | --login-url
<string> | --login-binding <string> | --logout-url <string> | --logout-binding <string>
| --logout-response-url <string>]
[--verbose | v]
Options
<id>
Unique identifier of a SAML service resource.
--zone <string>
Access zone for the SAML service provider IdP settings.
--metadata-location <string>
Metadat location of the SAML provider.
--metadata <string>
Metadata of the SAML provider.
--entity-id <string>
Unique identifier of the IdP.
--signing-certificate-path <string>
Path to the PEM-encoded certificate to verify messages from the IdP.
--signing-certificate <string>
PEM-encoded certificate used to verify messages from the IdP.
--login-url <string>
Login endpoint of the IdP. URL of the location of where to send messages.
--login-binding <string>
Login endpoint of the IdP. SAML binding to send messages to the IdP.
--logout-url <string>
Logout endpoint of the IdP. URL to send LogoutRequest to the IdP.
--logout-binding <string>
Logout endpoint of the IdP. SAML binding to send messages to the IdP.
--logout-response-url <string>
Logout endpoint of the IdP. URL to send LogoutResponse messages to IdP.
--verbose | -v
Displays more detailed information.
Syntax
isi auth sso idps delete <id>
[--zone <string>]
[--force | -f]
[--verbose | -v]
Options
<id>
Specifies a unique identifier of a SAML service resource.
--zone <string>
Specifies the name of the access zone for the SAML IdP settings.
--force | -f
Does not ask for confirmation.
--verbose | -v
Displays more detailed information.
Syntax
isi auth sso idps list
[--zone <string>]
[--limit | -l <integer>]
[--format {table | csv | list | json}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
--zone <string>
Specifies the access zone for the SAML service provider IdP settings.
--limit | -l <integer>.
Displays no more than the specified number of items.
--format {table | csv | list | json}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
--no-header | -a
Displays table and CSV output without headers.
--no-footer | -z
Displays table output without footers.
Syntax
isi auth sso idps modify {<id>
[--zone <string>]
[--metadata-location <string> | --metadata <string>]
[--entity-id <string>]
[--signing-certificate-path <string> | --signing-certificate <string> | --login-url
<string> | --login-binding <string> | --logout-url <string> | --logout-binding <string>
| --logout-response-url <string>]
[--verbose | v]
Options
<id>
Unique identifier of a SAML service resource.
--zone <string>
Access zone for the SAML service provider IdP settings.
--metadata-location <string>
Metadata location of the SAML provider.
--metadata <string>
Metadata of the SAML provider.
--entity-id <string>
Unique identifier of the IdP.
--signing-certificate-path <string>
Path to the PEM-encoded certificate to verify messages from the IdP.
--signing-certificate <string>
PEM-encoded certificate used to verify messages from the IdP.
--login-url <string>
Login endpoint of the IdP. URL of the location of where to send messages.
--login-binding <string>
Login endpoint of the IdP. SAML binding to send messages to the IdP.
--logout-url <string>
Logout endpoint of the IdP. URL to send LogoutRequest to the IdP.
--logout-binding <string>
Logout endpoint of the IdP. SAML binding to send messages to the IdP.
--logout-response-url <string>
Logout endpoint of the IdP. URL to send LogoutResponse messages to IdP.
--verbose | -v
Displays more detailed information.
Syntax
isi auth users view <id>
[--zone <string>]
Options
<id>
Unique identifier of a SAML service resource.
--zone <string>
Specifies the name of the access zone for the SAML IdP settings.
Syntax
isi auth sso settings modify
[--sso-enabled <boolean>]
[--zone <string>]
[--verbose | -v]
Options
--sso-enabled <boolean>
Enable or disable SSO.
--zone <string>
Specifies the name of the access zone for the SSO settings.
--verbose | -v
Displays more detailed information.
Syntax
isi auth sso settings view
[--zone <string>]
Syntax
isi auth sso sp {<action> | <subcommand>}
[--timeout <integer>]
Options
--timeout <integer>
Specifies the number of seconds for a command to timeout.
Syntax
isi auth sso sp modify
[--zone <string>]
[--entity-id <string>]
[--user-id <string>]
[--first-name <string>]
[--last-name <string]
[--email <string>]
[--hostname <string>]
[--signing-enabled <boolean>]
[--name-id-format (emailAddress | kerberos |
WindowsDomainQualifiedName | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos | urn:oasis:names:tc:SAML:1.1:nameid-
format:WindowsDomainQualifiedName)]
[--verbose | -v]
Options
--zone <string>
Access zone for the SAML Service Provider settings.
--entity-id <string>
Entity ID of the cluster.
--user-id <string>
User ID for the administrator for the SAML Service Provider.
--first-name <string>
First name for the administrator for the SAML Service Provider.
Syntax
isi auth sso sp signing-jey {<action> | <subcommand>}
[--timeout <integer>]
Options
--timeout <integer>
Indicates the number of seconds before the command times out.
Syntax
isi auth sso sp signing-key dump <file>
[--zone <string>]
Options
<file>
Indicates the file where the signing certificate will be written. By default, or when providing a dash ("-"),
the signing certificate will be written to stdout.
--zone <string>
Indicates the access zone.
Syntax
isi auth sso sp signing-key rekey
[--zone <string>]
[--force | -f]
Options
--zone <string>
Indicates the access zone.
--force | -f
Does not ask for confirmation.
Syntax
isi auth sso sp signing-key status
[--zone <string>]
[--verbose | -v]
Options
--zone <string>
Indicates the access zone.
--verbose | -v
Displays more detailed information.
Syntax
isi auth sso sp signing-key settings <action>
[--zone <string>]
Options
--zone <string>
Syntax
isi auth sso sp signing-key settings modify
[--expiration <duration>]
[--key-type (RSA)]
[--key-bits (3072 | 4096 | 6144 | 8192)]
[--common-name <string>]
[--clear-common-name]
[--country <string>]
[--clear-country]
[--state-or-province <string>]
[--clear-state-or-province]
[--locality <string>]
[--clear-locality]
[--organizations <string>]
[--clear-organizations]
[--add-organizations <string>]
[--remove-organizations <string>]
[--organization-units <string>]
[--clear-organization-units]
[--add-organization-units <string>]
[--remove-organization-units <string>]
[--zone <string>]
[--verbose | -v]
Options
--expiration <duration>
Indicates the duration of time for which the certificate will be valid.
--key-type (RSA)
Indicates the type of key for signing.
--key-bits (3072 | 4096 | 6144 | 8192)
Indicates the number of bits used in the signing key.
--common-name <string>
Indicates the common name of the subject of the certificate.
--clear-common-name
Clears the value for the common name.
--country <string>
Indicates the country of the subject of the certificate.
--clear-country
Clears the country of the subject of the certificate.
--state-or-province <string>
Indicates the state or province of the subject of the certificate.
--clear-state-or-province
Clears the state or provance of the subject of the certificate.
--locality <string>
Indicates the locality of the subject of the certificate.
--clear-locality
Syntax
isi auth sso sp signing-key settings view
[--zone <string>]
Options
--zone <string>
Indicates the access zone.
Syntax
isi auth sso sp view
[--zone <string>]
Options
--zone <string>
Specifies the name of the access zone for the SAML service provider settings.
Syntax
isi auth status
[--zone <string>]
[--groupnet <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies an access zone by name.
--groupnet <string>
Specifies a groupnet by name.
--limit [ -l | <integer>]
Specifies the number of providers to display.
--format {table | json | csv | list}
Displays providers in table (default), JavaScript Object Notation (JSON), comma-separated value
(CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth users change-password {<user> | --uid <integer> | --sid <string>}
[--zone <string>]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--zone <string>
Specifies the name of the access zone that contains the user.
Syntax
isi auth users create <name>
[--enabled {yes | no}]
[--expiry <timestamp>]
[--email <string>]
[--gecos <string>]
[--home-directory <path>]
[--password <string>]
[--password-expires {yes | no}]
[{--primary-group <name> | --primary-group-gid <integer>
| --primary-group-sid <string>}]
[--prompt-password-change {yes | no}]
[--shell <path>]
[--uid <integer>]
[--disable-when-inactive <boolean>
[--zone <string>]
[--provider <string>]
[--set-password]
[--verbose]
[--force]
Options
<name>
Specifies the user name.
--enabled {yes | no}
Full Name:
Office Location:
Office Phone:
Home Phone:
Other information:
Values must be entered as a comma-separated list, and values that contain spaces must be enclosed
in quotation marks. For example, the --gecos="Jane Doe",Seattle,555-5555,,"Temporary
worker" option with these values results in the following entries:
--home-directory <path>
Specifies the path to the user's home directory.
--password <string>
Sets the user's password to the specified value. This option cannot be used with the --set-password
option.
--password-expires {yes | no}
Specifies whether to allow the password to expire.
--primary-group <name>
Specifies the user's primary group by name.
--primary-group-gid <integer>
Specifies the user's primary group by GID.
--primary-group-sid <string>
Specifies the user's primary group by SID.
--prompt-password-change {yes | no}
Prompts the user to change the password during the next login.
--shell <path>
Specifies the path to the UNIX login shell.
--uid <integer>
Overrides automatic allocation of the UNIX user identifier (UID) with the specified value. Setting this
option is not recommended.
--disable-when-inactive <boolean>
The user account will be disabled when it has been inactive beyond the value specified.
--zone <string>
Specifies the access zone in which to create the user.
--provider <string>
Specifies a local authentication provider in the specified access zone.
--set-password
Sets the password interactively. This option cannot be used with the --password option.
{--verbose | -v}
Syntax
isi auth users delete {<user> | --uid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--force]
[--verbose]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--zone <string>
Specifies the name of the access zone that contains the user.
--provider <string>
Specifies the name of the authentication provider that contains the user.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi auth users flush
Options
There are no options for this command.
NOTE: The --domain option must be specified to list Active Directory users.
Syntax
isi auth users list
[--domain <string>]
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--domain <string>
Displays only the users in the specified provider domain.
--zone <string>
Specifies the access zone whose users you want to list. The default access zone is System.
--provider <string>
Displays only the users in the specified authentication provider. The syntax for specifying providers is
<provider-type>:<provider-name>, being certain to use the colon separator; for example, isi auth
users list --provider="lsa-ldap-provider:Unix LDAP".
{--limit | -l} <integer>.
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth users modify {<user> | --uid <integer> | --sid <string>}
[--enabled {yes | no}]
[--expiry <timestamp>]
[--unlock]
[--email <string>]
[--gecos <string>]
[--home-directory <path>]
[--password-expires {yes | no}]
[{--primary-group <string> | --primary-group-gid <integer>
| --primary-group-sid <string>}]
[--prompt-password-change {yes | no}]
[--shell <path>]
[--new-uid <integer>]
[--disable-when-inactive <boolean>
[--zone <string>]
[--add-group <name>]
[--add-gid <id>]
[--remove-group <name>]
[--remove-gid <id>]
[--provider <string>]
[--verbose]
[--force]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--enabled {yes | no}
Enables or disables the user.
{--expiry | -x} <timestamp>
Specifies the time at which the user account will expire, using the date format <YYYY>-<MM>-<DD> or
the date/time format <YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>].
--unlock
Unlocks the user account if locked.
--email <string>
Specifies the email address of the user.
--gecos <string>
Specifies the values for the following Gecos field entries in the user's password file:
Full Name:
Office Location:
Office Phone:
Home Phone:
Other information:
--home-directory <path>
Specifies the path to the user's home directory.
--password-expires {yes | no}
Specifies whether to allow the password to expire.
--primary-group <name>
Specifies the user's primary group by name.
--primary-group-gid <integer>
Specifies the user's primary group by GID.
--primary-group-sid <string>
Specifies the user's primary group by SID.
--prompt-password-change {yes | no}
Prompts the user to change the password during the next login.
--shell <path>
Specifies the path to the UNIX login shell.
--new-uid <integer>
Specifies a new UID for the user. Setting this option is not recommended.
--disable-when-inactive <boolean>
The user account will be disabled when it has been inactive beyond the value specified.
--zone <string>
Specifies the name of the access zone that contains the user.
--add-group <name>
Specifies the name of a group to add the user to. Repeat this option to specify multiple list items.
--add-gid <integer>
Specifies the GID of a group to add the user to. Repeat this option to specify multiple list items.
--remove-group <name>
Specifies the name of a group to remove the user from. Repeat this option to specify multiple list items.
--remove-gid <integer>
Specifies the GID of a group to remove the user from. Repeat this option to specify multiple list items.
--provider <string>
Specifies an authentication provider of the format <type>:<instance>. Valid provider types are ads,
ldap, nis, file, and local. For example, an LDAP provider named auth1 can be specified as
ldap:auth1.
{--verbose | -v}
Displays the results of running the command.
{--force | -f}
Suppresses command-line prompts and messages.
Syntax
isi auth users reset-password {<user> | --uid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--zone <string>
Specifies the name of the access zone that contains the user.
--provider <string>
Use a specific authentication provider to perform lookups, using the format type:instance. Valid provider
types are: ads, ldap, nis, file, and local. Example: an LDAP provider named auth1 can be specified as
ldap:auth1
Syntax
isi auth users view {<user> | --uid <integer> | --sid <string>}
[--cached]
[--show-groups]
[--resolve-names]
[--show-ssh-keys]
[--zone <string>]
[--provider <string>]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
Topics:
• isi batterystatus list
• isi batterystatus view
Syntax
isi batterystatus list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi batterystatus view
[--node-lnn <integer>
Syntax
isi certificate authority delete <id>
[--force]
[--verbose]
Options
<id>
The system TLS certificate identifier or name.
{--force | -f}
Does not prompt you to confirm that you want to delete the policy.
{--verbose | -v}
Displays a message confirming that the authority was deleted.
Syntax
isi certificate authority import <certificate-path>
[--name <string>]
[--description <string>
[--verbose]
Options
<certificate-path>
An absolute path with in the /ifs file system to the TLS certificate file in PEM, DER, or PCKS#12 format.
The certificate file will be copied into the system certificate store and can be removed after import.
--name <srting>
Specifies the name of the certificate for identification.
--description <srting>
Specifies a description of the certificate for administrative convenience.
--verbose | -v
Displays more detailed information.
Syntax
isi certificate authority list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer}
[--verbose]
Options
{--limit | -l} <integer>
The number of certificate authorities to display. You can specify an integer value.
--format {table | json | csv | list}
Display the list of certificate authorities in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate authority modify <id>
[--name <string>]
[--description <string>]
[--verbose]
Options
<id>
The certificate identifier or name.
--name <string>
An administrator-configured certificate identifier.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate authority view <id>
[--format {list | json]}
Options
<id>
The certificate identifier or name.
--format {list | json}
Display the list of certificate authorities in list or JSON format.
OneFS displays the specified TLS certificate authority.
Syntax
isi certificate server delete <id>
[--force]
[--verbose]
Options
<id>
The certificate identifier.
{--force | -f}
Skips the confirmation prompt for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server import <certificate-path> <certificate-key-path>
[--name <string>]
[--description <string>]
[--certificate-key-password <string>]
[--verbose]
Option
--name <string>
The administrator-configured certificate identifier.
<certificate-path>
The local path to the TLS certificate file, in PEM format. The certificate file is copied into the system
certificate store and can be removed after import. This must be an absolute path within the OneFS file
system.
<certificate-key-path>
The local path to the TLS certificate key file, in PEM format. The certificate key file is copied into the
system certificate store, and should be removed after import for security reasons.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
--certificate-key-password <string>
The password for the certificate key if a private key is password-encrypted.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer}
[--verbose]
Options
{--limit | -l}
The number of certificate servers to display.
--format {table | json | csv | list}
Display the list of certificate servers in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server modify <id>
[--name]
[--description <string>]
[--verbose]
Options
<id>
The certificate identifier.
--name
Specifies the administrator-configured name of a certificate to use to connect to a TLS-enabled service.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server view <id>
[--format {list | json]}
Options
<id>
The certificate identifier.
--format {list | json}
Display the list of certificate servers in list or JSON format.
Syntax
isi certificate settings modify
[--certificate-monitor-enabled <boolean>]
[--certificate-pre-expiration-threshold <duration>]
[--default-https-certificate <string>]
[--verbose]
Options
-- Enable certificate expiration monitoring.
certificate-
monitor-
enabled
<boolean>
-- The amount of time before a certificate expires to state a reminder of the upcoming expiry.
certificate-
pre-
expiration-
threshold
<duration>
--default- Specify the default HTTPS X.509 certificate for the cluster.
https-
certificate
<string>
{--verbose | Displays more detailed information.
-v}
Syntax
isi certificate settings view
Options
None OneFS displays the system-wide TLS certificate settings.
Topics:
• isi cloud access add
• isi cloud access list
• isi cloud access remove
• isi cloud access view
• isi cloud accounts create
• isi cloud accounts delete
• isi cloud accounts list
• isi cloud accounts modify
• isi cloud accounts view
• isi cloud archive
• isi cloud certificates delete
• isi cloud certificates import
• isi cloud certificates list
• isi cloud certificates modify
• isi cloud certificates view
• isi cloud jobs cancel
• isi cloud jobs create
• isi cloud jobs files list
• isi cloud jobs list
• isi cloud jobs pause
• isi cloud jobs resume
• isi cloud jobs view
• isi cloud pools create
• isi cloud pools delete
• isi cloud pools list
• isi cloud pools modify
• isi cloud pools view
• isi cloud proxies create
• isi cloud proxies delete
• isi cloud proxies list
• isi cloud proxies modify
• isi cloud proxies view
• isi cloud recall
• isi cloud restore_coi
• isi cloud settings modify
• isi cloud settings regenerate-encryption-key
• isi cloud settings view
Syntax
isi cloud access add <guid>
[--expiration-date]<timestamp>
[--force
[--verbose]
Options
<guid>
The GUID of the cluster that will be granted access to buckets for all cloud accounts.
--expiration-date <timestamp>
The date and time when unreferenced (stale) data will be removed from the cloud. The timestamp
format is MMDDYY:hh:mm. For example, 022016:12:00 specifies an expiration date and time of
February 20, 2016 at 12:00 PM.
Use this command to set the date when all currently unreferenced objects or files in the cloud will be
deleted from the cloud.
{-- force | -f}
Do not ask for confirmation.
{--verbose | -v}
Displays more detailed information.
Examples
The following example adds cloud write access to a cluster by specifying the cluster GUID and an expiration date:
OneFS displays a message indicating which cloud accounts and file pool policies the secondary cluster gain access to, and
requires confirmation. Type yes, and press ENTER to complete the process.
NOTE: Only a single cluster should have access to the cloud accounts and pools for a specific GUID at a given time.
Syntax
isi cloud access list
[--limit | -l]<integer>
[--sort {name | guid | state}]
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
Options
{--limit | -l} <integer>
Limits the number of eligible clusters displayed in the list.
--sort {name | guid | state}
Sorts the list of eligible clusters according to the specified category.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--descending | -d}
Outputs the list of eligible clusters in descending order according to the specified sort option.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud access remove <guid>
[--force]
[--verbose]
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster where accounts or policies
have been created.
{--force | -f}
Execute the command without requiring confirmation.
{--verbose | -v }
Displays more detailed information.
Examples
The following example removes cloud write access from a cluster identified by a specified GUID:
Syntax
isi cloud access view <guid>
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster.
Syntax
isi cloud accounts create <name> <type> <uri>
[--account-username <string>]
[--key <string>]
[--enabled {yes | no}]
[--account-id <string>]
[--telemetry-bucket <string>]
[--storage-region <string>]
[--skip-ssl-validation {yes | no}]
[--enable-ocsp {yes | no}]
[--ocsp-responder-url-required {yes | no}]
[--proxy <string>]
[--credential-provider-uri <string>]
[--credential-provider-agency <string>]
[--credential-provider-certificate <string>]
[--credential-provider-mission <string>]
[--credential-provider-proxy <string>]
[--credential-provider-role <string>]
[--force]
[--verbose]
Options
<name>
The name of the cloud storage account.
<type>
The type of cloud storage account. Use one of the following values:
Table 3. <type>
Value Description
isilon Dell Technologies PowerScale
<uri>
The cloud account URI. This URI must match that provided to the cloud vendor.
{--account-username | -u} <string>
The username for the cloud account. This name must be identical to the user name provided by the
cloud vendor.
--key <string>
The cloud account access key or password. This information is provided by the cloud vendor.
--enabled {yes | no}
Enables or disables the account at creation time. By default, a cloud storage account is enabled on
creation. To disable an account on creation, use this setting with the no option.
--account-id <string>
A required Amazon S3-only setting. The account ID number provided by Amazon when you first establish
an account with the vendor.
--telemetry-bucket <string>
A required Amazon S3-only setting. The telemetry bucket name that you specified when you first
established an account with the vendor. This is where usage reports are stored.
--storage-region <string>
An optional parameter for Amazon S3 or Google Storage Platform cloud types. The region value must
match the storage region that you specified when you first established an account with the cloud
provider. For example, us-west-1. If you do not specify a region, the cloud provider chooses its default
region.
--skip-ssl-validation {yes | no}
Specifies whether to circumvent SSL certificate validation when connecting to a cloud provider's
storage repository. Unless you specify this setting with a yes instruction, OneFS will attempt to perform
SSL certificate validation when connecting. For security purposes, we recommend not enabling this
setting. If you are connecting to a cloud provider that is within your corporate network (for example,
PowerScale or ECS), and you are having trouble connecting, you can skip SSL validation.
--enable-ocsp {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether to use OCSP to check the revocation status
of the authentication certificate.
--ocsp-responder-url-required {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether a certificate without an OCSP responder
URL is considered valid or not.
--proxy <string>
The network proxy through which CloudPools traffic to and from a public cloud provider should
be redirected. The specified network proxy must already have been created with the isi cloud
proxies create command.
--credential-provider-uri <string>
Applies only to the C2S-S3 cloud type. The URI to connect to a credential provider.
--credential-provider-agency <string>
Applies only to the C2S-S3 cloud type. The agency name required to connect to the credential provider.
Examples
The following example creates a Microsoft Azure cloud account:
Syntax
isi cloud accounts delete <id>
[--acknowledge <string>]
[--verbose]
Options
<id>
The name of the cloud account. You can use the isi cloud accounts list command to display
the names of cloud accounts.
--acknowledge <string>
Enables the account deletion to proceed. This parameter is required. You must include a text string with
the parameter, such as yes, proceed, or other string.
{--verbose | -v}
Displays more detailed information.
Example
The following example deletes a Microsoft Azure cloud account:
**********************************************************************
WARNING: Deleting an account is extremely dangerous.
Continuing with this operation will result in a permanent loss of data.
Type 'confirm delete data' to proceed. Press enter to cancel:
Syntax
isi cloud accounts list
[--limit <integer>]
[--sort {id | name | type | account_username | uri | state | bucket}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of cloud accounts displayed in the list.
--sort {id | name | type | account_username | uri | state | bucket}
Sorts the list of cloud accounts according to the specified category.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--descending | -d}
Outputs the list of cloud accounts in descending order according to the specified sort option.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud accounts modify <id>
[--name <string>]
Options
<id>
The ID of the cloud account. In this case, the ID is the same as the cloud account name.
{--name | -n} <string>
The name of the cloud account. In this case, the name is the same as the ID.
{--account-username | -u} <string>
The username for the cloud account. This name must be identical to the user name provided by the
cloud vendor.
--key <string>
The cloud account access key or password. This information is provided by the cloud vendor.
--uri <string>
The cloud account URI. This URI must match that provided to the cloud vendor.
--enabled {yes | no}
By default, when you create a cloud storage account, it is enabled. To disable the account on creation,
you can use this setting with the no option.
--account-id <string>
This is a required Amazon S3-only setting. The account ID number provided by Amazon when you first
establish an account with the vendor.
--telemetry-bucket <string>
This is a required Amazon S3-only setting. The telemetry bucket name that you specified when you first
established an account with the vendor.
--storage-region <string>
This is a required Amazon S3, Google Cloud Platform, Alibaba Cloud setting. The storage region that you
specified when you first established an account with the vendor. For example, us-west-1.
--skip-ssl-validation {yes | no}
Specifies whether to circumvent SSL certificate validation when connecting to a cloud provider's
storage repository. Unless you specify this setting with a yes instruction, OneFS will attempt to
perform SSL certificate validation when connecting. For security purposes, we recommend not enabling
this setting. If you are connecting to a cloud provider (for example, RAN or ECS) that is inside your
corporate network, and you are having trouble connecting, you can skip SSL validation.
--enable-ocsp {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether to use OCSP to check the revocation status
of the authentication certificate.
--ocsp-responder-url-required {yes | no}
Example
The following example modifies a Microsoft Azure cloud account:
Syntax
isi cloud accounts view <id>
Options
<id>
Specifies the id of the cloud account to view. You can use the isi cloud accounts list
command to obtain ids of available cloud accounts.
Syntax
isi cloud archive <files>
[--recursive {yes | no}]
[--policy <string>]
[--verbose]
[--help]
Examples
The following example archives multiple files to the cloud according to a specific file pool policy:
The following example archives an entire directory to the cloud. The operation must match an existing file pool policy to be
successful.
Syntax
isi cloud certificates delete <id>
[{--force | -f}]
[{--verbose | -v}]
Options
<id>
Specifies the name of the system certificate identifier or the certificate name.
{--force | -f}
Does not ask for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud certificates import <certificate-path> <certificate-key-path>
[--name <string>]
[--set-certificate-key-password]
[{--verbose | -v}]
Options
<certificate-path>
Specifies the local path to the TLS certificate file in PEM, DER, or PCKS#12 format. The certificate file
will be copied into the certificate store and can be removed after import.
<certificate-key-path>
Specifies the local path to the TLS certificate key file in PEM, DER, or PCKS#12 format. The certificate
key file will be copied into the certificate store and should be removed after import for security reasons.
--name <string>
Identifies the administrator configured certificate.
--set-certificate-key-password
Specifies the password for the password-encrypted certificate key.
--verbose | -v
Displays more detailed information.
Syntax
isi cloud certificates list
[--limit | -l <integer>]
[--sort (id | name | issuer | subject | not_after)]
[--descending | -d]
[--format {table | csv | list | json}]
[--no-header | -a]
[--no-footer | -z]
[{--verbose | -v}]
Options
{--limit | -l} <integer>
Limits the number of cloud certificates displayed in the list.
--sort {id | name | issuer | subject | not_after}
Sorts the list of data according to the specified category.
{--descending | -d}
Sorts the list of data in descending order according to the specified sort option.
Syntax
isi cloud certificates modify <id>
[--name <string>]
[--description <string>]
[--verbose | -v]
You can also provide a file matching filter. For a full description on file matching criteria, use man isi-file-matching on
the command line.
Options
<id>
Specifies the name of the system certificate identifier or the certificate name.
--name <string>
Identifies the administrator configured certificate.
--description <string>
Specifies a description for this certificate.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud certificates view <id>
Options
<id>
Specify the certificate ID or name.
Syntax
Options
<id>
The ID for the cloud job. Run isi cloud jobs list to see a list of all manual and system jobs and
their associated IDs.
{--verbose | -v}
Displays more detailed information.
Example
This following example cancels a CloudPools job with the ID of 21.
Syntax
isi cloud jobs create {archive | recall | restore-coi}
[--files <string>]
[{--recursive | -r} {yes | no}]
[--accounts <string>]
[--expiration-date <timestamp>]
[--policy <string>]
[{--verbose | -v}]
Options
{archive | recall | restore-coi}
The type of job. Valid entries are archive, recall, and restore-coi.
--files <string>...
Specifies files or directory names to which the job applies. Use --files for each additional
specification. Directory names are valid only for archive jobs.
{--recursive | -r} {yes | no}
Specifies whether the job should apply recursively to nested directories.
--accounts <string>
Examples
For archive jobs, you can specify one or more directories to archive. The following command archives a single directory:
Syntax
Options
<job-id>
The ID of the job. To find the list of job IDs in CloudPools, run the isi cloud jobs list command.
--offset <integer>
The starting file ID number to display.
--page <integer>
Used with limit option. If present, specifies the starting page number to display where page size is
specified by limit. This option will be deprecated; please use offset option instead.
--id <boolean>
Adds an ID number in the display before each file.
{--limit | -l} <integer>
Example
The following example displays a list of files associated with a specific cloud job:
Syntax
isi cloud jobs list
[--limit <integer>]
[--sort {id | job_state | operation_state |effective_state | type
| state_change_time | completion_time | create_time | description}]
[--descending ]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -d} <integer>
Displays no more than the specified number of items.
--sort {id | job_state | operation_state | effective_state | type | state_change_time |
completion_time | create_time | description}
Orders results by this field. The default value is id. Note that, to sort on other than ID, description,
effective state, and type, use the --verbose parameter with the command.
{--descending | -d}
Sorts and presents data in descending order.
--format {table | json | csv | list}
Display output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or
list format.
{--no-header | -a}
Displays table and CSV output without headers.
Syntax
Options
id
The ID of the cloud job to pause.
To find job IDs, use the isi cloud jobs list command to view the IDs of all cloud jobs.
Although possible, we recommend that you not pause any of the CloudPools system jobs that run in
the background and are critical for proper operation. These include:
Table 4. id
ID Description Effective Type
State
1 Write updated data to the cloud running cache-writeback
2 Expire CloudPools cache running cache-invalidation
4 Clean up unreferenced data in the cloud running cloud-garbage-collection
5 Write updated snapshot data to the running snapshot-writeback
cloud
6 Update SmartLink file formats running smartlink-upgrade
7 Add data to CloudPools cache running cache-pre-populate
{--verbose | -v}
Displays more detailed information.
Example
The following example pauses a cloud job with ID 19.
Syntax
Options
<id>
The ID for the cloud job to resume. Use the isi cloud jobs list command to view a list of jobs
and their associated IDs.
--verbose | -v
Displays more detailed information.
Example
The following command resumes a paused job with an ID of 26:
Syntax
isi cloud jobs view <id>
Options
<id>
Specify the ID of the cloud job. Use the isi cloud jobs list command to view all jobs and their
associated IDs.
Example
The following command shows the details of a job with the ID of 27:
Syntax
isi cloud pools create <name> <type> <account>
[{--description | -d} <string>]
[--vendor <string>]
[{--verbose | -v}]
Options
<name>
The name of the CloudPool.
<type>
The type of account. Valid values are: isilon (for PowerScale), ecs, azure, s3, c2s-s3 , google,
or alibaba-cloud.
<account>
The name of the cloud storage account to which the CloudPool connects. The cloud storage account is
required and must match the CloudPool type. Only one cloud storage account can be specified.
--description | -d <string>
A description of the CloudPool.
--vendor <string>
The name of the vendor hosting the cloud storage account.
--verbose | -v
Displays more detailed information.
Example
This following command creates a CloudPool containing a Microsoft Azure cloud storage account:
Syntax
isi cloud pools delete <id>
[--force | -f]
[--verbose | -v]
Example
The following command deletes a CloudPool:
When you press ENTER to run the command, OneFS asks for confirmation. Type yes, and then press ENTER.
Syntax
isi cloud pools list
[--limit <integer>]
[--sort {id | name | type | description | vendor}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort {id | name | type | description | vendor}
Orders results by this field. The default value is id, which, in this case, is the same as name. Unless you
use the --verbose option, you can only sort on name or type.
{--descending | -d}
Sorts and presents data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Syntax
isi cloud pools modify <id>
[--name <string>]
[--accounts <string> | --clear-accounts | --add-accounts <string> | --remove-accounts
<string>]
[--description <string>]
[--vendor <string>]
[--verbose]
Options
<id>
The ID of the CloudPool. Run isi cloud pools list to view the IDs of all CloudPools.
{--name | -n} <string>
Specifies a new name for the CloudPool.
{--accounts <string> | --clear-accounts | --add-accounts <string> | --remove-accounts <string>}
Adds or removes accounts associated with this cloudpool.
Only one account per CloudPool is allowed. To change the account associated with a CloudPool, we
recommend the following:
● Create a new CloudPool using the isi cloud pools create command, specifying the correct
account.
● Delete the old CloudPool using the isi cloud pools delete command. Proceed with caution.
If you delete a CloudPool, OneFS is no longer able to access the associated cloud storage account.
{--description | -d} <string>
Provides a description of this cloud pool.
---vendor <string>
Provides the name of the vendor hosting the cloud pool account.
{--verbose | -v}
Displays more detailed information.
Examples
The following command adds a vendor name and description to an existing CloudPool:
Syntax
isi cloud pools view <id>
Options
<id>
The ID of the cloud pool. Run the isi cloud pool list command to view all CloudPools and their
associated IDs.
Example
The following command displays information about a CloudPool named my_azure_pool.
Syntax
isi cloud proxies create <name> <host> <type> <port>
[{--username | -u} <string>]
[{--password | -p} <string>]
[{--verbose | -v}]
Options
<name>
The name of the network proxy. This can be any alphanumeric string, but should be a simple,
recognizable name.
<host>
The DNS name or IP address of the proxy server. For example, myproxy1.example.com or
192.168.107.107.
<type>
The proxy protocol type, one of socks_4, socks_5, or http.
<port>
The port number to communicate with the proxy server. The correct port number depends on the port
opened up on the proxy server for communication with CloudPools.
{--username | -u} <string>
The user name to authenticate with the SOCKS v5 or HTTP proxy server. Note that SOCKS v4 does not
support authentication.
{--password | -p} <string>
Examples
The following example creates a network proxy to use with CloudPools:
Syntax
isi cloud proxies delete <name>
[--force]
[--verbose]
Options
<name>
The unique id or name of the network proxy. You can use the isi cloud proxies list command
to display the names of proxies.
{--force | -f}
Enables the proxy deletion to proceed without confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following example deletes a network proxy named myproxy1:
When you run the command, OneFS displays the following message and requires confirmation:
To proceed, type yes, and press ENTER. If the proxy is attached to a cloud storage account, OneFS displays the following
message:
Syntax
isi cloud proxies list
[--limit <integer>]
[--sort {id | name | host | type | port}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of network proxies displayed in the list.
--sort {id | name | host | type | port}
Sorts the list of cloud proxies according to the specified category.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--descending | -d}
Outputs the list of network proxies in descending order according to the specified sort option.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
The following example creates a network proxy to use with CloudPools:
Syntax
isi cloud proxies modify <name>
[--name <string>]
[--host <string>]
Options
<name>
The current name of the network proxy.
{--name | -n} <string>
The new name of the network proxy. This can be any alphanumeric string, but should be a simple,
recognizable name.
--host <string>
The DNS name or IP address of the proxy server. For example, myproxy1.example.com or
192.168.107.107.
{--type | -t} {socks_4 | socks_5 | http}
The network proxy protocol , one of socks_4, socks_5, or http.
--port <integer>
The port number to communicate with the proxy server. The correct port number depends on the port
opened up on the proxy server for communication with CloudPools.
{--username | -u} <string>
The user name to authenticate with the SOCKS v5 or HTTP proxy server. Note that SOCKS v4 does not
support authentication.
--clear-username
Clear the user name that was previously specified for proxy server authentication.
{--password | -p} <string>
The password to authenticate with the SOCKS v5 or HTTP proxy server.
--clear-password
Clear the password that was previously specified for proxy server authentication.
{--verbose | -v}
Displays more detailed information.
Examples
The following example modifies a network proxy in CloudPools:
Syntax
isi cloud proxies view <name>
Example
The following example displays the details of a network proxy named myproxy1:
Syntax
isi cloud recall <files>
[--recursive | -r {yes | no}]
[--verbose]
You can also provide a file matching filter to specify a set of files to act on. The basic syntax follows. For a full description on file
matching criteria, use man isi-file-matching on the command line.
Options
<files>
The files to recall. For multiple specifications, use --files for each additional file name entry.
[--begin-filter] <criteria> [--end-filter]
A file matching filter that defines a set of files to act on. For a description of <criteria> and valid
operators to use in the filter, enter man isi-file-matching on the command line.
{--recursive | -r} {yes | no}
Specifies whether the recall should apply recursively to nested subdirectories.
{--verbose | -v}
Displays more detailed information about the operation.
Usage
The isi cloud recall command restores the full file to its original directory, and overwrites the associated SmartLink file.
If the file pool policy that originally archived the file to the cloud is still in effect, the next time the SmartPools job runs, the
recalled file is archived to the cloud again. If you do not want the recalled file to be re-archived, you can move the file to a
different directory that would not be affected by the file pool policy, or you can modify or delete the policy.
Examples
The following example recalls all files from the cloud for a directory and its subdirectories:
You can use the isi cloud jobs view command with the job number to see information about the job.
Usage
CAUTION: Do not execute this command unless instructed to do so by Dell Technologies Technical Support.
A cloud object index (COI) is a persistent mapping between cloud objects, their retention periods, and optionally, the files that
use the cloud objects. The cluster uses the COI when performing cleanup (garbage collection), to ensure it considers all versions
of files and objects correctly.
The isi cloud restore coi command allows a cluster to complete a COI to include all versions of all objects. The
command might be used in the following situations:
● To handle COI corruption in cases where COI entries are corrupted or deleted. This command can restore the COI for a
specified cloud account.
● To increase the retention time on the cluster where the command is run for objects in the specified cloud account.
Syntax
isi cloud restore_coi
[--accounts <string>]
[--expiration-date <timestamp>]
[--verbose]
Options
--accounts <string>...
The name of the cloud storage account whose COI you intend to restore. By restoring the COI, you
enable OneFS to not only read data from the cloud, but also to write data to the cloud.
Use an additional --accounts parameter for each additional cloud account.
--expiration-date <timestamp>
The expiration date for orphaned cloud data objects.
{--verbose | -v}
Displays more detailed information about the operation.
Example
The following example restores the COI for a cloud storage account:
Syntax
isi cloud settings modify
[--default-accessibility {cached | no-cache}]
[--default-cache-expiration <duration>]
[--default-compression-enabled {yes | no}]
[--default-data-retention <duration>]
[--default-encryption-enabled {yes | no}]
[--default-full-backup-retention <duration>]
[--default-incremental-backup-retention <duration>]
[--default-read-ahead <string>]
[--default-writeback-frequency <duration>]
[--verbose]
Options
These options specify the default behavior for accessing a SmartLink (archived) file, if there is no file pool policy for the
archived file. If there is a file pool policy for the archived file, that policy and its settings take precedence over any of these
settings.
--default-accessibility {cached | no-cache}
Specifies cache to ensure that only the data blocks requested are cached and flushed or invalidated
based on the cache retention settings. Specify no-cache to ensure that the data blocks are not cached
and do not consume file system blocks long term.
--default-cache-expiration <duration>
The minimum amount of time until the cache expires. A number followed by a unit of time is accepted.
For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D would specify
a two-day duration.
--default-compression-enabled {yes | no}
Specifies whether data is to be compressed when archived to the cloud.
--default-data-retention <duration>
The minimum amount of time that cloud objects associated with a SmartLink file will be retained in
the cloud after the SmartLink file is deleted from the cluster. A number followed by a unit of time is
accepted. For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
--default-encryption-enabled {yes | no}
Specifies whether data is to be encrypted when archived to the cloud.
--default-full-backup-retention <duration>
The length of time that OneFS retains cloud data referenced by a SmartLink file that has been backed
up by a full NDMP backup and is subsequently deleted. A number followed by a unit of time is accepted.
For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D would specify
a two-day duration.
--default-incremental-backup-retention <duration>
The length of time that OneFS retains cloud data referenced by a SmartLink file that has been backed
up by an incremental NDMP backup, or replicated by a SyncIQ operation, and is subsequently deleted.
A number followed by a unit of time is accepted. For example, a setting of 5Y would specify a five-year
duration.
--default-read-ahead {partial | full}
Example
The following example modifies several of the default CloudPools settings:
Syntax
isi cloud settings regenerate-encryption-key
[--verbose]
Option
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud settings view
Options
There are no options for this command.
Topics:
• isi cluster atime modify
• isi cluster atime view
• isi cluster config
• isi cluster config exports
• isi cluster config exports create
• isi cluster config exports list
• isi cluster config exports view
• isi cluster config imports
• isi cluster config imports create
• isi cluster config imports list
• isi cluster config imports view
• isi cluster config lock
• isi cluster config lock modify
• isi cluster config lock view
• isi cluster contact modify
• isi cluster contact view
• isi cluster encoding list
• isi cluster encoding modify
• isi cluster encoding view
• isi cluster identity modify
• isi cluster identity view
• isi cluster internal-networks modify
• isi cluster internal-networks view
• isi cluster join-mode modify
• isi cluster join-mode view
• isi cluster lnnset modify
• isi cluster lnnset view
• isi cluster maintenance components view
• isi cluster maintenance history view
• isi cluster maintenance settings modify
• isi cluster maintenance settings view
• isi cluster maintenance status
• isi cluster reboot
• isi cluster shutdown
• isi cluster time modify
• isi cluster time view
• isi cluster time timezone modify
• isi cluster time timezone view
Syntax
isi cluster atime modify
[--enabled <boolean>]
[--precision <integer>]
[--verbose]
Options
--enabled {yes Specifies whether the access time grace period is enabled.
| no}
--precision The amount of time between file access time updates, in seconds.
<integer>
{--verbose | Displays more detailed information.
-v}
Syntax
isi cluster atime view
Options
None OneFS displays whether cluster access time grace periods are enabled, and the prevision interval, in
seconds.
Syntax
isi cluster config <subcommand>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi cluster config exports <action>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi cluster config exports create
[--components <string>]
[--force | -f]
[--help | -h]
[--verbose | -v}
Options
--components <string>...
Specifies the components to be exported. Components can be all or one of zones, auth, network,
filepool, storagepool, snapshot, quota, nfs, smb, s3, synciq, smartsync, ndmp, or http. The default value
is all which indicates that all components are supported.
--force | -f
Does not ask confirmation.
--help | -h
Displays help for this command.
--verbose | -v
Displays more detailed information.
Syntax
Options
{--limit | -l} <integer>
Displays no more than the specified number of cluster configuration exports.
--sort (id | status | path)
Sorts the data by the specified field.
--descending | -d
Sorts the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi cluster config exports view <id>
[{--help | -h}]
Options
<id>
Specifies the id or name of the export task to view.
--help | -h
Displays help for this command.
Syntax
isi cluster config imports <action>
[--timeout <integer>]
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi cluster config imports create <export-id>
[--components <string>]
[--network-subnets-ip <string>
[--force | -f]
[--help | -h]
[--verbose | -v}
Options
<export-id>
Specifies the id of the configuration export to be imported.
--components <string>...
Specifies the components to be imported. Components can be all or one of zones, auth, network,
filepool, storagepool, snapshot, quota, nfs, smb, s3, synciq, smartsync, ndmp, or http. The default value
is all which indicates that all components are supported.
--network-subnets-ip <string>...
Specifies the custom IP address range for a subnet during restore. When specifying multiple subnets,
separate them by a comma. For example:
groupnet0.subnet1:10.11.12.12/24, groupnet1.subnet0:10.12.14.13/22
--force | -f
Does not ask for confirmation.
--help | -h
Displays help for this command.
--verbose | -v
Displays more detailed information.
Syntax
Options
{--limit | -l} <integer>
Displays no more than the specified number of cluster configuration exports.
--sort (id | export_id | status | path)
Sorts the data by the specified field.
--descending | -d
Sorts the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi cluster config imports view <id>
[{--help | -h}]
Syntax
isi cluster config lock <action>
[--timeout <integer>]
Options
--timeout <integer>
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
isi cluster config lock modify
[--action (enable | disable)]
[--force | -f]
Options
--action (enable | disable)
Enables or disables the configuration lock.
--force | -f
Does not ask for confirmation.
Syntax
isi cluster config lock view
[--help | -h]
Syntax
isi cluster contact modify
[--company <string>]
[--location <string>]
[--primary-name <string>]
[--primary-email <string>]
[--primary-phone1 <string>]
[--primary-phone2 <string>]
[--secondary-name <string>]
[--secondary-email <string>]
[--secondary-phone1 <string>]
[--secondary-phone2 <string>]
[--verbose]
Options
{--company | The company name for the cluster contact information.
-c}
{--location | The company location for the cluster contact information.
-o}
{--primary- The name of the primary administration contact.
name | -n}
{--primary- The email address for the primary administration contact.
email | -e}
{--primary- The main phone number for the primary administration contact.
phone1 | -p}
{--primary- Alternate phone number for the primary administration contact.
phone2 | -P}
{--secondary- The name of the secondary administration contact.
name | -N}
{--secondary- The email address for the secondary administration contact.
email | -E}
{--secondary- The main phone number for the secondary administration contact.
phone1 | -s}
{--secondary- Alternate phone number for the secondary administration contact.
phone2 | -S}
{--verbose | Displays more detailed information.
-v}
Syntax
isi cluster contact view
[--format (list | json]
Options
--format (list Display cluster contacts in list or JSON format.
| json)
Syntax
isi cluster encoding list
Options
None OneFS displays a list of supported file system character encoding formats.
Syntax
isi cluster encoding modify <current-encoding>
[--verbose]
Options
<current- Enter the supported character encoding selection
encoding>
{--verbose | Displays more detailed information.
-v}
Syntax
isi cluster encoding view
Options
None OneFS displays the selected file system character encoding type.
Syntax
isi cluster identity modify
[--description <string>]
[--motd <string>]
[--motd-header <string>]
[--name <string>]
[--verbose]
Options
{--description Text description of the cluster.
| -d}
{--motd | -m} The cluster message of the day.
{--motd-header The cluster message of the day header text.
| -M}
{--name | -n} The cluster name specified at installation.
{--verbose | Displays more detailed information.
-v}
Syntax
isi cluster identity view
[--format (list | json]
OneFS displays the cluster name, description, and message of the day.
Syntax
isi cluster internal-networks modify
[--int-a-ip-addresses <ip_address_range>]
[--int-b-ip-addresses <ip_address_range>]
[--failover-ip-addresses <ip_address_range>]
[--failover-status <boolean>]
[--int-a-prefix-length <integer>]
[--int-b-prefix-length <integer>]
Options
--int-a-ip- The IP address range for the int-a network interface. To specify an IP address range, enter two IP
addresses addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_ran
ge>
--int-b-ip- The IP address range for the int-b network interface. To specify an IP address range, enter two IP
addresses addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_ran
ge>
--failover- The IP address range for the failover network interface. To specify an IP address range, enter two IP
ip-addresses addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_ran
ge>
--failover- The status of the int-b network interface.
status
(enabled |
disabled)
--int-a- The prefix size for the int-a network interface.
prefix-length
<integer>
--int-b- The prefix size for the int-b network interface.
prefix-length
<integer>
Syntax
isi cluster internal-networks view
Options
None OneFS displays cluster internal network configuration settings.
Syntax
isi cluster join-mode modify <mode>
Options
<mode> (secure Set the cluster join mode to secure or manual.
| manual)
Syntax
isi cluster join-mode view
Options
None OneFS displays the security setting for cluster join mode.
Syntax
isi cluster lnnset modify <lnns>
Options
<lnns> The logical node names (LNNs) to be modified. Specify the current LNN and then the desired new LNN,
separated by a hyphen (-). The new LNN must not currently be in use. For example, to rename the node
with the current LNN from 1 to 9, enter:
Syntax
isi cluster lnnset view
[--lnn <integer>]
Options
--lnn <integer> Specify a LNN to view information about only that LNN.
OneFS displays LNN names and their associated device IDs and IP addresses.
Syntax
isi cluster maintenance components view
[--help | -h]
Options
--help | -h
Displays help for this command.
Syntax
isi cluster maintenance history view
[--help | -h]
Options
--help | -h
Displays help for this command.
Syntax
isi cluster maintenance settings modify
[--auto-enable <boolean>]
[--active <boolean>]
[--manual-window-enabled <boolean>]
[--manual-window-hours <hours>]
[--verbose | -v]
Options
--auto-enable <boolean>
Specifies if auto maintenance mode is enabled.
--active <boolean>
Specifies if a maintenance mode is active.
--manual-window-enabled <boolean>
Specifies if a manual maintenance mode window is enabled.
--manual-window-hours <hours>
Specifies the number of hours that a manual maintenance mode will be active.
--verbose | -v
Displays more detailed information.
Syntax
isi cluster maintenance settings view
[--help | -h]
Options
--help | -h
Displays help for this command.
Syntax
isi cluster maintenance status
[--help | -h]
Options
--help | -h
Displays help for this command.
NOTE: To perform a rolling reboot, run the isi upgrade rolling-reboot command.
Syntax
isi cluster reboot
[--node-lnn <string>
Options
--node-lnn The LNN of the node to reboot, or all to reboot all nodes. If omitted, OneFS selects the local node.
<string>
Syntax
isi cluster shutdown
[--node-lnn <string>
Options
--node-lnn The LNN of the node to shut down, or all to shut down all nodes. If omitted, OneFS selects the local
<string> node.
Syntax
isi cluster time modify <time>
Options
<time> The date and time in yyyy-mm-ddThh:mm:ss format.
Syntax
isi cluster time view
Options
None OneFS displays the cluster date and time in yyyy-mm-ddThh:mm:ss format.
Syntax
isi cluster time timezone modify
[--abbreviation <string>]
[--path <string>]
[--force]
[--verbose]
Options
NOTE: If you wish to use an interactive time zone selection tool, do not enter values for --abbreviation or --path.
{-- An abbreviation for the cluster time zone, such as PDT for United States Pacific Daylight Time. Do not
abbreviation enter a value if you wish to use the interactive time zone selector.
| -a} <string>
{--path | -p} A time zone hierarchical path, such as America/Los_Angeles for United States Pacific Daylight Time
<string> (PDT). Do not enter a value if you wish to use the interactive time zone selector.
{--force | -f} Do not prompt for confirmation of any modifications.
{--verbose | Display more detailed information.
-v}
Syntax
isi cluster time timezone view
Options
None OneFS displays the cluster time zone abbreviation and path.
Topics:
• isi compression stats list
• isi compression stats view
• isi compression settings modify
• isi compression settings view
Syntax
isi compression stats list
[--begin <integer>]
[--end <integer>]
[--resolution <integer>]
[--pretty-time]
[--local]
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--help | -h}]
Options
--begin <time>
Specifies begin time in UNIX Epoch timestamp format.
--end <time>
Specifies end time in UNIX Epoch timestamp format.
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--pretty-time
Displays the timestamp as a readable string.
--local
Show statistics for the local node only.
{--limit | -l} <integer>
Limits the number of compression statistics to display.
--format (table | json | csv | list )
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--noheader | -a}
Syntax
isi compression stats view
[--resolution <integer>]
[--local]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--local
Shows statistics for the local node only.
{--help | -h}
Displays help for this command.
Syntax
isi compression settings modify
[--enabled <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Options
--enabled <boolean>
Determines whether data compression is enabled or disable.
This setting only applies for data that resides on compatible hardware (i.e. F810).
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi compression settings view
Topics:
• isi config
isi config
Opens a new prompt where node and cluster settings can be altered.
The command-line prompt changes to indicate that you are in the isi config subsystem. While you are in the isi config
subsystem, other OneFS commands are unavailable and only isi config commands are valid.
Syntax
isi config
NOTE:
● The following commands are not recognized unless you are at the isi config command prompt.
● Changes are not applied until you run the commit command.
● Some commands require you to restart the cluster.
Commands
changes
Displays a list of changes to the configuration that have not been committed.
commit
Commits configuration settings and then exits isi config.
date <time-and-date>
Displays or sets the current date and time on the cluster.
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
<interface- Specifies the name of the interface as one of the following values:
name> int-a
int-b
failover
<ip-range> Specifies the range of IP addresses that can no longer be assigned to nodes.
Specify in the form <lowest-ip>-<highest-ip>.
exit
Exits the isi config subsystem.
help
Displays a list of all isi config commands. For information about specific commands, the syntax is
help [<command>].
interface <interface-name> {enable | disable}
The interface command displays the IP ranges, netmask, and MTU and enables or disables internal
interfaces. When issued with no argument, this command displays IP ranges, netmask, and MTU of all
interfaces. When issued with an <interface-name> argument, this command displays IP ranges, netmask,
and MTU for only the specified interface.
manual Configures the cluster so that joins can be initiated by either the node or the
cluster.
secure Configures the cluster so that joins can be initiated by only the cluster.
<interface- Specifies the name of the interface as int-a, int-b, and failover.
name>
<old-ip-range> Specifies the range of IP addresses that can no longer be assigned to nodes. If
unspecified, all existing IP ranges are removed before the new IP range is added.
Specify in the form of <lowest-ip>-<highest-ip>.
<new-ip-range> Specifies the range of IP addresses that can be assigned to nodes. Specify in the
form of <lowest-ip>-<highest-ip>.
-n <netmask> Specifies a new netmask for the interface.
NOTE: If more than one node is given a new IP address, the cluster reboots when the change is
committed. If only one node is given a new IP address, only that node is rebooted.
mtu [<value>]
Displays the size of the maximum transmission unit (MTU) that the cluster uses for internal network
communications when run with no arguments. Sets a new size of the MTU value, when specified. This
command is for the internal network only.
NOTE: This command is not valid for clusters with an InfiniBand back end.
<value> Specifies the new size of the MTU value. Any value is valid, but not all values
may be compatible with your network. The most common settings are 1500 for
standard frames and 9000 for jumbo frames.
name [<new_name>]
Displays the names currently assigned to clusters when run with no arguments. Assigns new names to
clusters, as specified.
<interface- Specifies the name of the interface. Valid names are int-a and int-b.
name>
<ip-mask> Specifies the new IP mask for the interface.
quit
Exits the isi config subsystem.
reboot [{<node_lnn> | all}]
Reboots one or more nodes, specified by LNN. If no nodes are specified, reboots the node from which
the command is run. To reboot the cluster, specify all.
NOTE: If run on an unconfigured node, this command does not accept any arguments.
remove
Deprecated. Instead, run the isi devices -a smartfail command.
shutdown [{<node_lnn> | all}]
status [advanced]
Displays current information on the status of the cluster. To display additional information, including
device health, specify advanced.
timezone [<timezone identifier>]
Displays the current time zone or specifies new time zones. Specifies the new timezone for the cluster
as one of the following values:
<timezone Specifies the new time zone for the cluster as one of the following values:
identifier> Greenwich Mean Time
Eastern Time Zone
Central Time Zone
Mountain Time Zone
Pacific Time Zone
Arizona
Alaska
Hawaii
Japan
Advanced. Opens a prompt with more time zone options.
version
Displays information about the current OneFS version.
wizard
Activates a wizard on unconfigured nodes and reactivates the wizard if you exit it during the initial node
configuration process. The wizard prompts you through the node-configuration steps.
Topics:
• isi config-catalog modify
• isi config-catalog view
Syntax
isi config-catalog modify
[--enabled<boolean>
Options
--enabled
Allows the config-catalog package to download automatically.
Syntax
isi config-catalog view
Options
There are no options for this command.
Syntax
isi dedupe inline settings modify
[--mode (enabled | assess | paused | disabled)]
[{--verbose | -v}]
Options
mode
Set the specified inline data deduplication mode. Mode settings are cluster-wide.
● enabled turns on inline data deduplication.
● assess allows you to assess the potential space savings from inline data deduplication.
● paused deactivates inline data deduplication but leaves the index table intact.
● disabled deactivate inline data deduplication and de-allocates the index table.
{--verbose | -v}
Displays more detailed information.
Examples
The following command enables inline data deduplication in assessment mode:
Syntax
isi dedupe settings view
Options
There are no options for this command.
Syntax
isi dedupe reports list
[--limit | -l <integer>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of
storage space consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of deduplication reports, run the following command:
Syntax
isi dedupe reports view <job-id>
Options
<job-id>
Displays the deduplication report for the deduplication job of the specified ID.
Examples
The following command displays a deduplication job:
Time: 2013-10-14T09:39:22
Job ID: 52
Job Type: Dedupe
Reports
Time : 2013-10-14T09:39:22
Results :
Dedupe job report:{
Start time = 2013-Oct-14:09:33:34
End time = 2013-Oct-14:09:39:22
Iteration count = 1
Scanned blocks = 1716
Sampled blocks = 78
Deduped blocks = 1425
Dedupe percent = 83.042
Created dedupe requests = 65
Successful dedupe requests = 65
Failed dedupe requests = 0
Skipped files = 0
Index entries = 38
Index lookup attempts = 38
Index lookup hits = 0
}
Elapsed time: 347 seconds
Aborts: 0
Errors: 0
Scanned files: 6
Directories: 2
2 paths:
Syntax
isi dedupe settings modify
[--paths <path> | --clear-paths | --add-paths <path> --remove-paths | <path>]
[--assess-paths <path> | --clear-assess-paths | --add-assess-paths <path> | --remove-
assess-paths | <path>]
[--verbose | -v]
Options
--paths <path>
Deduplicates files located under the specified directories. Specify --paths for each additional path.
--clear-paths
Stops deduplication for all previously specified directories. If you run the isi dedupe settings
modify command with this option, you must run the command again with either --paths or --add-
path to resume deduplication.
--add-paths <path>
Deduplicates files located under the specified directory in addition to directories that are already being
deduplicated. Specify --add-paths for each additional path to add.
--remove-paths <path>
Stops deduplicating the specified directory. Specify --remove-paths for each additional path to
remove.
--assess-paths <path>
Assesses how much space will be saved if files located under the specified directories are deduplicated.
Specify --assess-paths for each additional path to assess.
--clear-assess-paths
Stops assessing how much space will be saved if previously specified directories are deduplicated. If
you run the isi dedupe settings modify command with this option, you must run the command
again with either --paths or --add-path to resume deduplication.
--add-assess-paths <path>
Assesses how much space will be saved if the specified directories are deduplicated in addition to
directories that are already being assessed. Specify --add-assess-paths for each additional assess
path to add.
--remove-assess-paths <path>
Stops assessing how much space will be saved if the specified directories are deduplicated. Specify
--remove-assess-paths for each additional assess path to remove.
{--verbose | -v}
Displays more detailed information.
Syntax
isi dedupe settings view
Options
There are no options for this command.
Syntax
isi dedupe stats
[--format {list | json}]
Options
--format {list | json }
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
Examples
To view information about deduplication space savings, run the following command:
NOTE: You can add available nodes to a cluster by running the command isi devices node add.
Syntax
isi devices add {<bay> | all}
[--sled <string>
[--node-lnn <integer>]
[--force]
[--verbose]
Options
{<bay> | all }
Specifies the bay number that contains the drive to be added to the node. You can specify all to scan
the entire node.
Syntax
isi devices config modify
[--automatic-replacement-recognition {yes | no}]
[--instant-secure-erase {yes | no}]
[--node-lnn {all | <string>}]
[--verbose]
Options
--automatic-replacement-recognition {yes | no}
Changes the ARR status for a cluster or specific node. A value of yes will enable ARR, a value of no will
disable ARR.
--instant-secure-erase {yes | no}
Enable or disable the Instant Secure Erase (ISE) feature on the device. A value of yes will enable ISE, a
value of no will disable ISE.
--node-lnn {all | <string>}
Specifies the node LNN for which to modify the device configuration. You can specify all to modify
configuration of all nodes. If omitted, all nodes will be modified.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices config view
[--node-lnn {all | <string>}]
Options
--node-lnn {all | <string>}
Syntax
isi devices drive add {<bay> | --sled <string>}
[--node-lnn <integer>]
[--force]
[--verbose]
Options
{<bay> | all}
Specifies the bay number that contains the drive to be added to the node. You can specify all to scan
the entire node.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B
| C | D | E].
--node-lnn <integer>
Specifies the node number to scan for new drives. If omitted, the local node will be scanned.
{--force | -f}
Adds the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware list
[--node-lnn <string>]
[--sled <string> ]
[{--summary | -s}]
[{--override | -v}]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--node-lnn {all | <integer>}
Specifies the node number of the drives you would like to display firmware information for. You may
specify all nodes. If omitted, only the drive firmware information for the local node will be displayed.
Syntax
isi devices drive firmware update list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware update start <bay>
[--node-lnn <integer>]
Options
{<bay> | all}
Specifies the bay number that contains the drive to be updated. You can specify all to update every
drive in the node.
--node-lnn <integer>
Specifies the node number on which to update drives. If omitted, drives will be updated in the local node.
{--force | -f}
Updates the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware update view
[--node-lnn <integer>]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that is running the firmware update you want to
view. If omitted, firmware update status for the local node will be displayed.
Syntax
isi devices drive firmware view {<bay> | --lnum <integer>}
[--node-lnn <integer>]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to view.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to view. If
omitted, the drive in the local node will be displayed.
Syntax
isi devices format {<bay> | --sled <string>}
[--node-lnn <integer>]
[--purpose <string>]
[--force | -f]
Options
<bay>
Specifies the bay number that contains the drive to be formatted.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B
| C | D | E].
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to format. If
omitted, the specified drive in the local node will be formatted.
--purpose <string>
Specifies the purpose to assign to the new drive. You can view a list of the possible drive purposes by
running isi devices drive purposelist. If omitted, OneFS will automatically assign the drive
purpose.
{--force | -f}
Formats the drive without asking for confirmation.
NOTE: You can display nodes that are available to join the cluster by running the command isi devices node list.
Syntax
isi devices list
[--node-lnn <string>]
[--sled <string>]
[--override]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--node-lnn {all | <integer>}
Specifies the node number of the drives you would like to display. You may specify all nodes. If omitted,
only the drives in the local node will be displayed.
Syntax
isi devices node add <serial-number>
[--force]
Options
<serial-number>
Specifies the serial number of the node you want to add to the cluster.
{--force | -f}
Adds the node to the cluster without asking for confirmation.
Syntax
isi devices node list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
Syntax
isi devices node smartfail
[--node-lnn <integer>]
[--force]
[--verbose]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to smartfail. If omitted, the local
node will be smartfailed.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices node stopfail
[--node-lnn <integer>]
[--force]
[--verbose]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to discontinue smartfailing. If
omitted, the local node will discontinue smartfailing.
{--force | -f}
Discontinues smartfailing the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices purpose {<bay> | --lnum <integer>}
[--node-lnn <integer>]
[--purpose <string>]
[--force | -f]
[--verbose | -v]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to assign.
--purpose <string>
Specifies the purpose to assign to the drive. You can view a list of the possible drive purposes by running
isi devices drive purposelist.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to assign. If
omitted, the specified drive in the local node will be assigned.
{--force | -f}
Formats the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices purposelist
[--node-lnn <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to view the purpose list for. If
omitted, the purpose list of the local node will display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
NOTE: You can smartfail a node by running the command isi devices node smartfail.
Syntax
isi devices smartfail {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to smartfail.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to smartfail. If
omitted, the specified drive in the local node will be smartfailed.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B
| C | D | E].
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
NOTE: You can discontinue the smartfail process on a node by running the command isi devices node stopfail.
Syntax
isi devices stopfail {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to discontinue smartfailing.
Syntax
isi devices suspend {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer> | --sled <string>}
Specifies the bay number or LNUM (logical drive number), or prefix for the location of the sled drive(s)
to suspend. The --sled<string> must be one of [A | B | C | D | E].
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to suspend. If
omitted, the specified drive in the local node will be suspended.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices view {<bay> | --lnum <integer>}
[--node-lnn <integer>]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to view.
Syntax
isi diagnostics gather settings modify
[--upload {enable | disable}]
[--esrs {enable | disable}]
[--supportassist <boolean>]
[--gather-mode {incremental | full | partial}]
[--http-insecure-upload <boolean>]
[--http-upload-host <host>]
[--http-upload-path <path>]
[--http-upload-proxy <host>]
[--http-upload-proxy-port <port>]
[--clear-http-upload-proxy-port]
[--ftp-upload {enable | disable}]
[--ftp-upload-host <host>]
[--ftp-upload-path <path>]
[--ftp-upload-proxy <host>]
[--ftp-upload-proxy-port <port>]
[--clear-ftp-upload-proxy-port]
[--ftp-upload-user <username>]
[--ftp-upload-ssl-cert <string>]
[--ftp-upload-insecure <boolean>]
[--group <string>]
[--clear-group]
[--gather-begin <string>]
[--clear-gather-begin]
[--gather-past <string>]
[--clear-gather-past]
[--ftp-upload-pass <password>]
Options
--upload {enable | disable}
Enables the upload of gathered logs
--esrs {enable | disable}
Specifies EMC Secure Remote Services (ESRS) for log uploads.
--supportassist {boolean}
Specifies SupportAssist for log uploads.
--gather-mode {incremental | full}
Specifies whether you will start an incremental or full gather of logs.
--http-insecure-upload {boolean}
Enable insecure HTTP for log uploads.
--http-upload-host <host>
Specifies the HTTP site for upload.
--http-upload-path <path>
Specifies the HTTP upload directory.
--http-upload-proxy <host>
Specifies an HTTP proxy server.
--http-upload-proxy-port <port>
Specifies the HTTP proxy server port.
--clear-http-upload-proxy-port
Clears the proxy server port to use for HTTP upload.
--ftp-upload {enable | disable}
Specifies FTP for log uploads.
--ftp-upload-host <host>
Specifies the FTP site for upload.
--ftp-upload-path <path>
Specifies the FTP upload directory.
--ftp-upload-proxy <host>
Specifies an FTP proxy server.
--ftp-upload-proxy-port <port>
Specifies the FTP proxy server port.
--clear-ftp-upload-proxy-port
Clears the proxy server port to use for FTP upload.
--ftp-upload-user <username>
Specifies the FTP site username. The default user is anonymous.
--ftp-upload-ssl-cert <string>
Specifies the SSL cert to use for FTPS connection.
--ftp-upload-insecure <boolean>
Specifies if the FTP upload will be plain text.
--group <string>
Specifies which component groups to gather. The accepted format is one or more component groups,
separated by commas. For example: "node,admin". For a list of valid component groups, run isi
diagnostics gather groups.
--clear-group
Syntax
isi diagnostics gather settings view
Options
This command has no options.
Syntax
isi diagnostics gather start
[--upload {enable | disable}]
[--esrs {enable | disable}]
[--supportassist <boolean>]
[--gather-mode {incremental | full} | partial]
[--http-insecure-upload <boolean>
[--http-upload-host <host>]
[--http-upload-path <path>]
[--http-upload-proxy <host>]
[--http-upload-proxy-port <port>]
[--ftp-upload {enable | disable}]
[--ftp-upload-host <host>]
Options
--upload {enable | disable}
Enables the upload of gathered logs
--esrs {enable | disable}
Specifies EMC Secure Remote Services (ESRS) for log uploads.
--supportassist<boolean>
Use SupportAssist for gather upload.
--gather-mode {incremental | full | partial}
Specifies whether you will start an incremental or full gather of logs.
--http-insecure-upload <boolean>
Enables insecure HTTP for log uploads.
--http-upload-host <host>
Specifies the HTTP site for upload.
--http-upload-path <path>
Specifies the HTTP upload directory.
--http-upload-proxy <host>
Specifies an HTTP proxy server.
--http-upload-proxy-port <port>
Specifies the HTTP proxy server port.
--ftp-upload <boolean>
Specifies FTP for log uploads.
--ftp-upload-host <host>
Specifies the FTP site for upload.
--ftp-upload-path <path>
Specifies the FTP upload directory.
--ftp-upload-proxy <host>
Specifies an FTP proxy server.
--ftp-upload-proxy-port <port>
Specifies the FTP proxy server port.
--ftp-upload-user <username>
Specifies the FTP site username. The default user is anonymous.
--ftp-upload-ssl-cert <string>
Specifies the SSL certificate to use for the FTPS connection.
--ftp-upload-insecure <boolean>
Enables insecure FTP for log uploads.
--group <string>
Syntax
isi diagnostics gather status
Options
This command has no options.
Syntax
isi diagnostics gather stop
Options
This command has no options.
Syntax
isi diagnostics netlogger settings modify
[--interfaces <interface>]
[--count <integer>]
[--duration <duration>]
[--snaplength <bytes>]
[--nodelist <LNN>]
[--clients <IP>]
[--ports <string>]
[--protocols {ip | ip6 | arp | tcp | udp | vlan}]
[--verbose]
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes. The default value is
three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format <integer>{Y|M|W|D|H|m|
s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is 64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number (LNN). Multiple values
can be specified in a comma-separated list, for example, --nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified in a comma-separated
list. The default value is all.
--ports <port>
Specifies TCP or UDP ports to report statistics on. Multiple ports can be specified in a comma-separated
list. The default value is all.
--protocols {ip | ip6 | arp | tcp | udp | vlan}
Specifies a protocol to report statistics on.
{--verbose | -v}
Displays more detailed information.
Syntax
isi diagnostics netlogger settings view
Options
This command has no options.
Syntax
isi diagnostics netlogger start
[--interfaces <interface>]
[--count <integer>]
[--duration <duration>]
[--snaplength <bytes>]
[--nodelist <LNN>]
[--clients <IP>]
[--ports <string>]
[--protocols {ip | ip6 | arp | tcp | udp | vlan}]
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes. The default value is
three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format <integer>{Y|M|W|D|H|m|
s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is 64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number (LNN). Multiple values
can be specified in a comma-separated list, for example, --nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified in a comma-separated
list. The default value is all.
--ports <port>
Syntax
isi diagnostics netlogger status
Options
This command has no options.
Syntax
isi diagnostics netlogger stop
Options
This command has no options.
isi dm accounts
Manage Datamover accounts. Datamover accounts define how OneFS communicates with other storage systems.
Syntax
isi dm accounts <action>
[--timeout <integer>]
[{--help | -h}]
Syntax
isi dm accounts create <account-type> <uri> <name>
[--remote-network-pool <string> ]
[--local-network-pool <string> ]
[--auth-mode {CLOUD | CERTIFICATE}]
[--access-id <string> ]
[--proxy-port {<integer> | --proxy-type {SOCKS_4 | SOCKS_5 | HTTP}
| --proxy-uri <string> | --proxy-username <string>
| --proxy-password <string> | --enable-encryption {yes | no}
| --secret-key <string> }]
[{--verbose | -v}]
[{--help | -h}]
Options
<account-type>
The type of Datamover account to create. Use one of the following values:
Table 5. <account-type>
Value Description
DM The account will handle Datamover files. The URI format is dm://
<hostname>.
AWS_S3 The account will handle AWS S3 objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>.
ECS_S3 The account will handle ECS S3 objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>.
AZURE The account will handle AZURE objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>.
GCP The account will handle GCP objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>.
<uri>
Specifies the storage system URI to communicate with.
<name>
Specifies the name of the Datamover account. The name is ideally a round robin DNS name for the
remote cluster, but can also be an IPv4 or IPv6 address. OneFS handles load-balancing internally.
--remote-network-pool <groupnet>.<subnet>.<pool>
Syntax
isi dm accounts delete <account ID>
[{--force | -f}]
[{--help | -h}]
[{--verbose | -v}]
Options
account ID
The Datamover account ID or name to delete.
{--force | -f}
Delete the Datamover account and do not ask for confirmation.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi dm accounts list
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
--limit | -l} <integer>
Specifies the number of Datamover accounts to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi dm accounts modify <account ID>
[--account-type {DM | AWS_S3 | ECS_S3 | AZURE}]
[--uri <string>]
[--remote-network-pool <string> ]
[--local-network-pool <string> ]
[--auth-mode {CLOUD | CERTIFICATE}]
[--access-id <string>]
[--proxy-port {<integer> | --proxy-type {SOCKS_4 | SOCKS_5 | HTTP}
| --proxy-uri <string> | --proxy-username <string>
| --proxy-password <string> | --enable-encryption {yes | no}]
[--name<string>]
[--secret-key <string>]
[{--verbose | -v}]
[{--help | -h}]
Table 6. Values
Value Description
DM The account will handle Datamover files. The URI format is dm://
<hostname>. Set --auth-mode to CERTIFICATE.
AWS_S3 The account will handle AWS S3 objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>. Set --auth-mode
to CLOUD.
ECS_S3 The account will handle ECS S3 objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>. Set --auth-mode
to CLOUD.
AZURE The account will handle AZURE objects. The URI format is {http |
https}://<hostname>:<port>/<bucketname>. Set --auth-mode
to CLOUD.
--uri <string>
A valid URI that points to the data storage.
--remote-network-pool <groupnet>.<subnet>.<pool>
Optional. Specifies the remote network pool to connect to.
--local-network-pool <groupnet>.<subnet>.<pool>
Optional. Specifies the local network pool to connect to.
--auth-mode {CLOUD | CERTIFICATE}
The authentication mode for this account: cloud authentication or certificate.
Cloud service providers such as AWS, AZURE, or ECS are accessed by clients using an access ID and
secret key. Specify --auth-mode as CLOUD, then specify cloud authentication credentials to connect
to cloud service providers. Specify CERTIFICATE authentication for DataMover accounts.
--access-id <string>
Specifies the Cloud account access ID. Specify the --access-id when you specify --auth_mode as
CLOUD.
If auth_mode is CLOUD, specify the following cloud authentication credentials:
● --access-id
● --secret-key
● --proxy-port
● --proxy-type
● --proxy-username
● --proxy-password
If auth_mode is CERTIFICATE, specify only the --enable-encryption option.
--proxy-port <integer>
Specifies the Cloud services proxy port to use.
--proxy-type {SOCKS_4 | SOCKS_5 | HTTP }
Specifies the type of the Cloud services proxy port. Specify one of SOCKS_4, SOCKS_5, or HTTP.
--proxy-uri <string>
Specifies the Cloud services proxy port URI.
--proxy-username <string>
Syntax
isi dm accounts view <account ID>
[--help]
Options
<account ID>
Specifies the unique ID or name of the account to view.
--help | -h
Displays help for this command.
isi dm base-policies
Manage Datamover base policies. OneFS communicates with other storage systems.
Base policies are templates that provide common values to groups of related policies, such as schedule, source base path,
enable or disable. For example, disabling a base policy disables every policy that is linked to that base policy.
Syntax
isi dm base-policies <action>
[--timeout <integer>]
[{--help | -h}]
Options
<action>
Specifies the base policy action (subcommand) to perform: create, delete, list, modify, or view.
--timeout <integer>
Syntax
isi dm base-policies create <name> <enabled> <priority> {LOW | NORMAL | HIGH}
[--base-account-id <string>]
[--new-tasks-account <string>]
[--override-list {ENABLED | PRIORITY | SCHEDULE | BRIEFCASE | SOURCE_ACCOUNT_ID |
TARGET_ACCOUNT_ID | BASE_ACCOUNT_ID | TASK_ACCOUNT_ID | SUBPATHS | SOURCE_BASE_PATH |
TARGET_BASE_PATH | SRC_DATASET_RETENTION | TGT_DATASET_RETENTION}]
[--date-times <string>]
[--recurrence <string>]
[--start-time <string>]
[--source-account-id <string>]
[--soure-base-path <string>]
[--source-subpaths <string>]
[--source-dataset-retention-period <integer>]
[--source-dataset-expiry-action {DELETE}]
[--target-dataset-retention-period <integer>]
[--target-dataset-expiry-action {DELETE}]
[--target-account-id <string>]
[--target-base-path <string>]
[{--help | -h}]
Options
<name>
The base policy name.
<enabled> {True | False}
A Boolean value indicating whether or not the base policy is enabled. True means that the base policy is
enabled. False means that the base policy is disabled.
<priority> ({LOW | NORMAL | HIGH )
The priority of the base policy. Specify one of LOW, NORMAL, or HIGH.
--base-account-id <string>
Specifies the Datamover account ID of the local or remote Datamover system on which to create the
base policy.
--new-tasks-account <string>
Specifies the Datamover account of the system to create tasks on. This overrides the default task
affinity.
--override-list {ENABLED | PRIORITY | SCHEDULE | BRIEFCASE | SOURCE_ACCOUNT_ID |
TARGET_ACCOUNT_ID | BASE_ACCOUNT_ID | TASK_ACCOUNT_ID | SUBPATHS | SOURCE_BASE_PATH |
TARGET_BASE_PATH | SRC_DATASET_RETENTION | TGT_DATASET_RETENTION}
The list of fields that override a concrete policy. Specify multiple fields separated by commas.
--date-times <string>
Specifies the date and times at which to run this base policy. The --date-times parameter value
overrides the --start-time and --recurrence parameter values. Specify multiple date/time values
separated by commas. Date/time format is "yyyy-mm-dd hh:mm:ss".
--recurrence <string>
--source-subpaths="hr","finance"
--source-dataset-retention-period <integer>
Specifies the number of seconds after which the dataset expires.
--source-dataset-expiry-action DELETE
The action to take after the source dataset expires. I guess DELETE is the default/only action?
--target-dataset-retention-period <integer>
Specifies the number of seconds to retain the dataset. The count begins at dataset creation.
--target-dataset-expiry-action DELETE
The action to take after the target dataset expires. I guess DELETE is the default/only action?
--target-account-id <string>
Specifies the Datamover account ID of the target data storage.
--target-base-path <string>
Specifies the file system base path on the target Datamover system on which to create the dataset
directories and files.
--help | -h
Displays help for this command.
Syntax
isi dm base-policies delete <base policy id>
[{--force | -f]
[{--help | -h}]
[{--verbose | -v}]
Options
<base policy id>
Syntax
isi dm base-policies list
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
--limit | -l} <integer>
Specifies the number of Datamover base policies to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi dm base-policies modify <base policy id>
[--name <string>]
[--enabled=<boolean>]
[--base-account-id <string>]
[--new-tasks-account <string>]
[--override-list {ENABLED | PRIORITY | SCHEDULE | BRIEFCASE | SOURCE_ACCOUNT_ID |
TARGET_ACCOUNT_ID | BASE_ACCOUNT_ID | TASK_ACCOUNT_ID | SUBPATHS | SOURCE_BASE_PATH |
TARGET_BASE_PATH | SRC_DATASET_RETENTION | TGT_DATASET_RETENTION}]
Options
<base policy id>
The unique base policy identifier.
--name=<string>
The base policy name.
--enabled=<boolean>
A Boolean value indicating whether or not the base policy is enabled. True means that the base policy is
enabled. False means that the base policy is disabled.
--base-account-id <string>
Specifies the Datamover account ID of the local or remote Datamover system on which to modify the
base policy.
--new-tasks-account <string>
Specifies the Datamover account of the system to create tasks on. This overrides the default task
affinity.
--override-list {ENABLED | PRIORITY | SCHEDULE | BRIEFCASE | SOURCE_ACCOUNT_ID |
TARGET_ACCOUNT_ID | BASE_ACCOUNT_ID | TASK_ACCOUNT_ID | SUBPATHS | SOURCE_BASE_PATH |
TARGET_BASE_PATH | SRC_DATASET_RETENTION | TGT_DATASET_RETENTION}
The list of fields that override a concrete policy. Specify multiple fields separated by commas.
--priority=(LOW | NORMAL | HIGH)
The priority of the base policy.
--date-times <string>
Specifies the date and times at which to run this base policy. The --date-times parameter value
overrides the --start-time and --recurrence parameter values. Specify multiple date/time values
separated by commas. Date/time format is "yyyy-mm-dd hh:mm:ss" .
--recurrence <string>
Specifies the cron expression that represents a recurring start time schedule for the policy, enclosed
in double quotes (""). You can specify multiple cron expressions separated by colons (':'). For example:
"5,10,15 * * * *":"30 * 1 * 7".
--start-time <string>
Specifies the date/time of the first run of the policy. The date/time format is 'yyyy-mm-dd hh:mn:ss',
where year range is 2001-2099.
--source-account-id <string>
Specifies the Datamover account ID of the source data storage.
--source-base-path <string>
Specifies the filevsystem base file path on the source Datamover system from which to create the
dataset directories and files.
--source-subpaths
--source-subpaths="hr","finance"
--source-dataset-retention-period <integer>
Specifies the number of seconds after which the dataset expires.
--source-dataset-expiry-action DELETE
The action to take after the source dataset expires. I guess DELETE is the default/only action?
--target-dataset-retention-period <integer>
Specifies the number of seconds to retain the dataset. The count begins at dataset creation.
--target-dataset-expiry-action DELETE
The action to take after the target dataset expires. I guess DELETE is the default/only action?
--target-account-id <string>
Specifies the Datamover account ID of the target data storage.
--target-base-path <string>
Specifies the file system base path on the target Datamover system on which to create the dataset
directories and files.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information for this command.
Syntax
isi dm base-policies view <base policy id>
[--help]
Options
<base policy id>
The unique identifier of the base policy to view.
--help | -h
Displays help for this command.
isi dm certificates
Manage Datamover certificates.
Syntax
isi dm certificates <subcommand>
[--timeout <integer>]
[{--help | -h}]
isi dm certificates ca
Manage Datamover CA certificates.
Syntax
Options
<action>
The Datamover CA certificate action to perform: create, delete, list, modify, or view.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
Options
<certificate-path>
Specifies the local path from which to import the certificate.
<name>
The name of the certificate.
--description <string>
Description of the certificate.
Syntax
Options
<certificate ID>
Specifies the unique server certificate identifier.
--force | -f
Delete the CA certificate without asking for confirmation.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more details about this command.
Syntax
Options
<certificate-path>
Specifies the local path from which to import the certificate.
<name>
The name of the certificate.
--description <string>
Description of the certificate.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more details about this command.
Syntax
Options
<id>
The unique server certificate identifier.
<name>
The name of the certificate.
--description <string>
Description of the certificate.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more details about this command.
Syntax
Options
--limit | -l} <integer>
Specifies the number of Datamover CA certificates to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Syntax
Options
<server ID>
The unique server certificate identifier.
--description <string>
The certificate description.
{ --help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information about this command.
Syntax
Options
<server id>
The unique server identifier of the certificate to view.
--help | -h
Displays help for this command.
Syntax
Syntax
Options
<certificate-path>
Specifies the local path from which to import the certificate.
<name>
The name of the certificate.
--certificate-key-path <string>
Local path to the certificate key to import.
--certificate-key-password <string>
Specifies the private key password. If the key has a password set, you must specify the private key
password to avoid connection errors.
--description <string>
Description of the certificate.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more details about this command.
Syntax
Syntax
Options
--limit | -l} <integer>
Specifies the number of Datamover identity certificates to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
Syntax
Options
<server id>
The unique server identifier of the certificate to view.
--help | -h
Displays help for this command.
isi dm datasets
Display Datamover dataset information.
You can list Datamover datasets and view detailed information about them.
Syntax
isi dm datasets <action>
[--timeout <integer>]
[{--help | -h}]
Options
<action>
Specifies the datasets action to perform: list or view.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
isi dm datasets list
[--account-id <string>]
[--base-path <string>]
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
--account-id <string>
Filter the datasets to list based on the unique Datamover account ID .
--base-path <string>
Filter the datasets to list based on the base path.
--limit | -l} <integer>
Specifies the number of Datamover identity certificates to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
isi dm datasets view <dataset ID>
[--help]
isi dm historical-jobs
Manage Datamover jobs that have finished, have failed, or were canceled.
Syntax
isi dm historical-jobs <action>
[--timeout <integer>]
[{--help | -h}]
Options
<action>
Specifies the base policy action to perform:
● delete: Delete historical jobs.
● list: View a list of historical jobs.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
isi dm historical-jobs delete
[--after-time <string>]
[{--force | -f}]
[{--help | -h}]
[{--verbose | -v}]
Options
--after-time <string>
Delete jobs that ended after the specified time. The time format is "YYYY-MM-DD HH:MM:SS", enclosed
in double quotes (""). For example: "2022-04-28 21:09:54". The default action is to delete jobs that
ended in the last 24 hours.
{--force | -f}
Deletes the base policy without asking for confirmation.
Syntax
isi dm historical-jobs list
[--after-time <string>]
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
--after-time <string>
List jobs that ended after the specified time. The time format is "YYYY-MM-DD HH:MM:SS", enclosed in
double quotes (""). For example: "2022-04-28 21:09:54". The default action is to list jobs that ended in
the last 24 hours.
--limit | -l} <integer>
Specifies the number of historical jobs to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
isi dm jobs
Manage Datamover jobs.
Syntax
isi dm jobs <action>
[--timeout <integer>]
[{--help | -h}]
Syntax
isi dm jobs list
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
{--limit | -l} <integer>
Specifies the number of Datamover jobs to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
isi dm jobs modify <job ID>
[--action {PAUSE_JOB | RESUME_JOB | CANCEL_JOB | COMPLETE_PARTIAL_JOB}]
[{--verbose | -v}]
[{--help | -h}]
Options
<job ID>
The unique job identifier.
--action {PAUSE_JOB | RESUME_JOB | CANCEL_JOB | COMPLETE_PARTIAL_JOB}
The requested job modification.
{ --help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information about this command.
Syntax
isi dm job view <job ID>
[--help]
Options
<dataset ID>
The unique identifier of the job to view.
--help | -h
Displays help for this command.
isi dm policies
Manage Datamover policies.
Syntax
isi dm policies <action>
[--timeout <integer>]
[{--help | -h}]
Syntax
isi dm policies create<name>
[--policy-type {CREATION | EXPIRATION | COPY | REPEAT_COPY}]
[--enabled<boolean>]
[--priority {LOW | NORMAL | HIGH}]
[--run-now<boolean>]
[--base-policy-id<integer>]
[--parent-exec-policy-id<integer>]
[--copy-dataset-id<integer>]
[--copy-source-base-path<string>]
[--copy-source-subpaths<string>]
[--copy-create-dataset-on-target<boolean>]
[--copy-base-base-account-id<string>]
[--copy-base-source-account-id<string>]
[--copy-base-target-account-id<string>]
[--copy-base-new-tasks-account<string>]
[--copy-base-target-base-path<string>]
[--copy-base-target-dataset-type {FILE_ON_OBJECT_COPY | FILE_ON_OBJECT_BACKUP | FILE}]
[--copy-base-dataset-retention-period<integer>]
[--copy-base-dataset-reserve<integer>]
[--copy-base-policy-dataset-expiry-action {DELETE}]
[--creation-account-id<string>]
[--creation-base-path<string>]
[--creation-dataset-retention-period<integer>]
[--creation-dataset-reserve<integer>]
[--creation-dataset-expiry-action {DELETE}]
[--expiration-account-id<string>]
[--reconnect<boolean>]
[--repeat-copy-source-base-path<string>]
[--repeat-copy-base-base-account-id<string>]
[--repeat-copy-base-source-account-id<string>]
[--repeat-copy-base-target-account-id<string>]
[--repeat-copy-base-new-tasks-account<string>]
[--repeat-copy-base-target-base-path<string>]
[--repeat-copy-base-target-dataset-type {FILE_ON_OBJECT_COPY | FILE_ON_OBJECT_BACKUP |
FILE}]
[--repeat-copy-base-dataset-retention-period<integer>]
[--repeat-copy-base-dataset-reserve<integer>]
[--repeat-copy-base-dataset-expiry-action {DELETE}]
[--date-times<string>]
[--recurrence<string>]
[--start-time<string>]
[{--help | -h}]
[{--verbose | -v}]
Display options:
--verbose | -v
Displays more detailed help for this command.
--help | -h
Displays help for this command.
Syntax
isi dm policies delete <policy id>
[{--force | -f]
[{--help | -h}]
[{--verbose | -v}]
Syntax
isi dm policies list
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--help]
[--verbose]
Options
--limit | -l} <integer>
Specifies the number of Datamover policies to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi dm policies modify <name>
[--enabled <boolean>]
[--priority {LOW | NORMAL | HIGH}]
[--policy-type {CREATION | EXPIRATION | COPY | REPEAT_COPY}]
[--run-now <boolean>]
[--base-policy-id <integer>]
[--parent-exec-policy-id <integer>]
[--copy-dataset-id <integer>]
[--copy-source-base-path <string>]
[--copy-source-subpaths <string>]
[--copy-create-dataset-on-target <boolean>]
[--copy-base-base-account-id <string>]
[--copy-base-source-account-id <string>]
[--copy-base-target-account-id <string>]
[--copy-base-new-tasks-account <string>]
[--copy-base-target-base-path <string>]
[--copy-base-target-dataset-type {FILE_ON_OBJECT_COPY | FILE_ON_OBJECT_BACKUP | FILE}]
[--copy-base-dataset-retention-period <integer>]
[--copy-base-dataset-reserve <integer>]
[--copy-base-policy-dataset-expiry-action {DELETE}]
[--creation-account-id <string>]
[--creation-base-path <string>]
[--creation-dataset-retention-period <integer>]
[--creation-dataset-reserve <integer>]
[--creation-dataset-expiry-action {DELETE}]
[--expiration-account-id <string>]
[--reconnect <boolean>]
[--repeat-copy-source-base-path <string>]
[--repeat-copy-base-base-account-id <string>]
[--repeat-copy-base-source-account-id <string>]
[--repeat-copy-base-target-account-id <string>]
[--repeat-copy-base-new-tasks-account <string>]
[--repeat-copy-base-target-base-path <string>]
[--repeat-copy-base-target-dataset-type {FILE_ON_OBJECT_COPY | FILE_ON_OBJECT_BACKUP |
FILE}]
[--repeat-copy-base-dataset-retention-period <integer>]
[--repeat-copy-base-dataset-reserve <integer>]
[--repeat-copy-base-dataset-expiry-action {DELETE}]
[--date-times <string>]
[--recurrence <string>]
[--start-time <string>]
[{--help | -h}]
[{--verbose | -v}]
Options
<name>
Specifies the policy name.
--priority {LOW | NORMAL | HIGH}
The priority of the policy.
--enabled <boolean>
A Boolean value indicating whether or not the policy is enabled. True = policy enabled. False = policy
disabled.
--policy-type { CREATION | EXPIRATION | COPY | REPEAT_COPY}
Specifies the policy type.
--run-now <boolean>
Syntax
isi dm policies view <policy id>
[--help]
Options
<policy id>
The unique identifier of the policy to view.
--help | -h
Displays help for this command.
isi dm throttling
Manage Datamover throttling bandwidth and settings.
Syntax
isi dm throttling <subcommand>
[--timeout <integer>]
[{--help | -h}]
Options
<action>
Specifies the subcommand to perform:
● bw-rules: manage Datamover throttling bandwidth.
● settings: manage Datamover throttling settings.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
Syntax
Options
<rule-type> {NETMASK}
Specifies the bandwidth throttling rule type. Throttling is applied to the network segment described by
the netmask. Netmask is required.
netmask
Required. Specifies the netmask. For example: 192.168.0.100/16 or
2001:0db8:85a3:0000:0000:8a2e:0370:7334/64.
bw-limit
Specifies the bandwidth limit in bytes per second. Bandwidth limit is a scaled value formatted as
<integer>[kMGTP], where [kMGTP] indicates the byte size suffix, such as1024k, 500M, 20G, and
so on. For example, setting bw-limit to 20M means 20 megabytes per second of traffic.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed help for this command.
Syntax
Syntax
Options
--limit | -l} <integer>
Specifies the number of throttling bandwidth rules to display.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<rule id>
Syntax
Options
<action>
Specifies the action to perform: modify or view.
--timeout <integer>
Specifies the number of seconds for a command timeout.
--help | -h
Displays help for this command.
Syntax
Options
--allowed-cpu-threshold <integer>
Specifies the alowed CPU percentage threshold for the Datamover.
--system-cpu-load-threshold <integer>
Specifies the system CPU load threshold at which Datamover "backs off" if it is consuming more than
the allowed CPU percentage.
--help | -h
Displays help for this command.
--verbose | -v
Displays more detailed help for this command.
Syntax
Options
--help | -h
Displays help for this command.
Topics:
• isi email settings modify
• isi email settings view
Syntax
isi email settings modify
[--mail-relay <string>]
[--smtp-port <integer>]
[--mail-sender <string>]
[--mail-subject <string>]
[--use-smtp-auth {yes | no}]
[--smtp-auth-username | -u <string>]
[--use-encryption {yes | no}]
[--batch-mode {all | severity | category | none}]
[--user-template <string>]
[--clear-user-template]
[--smtp-auth-passwd | -p <string>]
[--clear-smtp-auth-passwd]
[--set-smtp-auth-passwd]
[--verbose | -v]
Options
--mail-relay <string>
Sets the SMTP relay address.
--smtp-port <integer>
Sets the SMTP port. The default is 25.
--mail-sender <string>
Sets the originator email address.
--mail-subject <string>
Set the prefix string for the email subject.
--use-smtp-auth {yes | no}
Use SMTP authentication.
--smtp-auth-username | -u <string>
Sets the SMTP user name.
--use-encryption {yes | no}
Use encryption (TLS) for SMTP authentication.
--batch-mode {all | severity | category | none}
Syntax
isi email settings view
Options
There are no options for this command.
Example
To view the currently-configured email settings, run the following command:
Mail Relay: -
SMTP Port: 25
Mail Sender: -
Mail Subject: -
Use SMTP Auth: No
SMTP Auth Username: -
Use Encryption: No
Batch Mode: none
User Template: -
SMTP Auth Password Set: False
Syntax
isi esrs modify
[--enabled <boolean>]
[--username <string>]
[--password <string>]
[--force]
[--primary-esrs-gateway <string>]
[--secondary-esrs-gateway <string>]
[--alert-on-disconnect <boolean>]
[--gateway-access-pools <string> (--clear-gateway-access-pools | --add-gateway-access-
pools <string> | --remove-gateway-access-pools <string>)]
[--connectivity-check-period <integer>]
[--ui-reporting-period <integer>]
[--download-enabled <boolean>]
[--download-timeout-period <integer>]
[--download-error-retries <integer>]
[--download-chunk-size <integer>]
[--download-filesystem-limit <integer>
Options
--enabled (yes Enables or disables ESRS. The default is no.
| no)
--username The Dell EMC user name for technical assistance.
<string>
Syntax
isi esrs view
Options
None OneFS displays ESRS configuration and gateway setting information for the cluster.
Syntax
isi esrs dataitems list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} The number of ESRS data items to display.
<integer>
--format Displays ESRS data items in table, JSON, CSV, or list format.
(table | json |
csv | list)
{--no-header | Do not display headers in table or CSV formats.
-a}
{--no-footer | Do not display table summary footer information.
-z}
{--verbose | Display more detailed information.
-v}
OneFS displays a list of ESRS data items, whether items are enabled, the frequency items are generated, and most recent
timestamp.
Syntax
isi esrs dataitems modify
[--dataitems-enabled <boolean>]
[--name <string>]
[--enabled <boolean>]
[--frequency <duration>]
[--timestamp-delete]
Options
--dataitems- Enables or disables ESRS data items. The default is enabled.
enabled
<boolean>
--name <string> The name of an ESRS data item.
--enabled Enables or disables an ESRS data item.
<boolean>
--frequency Establishes how often an ESRS data item is generated.
<duration>
--timestamp- Resets the last run timestamp for a selected ESRS data item to zero.
delete
Syntax
isi esrs download list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} The number of ESRS downloads to display.
<integer>
--format Displays ESRS data items in table, JSON, CSV, or list format.
(table | json |
csv | list)
{--no-header | Do not display headers in table or CSV formats.
-a}
{--no-footer | Do not display table summary footer information.
-z}
Syntax
isi esrs download start <file> <path>
Options
<file> The file name as displayed in the ESRS file locker.
<path> The path in which the file will be placed after successful download.
Syntax
isi esrs download view <file>
Options
<file> The name of the file as displayed in the ESRS file locker.
Syntax
isi esrs telemetry modify
[--enabled (yes | no)]
Options
--enabled (yes Enables or disables the ESRS telemetry upload feature. This option is enabled by default.
| no)
Syntax
isi esrs telemetry view
Options
None OneFS displays whether ESRS telemetry is enabled and the number of pending uploads.
Syntax
isi event alerts create <name> <condition> {NEW | ONGOING | SEVERITY_INCREASE |
SEVERITY_DECREASE | NEW_EVENTS | RESOLVED} <channel>
[--eventgroup <string>]
Options
<name>
Specifies the alert condition name.
<condition> {NEW | ONGOING | SEVERITY_INCREASE | SEVERITY_DECREASE | NEW_EVENTS |
RESOLVED}
Specifies the condition under which alert is sent for an eventgroup.
Condition values are case sensitive. The following values are valid:
NEW Reports on eventgroup occurrences that have never been reported on before.
ONGOING Provides periodic reports on eventgroup occurrences while an eventgroup is
active.
SEVERITY_INCR Reports on eventgroup occurrences whose severity has increased since the
EASE eventgroup was last reported on.
SEVERITY_DECR Reports on eventgroup occurrences whose severity has decreased since the
EASE eventgroup was last reported on.
NEW_EVENTS Reports on eventgroup occurrences that are new since the eventgroup was last
reported on.
RESOLVED Reports on eventgroup occurrences that have been resolved since the
eventgroup was last reported on.
<channel> ...
Specifies the channel over which to deliver the alert. Use the --channel parameter to specify
additional channels.
--eventgroup <string>...
Specifies the name of one or more eventgroups to alert on. Specify the --eventgroup parameter to
specify additional eventgroups.
--category (all | SYS_DISK_EVENTS | 100000000 | CPOOL_EVENTS | 1100000000 |
NODE_STATUS_EVENTS | 200000000 | REBOOT_EVENTS | 300000000 | SW_EVENTS | 400000000
| QUOTA_EVENTS | 500000000 | SNAP_EVENTS | 600000000 | WINNET_EVENTS | 700000000 |
FILESYS_EVENTS | 800000000 | HW_EVENTS | 900000000 | SYSTEM_ADMIN | 9800000000 |
DELL_SUPPORT | 9900000000)...
Specifies the name of one or more eventgroup categories to alert on. Specify the --category
parameter to specify additional eventgroup categories.
--severity {emergency | critical | warning | information ...
Specifies the event severity that the alert will report on. Severity values are case sensitive. Repeat
--severity to make the alert report on additional severity levels.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the NEW_EVENTS alert condition.
--interval <duration>
Sets the time period between reports for ongoing alerts. Applies only to the ONGOING alert condition.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
--transient <duration>
Sets a minimum time that an eventgroup occurrence must exist before it is reported on. Any occurrence
lasting less than the time period is considered transient and will not be reported.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts delete <name>
[--force | -f]
[--verbose | -v]
Options
<name>
Specifies the name of the alert condition you want to delete.
{--force | -f}
Deletes the alert without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts list
[--channel | -c <string>]
Options
{--channel | -c} <string>
Displays alert conditions for the specified channel only.
{--limit | -l} <integer>
Sets the maximum number of alerts to display.
--sort (condition | interval)
Specifies the field to sort items by.
{--descending | -d}
Sorts the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts modify <name>
[--eventgroup <string>]
[--clear-eventgroup]
[--add-eventgroup <string>]
[--remove-eventgroup <string>]
[--category <string>]
[--clear-category]
[--add-category <string>]
[--remove-category <string>]
[--channel | -c <string>]
[--clear-channel]
[--add-channel <string>]
[--remove-channel <string>]
[--severity {emergency | critical | warning | information}]
[--clear-severity]
[--add-severity {emergency | critical | warning | information}]
[--remove-severity {emergency | critical | warning | information}]
[--condition {NEW | NEW_EVENTS | ONGOING | SEVERITY_INCREASE| SEVERITY_DECREASE
| RESOLVED}]
[--limit <integer>]
[--interval <duration>]
Options
<name>
Specifies the name of the alert you want to modify.
--eventgroup <string>...
Specifies the name of one or more eventgroups to alert on. Specify --eventgroupfor each additional
eventgroup to alert on.
--clear-eventgroup
Clears the value for an eventgroup to alert on.
--add-eventgroup <string>...
Adds the name of one or more eventgroups to alert on. Specify --add-eventgroupfor each additional
eventgroup to add.
--remove-eventgroup <string>...
Removes the name of one or more event groups to alert on. Specify --remove-eventgroupfor each
additional eventgroup to remove.
--category (all | SYS_DISK_EVENTS | 100000000 | CPOOL_EVENTS | 1100000000 |
NODE_STATUS_EVENTS | 200000000 |REBOOT_EVENTS | 300000000 | SW_EVENTS | 400000000
| QUOTA_EVENTS | 500000000 | SNAP_EVENTS | 600000000 |WINNET_EVENTS | 700000000 |
FILESYS_EVENTS | 800000000 | HW_EVENTS | 900000000 | SYSTEM_ADMIN | 9800000000 |
DELL_SUPPORT | 9900000000)...
Specifies the name of one or more eventgroup categories to alert on. Specify --categoryfor each
additional eventgroup category.
--clear-category
Clears the list of eventgroup categories to alert on.
--add-category (all | SYS_DISK_EVENTS | 100000000 | CPOOL_EVENTS | 1100000000 |
NODE_STATUS_EVENTS | 200000000 |REBOOT_EVENTS | 300000000 | SW_EVENTS | 400000000
| QUOTA_EVENTS | 500000000 | SNAP_EVENTS | 600000000 |WINNET_EVENTS | 700000000 |
FILESYS_EVENTS | 800000000 | HW_EVENTS | 900000000 | SYSTEM_ADMIN | 9800000000 |
DELL_SUPPORT | 9900000000)...
Adds the name of one or more eventgroup categories to alert on. Specify --add-category for each
additional eventgroup category to add.
--remove-category (all | SYS_DISK_EVENTS | 100000000 | CPOOL_EVENTS | 1100000000 |
NODE_STATUS_EVENTS | 200000000 |REBOOT_EVENTS | 300000000 | SW_EVENTS | 400000000
| QUOTA_EVENTS | 500000000 | SNAP_EVENTS | 600000000 |WINNET_EVENTS | 700000000 |
FILESYS_EVENTS | 800000000 | HW_EVENTS | 900000000 | SYSTEM_ADMIN | 9800000000 |
DELL_SUPPORT | 9900000000)...
Removes the name of one or more eventgroup categories to alert on. Specify --remove-category
for each additional eventgroup category to remove.
{--channel | -c} <string>...
Specifies the name of one or more channels over which to deliver the alert. Specify --channel to
spcify additional channels.
--clear-channel
Clears the list of channels over which to deliver the alert.
--add-channel <string>...
Adds the name of one or more channels to deliver the alert over. Specify --add-channel for each
additional channel to add.
--remove-channel <string>...
Removes the name of one or more channels to deliver the alert over. Specify --remove-channel for
each additional channel to remove.
--severity {emergency | critical | warning | information}
NEW Reports on eventgroup occurrences that have never been reported on before.
ONGOING Provides periodic reports on eventgroup occurrences that have not been resolved.
SEVERITY_INCR Reports on eventgroup occurrences whose severity has increased since the
EASE eventgroup was last reported on.
SEVERITY_DECR Reports on eventgroup occurrences whose severity has decreased since the
EASE eventgroup was last reported on.
NEW_EVENTS Reports on eventgroup occurrences that are new since the eventgroup was last
reported on.
RESOLVED Reports on eventgroup occurrences that have been resolved since the
eventgroup was last reported on.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the NEW_EVENTS alert condition.
--interval <integer>
Sets the time period between reports for ongoing alerts. Applies only to the ONGOING alert condition.
The following <integer> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--transient <time>
Sets a minimum time that an eventgroup occurrence must exist before it is reported on. Any occurrence
lasting less than the time period is considered transient and will not be reported.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts view <name>
Options
<name>
Specifies the name of the alert condition. Severity conditions are shown as one-letter abbreviations as
follows:
● I - Information
● W - Warning
● C - Critical
● E - Emergency
● * - Any
Syntax
isi event categories list
[--format {table | csv | list | json}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
--format {table | csv | json | list}
Displays output in table (default), comma-separated value (CSV), JavaScript Object Notation (JSON),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels create <name> <type>{smtp | snmp | connecteemc | supportassist}
[--enabled {true | false}]
[--allowed-nodes <integer>]
[--excluded-nodes <integer>]
[--address <string>]
[--send-as <string>]
[--subject <string>]
[--smtp-host <string>]
[--smtp-port <integer>]
[--smtp-use-auth <boolean>]
[--smtp-username <string>]
[--smtp-password <string>]
[--smtp-security {STARTTLS | NONE}]
[--batch {NONE | ALL | CATEGORY | SEVERITY}]
[--batch-period <integer> <time>]
[--host <string>]
[--community <string>]
[--use-snmp-trap {true | false}]
[--snmp-use-v3 {true | false}]
[--snmp-security-name <string>]
[--snmp-security-level {noAuthNoPriv | authNoPriv | authPriv}]
[--snmp-auth-protocol {MD5 | SHA}]
[--snmp-auth-password <string>]
[--snmp-priv-protocol {AES | DES}]
[--snmp-priv-password <string>]
[--snmp-engine-id <string>]
[--verbose | -v]
Options
<name>
Specifies the channel name.
<type>
Specifies the mechanism by which alerts are sent.
Type values are case sensitive. The following values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--host <string>
For SNMP channels only. Specifies the host name or address.
--community <string>
For SNMP channels only. Specifies the community string.
--use-snmp-trap {true | false}
Specifies using snmptrap instead of snmpinform for this channel.
--snmp-use-v3 {true | false}
Specifies using version 3 traps for this channel.
--snmp-security-name <string>
Specifies the name for the version 3 user. Required for SNMPv3 channels.
--snmp-security-level {noAuthNoPriv | authNoPriv | authPriv}
Specifies the SNMPv3 security level for this channel. Default value is authNoPriv.
--snmp-auth-protocol {MD5 | SHA}
Specifies the SNMPv3 authentication algorithm to use for this channel. Default value is SHA.
--snmp-auth-password <string>
Syntax
isi event channels delete <name>
[--force | -f]
[--verbose | -v]
Options
<name>
Specifies the name of the channel you want to delete.
{--force | -f}
Deletes the channel without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels list
[--limit <integer>]
[--sort {id | name | type | enabled | allowed_nodes | excluded_nodes |
address | send_as | subject | smtp_host | smtp_port |
smtp_use_auth | smtp_username | smtp_password | smtp_security |
batch | batch_period | host | community | use_snmp_trap | snmp_use_v3
| snmp_security_name | snmp_security_level | snmp_auth_protocol | snmp_auth_password |
snmp_priv_protocol | snmp_priv_password | snmp_engine_id}
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Syntax
isi event channels <name>
[--type | -t {smtp | snmp | connectemc | supportassist}]
[--enabled {true | false}]
[--allowed-nodes <integer>]
[--clear-allowed-nodes]
[--add-allowed-nodes <integer>]
[--remove-allowed-nodes <integer>]
[--excluded-nodes <integer>]
[--clear-excluded-nodes]
[--add-excluded-nodes <integer>]
[--remove-excluded-nodes <integer>]
[--address <string>]
[--clear-address]
[--add-address <string>]
[--remove-address <string>]
[--send-as <string>]
[--subject <string>]
[--smtp-host <string>]
[--smtp-port <integer>]
[--smtp-use-auth <boolean>]
[--smtp-username <string>]
[--smtp-password <string>]
[--smtp-security {STARTTLS | NONE}]
[--batch {NONE | ALL | CATEGORY | SEVERITY}]
[--batch-period <integer> <time>]
[--host <string>]
[--community <string>]
[--use-snmp-trap {true | false}]
[--snmp-use-v3 {true | false}]
[--snmp-security-name <string>]
[--snmp-security-level (noAuthNoPriv | authNoPriv | authPriv)]
Options
<name>
Specifies the name of the channel you want to modify.
<type>
Specifies the mechanism by which alerts are sent.
Type values are case sensitive. The following values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--host <string>
For SNMP channels only. Specifies the host name or address
--community <string>
For SNMP channels only. Specifies the community string.
--use-snmp-trap <boolean>
For SNMP channels only. Use snmptrap instead of snmpinform for this channel.
Syntax
isi event channels test <name>
Options
<name>
Specifies the name of the channel you want to test.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels view <name>
Options
<name>
Specifies the name of the channel you want to view.
Syntax
isi event events list
[--eventgroup-id <string>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
--eventgroup-id <string>
Displays events that are included in the specified event group.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event events view <id>
Options
<id>
Specifies the instance ID of the event you want to view.
Syntax
isi event groups bulk
[--ignore <boolean>]
[--resolved <boolean>]
[--verbose | -v]
Options
--ignore {true | false}
Specifies whether all eventgroups have a status of ignored. Alerts about the eventgroup will be
suspended until the --ignore option is disabled.
--resolved {true | false}
Specifies whether all event groups have a status of resolved.
After you resolve an eventgroup, you cannot reverse that action. Any new events that would have been
added to the resolved eventgroup will be added to a new eventgroup.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event groups gather <id>
Options
<id>
Specifies the ID number of the event group you want to view.
Syntax
isi event groups list
[--begin | -b <timestamp>]
[--end | -e <timestamp>]
[--resolved {true | false}]
[--ignore {true | false}]
[--events <integer>]
[--cause <string>]
Options
{--begin | -b} <timestamp>
Filters the list to only show event groups that were created after the specified date and time.
Specify <timestamp> in the following format:
{--end | -e} <timestamp>
Filters the list to only show event groups that were created before the specified date and time.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
Listing Options
{--limit | -l} <integer>
Sets the maximum number of event groups to display.
--sort {id | started | causes_long | lnn | devid | last_event | ignore | ignore_time | resolved |
resolve_time | ended | events | severity}
Specifies the field to sort items by.
{--descending | -d}
Sorts the data in descending order.
Display Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
Syntax
isi event <id>
[--ignore {true | false}]
[--resolved {true | false}]
[--verbose]
Options
<id>
Specifies the ID number of the event group you want to modify.
--ignore {true | false}
Specifies whether the event group has a status of ignored.
--resolved {true | false}
Specifies whether the event group has a status of resolved.
After you resolve an event group, you cannot reverse that action. Any new events that would have been
added to the resolved event group will be added to a new event group.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event groups view <id>
Options
<id>
Specifies the ID number of the event group you want to view.
Syntax
isi event settings modify
[--retention-days | -r <integer>]
[--storage-limit | -s <integer>]
[--heartbeat-interval <string>]
[--verbose | -v]
Options
--retention-days | -r <integer>
Retention of resolved eventgroup data and maintenance mode history in days.
--storage-limit | -s <integer>
Sets the amount of memory that event data can occupy on your cluster. You can set this limit to be
between 1 and 100 megabytes of memory. For smaller clusters, the minimum amount of memory that will
be set aside is 1 gigabyte.
--heartbeat-interval <string>
Sets the interval between heartbeat events.
The following <time> values are valid:
● daily
● weekly
● monthly
--verbose | -v
Displays more detailed information.
Syntax
isi event settings view
Syntax
isi event suppress list
[{--limit | -l} <integer>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
Options
{--limit | -l} <integer>
Number of events suppressed to display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi event suppress modify <id>
[{--suppress | -s} <boolean>]
[{--verbose]| -v}
[{--help | -h}
Options
{--suppress | -s} {true | false}
Suppress alerting for an event.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi event test create <message>
[--verbose | -v]
Options
<message>
Specifies the message text of the test event.
{--verbose | -v}
Displays more detailed information.
Syntax
Severity levels display with abbreviations as follows:
● info - Information
● warn - Warning
● crit - Critical
● emerg - Emergency
Options
{--limit | -l} <integer>
Sets the maximum number of alerts to display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event thresholds modify [id]
[{--info | -i} <integer>] |
[{--warn | -w} <integer> ] |
[{--crit | -c} <integer> ] |
[{--emerg | -e} <integer> ] |
[--verbose | -v]
[--help | -h]
Options
<id>
The identifier for the event to modify.
{--info | -i} <integer>
Threshold for the info reporting level as a percentage: 0 to 100.
{--warn | -w} <integer>
Threshold for the --warn reporting level as a percentage: 0 to 100.
{--crit | -c} <integer>
Threshold for the --crit reporting level as a percentage: 0 to 100.
{--emerg | -e} <integer>
Threshold for the --emerg reporting level as a percentage: 0 to 100.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Example
The following command adjusts the critical reporting level for the disk pool space event to raise an alert when usage reaches
70%. Use the isi event thresholds list command to get the event IDs.
Syntax
isi event thresholds reset <id>
[--all | -a]
[{--info | -i} | {--warn | -w} | {--crit | -c} | {--emerg | -e}]
[{--help | -h}]
[{--verbose | -v}]
Syntax
isi event thresholds view <id>
[{--help | -h}]
Options
<id>
The event identifier. To obtain the event ID, run the command isi event thresholds list.
{--help | -h}
Display help for this command.
Syntax
isi event types list
[--category <string>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Syntax
isi fc settings list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--format {table | json | csv | list}
Displays Fibre Channel port settings in table, JSON, CSV, or list format.
{--no-header | -a}]
Does not display headers in table or CSV formats.
{--no-footer | -z}
Does not display table summary footer information.
Examples
The following command displays all ports on node 5:
isi fc 341
isi fc settings modify
Modifies Fibre Channel (FC) settings for a specific port.
Syntax
isi fc settings modify <port>
[--wwnn <string>]
[--wwpn <string>]
[--state {enable | disable}]
[--topology {auto | loop | ptp | nport}]
[--rate {auto | 1 | 2 | 4 | 8 | 16 | 32}]
Required privileges
ISI_PRIV_NDMP
Options
A FC port identified in the form of:
--wwnn <string>
Specifies the world-wide node name (WWNN) of the port as a string of 16 hexadecimal numerals.
--wwpn <string>
Specifies the world-wide port name (WWPN) of the port as a string of 16 hexadecimal numerals.
--state {enable | disable}
Specifies whether the port is enabled or disabled.
--topology {auto | loop | ptp | nport}
Specifies the type of Fibre Channel topology that the port expects. Note that QLogic cards do not
support nport topology. The following settings are valid:
auto Causes the port to detect the topology automatically. This is the recommended
setting. Specify this setting if you are using a fabric topology.
loop Causes the port to expect an arbitrated loop topology, with multiple backup
devices connected to a single port in a circular formation.
ptp Causes the port to expect a point-to-point topology, with one backup device or
Fibre Channel switch directly connected to the port.
auto OneFS automatically negotiates with the DMA to determine the rate. This is the
recommended setting.
1 Attempts to send data through the port at a speed of 1 Gb per second.
2 Attempts to send data through the port at a speed of 2 Gb per second.
4 Attempts to send data through the port at a speed of 4 Gb per second.
8 Attempts to send data through the port at a speed of 8 Gb per second.
16 Attempts to send data through the port at a speed of 16 Gb per second.
32 Attempts to send data through the port at a speed of 32 Gb per second.
342 isi fc
isi fc settings view
Displays settings for a specific Fibre Channel port.
Syntax
isi fc settings view <port>
[--format {list | json}]
Options
<port>
A Fibre Channel port ID in the format <lnn>.<fc port>.
--format {list | json}
Displays the Fibre Channel port settings in list or JSON format.
isi fc 343
20
isi file-filter
Syntax and descriptions for the isi file-filter commands.
Use the isi file-filter commands to manage the file filtering settings in an access zone.
Topics:
• isi file-filter settings modify
• isi file-filter settings view
Syntax
isi file-filter settings modify
[--file-filtering-enabled {yes | no}]
[--revert-file-filtering-enabled]
[--file-filter-extensions <string>...]
[--clear-file-filter-extensions]
[--add-file-filter-extensions <string>]
[--remove-file-filter-extensions <string>]
[--revert-file-filter-extensions]
[--file-filter-type {allow | deny}]
[--revert-file-filter-type
[--zone <string>]
[--verbose]
Options
--file-filtering-enabled {yes | no}
Enables or disables file filtering in the access zone. File filtering is disabled by default.
--revert-file-filtering-enabled
Sets the value of --file-filtering-enabled to the system default value.
--file-filter-extensions <string>...
Specifies a list of file types by their extensions. Each extension should start with a "." such as .txt. You
can specify multiple extensions in a comma-separated list or you run --file-filter-extensions
for each extension.
--clear-file-filter-extensions
Deletes the entire list of file filter extensions.
--add-file-filter-extensions <string>
Adds one or more file filter extensions to the list. Each extension should start with a "." such as .txt.
You can specify multiple extensions in a comma-separated list or you run --add-file-filter-
extensions for each extension.
--remove-file-filter-extensions <string>
Removes one or more file filter extensions from the list. Each extension should start with a "." such
as .txt. You can specify multiple extensions in a comma-separated list or you run --remove-file-
filter-extensions for each extension.
Syntax
isi file-filter settings view
[--zone <string>]
[--format {list | json}]
Options
--zone
Specifies the name of the access zone. If you do not specifiy an access zone, the system will display the
file filtering settings of the System zone.
--format {list | json}
Specifies whether to display the output as a list (default) or in JavaScript Object Notation (JSON).
Topics:
• isi filepool apply
• isi filepool default-policy modify
• isi filepool default-policy view
• isi filepool policies create
• isi filepool policies delete
• isi filepool policies list
• isi filepool policies modify
• isi filepool policies view
• isi filepool templates list
• isi filepool templates view
Syntax
Options
<files>
Files to be processed. Must be within /ifs.
--verbose
Print settings to be applied.
--quiet | -q
Suppresses warning messages.
--nop | -n
Calculates the specified settings without actually applying them. This option is best used with –-
verbose or --stats.
--recurse | -r
Specifies recursion through directories.
Examples
These examples show the results of running isi filepool apply in verbose mode. In the examples, the output shows
the results of comparing the path specified with each file pool policy. The recurse option is set so that all files in the /ifs/
data/projects path are matched against all file pool policies. The first policy listed is always the system default policy. In this
example, the second match is to the file pool policy Technical Data.
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
'Technical Data':
{'Policy Number': 0,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':0, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 0,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
This example shows the result of using the --nop option to calculate the results that would be produced by applying the file
pool policy.
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
{'Policy Number': -1,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':0, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 0,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
Syntax
Options
--data-access-pattern <string>
Specifies the preferred data access pattern, one of random, streaming, or concurrent.
--set-requested-protection <string>
Specifies the requested protection for files that match this filepool policy (for example, +2:1).
--data-storage-target <string>
Specifies the node pool or tier to which the policy moves files on the local cluster.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra
mirror of the file metadata is written to SSDs, if SSDs are available. The SSD
mirror is in addition to the number required to satisfy the requested protection.
Enabling global namespace acceleration (GNA) makes read acceleration available
to files in node pools that do not contain SSDs.
metadata-write Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to five
times more SSD storage than the Metadata setting. Enabling GNA does not
affect read/write acceleration.
data Uses SSD node pools for both data and metadata, regardless of whether global
namespace acceleration is enabled. This SSD strategy does not result in the
creation of additional mirrors beyond the normal requested protection but requires
significantly more storage space compared with the other SSD strategy options.
--snapshot-storage-target <integer>
The ID of the node pool or tier chosen for storage of snapshots.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata, metadata-write, data,
avoid. The default is metadata.
--enable-coalescer {yes | no}
Enable or disable the coalescer, also referred to as SmartCache. The coalescer protects write-back data
through a combination of RAM and stable storage. It is enabled by default, and should be disabled only in
cooperation with EMC Isilon Customer Support.
--enable-packing {yes | no}
Enable packing.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where cloud data is to be
archived.
--cloud-accessibility {cached | no-cache}
Specifies whether, when a SmartLink file is accessed, cloud data is incrementally downloaded (cached)
as needed, or fully downloaded (not cached).
--cloud-cache-expiration <duration>
Example
The command shown in the following example modifies the default file pool policy in several ways. The command sets the
requested-protection-level to +2:1, sets the data-storage-target to anywhere (the system default), and
changes the data--ssd-strategy to metadata-write.
Syntax
isi filepool default-policy view
[--help | -h]
Options
--help | -h
Display help for this command.
The following display shows sample output from the command:
Apply Order: -
File Matching Pattern: -
Set Requested Protection: default
Data Access Pattern: concurrency
Enable Coalescer: True
Data Storage Target: anywhere
Data SSD Strategy: metadata
Snapshot Storage Target: anywhere
Snapshot SSD Strategy: metadata
Cloud Pool: -
Cloud Compression Enabled: -
Cloud Encryption Enabled: -
Cloud Data Retention: -
Cloud Incremental Backup Retention: -
Cloud Full Backup Retention: -
Cloud Accessibility: -
Cloud Read Ahead: -
Cloud Cache Expiration: -
Cloud Writeback Frequency: -
Cloud Archive Snapshot Files: -
Syntax
Options
<name>
Specifies the name of the file pool policy to create.
--begin-filter {<predicate> <operator> <link>}... --end-filter
Specifies the file-matching criteria that determine the files to be managed by the filepool policy. Each file
matching criterion consists of three parts:
● Predicate. Specifies what attribute(s) to filter on. You can filter by path, name, file type, timestamp,
or custom attribute, or use a combination of these attributes.
● Operator. Qualifies an attribute (for example, birth time) to describe a relationship to that attribute
(for example, before).
● Link - Combines attributes using AND and OR statements.
The following predicates are valid:
--size=<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--path=<pathname>
Selects files relative to the specified pathname.
--file-type= <value>
Selects only the specified file-system object type.
The following values are valid:
--operator=<value>
Table 7. --operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
Link arguments can be used to specify multiple file-matching criteria. The following links are valid:
--and
Connects two file-matching criteria where files must match both criteria.
--or
Connects two file-matching criteria where files must match one or the other criteria.
--description <string>
Specifies a description of the filepool policy
--apply-order <integer>
Specifies the order index for execution of this policy.
--data-access-pattern <string>
Data access pattern random, streaming or concurrent.
--set-requested-protection <string>
Specifies a protection level for files that match this filepool policy (e.g., +3, +2:3, 8x).
--data-storage-target <string>
The name of the node pool or tier to which the policy moves files on the local cluster. If you do not
specify a data storage target, the default is anywhere.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra
mirror of the file metadata is written to SSDs, if SSDs are available. The SSD
mirror is in addition to the number required to satisfy the requested protection.
Enabling GNA makes read acceleration available to files in node pools that do not
contain SSDs.
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots. If you do not specify a snapshot
storage target, the default is anywhere.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata, metadata-write, data,
avoid. The default is metadata.
--enable-coalescer {Yes | No}
Enables the coalescer.
--enable-packing {Yes | No}
Enables packing.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where cloud data is to be
archived.
--cloud-accessibility {cached | no-cache}
Specifies the default behavior for accessing a SmartLink (archived) file if there is no file pool policy
for the archived file. If there is a file pool policy for the archived file, that policy and its settings take
precedence over a --cloud-accessibility setting. Specify cache to ensure that only the data
blocks requested are cached and flushed or invalidated based on the cache retention settings. Specify
no-cache to ensure that the data blocks are not cached and do not consume file system blocks long
term.
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed by a unit of time is
accepted. For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
--cloud-compression-enabled {yes | no}
Specifies whether data is to be compressed when archived to the cloud.
--cloud-data-retention <duration>
Specifies the minimum amount of time that archived data will be retained in the cloud after a SmartLink
file is deleted from the cluster. A number followed by a unit of time is accepted. For example, a setting
of 9H would specify a nine-hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-encryption-enabled {yes | no}
Specifies whether data is to be encrypted when archived to the cloud.
--cloud-full-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the creation of a full backup.
A number followed by a unit of time is accepted. For example, a setting of 9H would specify a nine-hour
duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-incremental-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the creation of an
incremental backup. A number followed by a unit of time is accepted. For example, a setting of 9H
would specify a nine-hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-read-ahead {partial | full}
Specifies the cache readahead strategy when SmartLink files are accessed. A partial strategy means
that only the amount of data needed by the user is cached. A full strategy means that all file data will be
cached when the user accesses a SmartLink file.
Examples
The following example creates a file pool policy that moves all files in directory /ifs/data/chemical/arco/finance to
the local storage target named Archive_2.
The following example matches older files that have not been accessed or modified later than specified dates, and moves the
files to an archival tier of storage.
Syntax
isi filepool policies delete <name>
[--force | -f]
[--verbose | -v]
[--help | -h]
Options
<name>
Specifies the name of the file pool policy to be deleted.
--force | -f
Deletes the file pool policy without asking for confirmation.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi filepool policies list
[--limit | -l <integer>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
[--help | -h]
Options
--limit | -l <integer>
Specifies a limit to the number of policies that are displayed.
--format
Output the list of file pool policies in a variety of formats. The following options are valid: table ,
json , csv , and list .
--no-header | -a
Displays table and CSV output without headers.
--no-footer | -z
Displays table output without footers.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Example
The following example lists custom file pool policies in .csv format and outputs the list to a file in the OneFS file system.
Syntax
Options
<id>
Specifies an ID for the filepool policy.
<name>
Specifies the name of the file pool policy to create.
--begin-filter {<predicate> <operator> <link>}... --end-filter
Specifies the file-matching criteria that determine the files to be managed by the filepool policy.
Each file matching criterion consists of three parts:
● Predicate. Specifies what attribute(s) to filter on. You can filter by path, name, file type, timestamp,
or custom attribute, or use a combination of these attributes.
● Operator. Qualifies an attribute (for example, birth time) to describe a relationship to that attribute
(for example, before).
● Link - Combines attributes using AND and OR statements.
The following predicates are valid:
--size=<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--path=<pathname>
--operator=<value>
Table 8. --operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra
mirror of the file metadata is written to SSDs, if SSDs are available. The SSD
mirror is in addition to the number required to satisfy the requested protection.
Enabling GNA makes read acceleration available to files in node pools that do not
contain SSDs.
metadata-write Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to five
times more SSD storage than the Metadata setting. Enabling GNA does not
affect read/write acceleration.
data Uses SSD node pools for both data and metadata, regardless of whether
global namespace acceleration is enabled. This SSD strategy does not result in
the creation of additional mirrors beyond the normal requested protection but
requires significantly increases storage requirements compared with the other
SSD strategy options.
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots.
--clear-snapshot-storage-target
Removes the action to set the snapshot storage target on matching files.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata, metadata-write, data,
avoid. The default is metadata.
--enable-coalescer {Yes | No}
Enables the coalescer.
--clear-enable-coalescer
Removes the action to change the coalescer setting on matching files.
The following example matches older files that have not been accessed or modified later than specified dates, and moves the
files to an archival tier of storage.
Syntax
isi filepool policies view <name>
Options
<name>
Specifies the name of the file pool policy to view. Run the isi filepool policies list
command to list the names of all custom file pool policies.
Example
The following example displays details about a file pool policy named my_policy:
Output from the command would look similar to the following display:
Name: my_policy
Description: Archive older files to the cloud
State: OK
State Details:
Apply Order: 1
File Matching Pattern: Path == data/old_files (begins with) AND Name == *.*
Set Requested Protection: -
Data Access Pattern: -
Enable Coalescer: -
Data Storage Target: -
Data SSD Strategy: -
Snapshot Storage Target: -
Snapshot SSD Strategy: -
Cloud Pool: my_s3_pool
Cloud Compression Enabled: False
Cloud Encryption Enabled: False
Cloud Data Retention: 604800
Cloud Incremental Backup Retention: 604800
Cloud Full Backup Retention: 157680000
Syntax
Options
{--limit | -l} <integer>
Specifies the number of templates to display.
--sort <string>
Sorts data by the field specified.
--descending | -d
Sorts data in descending order.
--format
Displays file pool templates in the specified format. The following values are valid:
table
json
csv
list
--no-header | -a
Displays table and CSV output without headers.
--no-footer | -z
Displays table output without footers.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
Options
<name>
The name of the template to view.
--help | -h
Display help for this command.
Topics:
• isi_for_array
isi_for_array
Runs commands on multiple nodes in an array, either in parallel or in serial.
When options conflict, the one specified last takes precedence.
NOTE: The -k, -u, -p, and -q options are valid only for SSH transport.
Syntax
isi_for_array
[--array-name | -a <array>]
[--array-file | -A <filename>]
[--directory | -d <directory>]
[--diskless | -D]
[--ignore-errors | -I]
[--user | -l | -u <user>]
[--nodes | -n <nodes>]
[--pre-command | -P <command>]
[--quiet | -Q]
[--rpc-timeout <seconds>]
[--serial | -s]
[--storage | -S]
[--throttle | -T <count>]
[--exclude-nodes | -x <nodes>]
[--exclude-down-nodes | -X]
Options
--array-name | -a <array>
Uses <array>.
--array-file | -A <filename>
Reads array information from<filename>. The default looks first for $HOME/.array.xml, then
for /etc/ifs/array.xml.
--directory | -d <directory>
Runs commands from the specified directory on remote computers. The current working directory is the
default directory. An empty <directory> results in commands being run in the user's home directory on
the remote computer.
--diskless | -D
Runs commands from diskless nodes.
--ignore-errors | -I
364 isi_for_array
Suppresses the printing of error messages for nodes that return non-zero exit status. Returns the
maximum exit status from all nodes.
--user | -u | -l <user>
Logs in as <user> instead of as the default root user.
--nodes | -n <nodes>
Runs commands on the specified nodes, which can be specified multiple times. Must be a list of either
node names or ranges of logical node numbers (LNNs); for example, 1,3-5,neal8,10. If no nodes are
explicitly listed, the whole array is used.
--pre-command | -P <command>
Runs the specified command before any other commands. This is useful for setting up the environment
and it can be specified multiple times. You can specify - to reset the list of pre-commands.
--quiet | -Q
Suppresses printing of the host prefix for each output line.
--rpc-timeout<seconds>
The maximum period in secionds before the RPC channel times out. To disable, use the value 0.
--serial | -s
Runs commands in serial instead of parallel.
--storage | -S
Run commands from storage nodes.
--throttle | -T <count>
Adjusts throttling. To disable throttling, specify 0. The default value is 80 for multitasking and 35 for
forking.
--exclude-nodes | -x <nodes>
Excludes specified nodes from the command. This argument is specified in the same manner as the -n
option.
--exclude-down-nodes | -X
Excludes offline nodes from the command. This command is limited to cluster local use only.
Example
In SmartLock compliance mode, to run isi_for_array for a command that requires root privileges, you must specify sudo
twice. For example, the following command runs isi statistics client list on each node in a compliance cluster.
isi_for_array 365
23
isi ftp
Syntax and descriptions for the isi ftp commands.
Use the isi ftp commands to view and modify the cluster FTP settings.
Topics:
• isi ftp settings modify
• isi ftp settings view
Syntax
isi ftp settings modify
[--accept-timeout <duration>]
[--revert-accept-timeout]
[--active-mode <boolean>]
[--revert-active-mode]
[--allow-anon-access <boolean>]
[--revert-allow-anon-access]
[--allow-anon-upload <boolean>]
[--revert-allow-anon-upload]
[--allow-dirlists <boolean>]
[--revert-allow-dirlists]
[--allow-downloads <boolean>]
[--revert-allow-downloads]
[--allow-local-access <boolean>]
[--revert-allow-local-access]
[--allow-writes <boolean>]
[--revert-allow-writes]
[--always-chdir-homedir <boolean>]
[--revert-always-chdir-homedir]
[--anon-chown-username <string>]
[--revert-anon-chown-username]
[--anon-password-list <string> | --clear-anon-password-list |
--add-anon-password-list <string> | --remove-anon-password-list
<string>]
[--revert-anon-password-list]
[--anon-root-path <path>]
[--revert-anon-root-path]
[--anon-umask <integer-octal>]
[--revert-anon-umask]
[--ascii-mode (off | upload | download | both)]
[--revert-ascii-mode]
[--chroot-exception-list <string> | --clear-chroot-exception-list |
--add-chroot-exception-list <string> | --remove-chroot-exception-list
<string>]
[--revert-chroot-exception-list]
[--chroot-local-mode (all | none | all-with-exceptions |
none-with-exceptions)]
[--revert-chroot-local-mode]
[--connect-timeout <duration>]
[--revert-connect-timeout]
[--data-timeout <duration>]
[--revert-data-timeout]
[--denied-user-list <string> | --clear-denied-user-list |
Options
--accept-timeout <duration>
Specifies the time, in seconds, that a remote client has to establish a PASV style data connection before
timeout. All integers between 30 and 600 are valid values. The default value is 60.
--revert-accept-timeout
Sets the value to the system default for --accept-timeout.
--active-mode <boolean>
Allow active mode of FTP connection type.
--revert-active-mode
Set value to system default for --active-mode
--allow-anon-access <boolean>
Controls whether anonymous logins are permitted. If enabled, both the usernames ftp and anonymous
are recognized as anonymous logins.
--revert-allow-anon-access
Sets the value to the system default for --allow-anon-access.
--allow-anon-upload <boolean>
Controls whether anonymous users are able to upload files under certain conditions.
--revert-allow-anon-upload
Sets the value to the system default for --allow-anon-upload.
--allow-dirlists <boolean>
Allow users to list directories.
--revert-allow-dirlists
Sets the value to the system default for --allow-dirlists.
--allow-downloads <boolean>
Allow users to download files.
--revert-allow-downloads
Sets the value to the system default for --allow-downloads.
--allow-local-access <boolean>
Allow local logins.
--revert-allow-local-access
--revert-anon-umask
Sets the value to the system default for --anon-umask.
--ascii-mode {off | upload | download | both}
Enables ASCII downloads, uploads, or both.
--revert-ascii-mode
Sets the value to the system default for --ascii-mode.
--chroot-exception-list <string>
Displays the list of local user chroot exceptions.
numeric Numeric IDs are shown in the user and group fields of directory listings.
textual Names are shown in text format in the user and group fields of directory listings.
hide All user and group information in directory listings is displayed as ftp. This is the
default setting.
--revert-dirlist-names
--revert-file-create-perm
Sets the value to the system default for --file-create-perm.
--limit-anon-passwords <boolean>
Limits anonymous passwords.
--revert-limit-anon-passwords
Sets the value to the system default for --limit-anon-passwords.
--local-root-path <path>
Specifies the initial directory in /ifs for a local login. Valid paths are in /ifs. The default path is the
local user home directory.
--revert-local-root-path
Sets the value to the system default for --local-root-path.
--local-umask <integer-octal>
Species the umask for file creation by local users. Valid values are octal umask numbers. The default
value is 077.
NOTE: The value must contain the 0 prefix; otherwise it will be interpreted as a base 10 integer.
--revert-local-umask
Sets the value to the system default for --local-umask.
--server-to-server <boolean>
Allow server-to-server (FXP) transfers.
--revert-server-to-server
Sets the value to the system default for --server-to-server.
--session-support <boolean>
Maintain login sessions for each user through Pluggable Authentication Modules (PAM).
--revert-session-support
Sets the value to the system default for --session-support.
--session-timeout <duration>
Specifies the maximum time (in seconds) that a remote client may spend between FTP commands
before the remote client is kicked off. Valid values are integers between 30 and 600. The default value is
300 (five minutes).
--revert-session-timeout
Sets the value to the system default for --session-timeout.
--user-config-dir <path>
Specifies the directory where user-specific configurations that override global configurations can be
found. The default value is the local user home directory.
--revert-user-config-dir
Sets the value to the system default for --user-config-dir.
--service <boolean>
Specifies whether the FTP service is enabled.
Syntax
isi ftp settings view
Options
There are no options for this command.
Example
The following is an example of the output generated by this command:
Accept Timeout: 1m
Allow Anon Access: No
Allow Anon Upload: Yes
Allow Dirlists: Yes
Allow Downloads: Yes
Allow Local Access: Yes
Allow Writes: Yes
Always Chdir Homedir: Yes
Anon Chown Username: root
Anon Password List: -
Anon Root Path: /ifs/home/ftp
Anon Umask: 0077
Ascii Mode: off
Chroot Exception List: -
Chroot Local Mode: none
Connect Timeout: 1m
Data Timeout: 5m
Denied User List: -
Dirlist Localtime: No
Dirlist Names: hide
File Create Perm: 0666
Limit Anon Passwords: Yes
Local Root Path: -
Local Umask: 0077
Server To Server: No
Session Support: Yes
Session Timeout: 5m
User Config Dir: -
FTP Service Enabled: No
Topics:
• isi_gather_info
isi_gather_info
Collects and uploads the most recent cluster configuration and log information to Dell Technologies for processing.
Multiple instances of -i, -f, -s, -S, and -1 are allowed.
gather_expr and analysis_expr can be quoted.
The default temporary directory is /ifs/data/Isilon_Support/ (change with -L or -T).
Syntax
isi_gather_info
[-h]
[-v]
[-u <user>]
[-p <password>]
[-i <commands>]
[--include]
[--incremental]
[--full]
[--list-known-commands | -l]
[-f <filename>]
[-n <node-lnns>]
[--local-only]
[--skip-node-check]
[-s]
[-1]
[-a]
[-x <exclude-command>]
[-I]
[-L]
[-T <temp-dir>]
[-t <tarfile>]
[--tardir <tardir>]
[--symlinkdir <symlinkdir>]
[--varlog-recent]
[--varlog-all]
[--nologs]
[--group <group-name>]
[--no-dumps]
[--dumps]
[--no-net-transport]
[--net-transport]
[--no-cores]
[--cores]
[--no-iceage-reports]
[--iceage-reports]
[--debug]
[--verbose]
372 isi_gather_info
[--no-console-logging]
[--log-to <location>]
[--timeout]
[--parallelism]
[--processes]
[--no-status]
[--gather-begin]
[--gather-past]
[--noconfig]
[--save-only]
[--save]
[--reference]
[--noupload]
[--upload]
[--re-upload <filename>]
[--verify-upload]
[--clean-cores]
[--clean-dumps]
[--clean-reports]
[--clean-all]
[--clean-none]
[--clean-only]
[--http-insecure]
[--nohttp]
[--http-host <http-host>]
[--http-port <http-port>]
[--http-path <http-path>]
[--http-proxy <http-host>]
[--http-proxy-port <http-port>]
[--ftp]
[--noftp]
[--set-ftp-password]
[--ftp-insecure]
[--ftp-user <ftp-user>]
[--ftp-pass <ftp-password>]
[--ftp-host <ftp-host>]
[--ftp-path <ftp-dir>]
[--ftp-ssl-cert <ftp-ssl-cert>]
[--ftp-port <ftp-port>]
[--ftp-proxy <ftp-host>]
[--ftp-proxy-port <ftp-proxy-port>]
[--ftp-mode <ftp-mode>]
[--esrs]
[--noesrs]
[--supportassist]
[--nosupportassist]
isi_gather_info 373
--incremental
Gathers only those logs that changed since last log upload.
--full
Gathers logs regardless of last upload.
-l | --list-known-commands
Lists utilities and groups that can be included. See -i and --group.
-f | --files_to_gather <filename>
Gathers <filename> from each node. The value must be an absolute path.
-n | --nodes <node LNNs>
Gathers information from only the specified nodes. Nodes must be a list or range of LNNs, for example,
1,4-10,12,14. If no nodes are specified, the whole array is used. Note that nodes are automatically
excluded if they are down.
--local-only
Gathers information only from only the local node. Run this option when gathering files from the /ifs
filesystem.
--skip-node-check
Skips the check for node availability.
-s GATHER_SCRIPT [GATHER_SCRIPT...] | --gather_script GATHER_SCRIPT [GATHER_SCRIPT...]
Runs <gather_script> on every node. This happens during the gather process and the result is stored at
the root of each node directory in the gather.
-1 LOCAL_GATHER_EXPRESSION [LOCAL_GATHER_EXPRESSION...] | --local_gather_expression
LOCAL_GATHER_EXPRESSION [LOCAL_GATHER_EXPRESSION...]
Runs <local_gather_expression> on the local node. This is run during the gather process. The results are
stored in the /local directory of a gather. A valid gather expression is any shell command.
-a | --results-analyze-script<results_analyze_script>
Runs <results_analyze_script> on the results of a gather.
-x EXCLUDE_COMMAND | --exclude_command EXCLUDE_COMMAND
Excludes the specified command from being gathered by isi_gather_info. For a list of commands
names, use -x, or run -l.
-I | --save_to_ifs
Saves results to /ifs. This is the default setting.
-L | --save_to_local
Save all results to local storage /var/crash/support/.This option is mutually exclusive with the -T
option.
-T | --temp <temp-dir>
Saves all results to <temp-dir> instead of the default directory. This option is mutually exclusive with the
-L option.
-t | --tarfile <tarfile>
Saves all results to the specified <tarfile> rather than to the default tar file name (IsilonLogs-
<node_name>-<date>-<time>.tgz).
--tardir <dir>
Places the final package directly into the specified directory.
--symlinkdir <dir>
Creates a symlink to the final package in the specified directory.
--varlog-recent
Gathers all logs in /var/log, with the exception of the compressed and rotated old logs.
374 isi_gather_info
--varlog-all
Gathers all logs in /var/log, including compressed and rotated old logs. This is the default options and
will only change if --varlog-recent is used.
--nologs
Does not gather the default logs.
--group <group>
Only gathers the component groups specified by the group field.
--no-dumps
Does not gather hang dumps for the package.
--dumps
Gathers hang dumps for the package. These can be very large and are included by default.
--no-net-transport
Does not add net_transport failures to the package.
--net-transport
Gathers net_transport failures in the package. These are included by default.
--no-cores
Does not gather core files for the package. Default is to collect core files.
--cores
Adds core files to the package. These can be very large and are included by default.
--no-iceage-reports
Does not gather IceAge reports to the package. The default is to collect IceAge reports.
--iceage-reports
Gathers IceAge reports to the package. IceAge reports can be large and are included by default.
--clean-cores
Deletes cores from /var/crash after successful compression of the package.
--debug
Displays debugging messages in the log files.
--verbose
Displays more detailed information.
--no-console-logging
Does not write logging information to the package.
--log-to<dir>
Directory to write log files to.
--timeout TIMEOUT TIMEOUT
Should be in the form of: (< > indicates a field, and a pipe (|) indicates a value) <COMMAND_NAME |
'all'> <TIMEOUT | 'none'> COMMAND_NAME should be the name of the command you wish to change
the timeout for. The option all will change the timeout values for all commands. TIMEOUT should be an
integer value for the new desired timeout value, in seconds. If set to none or 0, there will be no timeouts
for those commands. This flag can be specified more than once.
--parallelism{1,0}
Indicates which model of parallelism to use. The only supported options are: SERIAL, which runs the
commands in serial, regardless of what the --processes flag indicates, and SUBPROCESS, which
runs commands in parallel as indicated by the fork.
--processes<integer>
Indicates how many simultaneous gather commands should be run on a given node. Integer cannot be
larger than 3000.
--no-status
Disables the status screen.
--gather-begin
isi_gather_info 375
Sets the starting time of files to be gathered using the datetime format. The accepted datetime format
should be in the form of 'YYYY-MM-DD [HH:MM]' where time is optional. For example: '2023-06-16' or
'2023-06-16 01:36'. This will gather all files that have been modified since that date and time.
--gather-past
Enter a number followed by a letter to gather files modified within this time range. For example, 1h for
files modified in the last hour. Other supported times include 'd' for days and 'w' for weeks.
Configuration Options
--noconfig
Uses built-in default values and bypasses the configuration file.
--save-only
Saves the CLI-specified configuration to file and exits.
--save
Saves the CLI-specified configuration to file and runs it.
--reference REFERENCE
Saves the reference file and runs it.
376 isi_gather_info
Specifies no HTTP upload attempt. This is the default setting.
--http-host <http-host>
Specifies an alternate HTTP site for upload.
--http-port <http-port>
Specifies an alternate HTTP port for upload. Default is port 80.
--http-path <http-path>
Specifies an alternate HTTP upload directory.
--http-proxy <http-proxy>
Specifies the HTTP proxy server to use.
--http-proxy-port <http-proxy-port>
Specifies the HTTP proxy port to use.
isi_gather_info 377
ESRS Upload Options
--esrs
Attempts ESRS upload (default).
--noesrs
Does not attempt ESRS upload.
378 isi_gather_info
25
isi get
Syntax and descriptions for the isi get command.
Use the isi get command to view file attributes.
Topics:
• isi get
isi get
Displays information about a set of files, including the requested protection, current actual protection, and whether write-
coalescing is enabled.
Requested protection appears in one of three colors: green, yellow, or red. Green indicates full protection. Yellow indicates
degraded protection under a mirroring policy. Red indicates a loss of one or more data blocks under a parity policy.
Syntax
isi get {{[-a] [-d] [-g] [-s] [{-D | -DD | -DDC}] [-R] <path>}
| {[-g] [-s] [{-D | -DDO | -DDC}] [-R] -L <lin>}}
Options
-a
Displays the hidden "." and ".." entries of each directory.
-d
Displays the attributes of a directory instead of the contents.
-g
Displays detailed information, including snapshot governance lists.
-s
Displays the protection status using words instead of colors.
-D
Displays more detailed information.
-DDO
Includes information about protection groups and security descriptor owners and groups.
-DDC
Includes cyclic redundancy check (CRC) information.
-R
Displays information about the subdirectories and files of the specified directories.
<path>
Displays information about the specified file or directory.
Specify as a file or directory path.
Examples
The following command displays information on ifs/home/ and all of its subdirectories:
/ifs/home/admin:
default 4+2/2 concurrency on .zshrc
/ifs/home/ftp:
default 4x/2 concurrency on incoming/
default 4x/2 concurrency on pub/
/ifs/home/ftp/incoming:
/ifs/home/ftp/pub:
Syntax
isi hardening apply <profile>
[--help | -h]
Options
<profile>
Specifies the profile name. The profile name for STIG and SRG hardening is STIG.
--help | -h
Displays help for this command.
Usage
Profiles contain rules that change configuration settings, disable services, and perform other actions to increase the security of
the cluster. To see a list of rules in a profile, use the isi hardening reports commands.
When you issue the isi hardening apply command, OneFS works in the background to check the settings on each node
in the cluster, for each rule in the profile. OneFS changes the settings that are not in compliance with a rule.
If the command returns any error messages, fix the reported conditions and rerun the command.
The following message indicates that the command is finished running:
Syntax
isi hardening disable <profile>
[{--help | -h}]
Options
<profile>
Specifies the hardening profile name to disable.
{--help | -h}
Displays help for this command.
Syntax
isi hardening list
[--limit | -l <integer>]
[--format {table | csv | list | json}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
[--help | -h]
Options
If no options are specified, the command displays a list of all available profile names.
{--limit | -l} <integer>
Syntax
isi hardening reports create
[{--help | -h}]
Options
--help | -h
Displays help for this command.
Usage
This command gathers current status for all hardening rules for all profiles for all nodes in the cluster. The information is stored
in \ifs for use later by the hardening engine to format requested reports. To update the information that appears in reports,
rerun this command.
Syntax
isi hardening reports view <profile>
[{--limit | -l} <integer>]
[--format {table | csv | list | json}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
<profile>
The hardening profile name. The only supported profile name is STIG.
--limit | -l <integer>
Unsupported.
--format {table | json | csv | list}
Displays security check reports in table, JSON, CSV or list format. The default is table.
--no-header | -a
Does not display headers in CSV or table formats.
--no-footer | -z
Does not display table summary footer information.
Topics:
• isi hdfs crypto encryption-zones create
• isi hdfs crypto settings modify
• isi hdfs crypto encryption-zones list
• isi hdfs crypto settings view
• isi hdfs fsimage job settings modify
• isi hdfs fsimage job settings view
• isi hdfs fsimage job view
• isi hdfs fsimage latest delete
• isi hdfs fsimage latest view
• isi hdfs fsimage settings modify
• isi hdfs fsimage settings view
• isi hdfs inotify settings modify
• isi hdfs inotify settings view
• isi hdfs inotify stream reset
• isi hdfs inotify stream view
• isi hdfs log-level modify
• isi hdfs log-level view
• isi hdfs proxyusers create
• isi hdfs proxyusers delete
• isi hdfs proxyusers list
• isi hdfs proxyusers members list
• isi hdfs proxyusers modify
• isi hdfs proxyusers view
• isi hdfs racks create
• isi hdfs racks delete
• isi hdfs racks list
• isi hdfs racks modify
• isi hdfs racks view
• isi hdfs ranger-plugin settings modify
• isi hdfs ranger-plugin settings view
• isi hdfs settings modify
• isi hdfs settings view
• isi http settings modify
• isi http settings view
Syntax
isi hdfs crypto encryption-zones create <path> <key-name>
[--zone <string>]
Required Privileges
ISI_PRIV_HDFS
Options
<path>
An existing empty directory, within HDFS root directory.
< key-name>
Encryption key name.
--zone <string>
Access zone.
--verbose | -v
Display more detailed information.
--help | -h
Display help for this command.
Syntax
isi hdfs crypto settings modify
[--kms-url <string> | --clear-kms-url]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
--kms-url <string>
An existing empty directory, within HDFS root directory. A valid hostname, FQDN, IPv4 address, or IPv6
address of the key Management Server.
--clear-kms-url
Clear the kms_url and turn off Transparent Data Encryption.
--zone <string>
Access zone.
--verbose | -v
Syntax
isi hdfs crypto encryption-zones list
[--zone <string>]
[{--limit | -l} <integer>]
[--sort (id | key_name | path)]
[{--descending | -d}]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
--zone <string>
Access zone.
--limit | -l <integer>
Number of hdfs crypto encryption-zones to display.
--sort (id | key_name | path)
Sort data by the specified field.
--descending | -d
Sort data in descending order.
--format (table | csv | list | json)
Display hdfs crypto encryption-zones in table, CSV, list or JSON format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--help | -h
Display help for this command.
Syntax
isi hdfs crypto settings view
[--zone <string>]
[--format (table | csv | list | json)]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
--zone <string>
Access zone.
--format (table | csv | list | json)
Display hdfs crypto encryption-zones in table, CSV, list or JSON format.
--help | -h
Display help for this command.
Syntax
isi hdfs fsimage job settings modify
[--generation-interval <duration>]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
[--generation-interval <duration>]
The interval between successive FSImages.
--help | -h
Display help for this command.
--verbose | -v
Syntax
isi hdfs fsimage job settings view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage job view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage latest delete
[--force | -f]
[--verbose | -v]
Options
--force | -f
Do not prompt for confirmation.
--verbose | -v
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage latest view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage settings modify
[--enabled {yes | no}]
[--help <string>]
[--verbose | -v]
[--zone <string>]
Options
--enabled {yes | no}
Enables or disables the HDFS FSImage service. Allow access to FSImage and start FSImage generation.
The HDFS FSImage service is disabled by default. This service should only be enabled on a Hadoop-
enabled Access Zone that will use Cloudera Navigator.
--help <string>
Syntax
isi hdfs fsimage settings view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify settings modify
[--enabled <boolean>]
[--maximum-delay <duration>]
[--retention <duration>]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
--enabled <boolean>
Enable the collection of edits over HDFS and access to the edits via HDFS INotify stream.
--maximum-delay <duration>
The maximum duration until an edit event is reported in INotify.
--retention <duration>
Syntax
isi hdfs inotify settings view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify stream reset
[--force | -f]
[--verbose | -v]
[--zone <string>]
Options
--force | -f
Do not prompt for confirmation.
--verbose | -v
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify stream view
[--help <string>]
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs log-level modify
[--set {always|error|warning|info|verbose|debug|trace|default}]
[--verbose|-v]
Options
--set {always | error | warning | info | verbose | debug | trace | default}
Sets the default logging level for the HDFS service on the cluster. The default value is default.
--verbose | -v
Displays more detailed information.
Syntax
isi hdfs log-level view
Options
There are no options for this command.
Syntax
isi hdfs proxyusers create <proxyuser>
[--zone <string>]
[--add-group <name>]
[--add-gid <id>]
[--add-uid <id>]
[--add-user <name>]
[--add-sid <sid>]
[--add-wellknown <name>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<proxyuser>
Specifies the user name of a user currently configured on the cluster to be designated as a proxy user.
--zone <string>
Specifies the access zone the user authenticates through.
--add-group <name>
Adds the group specified by name to the list of proxy user members. The proxy user can impersonate
any user in the group. The users in the group must authenticate to the same access zone as the proxy
user. You can specify multiple group names in a comma-separated list.
--add-gid <id>
Adds the group by specified by UNIX GID to the list of proxy user members. The proxy user can
impersonate any user in the group. The users in the group must authenticate to the same access zone as
the proxy user. You can specify multiple UNIX GIDs in a comma-separated list.
--add-uid <id>
Adds the user specified by UNIX UID to the list of members the proxy user can impersonate. The user
must authenticate to the same access zone as the proxy user. You can specify multiple UNIX UIDs in a
comma-separated list.
--add-user <name>
Adds the user specified by name to the list of members the proxy user can impersonate. The user must
authenticate to the same access zone as the proxy user. You can specify multiple user names in a
comma-separated list.
--add-sid <sid>
Adds the user, group of users, machine or account specified by Windows SID to the list of proxy user
members. The object must authenticate to the same access zone as the proxy user. You can specify
multiple Windows SIDs in a comma-separated list.
--add-wellknown <name>
Adds the well-known user specified by name to the list of members the proxy user can impersonate. The
well-known user must authenticate to the same access zone as the proxy user. You can specify multiple
well-known user names in a comma-separated list.
--verbose | -v
Displays more detailed information.
Examples
The following command designates hadoop-user23 in zone1 as a new proxy user:
The following command designates hadoop-user23 in zone1 as a new proxy user and adds the group of users named hadoop-
users to the list of members that the proxy user can impersonate:
The following command designates hadoop-user23 in zone1 as a new proxy user and adds UID 2155 to the list of members that
the proxy user can impersonate:
Syntax
isi hdfs proxyusers delete <proxyuser-name>
[--force | -f]
[--verbose | -v]
[--zone <zone-name>]
Options
<proxyuser-name>
Specifies the user name of the proxy user to be deleted.
--force | -f
Deletes the specified proxy user without requesting confirmation.
--verbose | -v
Displays more detailed information.
--zone <zone-name>
Specifies the access zone that the proxy user authenticates through.
Examples
The following command deletes hadoop-user23 in zone1 from the list of proxy users:
Syntax
isi hdfs proxyusers list
[--zone <string>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
--zone <string>
Access zone.
--format (table | csv | list | json)
Display hdfs crypto encryption-zones in table, CSV, list or JSON format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Examples
The following command displays a list of all proxy users that are configured in zone1:
Name
-------------
hadoop-user23
hadoop-user25
hadoop-user28
-------------
Total: 3
Syntax
isi hdfs proxyusers members list <proxyuser>
[--zone <string>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<proxyuser>
Specifies the user name of a user currently configured on the cluster to be designated as a proxy user.
--zone <string>
Access zone.
--format (table | csv | list | json)
Display hdfs crypto encryption-zones in table, CSV, list or JSON format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Examples
The following command displays a detailed list of the users and groups that are members of proxy user hadoop-user23 in zone1:
Type: user
Name: krb_user_005
ID: UID:1004
--------------------------------------------------------------------------------
Type: group
Name: krb_users
ID: SID:S-1-22-2-1003
--------------------------------------------------------------------------------
Type: wellknown
Syntax
isi hdfs proxyusers modify <proxyuser>
[--zone <string>]
[--add-group <name>]
[--add-gid <id>]
[--add-uid <id>]
[--add-user <name>]
[--add-sid <sid>]
[--add-wellknown <name>]
[--remove-group <name>]
[--remove-gid <id>]
[--remove-uid <id>]
[--remove-user <name>]
[--remove-sid <sid>]
[--remove-wellknown <name>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<proxyuser>
Specifies the user name of a user currently configured on the cluster to be designated as a proxy user.
--zone <string>
Specifies the access zone the user authenticates through.
--add-group <name>
Adds the group specified by name to the list of proxy user members. The proxy user can impersonate
any user in the group. The users in the group must authenticate to the same access zone as the proxy
user. You can specify multiple group names in a comma-separated list.
--add-gid <id>
Adds the group by specified by UNIX GID to the list of proxy user members. The proxy user can
impersonate any user in the group. The users in the group must authenticate to the same access zone as
the proxy user. You can specify multiple UNIX GIDs in a comma-separated list.
--add-uid <id>
Adds the user specified by UNIX UID to the list of members the proxy user can impersonate. The user
must authenticate to the same access zone as the proxy user. You can specify multiple UNIX UIDs in a
comma-separated list.
--add-user <name>
Adds the user specified by name to the list of members the proxy user can impersonate. The user must
authenticate to the same access zone as the proxy user. You can specify multiple user names in a
comma-separated list.
--add-sid <sid>
Examples
The following command adds the well-known local user to, and removes the user whose UID is 2155 from, the list of members
for proxy user hadoop-user23 in zone1:
Syntax
isi hdfs proxyusers view <proxyuser>
[--zone <string>]
[{--help | -h}]
Options
<proxyuser>
Specifies the user name of the proxy user.
--zone <string>
Specifies the access zone the proxy user authenticates through.
--help
Display help for this command.
Examples
The following command displays the configuration details for the hadoop-user23 proxy user in zone1:
Name: hadoop-user23
Members: krb_users
LOCAL
krb_user_004
Syntax
isi hdfs racks create <rack>
[--client-ip-ranges <string>]
[--ip-pools <string>]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<rack>
Specifies the name of the virtual HDFS rack. The rack name must begin with a forward slash—for
example, /example-name.
--client-ip-ranges <string>
External IP range. Specify --client-ip-ranges for each additional external IP range.
--ip-pools <string>
Syntax
isi hdfs racks delete <rack-name>
[--force | -f]
[--verbose | -v]
[--zone <string>]
Options
<rack-name>
Deletes the specified virtual HDFS rack. Each rack name begins with a forward slash—for example, /
example-name.
--force | -f
Suppresses command-line prompts and messages.
--verbose | -v
Displays more detailed information.
--zone <string>
Specifies the access zone that contains the virtual rack you want to delete.
Syntax
isi hdfs racks list
[--zone <string>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Syntax
isi hdfs racks modify <rack>
[--name <string>]
[--client-ip-ranges <string> | --clear-client-ip-ranges |
--add-client-ip-ranges <string> | --remove-client-ip-ranges <string>]
[--ip-pools <string> | --clear-ip-pools | --add-ip-pools <string> |
--remove-ip-pools <string>]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<rack>
Specifies rack id (name).
--name <string>
Specifies new rack name. Rack name must start with '/'.
--client-ip-ranges <string>
Clear value for external IP range.
--clear-client-ip-ranges
Removes all IP address ranges of external Hadoop compute clients from the virtual rack.
--add-client-ip-ranges <string>
Add external IP range. Specify --add-client-ip-ranges for each additional item to add.
--remove-client-ip-ranges <string>
Remove external IP range. Specify --remove-client-ip-ranges for each additional item to remove.
--ip-pools <string>
Syntax
isi hdfs racks view <rack>
[--zone <string>]
[{--help | -h}]
Required Privileges
ISI_PRIV_HDFS
Options
<rack>
Specifies rack id (name).
--zone <string>
Specifies the access zone that contains the virtual rack you want to view.
--help | -h
Display help for this command.
Syntax
isi hdfs ranger-plugin settings modify
[--enabled <boolean>]
[--policy-manager-url <string>]
[--repository-name <string>]
[--zone <string>]
Required Privileges
ISI_PRIV_HDFS
Options
--enabled <boolean>
Enable the HDFS Ranger plug-in.
--policy-manager-url <string>
The scheme, host name, and port of the Apache Ranger server. For example:
http://ranger.com:6080 or:
https://ranger.com/6182
--repository-name<string>
The HDFS repository name that is registered with Apache Ranger server.
--zone <string>
The access zone containing the HDFS repository.
--verbose
Display more detailed information.
--help | -h
Display help for this command.
Syntax
isi hdfs ranger-plugin settings view
[--zone <string>]
Options
--zone <string>
The access zone containing the HDFS repository.
Syntax
isi hdfs settings modify
[--service <boolean>]
[--default-block-size <SIZE>]
Required Privileges
ISI_PRIV_HDFS
Options
---service <boolean>
Enables HDFS service on the zone.
--default-block-size <SIZE>
Specifies the block size (in bytes) reported by HDFS service. You may use suffices: k, M, G (for
instance: 64M, 512M, 1G).
--default-checksum-type (none | crc32 | crc32c)
Specifies the checksum type reported by HDFS service.
--authentication-mode (simple_only | kerberos_only)
Specifies allowed authentication type for HDFS protocol.
--root-directory <path>
Sets the root directory for HDFS protocol.
--webhdfs-enabled <boolean>
Enables WebHDFS on the zone.
--ambari-server <string>
A valid hostname, FQDN, IPv4 address, or IPv6 address of the Ambari server.
--ambari-namenode <string>
The SmartConnect name of this cluster that will be used for the HDFS service.
--odp-version <string>
The dot version of the ODP stack repository including build number if one exists.
--data-transfer-cipher (none | aes_128_ctr | aes_192_ctr | aes_256_ctr)
Specifies the cipher to use for data transfer (if any).
--ambari-metrics-collector <string>
A valid hostname, FQDN, IPv4 address, or IPv6 address of the Ambari metrics collector.
--hdfs-acl-enabled <boolean>
Enables HDFS ACL on the zone.
--hadoop-version-3-or-later <boolean>
Hadoop client version is 3 or later.
--zone <string>
The access zone to which the HDFS settings apply.
--verbose
Display more detailed information.
Syntax
isi hdfs settings view
[--zone <string>]
Options
--zone <string>
Specifies the access zone. The system will display the HDFS settings for the specified zone.
Syntax
isi http settings modify
[--access-control <boolean>]
[--basic-authentication <boolean>]
[--webhdfs-ran-https-port <integer>]
[--revert-webhdfs-ran-https-port]
[--dav <boolean>]
[--enable-access-log <boolean>]
[--https <boolean>]
[--integrated-authentication <boolean>]
[--server-root <path>]
[--service (enabled | disabled | redirect | disabled_basicfile)]
[--service-timeout <duration>]
[--revert-service-timeout]
[--inactive-timeout <duration>]
[--revert-inactive-timeout]
[--session-max-age <duration>]
[--revert-session-max-age]
[--httpd-controlpath-redirect <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HTTP.
Options
--access-control <boolean>
Enable Access Control Authentication for HTTP service. Access Control Authentication requires at least
one type of authentication to be enabled.
Syntax
isi http settings view
Example
The following example shows the output generated by this command:
Access Control: No
Basic Authentication: No
Dav: No
Enable Access Log: Yes
Integrated Authentication: No
Server Root: /ifs
Service: redirect
Syntax
isi http services list
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HTTP.
Options
--format (table | csv | list | json)
Display http services in table, CSV, list or JSON format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--verbose
Displays more detailed information.
--help
Display help for this command.
Syntax
isi http services modify <service-id> (PowerScaleUI | Platform-API-External
| RAN | RemoteService)
[--enabled <boolean>]
[{--verbose | -v}]
[{--force | -f}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HTTP.
Options
--service-id={PowerScaleUI | Platform-API-External | RAN | RemoteService}
Specifies an HTTP service. Valid values are:
Table 9. --service-id
Service id Description Results when disabled
PowerScale The PowerScale Web The Web UI is not available.
UI Administration UI (Web UI).
Platform- The external interface to the API queries originating external to the
API- Platform API (PAPI). cluster are not accepted. The WebUI is not
External available. Internal platform APIs continue
to operate.
RAN The RESTful access to Web UI pages that depend on REST are
namespace. not available:
● Remote file browser
● File system explorer
RemoteServ The remote support service Remote support service (SRS)
ice interface (rsapi) management capabilities in the UI are not
available.
--enabled <boolean>
Enables or disables the named service. May also enable or disable another dependent service, as
described in the following table.
--force | -f
Do not ask confirmation.
--verbose
Displays more detailed information.
--help
Display help for this command.
Example
Syntax
isi http services view
--service-id {PowerScaleUI | Platform-API-External | RAN | RemoteService}
Options
--service-id {PowerScaleUI | Platform-API-External | RAN | RemoteService}
Specifies the service. The following values are valid:
Syntax
isi http settings modify
[--access-control <boolean>]
[--basic-authentication <boolean>]
[--webhdfs-ran-https-port <integer>]
[--revert-webhdfs-ran-https-port]
[--dav <boolean>]
[--enable-access-log <boolean>]
[--https <boolean>]
[--integrated-authentication <boolean>]
[--server-root <path>]
[--service (enabled | disabled | redirect | disabled_basicfile)]
[--service-timeout <duration>]
[--revert-service-timeout]
[--inactive-timeout <duration>]
[--revert-inactive-timeout]
[--session-max-age <duration>]
[--revert-session-max-age]
[--httpd-controlpath-redirect <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_HTTP.
Options
--access-control <boolean>
Enable Access Control Authentication for HTTP service. Access Control Authentication requires at least
one type of authentication to be enabled.
--basic-authentication <boolean>
Enable Basic Authentication for HTTP service.
--webhdfs-ran-https-port <integer>
Configure Data Services Port for HTTP service.
--revert-webhdfs-ran-https-port
Set value to system default for --webhdfs-ran-https-port.
--dav <boolean>
Comply with Class 1 and 2 of the DAV specification (RFC 2518) for HTTP service. All DAV clients must
go through a single node. DAV compliance is NOT met if you go through SmartConnect, or via 2 or more
node IPs.
--enable-access-log <boolean>
Enable writing to a log when the HTTP server is accessed for HTTP service.
--https <boolean>
Enable HTTPS transport protocol for HTTP service.
--integrated-authentication <boolean>
Enable Integrated Authentication for HTTP service.
--server-root <path>
Document root directory for HTTP service. Must be within /ifs.
Syntax
isi http settings view
Options
There are no options for this command.
Example
The following example shows the output generated by this command:
Access Control: No
Basic Authentication: No
Dav: No
Enable Access Log: Yes
Integrated Authentication: No
Server Root: /ifs
Service: redirect
Syntax
isi healthcheck checklists deliver <id>
[--email <string>]
[--email-fail <string>]
[--email-host <string>]
[--email-port <integer>]
[--email-user <string>]
[--email-pass <string>]
[--email-security <string>]
[--clear]
[--verbose | -v ]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Syntax
isi healthcheck checklists history <id> <history>
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
The checklist identification.
Syntax
isi healthcheck checklists list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{--limit | -l} <integer>
The number of HealthCheck instances to display.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck checklists view <id>
[{--help | -h}]
Options
<id>
The name of the checklist for which you are acquiring details.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck definitions install <definition>
[--simultaneous | --rolling | --parallel]
[{--force | -f}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{definition}
The path of the definition to install.
{--simultaneous}
Start a simultaneous definition process.
{--rolling}
Start a rolling definition process.
{--parallel}
Start a parallel definition process.
{--force | -f}
Do not ask confirmation.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck definitions list
[--local]
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{--limit | -l} <integer>
The number of HealthCheck instances to display.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck definitions uninstall <definition>
[--simultaneous | --rolling | --parallel]
[{--force | -f}]
[{--help | -h}]
Options
{definition}
The path of the definition to install.
{--simultaneous}
Start a simultaneous definition process.
{--rolling}
Start a rolling definition process.
{--parallel}
Start a parallel definition process.
{--force | -f}
Do not ask confirmation.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck definitions view <definition>
[--local]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{definition}
Name or id of the definition to view. This can also be a full path of a definition file to examine before
installing.
{--local}
Only show definition information on the local node.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck evaluations cancel <id>
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
Cancels the specified evaluation based on the supplied evaluation ID. To check for active evaluation IDs,
use the command isi healthcheck evaluations list.
{--force | -f}
Forces cancellation of the evaluation without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
{--help| -v}
Displays help for this command.
Syntax
isi healthcheck evaluations gather <id>
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
Evaluation ID.
{--help| -v}
Displays help for this command.
Syntax
isi healthcheck evaluations list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{--limit | -l} <integer>
The number of HealthCheck evaluations to display.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck evaluations pause <id>
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Syntax
isi healthcheck evaluations resume <id>
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
Resumes the specified evaluation based on the supplied evaluation ID. To check for paused evaluation
IDs, use the command isi healthcheck evaluations list.
{--verbose | -v}
Displays more detailed information.
{--help| -h}
Displays help for this command.
Syntax
isi healthcheck evaluations run <checklist>
[--override-pass <item>:<pass_status>]
[--override-fresh <item>:<freshness>]
[--override-thresholds <item>:<critical>:<warning>:<ok>]
[--parameter <name>:<value>]
[--email <string>]
[--email-fail <string>]
[--email-host <string>]
[--email-port <integer>]
[--email-user <string>]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<checklist>
The name of the HealthCheck checklist you want to evaluate.
--override-pass <item>:<pass-status>
Overrides the pass status for an item, for example client_count:WARNING. You can specify this
option for multiple items.
--override-fresh <item>:<freshness>
Overrides the freshness requirement, for example client_count:7200. You can specify this option
for multiple items. The option suggests that a day or hour delimiter is accepted but actually only seconds
are accepted.
--override-thresholds <item>:<critical>:<warning>:<ok>
Specify values, consisting of three digits, representing the lower-bound values for critical, warning, and
OK statuses. For example, client_count:10:20:30. You can specify this option for multiple values
for an item.
--parameter <name>:<value>
The parameter name and value for a specified item that you are evaluating. You can specify multiple
parameter names and values if necessary.
--email<string>
Destination address for evaluation reports. Use ADMIN to send to cluster primary contact email. Specify
--email for each additional destination address for evaluation reports.
--email-fail<string>
Destination address for evaluation failure reports. Use ADMIN to send to cluster primary contact email.
If neither email nor email_fail is used then results will not be delivered. Specify --email-fail for each
additional destination address for evaluation failure reports.
--email-host<string>
SMTP relay host, optional.
--email-port<integer>
SMTP relay port, optionally used with email_host only.
--email-user<string>
SMTP authentication user, optionally used with email_host only.
--email-pass<string>
SMTP authentication password, optionally used with email_host only.
--email-security<string>
SMTP security STARTTLS or NONE, optionally used with email_host only.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck evaluations view <id>
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
The ID of the evaluation for which you are acquiring details. For a list of current evaluations, run the isi
healthcheck evaluations list command.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck items list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
{--limit | -l} <integer>
The number of HealthCheck items to display.
--format (table | json | csv | list)
Syntax
isi healthcheck items view <id>
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<id>
The name of the item for which you are acquiring details.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck parameters delete <name>
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Syntax
isi healthcheck parameters list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
{--limit | -l} <integer>
The number of HealthCheck item parameters to display.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck parameters set <name> <value>
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<name>
The name of the HealthCheck item parameter for which you want to set a value.
<value>
The value of the parameter.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi healthcheck parameters view <name>
[{--help | -h}]
Required Privileges
ISI_PRIV_SYS_SUPPORT
Options
<name>
The name of the parameter for which you want to view details.
{--help | -h}
Displays help for this command.
Topics:
• isi ipmi features list
• isi ipmi features modify
• isi ipmi features view
• isi ipmi network modify
• isi ipmi network view
• isi ipmi nodes list
• isi ipmi nodes view
• isi ipmi settings modify
• isi ipmi settings view
• isi ipmi user modify
• isi ipmi user view
Syntax
isi ipmi features list
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information about job events.
Syntax
isi ipmi features modify feature-ID
[--enabled {yes | no}]
[--force | -f]
[--help | -h ]
[--verbose | -v]
Options
feature-id
A string that identifies the name of the feature. This string matches the names used in the isi ipmi
feature list output.
--enabled {yes | no}
Enable or disable the feature. Specify yes to enable. Specify no to disable.
{--force | -f}
Do not ask for confirmation before running this command.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ipmi features view feature-ID
[--help | -h ]
Options
feature-id
A string that identifies the name of the feature. This string matches the names used in the isi ipmi
feature list output.
{--help | -h}
Displays help for this command.
Syntax
isi ipmi network modify
[--gateway <ip address> ]
[--prefixlen <prefixlen>]
[--ranges <ip_address_range>]
[--clear-ranges ]
[--add-ranges <ip_address_range>]
[--remove-ranges <ip_address_range>]
[--delete-config]
[--force | -f]
[--help | -h ]
[--verbose | -v]
Options
Specify an IP address range using two IP addresses separated by a dash (-). The specified addresses are included in the range.
For example:
92.168.0.100-192.168.100.100, 10.7.0.0-10.7.255.255
Syntax
isi ipmi network view
[--help | -h ]
Options
{--help | -h}
Displays help for this command.
Syntax
isi ipmi nodes list
[--format {table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[--help | -h ]
[--verbose | -v]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header}
Displays table and CSV output without headers.
{--no-footer}
Displays table output without footers.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information about active jobs.
Syntax
isi ipmi nodes view
[--node-lnn <integer>]
[{--help | -h}]
Options
--node-lnn <integer>
Specify the node LNN to view. If you do not specify a LNN, the local node information displays.
{--help | -h}
Displays help for this command.
Syntax
isi ipmi settings modify
[--enabled {yes | no}]
[--allocation-type {static | dhcp}]
[--force | -f]
[--help | -h ]
[--verbose | -v]
Options
--enabled {yes | no}
Enable or disable remote IPMI management. When you enable remote IPMI management, OneFS tries to
enable the BMC user account used for remote IPMI command authentication on IPMI-supported nodes.
When you disable remote IPMI management , OneFS disables the BMC user account on IPMI-supported
nodes, used for remote IPMI command authentication.
--allocation-type {static | dhcp}
Specify the network allocation type: either static network configuration or DHCP. If you set --
allocation-type to DHCP, the BMC LAN interfaces in the cluster attempt to acquire a DHCP
address if one is available. If you set --allocation-type to static, each BMC LAN interface acquires
addresses that were previously configured using isi ipmi network.
{--force | -f}
Do not ask for confirmation before running this command.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ipmi settings view
[{--help | {-h}]
Options
{--help | -h}
Displays help for this command.
Syntax
isi ipmi user modify
[--username <string>]
[--password <string>]
[--set-password]
[--force | -f]
[--help | -h ]
[--verbose | -v]
Options
--username <string>
Sets the user name for the remote IPMI user.
--password <string>
Sets the password for the remote IPMI user. The password must be 17-20 characters in length.
--set-password
Specify the password interactively.
{--force | -f}
Do not ask for confirmation before running this command.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ipmi user view
[{--help | -h}]
Options
{--help | -h}
Displays help for this command.
Topics:
• isi job events list
• isi job jobs cancel
• isi job jobs list
• isi job jobs modify
• isi job jobs pause
• isi job jobs resume
• isi job jobs start
• isi job jobs view
• isi job policies create
• isi job policies delete
• isi job policies list
• isi job policies modify
• isi job policies view
• isi job reports list
• isi job reports view
• isi job settings
• isi job settings modify
• isi job settings view
• isi job statistics view
• isi job status
• isi job types list
• isi job types modify
• isi job types view
Syntax
Examples
The following command lists all FSAnalyze events that happened in the month of September.
isi job events list --job-type fsanalyze --begin "2013-09-01" --end "2013-09-30"
Time Message
-----------------------------------------------------
2013-09-16T22:00:21 FSAnalyze[7] Waiting
2013-09-16T22:00:23 FSAnalyze[7] Running
2013-09-16T22:00:25 FSAnalyze[7] Phase 1: begin scan
2013-09-16T22:01:45 FSAnalyze[7] Phase 1: end scan
2013-09-16T22:01:46 FSAnalyze[7] Phase 2: begin merge
2013-09-16T22:02:30 FSAnalyze[7] Phase 2: end merge
2013-09-16T22:02:31 FSAnalyze[7] Succeeded
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
The following command lists all the job events that happened on a specific day.
Time Message
------------------------------------------------------------------
2013-09-17T22:00:04 SmartPools[8] Waiting
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:06 SmartPools[8] Running
2013-09-17T22:00:07 SmartPools[8] Phase 1: begin lin policy update
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:01 SmartPools[8] Phase 1: end lin policy update
2013-09-17T22:01:03 SmartPools[8] Phase 2: begin sin policy update
2013-09-17T22:01:06 SmartPools[8] Phase 2: end sin policy update
2013-09-17T22:01:09 SmartPools[8] Succeeded
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
------------------------------------------------------------------
Total: 14
Syntax
Options
<job>
Specifies the job to cancel. You can specify the job by job ID or job type. Specify a job type only if one
instance of that job type is active.
Examples
The following command cancels an active MultiScan job.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
--state {running | paused_user | paused_priority | paused_policy | paused_system}
Controls which jobs are listed according to status.
{--limit | -l} <integer>
Displays no more than the specified number of items. If no other parameters are specified, displays the
most recently activated jobs up to the specified number.
--sort {id | type | state | impact | policy | priority | start_time | running_time}
Sorts the output by the specified attribute.
--descending
Sorts the output in descending order of activation time.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header}
Displays table and CSV output without headers.
{--no-footer}
Displays table output without footers.
{--verbose}
Displays more detailed information about active jobs.
Examples
The following example lists jobs that have been manually paused.
The following example outputs a CSV-formatted list of jobs to a file in the /ifs/data path.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<job>
Specifies the job ID or job type to modify. If you specify job type (for example, FlexProtect), only one
instance of that type can be active.
{--priority | -p} <integer>
Sets the priority level for the specified job.
{--policy | -o} <string>
Sets the impact policy for the specified job.
Examples
The following command changes the impact policy of an active MultiScan job. This command example, which specifies the job
type, works only when a single instance of MultiScan is active.
If more than one instance of a job type is active, you can specify the job ID number instead of job type. The following command
changes the priority of an active job with an ID of 7.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<job>
Specifies the job to pause. You can specify the job by job type or job ID. If you use job type, only one
instance of the job type can be active.
Examples
The following command pauses an active AutoBalance job.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<job>
Specifies the job to resume. You can specify the job by job type or job ID. If you use the job type
parameter, only one instance of this job type can be in the Job Engine queue.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<type>
Specifies the type of job to add to the job queue (for example, MediaScan).
{--priority} <integer>
Sets the priority level for the specified job, with 1 being the highest priority and 10 being the lowest.
{--policy} <string>
Sets the impact policy for the specified job.
{--no-dup}
Disallows duplicate jobs. If an instance of the specified job is already in the queue, the new job does not
start.
--paths <path>
Specifies the path of the job, which must be within /ifs. This option is valid only for the TreeDelete
and PermissionRepair jobs.
Ignore this log message. The --delete-quotas option deletes the quota first and then it removes the
directory.
--root <path>
Valid for the DomainMark job only. Specifies the root path location for the DomainMark job.
--dm-type {snaprevert | synciq}
Valid for the DomainMark job only. Specifies the domain type for the DomainMark job.
--mapping-type {global | sid | unix | native}
Valid for the PermissionRepair job only, and is only used with the --mode convert option. Specifies
the type for PermissionRepair.
--mode {clone | inherit | convert}
Valid for the PermissionRepair job only. Specifies the mode for PermissionRepair.
--template <path>
Valid for the PermissionRepair job only. Specifies the pathname of a template file to use as a model for
the PermissionRepair job. Must be within the /ifs path.
--zone <string>
Valid for the PermissionRepair job only. Specifies the access zone for PermissionRepair.
--snapid <integer>
Valid for the SnapRevert job only. Specifies a snapshot ID for the SnapRevert job.
{--verbose | -v}
Displays more detailed information.
Examples
The following command starts an AutoBalance job.
The following command starts a MultiScan job with a priority of 8 and a high impact policy.
The following command starts a TreeDelete job with a priority of 10 and a low impact policy that deletes the /ifs/data/old
directory.
isi job jobs start treedelete --paths /ifs/data/old --priority 10 --policy low
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<job>
Specifies the job to view. You can specify the job by job type or job ID. If you specify a job type, only one
instance of this job can be active.
Examples
The following command displays information about an AutoBalance job with a job ID of 15.
ID: 15
Type: AutoBalance
State: Paused by user
Impact: Low
Policy: LOW
Pri: 4
Phase: 1/5
Start Time: 2013-09-19T09:08:28
Running Time: 24s
Participants: 1, 2, 3
Progress: Drives: 6 done, 0 in progress; last updated 3:0; Processed 4624 LINs
and 918669 KB; 0 ECCs and 0 errors
Waiting on job ID: -
Description:
Human Desc:
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
Options
<name>
Specifies a name for the new impact policy. The following names are reserved and cannot be used: LOW,
MEDIUM, HIGH, and OFF_HOURS.
--description <string>
Describes the job policy.
--impact {Low | Medium | High | Paused}
Specifies an impact level for the policy: Low, Medium, High, or Paused. You can specify an --impact
parameter for each impact interval that you define.
--begin <interval_time>
Specifies the beginning time, on a 24-hour clock, of the period during which a job can run. For example:
--begin "Friday 20:00".
--end <interval_time>
Specifies the ending time, on a 24-hour clock, of the period during which a job can run. For example:
--end "Sunday 11:59".
Examples
The following command creates a new impact policy named HIGH-WKEND.
isi job policies create HIGH-WKEND --impact high --begin "Saturday 00:01" --end "Sunday
23:59"
The following command creates a more complex impact policy named HI-MED-WKEND. This policy includes multiple impact
levels and time intervals. At the end of the specified intervals, a job running with this policy would automatically return to LOW
impact.
isi job policies create HI-MED-WKEND --description "High to medium impact when run on
the weekend" --impact high --begin "Friday 20:00" --end "Monday 03:00" --impact medium
--begin "Monday 03:01" --end "Monday 08:00"
Syntax
Options
<id>
Examples
The following command deletes a custom impact policy named HIGH-MED.
When you press ENTER, OneFS displays a confirmation message: Are you sure you want to delete the policy
HIGH-MED? (yes/[no]):
Type yes, and then press ENTER.
The following command deletes a custom impact policy named HIGH-WKEND without the confirmation message being
displayed.
Syntax
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
ID Description
------------------------------------------------------
HIGH Isilon template: high impact at all times
LOW Isilon template: low impact at all times
MEDIUM Isilon template: medium impact at all times
OFF_HOURS Isilon template: paused M-F 9-5, low-impact
at other times
HI-MED High to medium to low
HI-WKEND High impact when run on weekends
MED-WKEND Medium impact when run on weekends
------------------------------------------------------
Total: 7
The system displays verbose output in a list format as shown in the following partial example:
ID: HIGH
Description: Isilon template: high impact at all times
System: True
Impact Intervals
Impact : High
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
ID: LOW
Description: Isilon template: low impact at all times
System: True
Impact Intervals
Impact : Low
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
Syntax
Examples
The following command clears the custom intervals from a custom policy named MY_POLICY as the first step to adding new
intervals.
isi job policies modify MY_POLICY --impact high --begin "Friday 20:00" --end "Sunday
11:59"
Syntax
isi job policies view
[<id> <string>]
Options
<id> <string>
Specifies the job policy to display by policy ID.
Examples
The following command displays the details for the default job policy, HIGH.
ID: HIGH
Description: Isilon template: high impact at all times
System: True
Impact Intervals
Impact : High
Begin : Sunday 00:00
End : Sunday 00:00
Syntax
Options
--job-type <string>
Displays reports for all instances of the specified job type.
--job-id <integer>
Displays the report for a job with the specified job ID. If a job has multiple phases, Job Engines displays a
report for each phase of the specified job ID.
{--begin | -b} <interval_time>
Specifies the beginning of the time period for the job reports list. For example: --begin
"2013-09-19".
{--end | -e} <interval_time>
Specifies the end of the time period for the job reports list. For example: --end "2013-09-20".
{--limit | -l} <integer>
Displays no more than the specified number of reports.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
isi job reports list --job-type multiscan --begin "2013-9-19" --end "2013-9-20"
Syntax
isi job reports view <id>
Options
<id>
Specifies the job ID for the reports you want to view.
Examples
The following command requests reports for an FSAnalyze job with an ID of 7.
The system displays output similar to the following example. When a job has more than one phase, a report for each phase is
provided, along with a summary of the job status at the end.
Syntax
Options
--timeout <integer>
Indicates the number of seconds for a command timeout (specified as isi --timeout NNN
<command>).
Syntax
isi job settings modify
[--parallel-restriper-mode (Off | Partial | All)
[--smartthrottling <boolean>
[--verbose | -v]
Options
--parallel-restriper-mode (Off | Partial | All)
Specifies the restriper exclusion mode in the job engine. The following values are valid:
Off Indicates that the restriper jobs will run one at a time.
Partial Keeps FlexProtect (Lin) jobs running alone, while other restriper jobs can run
simultaneously.
--smartthrottling <boolean>
Allows control of Job Engine job resources and maintains front-end Quality of Service.
--verbose | -v
Displays more detailed information.
Syntax
isi job settings view
[--format {list | json}]
Options
--format {list | json}
Displays output in list or JavaScript Object Notation (JSON) format.
Syntax
isi job statistics view
[--job-id <integer>]
[--devid <integer>]
[--verbose]
[--format {table | json | csv | list}]
Options
--job-id <integer>
Displays statistics for a specific job ID.
--devid <integer>
Displays statistics for a specific node (device) in the cluster.
{--verbose | -v}
Displays more detailed statistics for an active job or jobs.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
The system displays output similar to the following example. In the example, PID is the process ID, and CPU indicates CPU
utilization by the job. Also indicated are how many worker threads exist for the job on each node and what the sleep-to-work
(STW) ratio is for each thread. The statistics represent how the system throttles the job based on impact policies.
Job ID: 6
Phase: 2
Nodes
Node : 1
PID : 17006
CPU : 0.00% (0.00% min, 7.91% max, 4.50% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.08M (10.01M min, 10.11M max, 10.09M avg)
I/O
Read : 4141 ops, 45.33M
Write : 5035 ops, 35.28M
Workers : 2 (0.60 STW avg.)
Node : 2
PID : 16352
CPU : 13.96% (1.95% min, 13.96% max, 9.61% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.01M (9.90M min, 10.01M max, 10.00M avg)
I/O
Read : 3925 ops, 43.39M
Write : 4890 ops, 34.13M
Workers : 2 (0.60 STW avg.)
Node : 3
PID : 15929
CPU : 0.98% (0.98% min, 12.89% max, 6.82% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.57M avg)
Physical : 9.86M (9.84M min, 9.94M max, 9.92M avg)
I/O
Read : 3354 ops, 36.77M
Write : 772 ops, 2.12M
Workers : 2 (0.60 STW avg.)
Syntax
Options
{--verbose | -v}
Displays more detailed job status information, including information about the cluster and nodes.
The system displays additional output that includes cluster and node information.
Syntax
isi job types list
[--all]
Options
--all
Displays all job types available in the Job Engine.
--sort {id | policy | exclusion_set | priority}
Sorts the output by the specified parameter.
--descending
In conjunction with --sort option, specifies that output be sorted descending order. By default, output
is sorted in ascending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated values (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information about a specific job type or all job types.
Examples
The following command provides detailed information about job types.
ID: AVScan
Description: Perform an antivirus scan on all files.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: None
Priority: 6
-------------------------------------------------------------------
ID: AutoBalance
Description: Balance free space in a cluster. AutoBalance is most
efficient in clusters that contain only HDDs.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: Restripe
Priority: 4
-------------------------------------------------------------------
ID: AutoBalanceLin
Description: Balance free space in a cluster. AutoBalanceLin is
most efficient if file system metadata is stored on
SSDs.
Enabled: Yes
Policy: LOW
Syntax
isi job types modify <id>
[--enabled <boolean>]
[--policy <string>]
[--schedule<string>]
[--priority <integer>]
[--clear-schedule]
Options
<id>
Specifies the job type to modify.
--enabled <boolean>
Specifies whether the job type is enabled or disabled.
--policy<string>
Sets the policy for the specified job type.
--schedule <string>
Sets a recurring date pattern to run the specified job type.
--priority<integer>
Sets the priority level for the specified job type. Job types have a priority value between 1 and 10, with 1
being the highest priority and 10 being the lowest.
--clear-schedule
Clears any schedule associated with the specified job type.
--force
Forces the modification without a confirmation message.
Examples
The following command adds a recurring schedule to the MultiScan command.
When you run this command, the system prompts you to confirm the change. Type yes or no, and then press ENTER.
Syntax
Options
<id>
Specifies the job type to view.
Examples
The following command displays the parameters of the job type MultiScan.
ID: MultiScan
Description: Perform the work of the AutoBalance and Collect jobs simultaneously.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: Restripe, Mark
Priority: 4
Syntax
isi keymanager
[--format {table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--help | -h}]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
--no-header | -a
Displays table and CSV output without headers.
Syntax
Options
--key-rotation <duration>
Sets a duration interval for rekey operations. Specify the interval as <integer><unit>, where <unit> is:
Y Years
M Months
W Weeks
D Days
H Hours
m minutes
s seconds. Seconds is the default if a unit is not provided.
{--help | -h}
Displays help for this command.
Syntax
Options
{force | -f}
Does not ask for confirmation before starting the operation. If this parameter is omitted, the rekey
operation starts immediately.
{--help | -h}
Displays help for this command.
Syntax
isi keymanager cluster rekey view
[{--help | -h}]
Options
{--help | -h}
Displays help for this command.
Example
Syntax
Options
view
Displays the status of the domains. Specifying view is optional: the command displays the status
whether you specify view or not.
{--limit | -l} <integer>
Displays no more than the specified number of keymanager SEDs.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
Syntax
Options
<name>
Specifies the unique KMIP server identifier.
<host>
Specifies the KMIP server host name.
<ca-cert-path>
Specifies the Certification Authority (CA) certificate to use to validate the server connection during TLS
mutual authentication with the external KMIP server. The <ca-cert-path> must be an absolutely path
within the /ifs file system.
<client-cert-path>
Specifies the client certificate and private key to use to authenticate the cluster during TLS mutual
authentication with the external KMIP server.
[{--port | -p} <integer>
Specifies the KMIP server host port.
--minimum-tls-version <string>
Specifies the minimum TLS version number for the Key Trust Platform (KTP). The KTP enables
supporting KMIP-compliant servers providing secure external key management. The default version is
1.2. Acceptable values are 1.0, 1.1, or 1.2.
--client-cert-password <string>
Specifies an optional cluster client private key password.
--set-client-cert-password
Enables specifying the cluster client private key password interactively.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
Options
<name>
Specifies the unique KMIP server identifier.
[{--force | -f}
Deletes the KMIP server without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
Options
<name>
Specifies the unique KMIP server identifier.
<host>
Specifies the KMIP server host name.
<ca-cert-path>
Syntax
Options
{--limit | -l} <integer>
Displays no more than the specified number of KMIP servers.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
--format {list | json}
Display the KMIP server information in JavaScript Object Notation (JSON) or list format.
{--help | -h}
Displays help information for this command.
Syntax
Options
--key-rotation <duration>
Sets a duration interval for rekey operations. Specify the interval as <integer><unit>, where <unit> is:
Y Years
M Months
W Weeks
D Days
H Hours
m minutes
s seconds. Seconds is the default if a unit is not provided.
{--help | -h}
Syntax
Options
{force | -f}
Does not ask for confirmation before starting the operation. If this parameter is omitted, the rekey
operation starts immediately.
{--help | -h}
Displays help for this command.
Syntax
Options
{--help | -h}
Displays help for this command.
Example
Syntax
Options
view
Displays the SEDs status of the nodes. Specifying view is optional: the command displays the status
whether you specify view or not.
{--node | -n} <integer>
Displays the status for the specified node ID.
{--limit | -l} <integer>
Displays no more than the specified number of keymanager SEDs.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
Syntax
Options
{--help | -h}
Displays help information for this command.
Syntax
Options
{--help | -h}
Displays help information for this command.
Syntax
Options
{--help | -h}
Displays help information for this command.
Syntax
Options
--kmip-enabled {true | false}
Set to true to enable the KMIP feature. Set to false to disable the KMIP feature. Enabling KMIP allows
migrating the SED. You cannot delete KMIP servers when the KMIP feature is enabled, and you cannot
disable the KMIP feature if any nodes are not in "LOCAL" status.
{--help | -h}
Displays help for this command.
Syntax
Options
{--help | -h}
Displays help information for this command.
Example
The command displays output similar to the following example.
If the KMIP feature is disabled or the KMIP server is not configured, the KMIP Server field is blank.
Syntax
Options
view
Displays the SEDs status of the nodes. Specifying view is optional: the command displays the status
whether you specify view or not.
{--node | -n} <integer>
Displays the status for the specified node ID.
{--limit | -l} <integer>
Displays no more than the specified number of keymanager SEDs.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
Topics:
• isi license activation start
• isi license activation view
• isi license add
• isi license generate
• isi license list
• isi license view
Syntax
isi license activation start
[--timeout integer]
[{--help | -h]}
Options
--timeout <integer>
Displays the number of seconds for a command timeout, specified as isi --timeout NNN
<command>.
{--help | -h}
Displays help for this command.
Syntax
isi license activation view
[{--help | -h]}
Options
{--help | -h}
Displays help for this command.
Syntax
isi license add
[--path <string>]
[--verbose]
Options
--path <string>
The location of the license file on the cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi license generate
[--include <module>]
[--exclude <module>]
[--only <module>...]
[--action (license_list_only | generate_activation)]
[--file <path>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
--include <module>
Adds a software module license to the activation file. Specify --include for each license you want to
include in the activation file.
--exclude <module>
Removes a software module license from the activation file. Specify --exclude for each license you
want to remove from the activation file.
--only <module>
Adds a software module license to the activation file. Specify --only for each license you want to
include in the activation file.
--action (license_list_only | generate_activation)
Specifies the action you want the command to take. You can generate an activation file, or you can
return a list of activated licenses without generating an activation file.
--file <path>
Sets the location on the cluster where you want to save the new activation file.
Syntax
isi license list
[--limit <integer>]
[--sort {name | module | status | expiration}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
The number of licenses to display.
--sort {name | module | status | expiration}
Sort data by the specified field.
{--descending | -d}
Sort data in descending order.
--format {table | json | csv | list}
Display licenses in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi license view <name>
[--format (list | json)]
Topics:
• isi namelength
• isi namelength create
• isi namelength delete
• isi namelength list
• isi namelength modify
• isi namelength view
isi namelength
Manages file name configurations.
Syntax
Options
[--timeout <integer>]
Displays the number of seconds for a command timeout (specified as 'isi --timeout NNN <command>').
Syntax
Options
<path>
Specifies a path of the file name length configuration domain. Must be within /ifs/.
Syntax
Options
<path>
Specifies a path of the file name length configuration domain. Must be within /ifs/.
--all
Deletes all file name length configuration domains.
{--force | -f}
Asks no confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi namelength list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
[{--limit | -l} <integer>]
Syntax
Options
<path>
Specifies a path of the file name length configuration domain. Must be within /ifs/.
[{--policy | -p} (restricted | full | custom)]
Specifies the type of file length policy.
[{--max-bytes | -B} <integer>]
Specifies the maximum number of bytes for a new UTF-8 filename.
[{--max-chars | -C} <integer>]
Specifies the maximum number of characters for a new UTF-8 filename.
{--verbose | -v}
Displays more detailed information.
Syntax
Syntax
isi ndmp contexts delete --id <id>
[--force]
[--verbose]
Options
--id <id>
The context ID string.
Syntax
isi ndmp contexts list
[--type {bre | backup | restore}]
[--format {table | json | csv | list}]
Options
{--type | -t} {bre | backup | restore}
Displays entries for the specified level: backup restartable extension (BRE), backup, or restore.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
Syntax
isi ndmp contexts view --id <id>
[--format {list | json}
Options
--id <id>
The context ID string.
--format {list | json}
Lists the NDMP context in the specified format.
Syntax
isi ndmp dumpdates delete --path <path>
[--level <integer>]
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Deletes a dumpdate entry for a backup of the specified level for the given directory. If this option is not
specified, deletes all dumpdate entries for the given directory.
Examples
The following command deletes the dumpdate entry for a level 0 backup of /ifs/data/media:
Syntax
isi ndmp dumpdates list
[--path <path>]
[--level <integer>]
[--limit <integer>]
[--sort {path | level}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Displays dumpdate entries for a backup of the specified level for the given directory path.
{--limit | -l}<integer>
The number of NDMP dumpdates to display.
--sort {path | level}
Sorts data by the specified field.
{--descending | -d}
Sorts data in descending order.
--format {table | json | csv | list}
Displays NDMP dumpdates in table (default), JavaScript Object Notation (JSON), comma-separated
value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
Examples
To view NDMP dumpdate entries, run the following command:
Syntax
isi ndmp sessions delete --session <session>
[--force]
[--level
[--path]
[--session]
[--verbose]
Options
{--force | -f}
Skips the confirmation prompt.
--level
Stops an NDMP session for a specified level.
--path
Stops an NDMP session that is running at a specified path.
--session <session>
The NDMP session identifier. The session ID consists of the logical node number (LNN) followed by a
decimal point and then the process ID (PID), such as <lnn>.<pid>.
{verbose | -v}
Displays more detailed information.
Example for the --session option
The following command ends an NDMP session with the session ID 4.36339:
Syntax
isi ndmp sessions list
[--node <integer>]
[--session <string>]
[--consolidate}
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--node | -n} <integer>
Displays only sessions for the specified node.
{--session | -s} <string>
The NDMP session identifier. The session ID consists of the logical node number (LNN) followed by a
decimal point and then the process ID (PID), such as <lnn>.<pid>.
{--consolidate | -c}
Consolidates sessions of a multi-stream context.
{--limit | -l} <integer>
The number of NDMP sessions to display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{verbose | -v}
Displays more detailed information.
Syntax
isi ndmp sessions view --session <session>
[--probe]
[--format {list | json}]
Options
--session <session>
Syntax
isi ndmp settings diagnostics modify
[--diag-level <integer>]
[--protocol-version <integer>]
[--trace-level {none | standard | include-file-history | log-file-history}]
Options
--diag-level <integer>
The diagnostics level for NDMP.
--protocol-version <integer>
The NDMP protocol version (3 or 4).
--trace-level {none | standard | include-file-history | log-file-history}
The NDMP trace log level. Select none for no log, standard for NDMP protocol tracing, include-
file-history to log file history information into the trace file, or log-file-history to log file
history into the file history log.
Syntax
isi ndmp settings diagnostics view
[--format {list | json}]
Options
--format {list | json}
Displays NDMP diagnostic settings information in list or JSON format.
Syntax
isi ndmp settings global modify
[--service {true | false}]
[--dma {generic | atempo | bakbone | commvault | emc | symantec | tivoli | symantec-
netbackup | symantec-backupexec}]
[--port <integer>]
[--bre-max-num-contexts <integer>]
[--msb-context-retention-duration <integer>]
[--msr-context-retention-duration <integer>]
[--stub-file-open-timeout<integer>]
[--enable-redirector <boolean>]
[--enable-throttler <boolean>]
[--throttler-cpu-threshold <integer>]
[--vmem-size <integer>]
Options
{--service | -s} {true | false}
Enables or disables the NDMP service.
{--dma | -d} {generic | atempo | bakbone | commvault | emc | symantec | tivoli | symantec-netbackup |
symantec-backupexec}
The data management application (DMA) that controls NDMP sessions.
{--port | -p} <integer>
Sets the TCP/IP port number on which the NDMP daemon listens for incoming connections. The default
port is 10000.
--bre-max-num-contexts <integer>
Sets the maximum number of restartable backup contexts. The system maximum limit is 1024, and the
default is 64. Set this option to zero (0) to disable restartable backups.
--msb-context-retention-duration <integer>
Sets the duration of multi-stream backup context retention. Express durations in YMWDHms integer
format. The default duration is 5m (five minutes).
--msr-context-retention-duration <integer>
Sets the duration of multi-stream restore context retention. Express durations in YMWDHms integer
format. The default duration is 10m (ten minutes).
--stub-file-open-timeout
During a backup or a restore, a smartlinked file may not be opened due to active operations. NDMP will
retry, but will fail after this timeout. The default value is 15 (15 seconds). The maximum timeout value is
120 seconds (2 minutes).
--enable-redirector
Enable or disable NDMP redirector which does load distribution of NDMP backup and restore operations.
--enable-throttler
When NDMP throttler is enabled, NDMP makes sure that NDMP backup or restore operations will not go
over this CPU threshold. The value is represented in percentage which ranges from 1 to 100. The default
value is 50.
--throttler-cpu-threshold
Enable or disable NDMP throttler which limits CPU usage for NDMP backup and restore operations on
each node.
--vmem-size <integer>
Syntax
isi ndmp settings global view
[--format {list | json}]
Options
--format {list | json}
Displays NDMP global settings in list or JSON format.
Example
The following is an example of the output generated by this command:
Service: True
Port: 10000
Dma: emc
Bre Max Num Contexts: 64
Msb Context Retention Duration: 300
Msr Context Retention Duration: 600
Syntax
isi ndmp settings preferred-ips create --scope <scope> --data-subnets <subnets>
[{verbose | -v}]
Options
--scope <scope>
Specifies the scope of the preferred IP setting. The scope determines the conditions under which
the IPs listed under the data-subnets will be preferred during a three-way NDMP backup or restore
operation. The scope can either be the subnet that is receiving the incoming NDMP request or it can be
a cluster in case of a cluster-wide preference. There can be upto one preference setting for each subnet
scope and one for the cluster scope.
--data-subnets <subnets>
Specifies a comma-separated list of flexnet subnet names where the IPs in the subnets are preferred
for outgoing data (during a backup) or incoming data (during a restore). The list of IPs are rearranged
according to the order of subnets listed under data-subnets. If an IP is in the listed data-subnets,
that IP is placed at the top of the list. A subnet in the data-subnets has no effect if none of the
IPs in the list belong to the subnet. The preferences will be applied only under the condition specified
Syntax
isi ndmp settings preferred-ips delete --scope <scope>
[{--verbose | -v}]
[{--help | -h}]
Option
--scope <scope>
Scope of the preferred IP setting. You can set the preferred IP to have a cluster-wide scope
by specifying a value for the cluster or you can select a OneFS-configured subnet, for example,
groupnet0.mysubnet1.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Syntax
isi ndmp settings preferred-ips list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
--limit | -l <integer>
The number of NDMP preferred IP settings to display.
--format (table | json | csv | list)
Syntax
isi ndmp settings preferred-ips modify --scope <scope>
[--data-subnets <subnet> | --add-data-subnets <subnet> |
--remove-data-subnets <subnet>]
[{--verbose | -v}]
[{--help | -h}]
Options
--scope <scope>
Scope of the NDMP preferred IP setting. You can set the preferred IP to have a cluster-wide scope
by specifying a value for the cluster or you can select a OneFS-configured subnet, for example,
groupnet0.mysubnet1.
--data-subnets <subnet>
A network subnet value. Specify a value for--data-subnets for each additional network subnet that
you want to specify. The subnet names must be separated by commas.
--add-data-subnets <subnet>
Add a network subnet. Specify --add-data-subnets for each network subnet that you want to add.
The subnet names must be separated by commas.
--remove-data-subnets <subnet>
Remove a network subnet. Specify --remove-data-subnets for each network subnet that you want
to remove. The subnet names must be separated by commas.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Syntax
isi ndmp settings preferred-ips view --scope <scope>
[--format (list | json)]
[{--help | -h}]
Syntax
isi ndmp settings variables create --path <path> --name <name> --value <value>
For a list of available environment variables, see the NDMP environment variables section in the version-appropriate OneFS
Backup and Recovery Guide.
Options
--path <path>
Applies the default NDMP environment variable value to the specified path. The directory path must be
within /ifs.
--name <name>
Specifies the NDMP environment variable to define.
--value <value>
Specifies the value to be applied to the NDMP environment variable.
Examples
The following command enables snapshot-based incremental backups to be performed for /ifs/data/media by default:
Syntax
isi ndmp settings variables delete
[--path <path>
[--name <name>
[--force]
[--verbose]
Examples
The following command removes all default NDMP settings for /ifs/data/media:
The following command removes the default file-history setting for backing up /ifs/data/media:
Syntax
isi ndmp settings variables list
[--path <path>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--path <path>
Applies the default NDMP-environment-variable value to the specified path.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Syntax
isi ndmp settings variables modify --path <path> --name <name> --value <value>
Options
For a list of available environment variables, see the NDMP environment variables section in the version-appropriate OneFS
Backup and Recovery Guide.
<path>
Applies the default NDMP-environment-variable value to the specified path. This must be a valid
directory path within /ifs.
<name>
Specifies the NDMP environment variable to be defined.
<value>
Specifies the value to be applied to the NDMP environment variable.
Syntax
isi ndmp users create --name <name>
[--password <string>]
Options
--name <name>
The name of the user.
--password <string>
The password for the new NDMP user. If you do not specify a password, the new user will be prompted
to enter a password, and will be prompted to confirm the password by entering it again. This command
fails if the specified user already exists.
Examples
The following command creates an NDMP user account with username ndmp_user and password 1234:
Syntax
isi ndmp users delete --name <name>
[--force]
[--verbose]
Options
--name <name>
The name of the NDMP user to delete.
{--force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Syntax
isi ndmp users list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Example
This is an example of the output created by this command:
Name
----------
ndmp_nick
ndmp_lisa
ndmp_jason
Syntax
isi ndmp users delete --name <name>
Options
--name <name>
The name of NDMP user you are modifying.
Syntax
isi ndmp users view --name <name>
[--format {list | json}]
Output
--name <name>
The name of the NDMP user.
--format {list | json}
Lists the NDMP user in the specified format.
Example
The following is an example of the output created by this command, for an NDMP user named ndmp_lisa, and with JSON
format specified:
Topics:
• isi network dnscache flush
• isi network dnscache modify
• isi network dnscache view
• isi network external modify
• isi network external view
• isi network firewall dscp list
• isi network firewall dscp modify
• isi network firewall reset-global-policy
• isi network firewall policies clone
• isi network firewall policies create
• isi network firewall policies delete
• isi network firewall policies list
• isi network firewall policies modify
• isi network firewall policies view
• isi network firewall reset-dscp-setting
• isi network firewall rules create
• isi network firewall rules delete
• isi network firewall rules list
• isi network firewall rules modify
• isi network firewall rules view
• isi network firewall services list
• isi network firewall settings modify
• isi network firewall settings view
• isi network groupnets create
• isi network groupnets delete
• isi network groupnets list
• isi network groupnets modify
• isi network groupnets view
• isi network interfaces list
• isi network pools create
• isi network pools delete
• isi network pools list
• isi network pools modify
• isi network pools rebalance-ips
• isi network pools sc-resume-nodes
• isi network pools sc-suspend-nodes
• isi network pools status
• isi network pools view
• isi network rules create
• isi network rules delete
• isi network rules list
• isi network rules modify
• isi network rules view
• isi network sc-rebalance-all
• isi network subnets create
Syntax
isi network dnscache flush
[--verbose | -v]
Options
--verbose | -v
Displays more detailed information.
Syntax
Syntax
isi network dnscache view
Options
There are no options for this command.
Syntax
Options
--sbr {true | false}
Enables or disables source-based routing on the cluster. Source-based routing is disabled by default.
--revert-sbr
Sets the value of --sbr to the default system value.
--sc-rebalance-delay <integer>
Specifies a period of time (in seconds) that should pass after a qualifying event before an automatic
rebalance is performed. The default value is 0 seconds.
--revert-sc-rebalance-delay
Sets the value of --sc-rebalance-delay to the default system value.
--tcp-ports <integer>
Sets a list of recognized client TCP ports. 65535 is the maximum supported port number. You can
specify multiple TCP ports separated by commas, or specify this option for each additional TCP port.
--clear-tcp-ports
Removes all client TCP ports.
--add-tcp-ports <integer>
Adds one or more recognized client TCP ports, separated by commas, to the existing list. 65535 is the
maximum supported port number.
--remove-tcp-ports <integer>
Removes one or more recognized client TCP ports, separated by commas.
--revert-tcp-ports
Sets the value of --tcp-ports to the default system value.
--sc-server-ttl <integer>
Sets the specified time to live value in the DNS nameserver (NS) and start of authority (SOA) records.
The TTL is expressed in seconds.
--ipv6-enabled {true | false}
Enables or disables front end interfaces to support IPv6.
--ipv6-auto-config-enabled {true | false}
Enables or disables IPv6 auto configuration. When auto configuration is enabled, OneFS discovers and
applies network settings from the IPv6 router advertisements (RAs). Settings that are propagated
include IPv6 MTUs and network routes.
--ipv6-generate-link-local {true | false}
Specifies whether OneFS generates IPv6 link-local addresses on the front-end network interfaces.
--ipv6-dad {enabled | disabled | integer}
Enables or disables IPv6 Duplicate Address Detection (DAD) globally on OneFS. This parameter also can
set a global DAD timeout value. Specifying a timeout value also enables DAD.
Valid values for integer are 1 through 10. The value specifies how many seconds OneFS looks for
duplicate addresses before accepting connections on the IP.
This global DAD setting must be enabled if you want to enable the following related features:
● DAD for SmartConnect Service IPs—Enable with the --ipv6-ssip-perform-dad parameter
below.
Syntax
Options
--verbose | -v
Displays more detailed information.
Syntax
Options
--verbose | -v
Displays more detailed information.
Syntax
Options
<rule_name>
Specifies the name of the DSCP rule to modify.
--dscp-value <int>
Specifies the DSCP value of this DSCP rule.
--src-ports <ports>
Specifies the list of source network ports restricted by this DSCP rule. Specify --src-ports for each
additional source network port. Specify "all" or "ALL" to indicate that all source port IPs must be
matched to this rule.
--clear-src-ports
Clears the value for the list of source network ports restricted by this DSCP rule.
--add-src-ports <ports>
Adds the list of source network ports restricted by this DSCP rule. Specify --add-src-ports for each
additional source network port to add.
--remove-src-ports <ports>
Removes the list of source network ports restricted by this DSCP rule. Specify --remove-src-ports for
each additional source network port to remove.
--dst-ports <ports>
Specifies the list of destination network ports restricted by this DSCP rule. Specify --dst-ports for each
additional destination network ports. Specify "all" or "ALL" to indicate that all destination port IPs must
be matched to this rule.
--clear-dst-ports
Clears the value for the list of destination network ports restricted by this DSCP rule.
--add-dst-ports <ports>
Adds the list of destination network ports restricted by this DSCP rule. Specify --add-dst-ports for each
additional destination network port to add.
--remove-dst-ports <ports>
Removes the list of destination network ports restricted by this DSCP rule. Specify --remove-dst-ports
for each additional destination network port to remove.
--live
isi network firewall dscp modify rule_transactional_data --src-ports 123 --dst-ports 456
--dscp-value 10
Syntax
Options
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<id>
The policy ID of the firewall policy to clone.
<new-id>
The policy ID for the new firewall policy.
--description <string>
Specifies a description of the new policy. This string cannot exceed 128 bytes.
--clear-description
Clears the description of the policy.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<id>
The policy ID for the new firewall policy.
--description <string>
Specifies a description of the new policy. This string cannot exceed 128 bytes.
--default-action (allow | deny)
The default action for this firewall policy.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<id>
The policy ID of the firewall policy to delete.
--force | -f
Does not ask for confirmation.
--verbose | -v
Displays more detailed information.
Syntax
Options
--limit | -l <integer>
Displays no more than the specified number.
--format {table | csv | list | json}
Displays output in table (default), comma-separated value (CSV), list format, or JavaScript Object
Notation (JSON) format.
--no-header | -a
Does not display headers in CSV or table formats.
--no-footer | -z
Does not dispaly table summary footer information.
--verbose | -v
Displays more detailed information.
Syntax
Options
<id>
The policy ID of the firewall policy to modify.
--name <string>
Syntax
Options
<id>
The policy ID of the firewall policy to view.
Syntax
Options
--verbose | -v
Displays more detailed information.
Syntax
Options
<id>
Indicates an ID for the new firewall rule. The rule must belong to an existing policy.
The <id> argument is a string that identifies the ID of a firewall rule consisting of a <policy_id> and
a rule name, separated by a .. The rule name must be unique to the policy and consist of supported
characters, not to exceed 32 characters.
Example: policy1.pool1
--index <integer>
Specifies an index number for this firewall rule.
--description <string>
Specifies a description of the new firewall rule. This string cannot exceed 128 bytes.
--protocol (ALL | UDP | TCP | ICMP | ICMP6)
Indicates the protocol restricted by this firewall rule.
--dst-ports <ports>
Indicates the list of destination network ports that will be restricted by this firewall rule. Specify --dst-
ports for each additional network port to restrict.
The <ports> argument specifies the network port by the numeric number or by the service name string.
These are the only two variables that can be used in this argument.
--src-networks <ip_address>
Indicates the list of source IP addresses that will be restricted by this firewall rule. Specify --src-
networks for each additional source IP address to restrict.
The <ip_address> argument is a string that defines an IPv4 or IPv6 address. IPv4 addresses must be
valid IP addresses that are specified in dotted decimal octet format (xxx.xxx.xxx.xxx). IPv6 addresses
must be valid IP addresses that are specified in hextets format (xxxx:xxxx:xxxx).
--src-ports <ports>
Indicates the list of source network ports that will be restricted by this firewall rule. Specify --src-
ports for each additional network port to restrict.
The <ports> argument specifies the network port by the numeric number or by the service name string.
These are the only two variables that can be used in this argument.
--action (allow | deny | reject)
Indicates the default action for this firewall rule. The action allow will allow the network packets. The
action deny will discard the network packets. The action reject will send an ICMP unreachable error back
to the client.
Syntax
Options
<id>
The policy ID of the firewall rule to delete.
The <id> argument is a string that identifies the ID of a firewall rule consisting of a <policy_id> and
a rule name, separated by a .. The rule name must be unique to the policy and consist of supported
characters, not to exceed 32 characters.
Example: policy1.rule1
--live
The --live option is used when issuing a command to create, modify, or delete a rule in an active
policy. Changes will take effect immediately on all network subnets and pools associated with this policy.
Using the --live option on an inactive policy will be rejected and will return an error.
--force | -f
Does not ask for confirmation.
--verbose | -v
Displays more detailed information.
Syntax
Syntax
Options
<id>
Indicates the ID of the firewall rule to modify.
The <id> argument is a string that identifies the ID of a firewall rule consisting of a <policy_id> and
a rule name, separated by a .. The rule name must be unique to the policy and consist of supported
characters, not to exceed 32 characters.
Example: policy1.rule1
--name <string>
Specifies the name of the policy rule.
--index <integer>
Specifies an index number for this firewall rule.
--description <string>
Specifies a description of the firewall rule. This string cannot exceed 128 bytes.
--clear-description
Clears the description of the firewall rule.
Syntax
Options
<id>
The rule ID of the firewall policy to view.
The <id> argument is a string that identifies the ID of a firewall rule consisting of a <policy_id> and a
rule name separated by a period. The rule name must be unique to the policy and consist of supported
characters [0-9a-zA-Z_-] not to exceed 32 characters.
Example: policy1.rule1
--verbose | -v
Displays more detailed information.
Syntax
Syntax
Options
--enabled {true | false}
Enables or disables the firewall service.
--dscp-enabled {true | false}
Enables or disables the DSCP rules. DSCP rules are disabled by default.
--verbose | -v
Displays more detailed information.
Syntax
Syntax
Options
<id>
Specifies a unique ID for the groupnet. The ID can be up to 32 alphanumeric characters long and can
include underscores or hyphens, but cannot include spaces or other punctuation. The ID cannot exceed
32 characters.
--description <string>
Specifies an optional description of the groupnet. The description cannot exceed 128 bytes.
--dns-cache-enabled {true | false}
Specifies whether DNS caching for the groupnet is enabled. DNS caching is enabled by default.
--dns-search <domain name>
Sets the list of DNS search suffixes. Suffixes are appended to domain names that are not fully qualified.
The list cannot contain more than six suffixes.
NOTE: Do not begin suffixes with a leading dot; leading dots are automatically added.
Syntax
Options
< id>
Specifies the ID of the groupnet to be deleted.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network groupnets list
[{--limit | -l} <integer>]
[--sort {description | dns_cache_enabled | id | name | server_side_dns_search}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {description | dns_cache_enabled | id | name | server_side_dns_search}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
Syntax
Options
<id>
Specifies the ID of the groupnet to be modified.
--description <string>
Specifies an optional description of the groupnet. This option overwrites the existing description. The
description cannot exceed 128 bytes.
--clear-description
Clears the current description.
--dns-cache-enabled {true | false}
Specifies whether DNS caching for the groupnet is enabled. DNS caching is enabled by default.
--revert-dns-cache-enabled
Sets the value of --dns-cache-enabled to the system default value.
--dns-search <domain name>
Sets the list of DNS search suffixes. Suffixes are appended to domain names that are not fully qualified.
The list cannot contain more than six suffixes. This option overwrites the current list of DNS search
suffixes.
--clear-dns-search
Removes the current list of DNS search suffixes.
--add-dns-search <domain name>
Adds one or more DNS search suffixes to the current list.
--remove-dns-search <domain name>
Removes one or more DNS search suffixes from the current list.
--dns-servers <IP address>
Sets a list of DNS IP addresses. Nodes issue DNS requests to these IP addresses. The list cannot
contain more than three IP addresses. This option overwrites the current list of DNS IP addresses.
--clear-dns-servers
Removes the current list of DNS servers.
--add-dns-servers <IP address>
Adds one or more DNS servers to the current list.
--remove-dns-servers <IP address>
Removes one or more DNS servers from the current list.
--dns-options <string>
Sets the DNS resolver option. The only valid value for this option is rotate.
--clear-dns-options
Removes the current list of DNS resolver options.
--add-dns-options <string>
Adds one or more DNS resolver options to the current list.
--remove-dns-options <string>
Removes one or more DNS resolver options from the current list.
--server-side-dns-search {true | false}
Specifies whether server-side DNS searching is enabled, which appends DNS search lists to client DNS
inquiries handled by a SmartConnect service IP address. Server-side search is enabled by default.
--revert-server-side-dns-search
Sets the value of --server-side-dns-search to the system default value.
--name <string>
Specifies a new name for the groupnet. The ID can be up to 32 alphanumeric characters long and
can include underscores or hyphens, but cannot include spaces or other punctuation. The name cannot
exceed 32 characters.
--allow-wildcard-subdomains <boolean>
If enabled, SmartConnect treats subdomains of known DNS zones as the known DNS zone. This is
required for S3 Virtual Host domains. Default value is true.
--revert-allow-wildcard-subdomains
Sets the value to the system default for --allow-wildcard-subdomains.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network groupnets view <id>
Options
<id>
Specifies the ID of the groupnet to be viewed.
Syntax
Options
If no options are specified, the command displays a list of all network interfaces on the cluster.
--nodes <lnn>
Lists interfaces only from the specified nodes. Specify nodes by Logical Node Number. Separate multiple
nodes by commas.
--network (internal | external | all)
Displays a list of interfaces associated with external or internal networks. The default value is
external.
--vlan <id>
Only lists the interfaces and owners from the specified VLAN ID provided.
--type (static | dynamic | ExternallyManaged | SSIP | NetworkPool | LinkLocal | All)
Only lists owners from the specified type.
The following values are valid:
off Will return results from nodes that are currently running and are able to respond.
If a node has fallen out of quorum, or is unable to respond, no results will be
returned.
only Will return results from the cache. This will only list Network Pool IP addresses,
not link local or SSIPs.
default Will query the network interface status of each of the requested nodes. Any
nodes that fail to return a response, a response will be returned from the cache.
--owner <string>
Filters the owner to only show specific values. To view an owner and all children beneath it, a single term
is sufficient. For example:
--owner=groupnet0
If the owner is in the default groupnet, the groupnet can be omitted. If the groupnet name is omitted,
the subnet is assumed to be in the default groupnet.
--show-vlans <boolean>
Specifies if the VLAN interfaces and their IP addresses are listed.
--show-inactive
Includes inactive interfaces in the output.
--limit | -l <integer>
Displays no more than the specified number of interfaces.
--sort (lnn | name | status)
Sorts output displayed by the specified attribute.
--descending | -d
Displays output in reverse order.
--format {table | csv | list | json}
Displays output in table (default), comma-separated value (CSV), list format, or JavaScript Object
Notation (JSON).
--no-header | -a
Displays table and CSV output without headers.
--no-footer | -z
Displays table output without footers.
--verbose | -v
Displays more detailed information.
Syntax
isi network pools create <id>
[--access-zone <string]
[--aggregation-mode {roundrobin | failover | lacp | loadbalance | none}]
[--description <string>]
[--alloc-method {dynamic | static}]
[--ifaces <node-interface-range>]
[--ranges <ip-address-range>]
[--rebalance-policy{manual | auto}]
[--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--static-routes <route>]
[--nfs-rroce-only {true | false}]
[--ipv6-perform-dad {true | false}]
[--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--sc-dns-zone <domain-name>]
[--sc-dns-zone-aliases <domain-name>]
[--sc-subnet <string>]
[--sc-ttl <integer>]
[--force]
[--verbose]
Options
<id>
Specifies the ID of the new pool that you want to create. The pool must be added to an existing
groupnet and subnet. The ID can be up to 32 alphanumeric characters long and can include underscores
or hyphens, but cannot include spaces or other punctuation. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0. The pool name must be
unique in the subnet.
roundrobin Rotates connections through the nodes in a first-in, first-out sequence, handling
all processes without priority. Balances outbound traffic across all active ports in
the aggregated link and accepts inbound traffic on any port.
failover Switches to the next active interface when the primary interface becomes
unavailable. Manages traffic only through a primary interface. The second
interface takes over the work of the first as soon as it detects an interruption
in communication.
lacp Supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP). Balances
outgoing traffic across the interfaces based on hashed protocol header
information that includes the source and destination address and the VLAN tag,
if available. Also assembles interfaces of the same speed into groups called Link
Aggregated Groups (LAGs) and balances traffic across the fastest LAGs. This
option is the default mode for new pools.
loadbalance Balances outgoing traffic across the active ports based on hashed protocol
header information that includes the Ethernet source and destination address,
and, if available, the VLAN tag, and the IP source and destination address, and
accepts incoming traffic from any active port.
none Does not allow for aggregation in a given node pool. Attempting to add an
aggregated interface will return an error.
--description <string>
Specifies an optional description of the IP address pool. The description cannot exceed 128 bytes.
Network Options
--alloc-method {dynamic | static}
Specifies the method by which IP addresses are allocated to the network interfaces that are members of
the pool.
The following values are valid:
static Assigns each network interface in the IP address pool a single, permanent IP
address from the pool. Depending on the number of IP addresses available, some
IP addresses might go unused. The static option is the default setting.
dynamic Specifies that all pool IP addresses must be assigned to a network interface at all
times. Enables multiple IP addresses to be assigned to an interface. If a network
interface becomes unavailable, this option helps to ensure that the assigned IP
address are redistributed to another interface.
NOTE: This option is only available if a SmartConnect Advanced license is
active on the cluster.
--ifaces <node-interface-range>...
Specifies which network interfaces should be members of the IP address pool. Specify network
interfaces in the following format:
<node>:<interface>
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
NOTE: If you attempt to add an interface that has already been added as part of an aggregated
interface, you will receive an error message.
--ranges <ip-address-range>...
Specifies one or more IP address ranges for the pool. IP addresses within these ranges are assigned to
the network interfaces that are members of the pool.
Specify the IP address range in the following format:
<low-ip-address>-<high-ip-address>
--rebalance-policy{manual | auto}
Specifies when to redistribute pool IP addresses if a network interface that was previously unavailable
becomes available.
To manually rebalance all IP addresses across the cluster, run the following
command:
round-robin Assigns IP addresses across nodes equally. This is the default policy.
conn-count Assigns IP addresses to the node that has fewest number of connections.
throughput Assigns IP addresses to the node with least throughput.
cpu-usage Assigns IP addresses to the node with lowest CPU usage.
--static-routes <route>
Designates an IP addresses as a static route and specifies the destination gateway. If a client connects
through a static route IP address, outgoing client traffic is routed through the specified gateway.
Multiple routes can be specified in a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR) notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
round-robin Rotates connections through nodes equally. This value is the default policy.
conn-count Assigns connections to the node that has the fewest number of connections.
throughput Assigns connections to the node with the least throughput.
cpu-usage Assigns connections to the node with the lowest CPU usage.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are returned in response to DNS
queries to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple aliases can be
specified in a comma-separated list.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS requests for the
SmartConnect zone. If not specified, the parent subnet of the Network Pool will be used.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in seconds). DNS responses
are only valid for the time specified. The default value is 0 seconds.
Display Options
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Forces commands without warnings.
Argument Formats
<aggregation_mode>
Specifies the type of NIC aggregation. Supported types are: roundrobin, failover, lacp, loadbalance, and
none.
<domain_name>
Specifies the domain name. The string must be formatted as empty sequences or sequences of
supported characters (a-zA-Z0-9-) separated by "." and may be up to 253 characters long.
Examples:
example.domain.name.net, another..example..com
<ip_address_range>
Specifies an IP address range, using two IP addresses separated by a dash. The specified IP addresses
will be included in the range.
Examples:
192.168.0.100-192.168.100.100, 10.7.0.0-10.7.255.255
<node_iface_range>
<id>
Specifies the string that identifies the ID of a pool consisting of a subnet ID and a pool name, separated
by a ":" or a ".". The pool name must be unique throughout the subnet and must contain supported
characters (a-zA-Z0-9-) and may be up to 32 characters long.
Examples:
<static_route>
Specifies a static route that allows connections to networks that are unavailable through the default
routes of the form: <ip_address>/<integer>-<ip_address> where the first address and the integer form
a netmask, and the second address is a gateway. Static routes are configured on a per-pool basis.
Examples:
192.168.0.0/16-192.170.0.1
Examples
The following command creates an IP address pool called pool1 under groupnet0.subnet0. It assigns IP addresses
198.51.100.10-198.51.100.20 to ext-1 network on nodes 1, 2, and 3. The SmartConnect zone name of this pool is
storage.company.com, but it accepts the alias of storage.company:
The following command creates an IP address pool called pool1 under groupnet0.subnet0. It assigns IP addresses
198.51.100.10-198.51.100.20 to the pool. The command also includes aggregated interfaces from nodes 1 through 3 and specifies
loadbalance as the aggregation mode:
The following command creates an IP address pool called pool1 under groupnet0.subnet0. It assigns IP addresses
198.51.100.10-198.51.100.20 to the pool and specifies that connection rebalancing must be performed manually:
Options
<id>...
Specifies the ID of the IP address pool to be deleted. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools list
[--subnet-id <string>...]
[--groupnet <string>...]
[--subnet <string>...]
[{--limit | -l} <integer>]
[--sort {aggregation_mode | alloc_method | description | id | name | rebalance_policy
| sc_auto_suspend_dealy | sc_connect_policy | sc_dns_zone | sc_failover_policy |
sc_subnet | sc_ttl}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
If no options are specified, the command displays a list of all IP address pool on the cluster.
--subnet-id <string>...
Displays IP address pools only from the specified subnet ID. Specify the subnet ID in the following
format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0.
--groupnet <string>...
Displays IP address pools only from the specified groupnet name.
--subnet <string>...
Syntax
isi network pools modify <id>
[--access-zone <zone-name>]
[--revert-access-zone]
[--aggregation-mode {roundrobin | failover | lacp | loadbalance | none}]
[--revert-aggregation-mode]
[--description <string>]
[--clear-description]
[--name <string>
[--alloc-method {dynamic | static}]
[--revert-alloc-method]
[--ifaces <node-interface-range>]
[--clear-ifaces]
[--add-ifaces <node-interface-range>]
[--remove-ifaces <node-interface-range>]
[--ranges <ip-address-range>]
[--clear-ranges]
[--add-ranges <ip-address-range>]
[--remove-ranges <ip-address-range>]
[--rebalance-policy{manual | auto}]
[--revert-rebalance-policy]
[--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--revert-sc-failover-policy]
[--static-routes <route>]
[--clear-static-routes]
[--add-static-routes <route>]
[--remove-static-routes <route>]
[--nfsv3-rroce-only {true | false}]
[--ipv6-perform-dad {true | false}]
[--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--revert-sc-connect-policy]
[--sc-dns-zone <domain-name>]
[--sc-dns-zone-aliases <domain-name>]
[--clear-sc-dns-zone-aliases]
[--add-sc-dns-zone-aliases <domain-name>]
[--remove-sc-dns-zone-aliases <domain-name>]
Options
<id>
Specifies the ID of the IP address pool that you want to modify. Specify the ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0. The pool name must be
unique in the subnet.
Pool Options
--access-zone <zone-name>
Associates an access zone with the pool. Clients will be allowed to connect to the specified access zone
only through IP addresses in the pool. The access zone must belong to the same groupnet as the IP
address pool.
--revert-access-zone
Sets the value of --access-zone to the system default value.
--aggregation-mode {roundrobin | failover | lacp | loadbalance | none}
Specifies how outgoing traffic is distributed across aggregated network interfaces. The aggregation
mode is applied only if at least one aggregated network interface is a member of the IP address pool.
The following values are valid:
roundrobin Rotates connections through the nodes in a first-in, first-out sequence, handling
all processes without priority. Balances outbound traffic across all active ports in
the aggregated link and accepts inbound traffic on any port.
failover Switches to the next active interface when the primary interface becomes
unavailable. Manages traffic only through a primary interface. The second
interface takes over the work of the first as soon as it detects an interruption
in communication.
lacp Supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP). Balances
outgoing traffic across the interfaces based on hashed protocol header
information that includes the source and destination address and the VLAN tag,
if available. Also assembles interfaces of the same speed into groups called Link
Aggregated Groups (LAGs) and balances traffic across the fastest LAGs. This
option is the default mode for new pools.
loadbalance Balances outgoing traffic across the active ports based on hashed protocol
header information that includes the Ethernet source and destination address,
and, if available, the VLAN tag, and the IP source and destination address, and
accepts incoming traffic from any active port.
none Does not allow for aggregation in a given network pool. Attempting to add an
aggregated interface will return an error.
--revert-aggregation-mode
Sets the value of --aggregation-mode to the system default value.
--description <string>
Specifies an optional description of the IP address pool. This option overwrites the existing description.
The description cannot exceed 128 bytes.
--clear-description
Network Options
--alloc-method {dynamic | static}
Specifies the method by which IP addresses are allocated to the network interfaces that are members of
the pool.
NOTE: Cloud deployments offer an additional allocation method: ExternallyManaged. This allocation
method allows cloud providers to decide the placement of Primary IP addresses. Pools using
ExternallyManaged allocation method are created and managed by SmartConnect, and cannot be
edited or changed from the ExternallyManaged allocation method.
The following values are valid:
static Assigns each network interface in the IP address pool a single, permanent IP
address from the pool. Depending on the number of IP addresses available, some
IP addresses might go unused. The static option is the default setting.
dynamic Specifies that all pool IP addresses must be assigned to a network interface at all
times. Enables multiple IP addresses to be assigned to an interface. If a network
interface becomes unavailable, this option helps to ensure that the assigned IP
address are redistributed to another interface.
NOTE: This option is only available if a SmartConnect Advanced license is
active on the cluster.
--revert-alloc-method
Sets the value of --alloc-method to the system default value.
--ifaces <node-interface-range>...
Adds network interfaces to the IP address pool. Specify network interfaces in the following format:
<node>:<interface>
To specify a range of nodes, separate the lower and upper node IDs with a dash (-). To specify multiple
network interfaces, separate each interface with a comma. The following example adds the interfaces
from nodes 1, 2 and 3:
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
--clear-ifaces
Removes all network interfaces from the IP address pool.
--add-ifaces <node-interface-range>...
Adds one or more network interfaces to the IP address pool.
--remove-ifaces <node-interface-range>...
Removes one or more network interfaces from the IP address pool.
--ranges <ip-address-range>...
Specifies one or more IP address ranges for the pool. IP addresses within these ranges are assigned to
the network interfaces that are members of the pool.
Specify the IP address range in the following format:
<low-ip-address>-<high-ip-address>
This option overwrites the existing list of IP address ranges. Use the --add-ranges and --remove-
ranges options to modify the existing list.
To manually rebalance all IP addresses across the cluster, run the following
command:
--revert-rebalance-policy
Sets the value of --rebalance-policy to the system default value.
--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}
Specifies how IP addresses that belong to an unavailable interface are rebalanced across the remaining
network interfaces.
The following values are valid:
roundrobin Assigns IP addresses across nodes equally. This is the default policy.
conn_count Assigns IP addresses to the node that has fewest number of connections.
throughput Assigns IP addresses to the node with least throughput.
cpu_usage Assigns IP addresses to the node with lowest CPU usage.
--revert-sc-failover-policy
Sets the value of --sc-failover-policy to the system default value.
--static-routes <route>...
Designates an IP addresses as a static route and specifies the destination gateway. If a client connects
through a static route IP address, outgoing client traffic is routed through the specified gateway.
Multiple routes can be specified in a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR) notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
This option overwrites the existing list of static routes. Use the --add-static-routes and --
remove-static-routes options to modify the existing list.
--clear-static-routes
Removes all static routes from the pool.
--add-static-routes <route>...
Adds one or more static routes to the pool.
--remove-static-routes <route>...
Removes one or more static routes from the pool.
roundrobin Rotates connections through nodes equally. This value is the default policy.
conn_count Assigns connections to the node that has the fewest number of connections.
throughput Assigns connections to the node with the least throughput.
cpu_usage Assigns connections to the node with the lowest CPU usage.
--revert-sc-connect-policy
Sets the value of --sc-connect-policy to the system default value.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are returned in response to DNS
queries to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>...
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple aliases can be
specified in a comma-separated list. This option overwrites the existing list of SmartConnect DNS zone
aliases. Use the --add-sc-dns-zone-aliases and --remove-sc-dns-zone-aliases options
to modify the existing list.
--clear-sc-dns-zone-aliases
Removes all SmartConnect DNS zone aliases from the pool.
--add-sc-dns-zone-aliases <domain-name>...
Adds one or more SmartConnect DNS zone aliases to the pool.
--remove-sc-dns-zone-aliases <domain-name>...
Removes one or more SmartConnect DNS zone aliases from the pool.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS requests for the
SmartConnect zone.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in seconds). DNS responses
are only valid for the time specified. The default value is 0 seconds.
--revert-sc-ttl
Sets the value to the default value of 0 seconds.
Display Options
--verbose | -v
Displays more detailed information.
--force | -f
Forces commands without warnings.
Syntax
isi network pools rebalance-ips <id>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool to be rebalanced. Specify the pool name in the following
format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools sc-resume-nodes <id> <lnn>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query responses should be
resumed. Specify the pool name in the following format:
<groupnet_id>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS query responses should
be resumed.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
Syntax
isi network pools sc-suspend-nodes <id> <lnn>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query responses should be
suspended. Specify the pool name in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters—for example, groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS query responses should
be suspended.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools status <id>
[--show-all]
Options
<id>
The unique identifier of the network pool to view.
--show-all
Optional. By default, isi network pools status lists only unresolvable nodes. Specify --show-
all to see the status of all nodes, including resolvable nodes.
No detected problems
The following example shows the status for a network pool with a node, LNN 3, that needs attention.
Syntax
isi network pools view <id>
Options
<id>
Specifies the ID of the IP address pool to be viewed. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0.
Syntax
isi network rules create <id> <iface>
[--desc <string>]
[--node-type {any | storage | accelerator | backup-accelerator}]
[--verbose]
Options
<id>
Specifies the ID and location of the new provisioning rule. New network interfaces that meet the rule
criteria will be assigned to the IP address pool that contains the rule. Valid IDs include the groupnet,
subnet, pool, and rule name. The rule name must be unique throughout the given IP address pool.
Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0:rule3. The rule name must
be unique in the pool.
<iface>
Specifies the network interface name the rule applies to. To view a list of interfaces on your system, run
the isi network interfaces list command.
--description <string>
Specifies an optional description of the provisioning rule. The description cannot exceed 128 bytes.
--node-type {any | storage | accelerator | backup-accelerator}
Sets the provisioning rule to apply to one or more of the specified type of node. The default setting is
any.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network rules delete <id>
Options
<id>...
Specifies the ID of the provisioning rule to be deleted. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
Syntax
isi network rules list
[--pool-id <string>]
[--groupnet <string>]
[--subnet <string>]
[--pool <string>]
[{--limit | -l} <integer>]
[--sort {id | description | iface | node_type | name}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[--verbose]
Options
If no options are specified, the command displays a list of all provisioning rules on the cluster.
--pool-id <string>
Displays provisioning rules only from the specified pool ID. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0:rule3.
--groupnet <string>
Displays provisioning rules only from the specified groupnet name.
--subnet <string>
Displays provisioning rules only from subnets with the specified name.
--pool <string>
Displays provisioning rules only from IP address pools with the specified name.
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {id | description | iface | node_type | name}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Examples
The following example displays a list of provisioning rules on a node:
The system displays the list of rules in output similar to the following example:
Syntax
isi network rules modify <id>
[--description <string>]
[--clear-description ]
[--iface <node_interface>]
[--name <string>]
[--node-type {any | storage | accelerator | backup-accelerator}]
[--revert-node-type ]
[--verbose]
Options
<id>
Specifies the ID of the provisioning rule to be modified. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0:rule3.
--description <string>
Specifies an optional description of the provisioning rule. This option overwrites the existing description.
The description cannot exceed 128 bytes.
--clear-description
Clears the description of the provisioning rule.
--iface <node_interface>
Specifies the network interface name the rule applies to. This option overwrites the existing interface
name.
--name <string>
Syntax
isi network rules view <id>
Options
<id>
Specifies the ID of the provisioning rule to be viewed. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1:pool0:rule3.
Syntax
isi network sc-rebalance-all
[--force]
[--verbose]
Options
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi networks create subnet <id> <addr-family> (ipv4 | ipv6) <prefixlen>
[--description <string>]
[--dsr-addrs <ip-address>]
[--gateway <ip-address>]
[--gateway-priority <integer>]
[--mtu <integer>]
[--vlan-enabled {true | false}]
[--vlan-id <integer>]
[--sc-service-addr <ip-address>]
[--sc-service-name <domain_name>]
[--verbose | -v]
Options
<id>
Specifies the ID of the new subnet that you want to create. The subnet must be added to an existing
groupnet. The ID can be up to 32 alphanumeric characters long and can include underscores or hyphens,
but cannot include spaces or other punctuation. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1. The subnet name must be
unique in the groupnet.
Network options:
<addr-family> (ipv4 | ipv6)
Specifies IP address format to be applied to the subnet. All subnet settings and IP address pools added
to the subnet must use the specified address format. You cannot modify the address family once the
subnet has been created.
<prefixlen>
Sets the prefix length of the subnet. Specify a prefix length appropriate for the selected address family.
Subnet options:
--description <string>
Specifies an optional description of the subnet. The description cannot exceed 128 bytes.
Network options:
--dsr-addrs <ip_address>...
Sets one or more Direct Server Return addresses for the subnet. If an external hardware load balancer
that uses DSR addresses is used, this parameter is required.
NOTE: dsr-addrs have been deprecated.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
SmartConnect options:
--sc-service-addr <ip_address>
Specifies the IP address on which the SmartConnect module listens for domain name server (DNS)
requests on this subnet.
--sc-service-name <domain_name>
Specifies the domain name corresponding to the SmartConnect service address.
Display options:
--verbose | -v
Displays more detailed information.
Options
<id>...
Specifies the ID of the subnet to be deleted. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network subnets list
[--groupnet-id <string>]
[--groupnet | -g <string>]
[{--limit | -l} <integer>]
[--sort {id | name | addr_family | base_addr | description | gateway |
gateway_priority | mtu | prefixlen | sc_service_addr | sc_service_name | vlan_enabled
| vlan_id}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[--verbose | -v]
Options
If no options are specified, the command displays a list of all subnets on the cluster.
--groupnet-id <string>
Displays subnets only from the specified groupnet ID.
--groupnet | -g <string>
Displays subnets only from the specified groupnet ID.
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort id | name | addr_family | base_addr | description | gateway | gateway_priority | mtu |
prefixlen | sc_service_addrs | sc_service_name | vlan_enabled | vlan_id
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
Examples
The following command displays a list of all subnets:
Syntax
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1.
--description <string>
Specifies an optional description of the subnet. The description cannot exceed 128 bytes.
--clear-description
Clears the description of the subnet.
--dsr-addrs <ip_address>...
Specifies a list of IP addresses that use Direct Server Return (DSR). You need to specify --dsr-addrs
for each additional IP address.
NOTE: This option has been deprecated.
--clear-dsr-addrs
Clears list of IP addresses that use Direct Server Return.
NOTE: This option has been deprecated.
--add-dsr-addrs <ip_address>...
Adds items to the list of IP addresses that use Direct Server Return. You need to specify--add-dsr-
addrs for each additional IP address that you want to add.
NOTE: This option has been deprecated.
--remove-dsr-addrs <ip_address>...
Removes items from the list of IP addresses that use Direct Server Return. You need to specify --
remove-dsr-addrs for each additional IP address that you want to remove.
NOTE: This option has been deprecated.
--revert-dsr-addrs
Sets the value of --dsr-addrs to the system default value.
NOTE: This option has been deprecated.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
--gateway-priority <integer>
Specifies priority of the subnet gateway, where the lowest number is of the highest priority.
--mtu <integer>
Sets the size of the maximum transmission unit (MTU) of the subnet that the cluster uses in network
communication.
--revert-mtu
Sets the value of --mtu to the system default value.
--prefixlen <iprefixlen>
Sets the prefix size of the subnet.
--name <string>
Specifies the name for the subnet.
--sc-service-addrs <ip_address_range>...
Syntax
isi network subnets view <id>
Options
<id>
Specifies the ID of the subnet to be viewed. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as
delimiters between component names—for example, groupnet0:subnet1.
Topics:
• isi nfs aliases create
• isi nfs aliases delete
• isi nfs aliases list
• isi nfs aliases modify
• isi nfs aliases view
• isi nfs exports check
• isi nfs exports create
• isi nfs exports delete
• isi nfs exports list
• isi nfs exports modify
• isi nfs exports reload
• isi nfs exports view
• isi nfs log-level modify
• isi nfs log-level view
• isi nfs netgroup check
• isi nfs netgroup flush
• isi nfs netgroup modify
• isi nfs nlm locks list
• isi nfs nlm locks waiters
• isi nfs nlm sessions check
• isi nfs nlm sessions delete
• isi nfs nlm sessions list
• isi nfs nlm sessions refresh
• isi nfs nlm sessions view
• isi nfs settings export modify
• isi nfs settings export view
• isi nfs settings global modify
• isi nfs settings global view
• isi nfs settings zone modify
• isi nfs settings zone view
Syntax
isi nfs aliases create <name> <path>
[--zone <string>]
[{--verbose | -v}]
[{--force | -f}]
[{--help | -h}]
Options
<name>
The name of the alias. Alias names must be formed as Unix root directory with a single forward slash
followed by the name. For example, /home.
<path>
The OneFS directory pathname the alias links to. The pathname must be an absolute path below the
access zone root. For example, /ifs/data/ugroup1/home.
--zone <string>
The access zone in which the alias is active.
{--force | -f}
Forces creation of the alias without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Example
The following command creates an alias in a zone named ugroup1:
Syntax
isi nfs aliases delete <name>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<name>
The name of the alias to be deleted.
--zone <string>
Example
The following command deletes an alias from a zone named ugroup1.
Syntax
isi nfs aliases list
[--check]
[--zone <string>]
[{--limit | -l} <integer>]
[--sort (zone | name | path | health)]
[{--descending | -d}]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
--check
For the current zone, displays a list of aliases and their health status.
--zone <string>
The access zone in which the alias is active.
{--limit | -l} <integer>
Displays no more than the specified number of NFS aliases.
--sort {zone | name | path | health}
Specifies the field to sort by.
{--descending | -d}
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Example
The following command displays a table of the aliases in a zone named ugroup1 including their health status.
Syntax
isi nfs aliases modify <alias>
[--zone <string>]
[--new-zone <string>]
[--name <string>]
[--path <path>]
[{--verbose | -v}]
[{--force | -f}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<alias>
The current name of the alias, for example, /home.
--zone <string>
The access zone in which the alias is currently active.
--new-zone <string>
The new access zone in which the alias is to be active.
--name <string>
A new name for the alias.
--path <path>
Example
The following command modifies the zone, name, and path of an existing alias:
isi nfs aliases modify /home --name /users --zone ugroup1 --new-zone ugroup2
--path /ifs/data/ugroup2/users
Syntax
isi nfs aliases view <name>
[--zone <string>]
[--check]
Options
<name>
The name of the alias.
--zone <string>
The access zone in which the alias is active.
--check
Include the health status of the alias.
Example
The following command displays a table of information, including the health status, of an alias named /projects in the current
zone.
Syntax
isi nfs exports check
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[--zone <string>]
[--ignore-unresolvable-hosts]
[--ignore-bad-paths]
[--ignore-bad-auth]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
{--limit | -l} <integer>
Displays no more than the specified number of NFS exports.
--zone <string>
Specifies the access zone in which the export was created.
[--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--ignore-unresolvale-hosts
Does not present an error condition on unresolvable hosts when creating or modifying an export.
--ignore-bad-paths
Does not present an error condition on bad paths when creating or modifying an export.
--ignore-bad-auth
Ignores bad authentication for mapping options when creating or modifying an export.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
If the check finds no problems, it returns an empty table. If, however, the check finds a problem, it returns a display similar to
the following:
ID Message
---------------------------------------
3 '/ifs/data/project' does not exist
---------------------------------------
Total: 1
Syntax
isi nfs exports create <paths>
[--block-size <size>]
[--can-set-time {yes | no}]
[--case-insensitive {yes | no}]
[--case-preserving {yes | no}]
[--chown-restricted {yes | no}]
[--directory-transfer-size <size>]
[--link-max <integer>]
[--max-file-size <size>]
[--name-max-size <integer>]
[--no-truncate {yes | no}]
[--return-32bit-file-ids {yes | no}]
[--symlinks {yes | no}]
[--zone <string>]
[--clients <client>]
[--description <string>]
[--root-clients <client>]
[--read-write-clients <client>]
[--read-only-clients <client>]
[--all-dirs {yes | no}]
[--encoding <string>]
[--security-flavors {unix | krb5 | krb5i | krb5p}]
[--snapshot <snapshot>]
[--map-lookup-uid {yes | no}]
[--map-retry {yes | no}]
[--map-root-enabled {yes | no}]
[--map-non-root-enabled {yes | no}]
[--map-failure-enabled {yes | no}]
[--map-all <identity>]
[--map-root <identity>]
[--map-non-root <identity>]
[--map-failure <identity>]
[--map-full {yes | no}]
[--commit-asynchronous {yes | no}]
[--read-only {yes | no}]
[--readdirplus {yes | no}]
[--eaddirplus-prefetch <integer>
[--read-transfer-max-size <size>]
[--read-transfer-multiple <integer>]
[--read-transfer-size <size>]
[--setattr-asynchronous {yes | no}]
Required Privileges
IISI_PRIV_NFS.
Options
<paths> ...
Required. Specifies the path to be exported, starting at /ifs. This option can be repeated to specify
multiple paths.
--block-size <size>
Specifies the block size, in bytes.
--can-set-time {yes | no}
If set to yes, enables the export to set time. The default setting is no.
--case-insensitive {yes | no}
If set to yes, the server will report that it ignores case for file names. The default setting is no.
--case-preserving {yes | no}
If set to yes, the server will report that it always preserves case for file names. The default setting is
no.
--chown-restricted {yes | no}
If set to yes, the server will report that only the superuser can change file ownership. The default
setting is no.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed by a case-sensitive
unit of measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 128K.
--link-max <integer>
The reported maximum number of links to a file.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger than the specified
value, an error is returned.
--name-max-size <integer>
The reported maximum length of characters in a filename.
--no-truncate {yes | no}
If set to yes, too-long file names will result in an error rather than be truncated.
--return-32bit-file-ids {yes | no}
Applies to NFSv3 and NFSv4. If set to yes, limits the size of file identifiers returned from readdir to
32-bit values. The default value is no.
--description <string>
The description for this NFS export.
--root-clients <client>
Allows the root user of the specified client to execute operations as the root user of the cluster. This
option overrides the --map-all and --map-root option for the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range. You can specify multiple
clients in a comma-separated list.
--read-write-clients <client>
Grants read/write privileges to the specified client for this export. This option overrides the --read-
only option for the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range. You can specify multiple
clients in a comma-separated list.
--read-only-clients <client>
Makes the specified client read-only for this export. This option overrides the --read-only option for
the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range. You can specify multiple
clients in a comma-separated list.
--all-dirs {yes | no}
If set to yes, this export will cover all directories. The default setting is no.
--encoding <string>
Specifies the character encoding of clients connecting through this NFS export.
Valid values and their corresponding character encodings are provided in the following table. These
values are taken from the node's /etc/encodings.xml file, and are not case sensitive.
Examples
The following command creates an NFS export for a particular zone and set of clients:
The following command creates an NFS export with multiple directory paths and a custom security type (Kerberos 5):
Syntax
isi nfs exports delete <id>
[{--force | -f}]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<id>
Specifies the ID of the NFS export to delete. You can use the isi nfs exports list command to
view a list of exports and their IDs in the current zone.
--zone <string>
Specifies the access zone in which the export was created. The default is the current zone.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs exports list
[--path <path>]
[{--limit | -l} <integer>]
[--sort (id | paths | description)]
[{--descending | -d}]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[--zone <string>]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
--path <path>
Only show exports defined for the given path.
{--limit | -l} <integer>
Displays no more than the specified number of NFS exports.
--sort <field>
Specifies the field to sort by. Valid values are as follows:
● id
● zone
● paths
● description
● clients
● root_clients
● read_only_clients
● read_write_clients
● unresolved_clients
● all_dirs
● block_size
● can_set_time
● commit_asynchronous
● directory_transfer_size
● encoding
● map_lookup_uid
● map_retry
● map_all
● map_root
● map_full
● max_file_size
● read_only
Examples
The following command lists NFS exports, by default in the current zone:
NOTE: You can run the isi nfs settings export view command to see the full list of default settings for exports.
Required Privileges
IISI_PRIV_NFS.
Options
<id>
The export ID number. You can use the isi nfs exports list command to view all the exports
and their ID numbers in the current access zone.
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--can-set-time {yes | no}
--revert-encoding
Restores the setting to the system default.
--security-flavors {unix | krb5 | krb5i | krb5p}
Specifies a security flavor to support. To support multiple security flavors, repeat this option for each
additional entry. The following values are valid:
--revert-security-flavors
Restores the setting to the system default.
--clear-security-flavors
Clears the value for supported security flavors.
--add-security-flavors {unix | krb5 | krb5i | krb5p}
Adds supported security flavors. Repeat for each additional supported security flavor to add.
--remove-security-flavors
Removes supported security flavors. Repeat for each additional supported security flavor to remove
from the list.
--snapshot {<snapshot> | <snapshot-alias>}
Specifies the ID of a snapshot or snapshot alias to export. If you specify this option, directories will
be exported in the state captured in either the specified snapshot or the snapshot referenced by
the specified snapshot alias. If the snapshot does not capture the exported path, the export will be
inaccessible to users.
If you specify a snapshot alias, and the alias is later modified to reference a new snapshot, the new
snapshot will be automatically applied to the export.
Because snapshots are read-only, clients will not be able to modify data through the export unless you
specify the ID of a snapshot alias that references the live version of the file system.
Specify <snapshot> or <snapshot-alias> as the ID or name of a snapshot or snapshot alias.
--revert-snapshot
Restores the setting to the system default.
--map-lookup-uid {yes | no}
If set to yes, incoming UNIX user identifiers (UIDs) will be looked up locally. The default setting is no.
--revert-map-lookup-uid
Restores the setting to the system default.
--map-retry {yes | no}
If set to yes, the system will retry failed user-mapping lookups. The default setting is no.
Syntax
isi nfs exports reload
[--zone <string>]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
--zone <string>
The access zone for the exports you are reloading.
--help | -h
Display help for this command.
Syntax
isi nfs exports view <id>
[--zone <string>]
Syntax
isi nfs log-level modify <level> (always | error | warning | info | verbose
| debug | trace | unknown)
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<level>
Valid logging levels are:
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs log-level view
Options
There are no options for this command.
Syntax
isi nfs netgroup check
[--host <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
--host <string>
The IPv4 or IPv6 address of the node to check. The default is the localhost IP address.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs netgroup flush
[--host <string>]
[{--verbose | -v}]
[{--help | -h}]
Options
--host <string>
The IPv4 or IPv6 address of the node to flush. If you do not specify a node, all nodes are flushed
(default).
{verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs netgroup modify
[{--bgwrite | -w} <duration>]
[{--expiration | -e} <duration>]
[{--lifetime | -l} <duration>]
[{--retry | -r} <duration>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
NOTE: In the following option definitions, express duration in integer format as [YMWDHms].
Syntax
isi nfs nlm sessions check
[--cluster-ip <string>]
[--zone <string>]
Options
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
Syntax
isi nfs nlm sessions delete <hostname> <cluster-ip>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
Syntax
isi nfs nlm sessions list
[{--limit | -l} <integer>]
[--sort (hostname | cluster_ip | is_active | notify_attempts_remaining)]
[{--descending | -d}]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
{--limit | -l} <integer>
The number of NFS NLM sessions to display.
--sort {hostname | cluster_ip | is_active | notify_attempts_remaining}
Specifies the field to sort by.
{--descending | -d}
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs nlm sessions refresh <hostname> <cluster-ip>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
IISI_PRIV_NFS.
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs nlm sessions view <hostname>
[--cluster-ip <string>]
[--zone <string>]
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
Required Privileges
IISI_PRIV_NFS.
Options
<hostname>
The name of the client that initiated the session.
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--limit | -l} <integer>
Displays no more than the specified number of NFS nlm locks.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi nfs exports modify <id>
[--block-size <SIZE>]
[--revert-block-size]
[--can-set-time <boolean>]
[--revert-can-set-time]
[--case-insensitive <boolean>]
[--revert-case-insensitive]
[--case-preserving <boolean>]
[--revert-case-preserving]
[--chown-restricted <boolean>]
[--revert-chown-restricted]
[--directory-transfer-size <SIZE>]
[--revert-directory-transfer-size]
[--link-max <integer>]
Required Privileges
IISI_PRIV_NFS.
Options
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--can-set-time {yes|no}
If set to yes, enables the export to set time. The default setting is no.
--revert-can-set-time
Restores the setting to the system default.
--case-insensitive {yes|no}
If set to yes, the server will report that it ignores case for file names. The default setting is no.
--revert-case-insensitive
Restores the setting to the system default.
--case-preserving {yes|no}
If set to yes, the server will report that it always preserves case for file names. The default setting is
no.
--revert-case-preserving
Restores the setting to the system default.
--chown-restricted {yes|no}
If set to yes, the server will report that only the superuser can change file ownership. The default
setting is no.
--revert-chown-restricted
Restores the setting to the system default.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed by a case-sensitive
unit of measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 128K.
--revert-directory-transfer-size
--revert-encoding
Restores the setting to the system default.
--security-flavors {unix|krb5|krb5i|krb5p} ...
Specifies a security flavor to support. To support multiple security flavors, repeat this option for each
additional entry. The following values are valid:
--revert-security-flavors
Restores the setting to the system default.
--snapshot {<snapshot>|<snapshot-alias>}
Specifies the ID of a snapshot or snapshot alias to export. If you specify this option, directories will
be exported in the state captured in either the specified snapshot or the snapshot referenced by
the specified snapshot alias. If the snapshot does not capture the exported path, the export will be
inaccessible to users.
If you specify a snapshot alias, and the alias is later modified to reference a new snapshot, the new
snapshot will be automatically applied to the export.
Because snapshots are read-only, clients will not be able to modify data through the export unless you
specify the ID of a snapshot alias that references the live version of the file system.
Specify <snapshot> or <snapshot-alias> as the ID or name of a snapshot or snapshot alias.
--revert-snapshot
Restores the setting to the system default.
--map-lookup-uid {yes|no}
If set to yes, incoming UNIX user identifiers (UIDs) will be looked up locally. The default setting is no.
Syntax
isi nfs settings export view
[--zone <string>]
Options
--zone <string>
Specifies the access zone in which the default settings apply.
Example
To view the currently-configured default export settings, run the following command:
Syntax
isi nfs settings global modify
[--nfsv3-enabled <boolean>]
[--nfs-rdma-enabled <boolean>]
[--nfsv4-enabled <boolean>]
[--nfsv40-enabled <boolean>]
[--nfsv41-enabled <boolean>]
[--nfsv42-enabled <boolean>]
[--rquota-enabled <boolean>]
[{--force | -f}]
[{--verbose | -v}]
Options
[--nfsv3-enabled <boolean>]
Enables or disables version 3 of the NFS protocol.
Syntax
isi nfs settings global view
Options
There are no options for this command.
Example
The following is an example of the report that is generated by this command.
Syntax
isi nfs settings zone modify
[--nfsv4-domain <string>]
[--revert-nfsv4-domain]
[--nfsv4-replace-domain <boolean>]
[--revert-nfsv4-replace-domain]
[--nfsv4-no-domain <boolean>]
[--revert-nfsv4-no-domain]
[--nfsv4-no-domain-uids <boolean>]
[--revert-nfsv4-no-domain-uids]
[--nfsv4-no-names <boolean>]
[--revert-nfsv4-no-names]
[--nfsv4-allow-numeric-ids <boolean>]
[--revert-nfsv4-allow-numeric-ids]
[--zone <string>]
[{--verbose | -v}]
Required Privileges
IISI_PRIV_NFS.
Options
--nfsv4-domain <string>
Specifies the NFSv4 domain name.
--revert-nfsv4-domain
Returns the --nfsv4-domain setting to the system default ( localhost).
--nfsv4-replace-domain {yes | no}
Replaces the owner/group domain with the NFSv4 domain name.
--revert-nfsv4-replace-domain
Returns setting to the system default. Default is yes.
--nfsv4-no-domain {yes | no}
Sends owners/groups without the NFSv4 domain name.
--revert-nfsv4-no-domain
Returns setting to the system default. Default is no.
--nfsv4-no-domain-uids {yes | no}
Sends UIDs/GIDs without the NFSv4 domain name.
--revert-nfsv4-no-domain-uids
Returns setting to the system default. Default is yes.
--nfsv4-no-names {yes | no}
Always sends owners/groups as UIDs/GIDs.
--revert-nfsv4-no-names
Returns setting to the system default. Default is no.
--nfsv4-allow-numeric-ids {yes | no}
Sends owners/groups as UIDs/GIDs when look-ups fail or if --nfsv4-no-names is enabled.
--revert-nfsv4-allow-numeric-ids
Example
The following command specifies that the NFS server would accept UIDs/GIDs in place of user names:
Syntax
isi nfs settings zone view
[--zone <string>]
Options
--zone <string>
Specifies the access zone for which you want to view NFSv4-related settings.
Example
The following command specifies that you want to examine NFSv4-related settings for an access zone named Zone1:
Topics:
• isi ntp servers create
• isi ntp servers delete
• isi ntp servers list
• isi ntp servers modify
• isi ntp servers view
• isi ntp settings modify
• isi ntp settings view
Syntax
isi ntp servers create <name>
[--key <string>]
[--verbose]
Options
<name>
The host name of the NTP server you are adding to the cluster.
{--key | -k} <string>
Value that maps the NTP server to a key in the key file.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ntp servers delete (<name> | --all)
[--verbose | -v]
[--force]
Syntax
isi ntp servers list
[--limit | -l <integer>]
[--sort (name | key)]
[--descending]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l | -l} <integer> }
The number of NTP servers to display.
{--sort (name | key}
Sort the list output by server name or key path.
{--descending | -d}
Sort data in descending order.
{--format (table | json | csv | list}
Displays NTP servers in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ntp servers modify <name>
[--key | -k (<string> | --clear-key)]
[--verbose]
Options
{<name> }
The host name of an NTP server connected to the cluster.
{--key | -k) (<string> | --clear-key }
Value that maps the NTP server to a key in the key file.
{--clear-key | -v}
Clear the key value.
{--verbose | -v}
Displays more detailed information.
Syntax
isi ntp servers view <name>
Options
{<name> }
The host name of the NTP server.
Syntax
isi ntp settings modify
[--chimers | -c <integer>]
[--excluded (<lnn> | --clear-excluded | --add-excluded <lnn> | --remove-excluded
<lnn>)]
[--key-file (<path> | --clear-key-file]
[--verbose]
Syntax
isi ntp settings view
Options
None OneFS displays cluster NTP configuration settings.
Topics:
• isi performance datasets create
• isi performance datasets delete
• isi performance datasets list
• isi peformance datasets modify
• isi performance datasets view
• isi performance filters apply
• isi performance filters list
• isi performance filters modify
• isi performance filters remove
• isi performance filters view
• isi performance metrics list
• isi performance metrics view
• isi performance settings modify
• isi performance settings view
• isi performance workloads list
• isi performance workloads modify
• isi performance workloads pin
• isi performance workloads unpin
• isi performance workloads view
Syntax
isi performance datasets create <metrics> (export_id | groupname | local_address | path
| protocol | remote_address |
share_name | username | zone_name)
[{--filters | -f} <metrics>]
[{--name | -n} <string>]
[{--help | -h}]
Options
<metrics> The statistics metric(s) to include in the new data set. You can specify multiple metric options.
{export_id |
groupname |
local_address
| path |
protocol |
remote_addres
s | share_name |
Syntax
isi performance datasets delete <dataset>
[--remove-filters | -r]
[--unpin-workloads | -u]
[--force | -f]
Options
<dataset> The name or numeric ID of the dataset you are deleting.
--remove- Remove all filters from a performance dataset before deleting the dataset.
filters | -r
--unpin- Unpin all workloads from a performance dataset before deleting the dataset.
workloads | -u
--force | -f Do not prompt for confirmation of the dataset deletion.
Syntax
isi performance datasets list
[--sort {id | name | statkey | creation_time}]
[--descending | -d]
[--format {table | csv | list | json}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
--sort {id | Sort data by the specified field.
name | statkey |
creation_time}
--descending | Specifies to sort the data in descending order.
-d
Syntax
isi performance datasets modify <dataset>
[--name <string>]
Options
<dataset> The name or numeric ID of the data set you are modifying.
{--name | -n} A new custom name for the performance data set.
Syntax
isi performance datasets view <dataset>
Options
<dataset> The name or numeric ID of the OneFS performance data set for which you are viewing properties.
OneFS displays the properties for the specified OneFS performance data set.
Syntax
isi performance filters apply <dataset> <metric-value>
[--name | -n]
Syntax
isi performance filters list <dataset>
[--sort {id | name | creation_time}]
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
<dataset> The name or numeric ID of the dataset for which you are listing filters.
--sort {id Sort data by the specified field.
| name |
creation_time}
--descending | Specifies to sort the data in descending order.
-d
--format Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or
{table | json | list format.
csv | list}
--no-header | Displays table and CSV output without headers.
-a
--no-footer | Displays table output without footers.
-z
--verbose | Displays more detailed information.
-v
Syntax
isi performance filters modify <dataset> <filter>
[--name | -n <string>]
Syntax
isi performance filters remove <dataset> <filter>
[--force]
Options
<dataset> The name or numeric ID of the data set from which you are removing a filter.
<filter> The name or numeric ID of the filter to remove from the data set.
{--force | -f} Do not prompt for confirmation of the filter deletion.
Syntax
isi performance filters view <dataset> <filter>
Options
<dataset> The name or numeric ID of the data set to which you have applied the filter.
<filter> The name or numeric ID of the filter to view.
OneFS displays the properties for the specified filter applied to the OneFS performance data set.
Syntax
isi performance metrics list
[--sort {id | datatype | system_only}]
[--descending | -d]
Options
--sort {id Sort data by the specified field. Metrics classified as system_only are reserved for use by the system
| datatype | dataset.
system_only}
--descending | Specifies to sort the data in descending order.
-d
--format Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or
{table | json | list format.
csv | list}
--no-header | Displays table and CSV output without headers.
-a
--no-footer | Displays table output without footers.
-z
--verbose | Displays more detailed information.
-v
Syntax
isi performance metrics view <id>
Options
<id> The name or numeric ID of the statistics metric to view.
Syntax
isi performance settings modify
[--top-n-collection-count <integer>]
[--target-disk-time-in-queue-ms <percent>]
[--target-protocol-read-latency-usec <integer>]
[--target-protocol-write-latency-usec <integer>]
[--protocol-ops-limit-enabled <boolean>]
[--medium-impact-modifier-usec <integer>]
[--high-impact-modifier-usec <integer>]
Syntax
isi performance settings view
Syntax
isi performance workloads list <dataset>
[--sort {id | name | creation_time | cluster_resource_impact | client_impact | limits}]
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
Options
<dataset> The name or numeric ID of the dataset for which you are listing pinned workloads.
--sort {id | Sort data by the specified field.
name |
creation_time
|
cluster_resou
rce_impact |
client_impact
| limits}
--descending | Specifies to sort the data in descending order.
-d
--format Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or
{table | json | list format.
csv | list}
--no-header | Displays table and CSV output without headers.
-a
--no-footer | Displays table output without footers.
-z
--verbose | Displays more detailed information.
-v
Syntax
isi performance workloads modify <dataset> <workload>
[--name | -n <string>]
[--limits <limit-value> | --no-protocol-ops-limit]
Options
<dataset> The name or numeric ID of the dataset for which you are modifying a pinned workload.
<workload> The name or numeric ID of the workload you are modifying.
--name | -n A new custom name for the workload.
--limits | Indicates the limits for the workload. A limit-value is a limit and a value for the limit, joined with a colon
<limit-value> symbol (:). For example, protocol:nfs3
--no-protocol- Removes the protocol operations limit for the workload.
ops-limit
Syntax
isi performance workloads pin <dataset> <metric-value>
[--name | -n <string>]
[--limits <limit-value>]
Options
<dataset> The name or numeric ID of the dataset for which you are pinning a workload.
<metric-value> A metric value for defining the new workload. Specify --metric-value for each additional value
required. A metric-value is a performance metric and a value for the metric, joined with a colon symbol (:).
For example, protocol:nfs3.
--name | -n A custom name for the workload.
--limits | Indicates the limits for the workload. A limit-value is a limit and a value for the limit, joined with a colon
<limit-value> symbol (:). For example, protocol_ops:1000
Syntax
isi performance workloads unpin <dataset> <workload>
[--force]
Options
<dataset> The name or numeric ID of the data set from which you are un-pinning a workload.
<workload> The name or numeric ID of the workload to un-pin from the data set.
{--force | -f} Do not prompt for confirmation of the un-pinning of the workload from the data set.
Syntax
isi performance workloads view <dataset> <workload>
OneFS displays the properties for the specified workload pinned to the OneFS performance data set.
Topics:
• isi quota quotas create
• isi quota quotas delete
• isi quota quotas list
• isi quota quotas modify
• isi quota quotas notifications clear
• isi quota quotas notifications create
• isi quota quotas notifications delete
• isi quota quotas notifications disable
• isi quota quotas notifications list
• isi quota quotas notifications modify
• isi quota quotas notifications view
• isi quota quotas view
• isi quota reports create
• isi quota reports delete
• isi quota reports list
• isi quota settings mappings create
• isi quota settings mappings delete
• isi quota settings mappings list
• isi quota settings mappings modify
• isi quota settings mappings view
• isi quota settings notifications clear
• isi quota settings notifications create
• isi quota settings notifications delete
• isi quota settings notifications list
• isi quota settings notifications modify
• isi quota settings notifications view
• isi quota settings reports modify
• isi quota settings reports view
Syntax
isi quota quotas create <path> <type> (directory | user | group | default-directory |
default-user | default-group)
[--user <name> | --group <name> | --gid <id> | --uid <id> | --sid <sid> |
--wellknown <name>]
[--hard-threshold <SIZE>]
[--advisory-threshold <SIZE>]
[--soft-threshold <SIZE>]
[--soft-grace <duration>]
[--percent-advisory-threshold <percent>]
Options
<path>
Path of the quota. Path must be on a directory within the /ifs file system.
CAUTION:
Do not create quotas of any type on the /ifs directory itself. A root-level quota may result
in significant performance degradation.
<type> {directory | user | group | default-directory | default-user | default-group}
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--hard-threshold <SIZE>
Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the request
violates the quota limit. Size is a capacity value formatted as <integer>[{b | K | M | G | T | P}].
--advisory-threshold <SIZE>
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
[--container <boolean>]
Specifies whether to consider a share (container) or the entire Isilon filesystem when reporting total
available space and amount of free space.
● no—Available space is relative to the entire Isilon cluster filesystem. This is the default setting.
● yes—Available space is relative to quotas set for each share. This feature is supported for protocols
such as SMB, NFS, rquotas, and others. To determine the total available space in a share, OneFS
considers both hard and soft quotas of all quota types (directory, groups, users). To report free
space on a share, it finds the quota with the least amount of free space. This is not necessarily the
smallest threshold set; it is the smallest currently available free space. For example, if a department
has a 100T limit, and each user within the department has a 1T limit, it would be possible for the 100T
share to run out of space before any one user runs out of their 1T.
The yes setting requires that either a hard or soft quota is set to define a share and that the
--enforced setting is specified.
--ignore-limit-checks <boolean>
Ignore threshold comparison with parent quota path.
--include-snapshots <boolean>
Includes snapshots in the quota size.
--percent-advisory-threshold <percent>
Specifies an advisory threshold as a percentage of the quota hard limit.
--percent-soft-threshold <percent>
Specifies a soft limit as a percentage of the quota hard limit.
--thresholds-include-overhead <boolean>
Includes OneFS storage overhead in the quota threshold when set to yes.
--thresholds-on {fslogicalsize | physicalsize | applogicalsize}
Enforces the limits for this quota based on the following parameters.
fslogicalsize Base quota enforcement on file system logical size; storage usage which does not
include metadata and data protection.
physicalsize Base quota enforcement on physical size; storage usage which includes metadata
and data protection.
--enforced <boolean>
Enforces this quota when set to yes. Specifying any threshold automatically sets this value to yes on
create.
--description <str>
Specifies the user settable free form text description of the quota.
--zone <string>
Specifies an access zone.
{--force | -f}
Does not fail when creating quota on root /ifs directory or does not prompt while defining percent
thresholds.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<path>
Specifies an absolute path within the /ifs file system.
<type> {directory | user | group | default-directory | default-user | default-group | --all}
Deletes quotas of the specified type. Argument must be specified with the <path> variable. The
following values are valid:
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of --user, --uid,
or --sid.
group Specifies a quota for one specific group. Requires specification of the --group,
--gid, or --sid option.
default- Specifies a main quota that creates a linked quota for every immediate
directory subdirectory created in the directory.
--uid <id>
Deletes a quota by the specified numeric user identifier (UID).
--user <name>
Deletes a quota associated with the user identified by name.
--gid <id>
Deletes a quota by the specified numeric group identifier (GID).
--group <name>
Deletes a quota associated with the group identified by name.
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Deletes a quota associated with the wellknown persona.
--recurse-path-parents
Searches parent paths for quotas.
--recurse-path-children
Searches child paths for quotas.
--include-snapshots {yes | no}
Deletes quotas that include snapshot data usage.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota quotas list
[--user <name> | --group <name> | --gid <id> | --uid <id> | --sid <sid> | --
wellknown <name>]
[--type (directory | user | group | default-directory | default-user | default-
group)]
[--path <path>]
[--recurse-path-parents]
[--recurse-path-children]
[--include-snapshots <boolean>]
[--exceeded]
[--enforced <boolean>]
[--zone <string>]
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--path <path>
Specifies quotas on the specified path.
--recurse-path-parents
Specifies parent paths for quotas.
--recurse-path-children
Specifies child paths for quotas.
--include-snapshots <boolean>
Specifies quotas that include snapshot data usage.
--exceeded
Specifies only quotas that have an exceeded threshold.
--enforced <boolean>
Specifies quotas that have an enforced threshold.
--zone <string>
Specifies quotas in the specified zone.
{--limit | -l} <integer>
Specifies the number of quotas to display.
--format
Displays quotas in the specified format. The following values are valid:
● table
● json
● csv
Syntax
isi quota quotas modify <path> <type> (directory | user | group |
default-directory | default-user | default-group)
[--user <name> | --group <name> | --gid <id> | --uid <id> | --sid <sid>|
--wellknown <name>]
[--hard-threshold <SIZE> | --clear-hard-threshold]
[--advisory-threshold <SIZE> | --clear-advisory-threshold]
[--soft-threshold <SIZE> | --clear-soft-threshold]
[--soft-grace <duration>]
[--percent-advisory-threshold <percent>]
[--percent-soft-threshold <percent>]
[--container <boolean>]
[--include-snapshots <boolean>]
[--thresholds-include-overhead <boolean>]
[--thresholds-on (fslogicalsize | physicalsize | applogicalsize)]
[--enforced <boolean>]
[--description <str>]
[--linked <boolean>]
[--zone <string>]
[{--verbose | -v}]
[{--force | -f}]
Options
--path
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, or --sid option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, or --sid option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota that you want to modify. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--hard-threshold <SIZE>
Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the request
violates the quota limit. Size is a capacity value formatted as <integer>[{b | K | M | G | T | P}].
--clear-hard-threshold
Clears an absolute limit for disk usage.
--advisory-threshold <SIZE>
Sets the advisory threshold. For notification purposes only. Does not enforce limitations on disk write
requests. Size is a capacity value formatted as <integer>[{b | K | M | G | T | P}].
--clear-advisory-threshold
Clears the advisory threshold.
--soft-threshold <SIZE>
Specifies the soft threshold, which allows writes to disk above the threshold until the soft grace
period expires. Attempts to write to disk are denied thereafter. Size is a capacity value formatted as
<integer>[{b | K | M | G | T | P}].
--clear-soft-threshold
Clears the soft threshold.
--soft-grace <duration>
Specifies the soft threshold grace period, which is the amount of time to wait before disk write requests
are denied.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--container <boolean>
Specifies whether to consider a share (container) or the entire Isilon filesystem when reporting total
available space and amount of free space.
--include-snapshots <boolean>
Includes snapshots in the quota size.
--percent-advisory-threshold<percent>
Specifies an advisory threshold as a percentage of the quota hard limit.
--percent-soft-threshold <percent>
Specifies a soft limit as a percentage of the quota hard limit.
--thresholds-include-overhead <boolean>
Includes OneFS storage overhead in the quota threshold when set to yes.
--thresholds-on (fslogicalsize | physicalsize | applogicalsize)
Enforces the limits for this quota based on the following parameters.
fslogicalsize Base quota enforcement on file system logical size; storage usage which does not
include metadata and data protection.
physicalsize Base quota enforcement on physical size; storage usage which includes metadata
and data protection.
applogicalsiz Base quota enforcement on application logical size; storage usage which includes
e capacity consumption on the cluster as well as data tiered to the cloud. This
storage usage is usually equal to or less than the file system logical size.
--enforced <boolean>
Enforces this quota when set to yes. Specifying any threshold automatically sets this value to yes on
create.
--description <str>
Specifies the user settable free form text description of the quota.
--linked <boolean>
Unlinks a linked quota created automatically by a default-directory, default-user, or default-group quota.
Unlinking allows the quota to be modified separately. To modify a linked quota, you must modify the
original default-directory, default-user, or default-group quota it originated from, instead of the linked
quota itself.
--zone <string>
Specifies an access zone.
{--force | -f}
Does not fail when creating quota on root /ifs directory or does not prompt while defining percent
thresholds.
{--verbose | -v}
Displays more detailed information.
NOTE: Use the isi quota quotas notifications disable command to disable all notifications for a quota.
Syntax
isi quota quotas notifications clear <path> <type>
[--user <name>]
[--group <name>]
[--gid <id>]
[--uid <id>]
[--sid <sid>]
[--wellknown <name>]
[--include-snapshots {yes | no}]
[--force]
Options
<path>
Specifies an absolute path within the /ifs file system.
<type>
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
{--force | -f}
Syntax
isi quota quotas notifications create
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--schedule <name>]
[--holdoff <duration>]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Specifies quotas that include snapshot data usage.
--schedule <name>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
Syntax
isi quota quotas notifications delete
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--verbose]
Options
--path <path>
Deletes quota notifications set on an absolute path within the /ifs file system.
--type
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Specifies a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a main quota that creates a linked quota for every user who has data in
the directory.
default-group Specifies a main quota that creates a linked quota for every group that owns data
in the directory.
--threshold
Deletes a quota notification by specified threshold. The following values are valid:
--condition
Deletes a quote notification by the specified condition on which to send a notification. The following
values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
--user <name>
Deletes a quota notification by the specified user name.
--group <name>
Deletes a quota notification by the specified group name.
--gid <id>
Deletes a quota notification by the specified numeric group identifier (GID).
--uid <id>
Deletes a quota notification by the specified numeric user identifier (UID).
--sid <sid>
Deletes a quota notification by the specified security identifier (SID) for selecting the quota. For
example, S-1-5-21-13.
--wellknown <name>
Deletes a quota notification by the specified well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Deletes a quota notification by the specified settings for Included snapshots in the quota size.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota quotas notifications disable
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Disables quotas of the specified type. Argument must be specified with the --path option. The
following values are valid:
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of -user, --uid,
--sid, or --wellknown option.
group Specifies a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a main quota that creates a linked quota for every user who has data in
the directory.
default-group Specifies a main quota that creates a linked quota for every group that owns data
in the directory.
--user <name>
Disables a quota associated with the user identified by name.
--gid <id>
Disables a quota by the specified numeric group identifier (GID).
--uid <id>
Disables a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting a quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Disables quotas that include snapshot data usage.
Syntax
isi quota quotas notifications list
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Syntax
isi quota quotas notifications modify
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--schedule <string>]
[--holdoff <duration>]
[--clear-holdoff]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--clear-action-email-address]
[--add-action-email-address <address>]
[--remove-action-email-address <address>]
[--email-template <path>]
[--clear-email-template]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
--schedule <name>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
--clear-holdoff
Clears the value for the --holdoff duration.
--action-alert {yes | no}
Generates an alert when the notification condition is met.
--action-email-owner {yes | no}
Specifies that an email be sent to a user when the threshold is crossed. Requires --action-email-
address.
--action-email-address <address>
Specifies the email address of the user to be notified. Specify --action-email-address for each
additional email address of user to notify.
--clear-action-email-address
Syntax
isi quota quotas notifications view
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a main quota that creates a linked quota for every user who has data in
the directory.
default-group Creates a main quota that creates a linked quota for every group that owns data
in the directory.
--threshold
Specifies the threshold type. The following values are valid:
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
Syntax
isi quota quotas view
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--zone <string>]
Options
--path <path>
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of -user, --uid,
--sid, or --wellknown option.
group Specifies a quota for one specific group. Requires specification of the --group,
--gid, --sid, or --wellknown option.
default- Creates a main quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a main quota that creates a linked quota for every user who has data in
the directory.
default-group Specifies a main quota that creates a linked quota for every group that owns data
in the directory.
--user <name>
Specifies a quota associated with the user identified by name.
--group <name>
Specifies a quota associated with the group identified by name.
--gid <id>
Specifies a quota by the numeric group identifier (GID).
--uid <id>
Specifies a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Specifies quotas that include snapshot data usage.
--zone <zone>
Specifies an access zone.
Syntax
Options
{--verbose | -v}
Syntax
isi quota reports delete
--time <string>
--generated {live | scheduled | manual}
--type {summary | detail}
[--verbose]
Options
--time <string>
Specifies the timestamp of the report.
Specify <time-and-date> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
h Specifies hours
s Specifies seconds
--generated
Specifies the method used to generate the report. The following values are valid:
live
scheduled
manual
--type
Specifies a report type. The following values are valid:
summary
detail
{--verbose | -v}
Displays more detailed information.
Syntax
Options
--limit <integer>
Specifies the number of quotas to display.
--format
Displays quotas in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings mappings create <type> <domain> <mapping>
[--verbose]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
Syntax
isi quota settings mappings delete <type> <domain>
[--all]
[--verbose]
[--force]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
--all
Deletes all mapping rules.
{--verbose | -v}
Displays more detailed information.
{force | -f}
Forces the deletion without displaying a confirmation prompt.
Syntax
isi quota settings mappings list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
The number of quota mapping settings to display.
--format {table | json | csv | list}
Display quota mappings settings in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
Syntax
isi quota settings mappings modify <type> <domain> <mapping>
[--verbose]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
The fully-qualified domain name for the destination domain you are mapping to.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings mappings view <type> <domain>
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
Syntax
isi quota settings notifications create
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
--schedule <string>
--holdoff <duration>
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address<address>]
[--email-template <path>]
[--verbose]
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only
soft thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer> <units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
Syntax
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only
soft thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings notifications list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi quota settings notifications modify
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--schedule <string>]
[--holdoff <duration>]
[--clear-holdoff]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--clear-action-email-address]
[--add-action-email-address <address>]
[--remove-action-email-address <address>]
[--email-template <path>]
[--clear-email-template]
[--verbose
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only
soft thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
--holdoff <duration>
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
--clear-holdoff
Clears the value for the --holdoff duration.
--action-alert {yes | no}
Generates an alert when the notification condition is met.
--action-email-owner {yes | no}
Specifies that an email be sent to a user when the threshold is crossed. Requires --action-email-
address.
--action-email-address <address>
Specifies the email address of user to be notified. Specify --action-email-address for each
additional email address of user to notify.
--clear-action-email-address
Clears the value for the email address of the user to notify.
--add-action-email-address<address>
Adds the email address of the user to be notified. Specify --add-action-email-address for each
additional email address of user to notify.
--remove-action-email-address<address>
Removes the email address of the user to notify. Specify --remove-action-email-address for
each email address of user to notify.
--email-template <path>
Specifies the path in /ifs to the email template.
--clear-email-template
Clears the setting for the path to the email template.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings notifications view
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the
soft grace period expires. Attempts to write to disk are denied thereafter.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft
grace period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only
soft thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of
the other conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-
grace period has expired.
Syntax
isi quota settings reports modify
[--schedule <schedule>]
[--revert-schedule]
[--scheduled-dir <dir>]
[--revert-scheduled-dir]
[--scheduled-retain <integer>]
[--revert-scheduled-retain]
[--live-dir <dir> | --revert-live-dir]
[--live-retain <integer> | --revert-live-retain]
[--verbose]
Options
--schedule <schedule>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--revert-schedule
Sets the --schedule value to system default.
--scheduled-dir <dir>
Specifies the location where scheduled quota reports are stored.
--revert-scheduled-dir
Sets the --scheduled-dir value to system default.
--scheduled-retain <integer>
Specifies the maximum number of scheduled reports to keep.
--revert-scheduled-retain
Sets the --scheduled-retain value to system default.
--live-dir <dir>
Specifies the location where live quota reports are stored.
--revert-live-dir
Sets the --live-dir value to system default.
--live-retain <integer>
Specifies the maximum number of live quota reports to keep.
--revert-live-retain
Sets the --live-retain value to system default.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings reports view
Options
There are no options for this command.
Topics:
• isi readonly list
• isi readonly modify
• isi readonly view
Syntax
isi readonly list
[--format (table | json | csv | list)]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_DEVICES
Options
--format Displays ESRS data items in table, JSON, CSV, or list format.
(table | json |
csv | list)
--no-header | Do not display headers in table or CSV formats.
-a
--no-footer | Do not display table summary footer information.
-z
--verbose | -v Displays more detailed information.
--help | -h Displays help on this command.
OneFS displays a list of current read-only modes and statuses for nodes, sorted by LNN.
Syntax
isi readonly modify
[--allowed (yes | no)]
[--enabled (yes | no)]
[--node-lnn <string>]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_DEVICES
Options
--allowed (yes Read-only status allowed for the node. Default is yes.
| no)
--enabled (yes Read-only status enabled for the node. Default is no.
| no)
--node-lnn The logical node number (LNN) of the node to modify read-only status. If you do not specify an LNN, the
<string> local node is selected.
--verbose | -v} Displays more detailed information.
--help | -h Displays help on this command.
Syntax
isi readonly view
[--node-lnn <integer>]
[--help | -h]
Required Privileges
ISI_PRIV_DEVICES
Options
--node-lnn The logical node number (LNN) for the specific. If you do specify an LNN, the local node is displayed.
<integer>
--help | -h Displays help on this command.
Syntax
isi s3 buckets create <name> <path>
[--create-path]
[--owner <string>]
[--description <string>]
[--acls <string>]
[--zone <string>]
[--object-acl-policy (replace | deny)]
[{--verbose | -v}]
Options
<name>
The name of the S3 bucket.
<path>
The path for the S3 bucket. Must be within /ifs.
636 isi s3
--create-path
Creates a path for the S3 bucket if it does not already exist.
---owner<string>
Name of the owner of the S3 bucket.
---description<string>
Description for the S3 bucket.
---acls<string>
The full list of access control entries for the bucket. This list of ACEs replaces all ACEs currently in the
bucket. For example, --acls name=<> type=<> perm=<>. Specify --acls for each additional
ACL to add.
--zone<string>
The access zone where the S3 bucket may be created.
---object-acl-policy(replace | deny)
Policy for modifying object ACLs in this bucket.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 buckets delete <bucket>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
Options
<bucket>
The name of the S3 bucket.
--zone<string>
The access zone from where the S3 bucket may be deleted.
{--force | -f}
Asks no confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 637
[{--limit | -l} <integer>]
[--sort (id | name | owner | path | description)]
[{--descending | -d}]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose| -v}]
Options
--zone<string>
Displays the access zone.
--owner<string>
Displays the name of the owner of the bucket.
{--limit | -l <string>
Specifies the number of S3 buckets.
--sort(id | name | owner | path | description)
Sorts data by the specified field.
--descending | -d
Sorts data in a descending order.
----format table | json | csv | list
Display S3 buckets in table, JSON, CSV or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 buckets modify <bucket>
[--description <string>]
[--zone <string>]
[--acls <string> | --add-ace <string> | --remove-ace <string>]
[--object-acl-policy (replace | deny)]
[{--verbose | -v}]
Options
<bucket>
The name of the S3 bucket.
---description<string>
Description for the S3 bucket.
--zone<string>
638 isi s3
The access zone where the S3 bucket may be modified.
---acls<string>
The full list of access control entries for the bucket. This list of ACEs replaces all ACEs currently in the
bucket. For example, --acls name=<> type=<> perm=<>. Specify --acls for each additional
ACL to add.
---object-acl-policy(replace | deny)
Policy for modifying object ACLs in this bucket.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 buckets view <bucket>
[--zone <string>]]
Options
<bucket>
Displays the name of the bucket.
--zone<string>
Displays the name of the access zone in to view the S3 bucket.
Syntax
isi services s3 disable
Syntax
isi services s3 enable
isi s3 639
isi s3 keys create
Creates an S3 key.
Syntax
isi s3 keys create <user>
[{--existing-key-expiry-time | -E} <integer>]
[--zone <string>]
[{--force | -f}]
[--show-key]
[{--verbose | -v}]
Options
<user>
The user for whom the action is performed.
{--existing-key-expiry-time | -E}
Expiry time for the previous secret key (in minutes).
--zone<string>
Specifies the access zone for the user.
{--force| -f}
Forcefully creates a new key and deletes the old key.
{--show-key| -f}
Shows the secret key.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 keys delete <user>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
Options
<user>
The user for whom the action is performed.
--zone<string>
Specifies the access zone for the user.
{--force| -f}
Forcefully creates a new key and deletes the old key.
{--verbose | -v}
Displays more detailed information.
640 isi s3
isi s3 log-level
Manages log level for s3 service.
Syntax
Options
<action>
The action that must be performed.
--timeout <integer>
Number of seconds for a command timeout (specified as isi --timeout NNN <command>).
Syntax
isi s3 log-level modify <level> (always | error | warning | info | verbose |debug |
trace | unknown)
[{--verbose | -v}]
Options
<level>
Logging level for the s3 service. Valid logging levels are 'always', 'error', 'warning', 'info', 'verbose',
'debug', and 'trace'.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 log-level view
isi s3 641
isi s3 mykeys create
Creates S3 keys.
Syntax
isi s3 mykeys create
[{--existing-key-expiry-time | -E} <integer>]
[{--force | -f}]
[--show-key]
[{--verbose | -v}]
Options
{--existing-key-expiry-time | -E}
Expiry time for the previous secret key (in minutes).
{--force | -f}
Forcefully creates a new key and deletes the old key.
{--show-key}
Displays the secret key.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 mykeys delete
[{--force | -f}]
[{--verbose | -v}]
Options
{--force | -f}
Asks no confirmation to delete the keys.
{--verbose | -v}
Displays more detailed information.
642 isi s3
isi s3 mykeys view
Displays s3 keys.
Syntax
isi s3 mykeys view
[--show-key]
Options
{--show-key }
Displays the secret key.
Syntax
isi s3 settings global modify
[--http-port <integer>]
[--https-port <integer>]
[--https-only <boolean>]
[{--force | -f}]
[{--verbose | -v}]
Options
--http-port <integer>
The TCP/IP port number on which the S3 server listens for incoming HTTP connections.
--https-port <integer>
The TCP/IP port number on which the S3 server listens for incoming HTTPS connections.
--https-only <boolean>
If this flag is set, S3 accepts only HTTPS traffic.
{--force| -f}
Asks no confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 settings global view
isi s3 643
isi s3 settings zone modify
Modifies the default S3 zone options.
Syntax
isi s3 settings zone modify
[--root-path <path>]
[--revert-root-path]
[--base-domain <string>]
[--object-acl-policy (replace | deny)]
[--bucket-directory-create-mode <integer-octal>]
[--use-md5-for-etag <boolean>]
[--validate-content-md5 <boolean>]
[--zone <string>]
[{--verbose | -v}]
Options
[--root-path <path> ]
Root path for the S3 buckets. The root path must be within access zone base path.
--revert-root-path
Sets a value to the system default for --root-path.
[--base-domain <string> ]
Base domain is used to indicate the domain name portion of the object address where virtual host style
addressing is used and allows OneFS to determine the bucket name.
[--object-acl-policy (replace | deny)]
Default object ACL policy for new S3 buckets in this zone.
[--bucket-directory-create-mode <integer-octal >]
The permission mode to create a bucket directory. It is expressed in octal.
[--use-md5-for-etag<boolean>]
Uses MD5 for Etag on upload.
--validate-content-md5<boolean>]
Validates given Content-MD5.
--zone <string>
Name of the access zone.
{--verbose | -v}
Displays more detailed information.
Syntax
isi s3 settings zone view
[--zone <string>]
644 isi s3
Options
--zone <string>
The name of the access zone.
isi s3 645
43
isi security commands
Syntax and descriptions for the isi security commands.
Use the isi security commands to:
● Enable and disable FIPS mode
● Enable and disable USB ports
● Enable and disable Restricted CLI
● Run on-demand security checks and manage security check default values.
Topics:
• isi security check report view
• isi security check settings modify
• isi security check settings view
• isi security check start
• isi security check status
• isi security settings modify
• isi security settings view
Syntax
isi security check report view
[--format {table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--help | -h}]
Options
--format {table | json | csv | list
Displays security check reports in table, JSON, CSV or list format.
--no-header | -a
Does not display headers in CSV or table formats.
--no-footer | -z
Does not display table summary footer information.
--help | -h
Displays help for this command.
Syntax
isi security check settings modify
[{--stig-path | -s} <string>]
[--revert-stig-path]
[{--action | -a} {celog | reboot | shutdown}]
[--revert-action]
[{--verbose | -v}]
[{--help | -h}]
Options
--stig-path | -s<string>
The path for the STIG profile in use.
--revert-stig-path
Set value to system default for --stig-path.
--action | -a {celog | reboot | shutdown}
The action to take when a security check discovers an anomaly. Values are:
celog Issue an event to CELOG. The message contains the details of the security anomaly.
reboot Reboot the node.
shutdown Shut down the node.
--revert-action
Set value to system default for --action (celog).
--verbose | -v
Displays more detailed information.
--help | -h
Displays help for this command.
Syntax
isi security check settings view
[{--help | -h}]
Options
--help | -h
Displays help for this command.
Syntax
isi security check start
[--exclude-list | -e (ClusterHealthCheck | PeriodicSecurityCheck |
StigComplianceCheck)| {--name | -c} (ClusterHealthCheck | PeriodicSecurityCheck |
StigComplianceCheck)]
[--mode | -m (cluster | node)]
[--node-lnn | -n} <integer>]
[--action | -a} (celog | reboot | shutdown)]
[{--help | -h}]
Options
--exclude-list | -e <security-check-name> |
--name | -c <security-check-name>
By default, the command runs all security checks. Use one of these parameters to specify a subset of
security checks to run.
● Use --exclude-list to exclude one of the checks from the run.
● Use --name to specify one check to run.
The available <security-check-name> values are:
● ClusterHealthCheck - Runs the OneFS Health Check Framework security checks.
● PeriodicSecurityCheck - Runs the FreeBSD periodic(8) security checks.
● StigComplianceCheck - Verifies that all STIG hardening configuration settings remain
configured.
--mode | -m {cluster | node}
Selects whether to run the security check on the cluster or on specific nodes. The default is cluster.
--node-lnn | -n <integer> ...
Node number (LNN) on which to run the security check. Specify multiple nodes by repeating the
--node-lnn parameter for each additional node.
--action | -a {celog | reboot | shutdown}
Action that OneFS should take when a security check discovers security anomalies. Available options
are:
● celog - Send an event message to CELOG. The message contains the details of the security
anomaly.
● reboot - Reboot the node experiencing the security anomaly.
● shutdown - Shut down the node experiencing the security anomaly.
--help | -h
Displays help for this command.
Syntax
isi security check status
[{--help | -h}]
Syntax
isi security settings modify
[--fips-mode-enabled ]
[--usb-ports-disabled {true | false}]
[--restricted-shell-enabled {true | false}]
[{--verbose | -v}]
[{--help | -h}]
Options
--fips-mode-enabled {true | false}
Sets FIPS mode to enabled or disabled and resets the cryptography to the default set for the mode.
It resets the cryptography even if you do not change the mode. For example, if FIPS mode is enabled
and you reissue --fips-mode-enabled true, you are resetting the cryptography to the default for
FIPS mode. The default setting is false. For information about FIPS mode, see the OneFS Security
Configuration Guide.
--usb-ports-disabled {true | false}
Enables or disables USB ports on the cluster. The default setting is false.
NOTE: The STIG hardening profile disables all USB ports.
Syntax
isi security settings view
[{--verbose | -v}]
[{--help | -h}]
Topics:
• isi servicelight list
• isi servicelight modify
• isi servicelight view
Syntax
isi servicelight list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi servicelight modify
[--enabled <boolean>]
[--node-lnn <integer>]
[--verbose]
Syntax
isi servicelight view
[--node-lnn <integer>]
Options
--node-lnn <integer>
Specifies the node you want to view. If omitted, service LED status for the local node is displayed.
Topics:
• isi services
isi services
Displays a list of available services. The -l and -a options can be used separately or together.
Syntax
isi services
[-l | -a]
[<service> [{enable | disable}]]
Options
-l
Lists all available services and the current status of each. This is the default value for this command.
- a
Lists all services, including hidden services, and the current status of each.
NOTE: Using the - a option with the enable or disable options can have unintended effects. If
you must use the - a with the enable or disable options, contact Dell Technologies Support for
assistance.
<service> {enable | disable}
Enables or disables the specified service.
Examples
The following example shows the command to enable the ftp service.
Topics:
• isi set
isi set
Works similar to chmod, providing a mechanism to adjust OneFS-specific file attributes, such as the requested protection, or to
explicitly restripe files. Files can be specified by path or LIN.
Syntax
isi set
[-f -F -L -n -v -r -R]
[-p <policy>]
[-w <width>]
[-c {on | off | endurant_all | coal_only}]
[-g <restripe_goal>]
[-e <encoding>]
[-d <@r drives>]
[-a {<default> | <streaming> | <random> | <disabled>| <custom{1..5}>}]
[-l {<concurrency> | <streaming> | <random>}]
[--nodepool {<id> | <name>}]
[-packing {on | off}]
[{--strategy | -s} {<avoid> | <metadata> | <metadata-write> | <data>]
[--mm-access | -A {on | off}]
[--mm-packing {on | off}]
[--mm-protection | -P {on | off}]
[<file> | <lin>}]
Options
-f
Suppresses warnings on failures to change a file.
-F
Includes the /ifs/.ifsvar directory content and any of its subdirectories. Without -F,
the /ifs/.ifsvar directory content and any of its subdirectories are skipped. This setting allows
the specification of potentially dangerous, unsupported protection policies.
-L
Specifies file arguments by LIN instead of path.
-n
Displays the list of files that would be changed without taking any action.
-v
Displays each file as it is reached.
-r
+M Where M is the number of node failures that can be tolerated without loss of data.
+M must be a number from, where numbers 1 through 4 are valid.
+D:M Where D indicates the number of drive failures and M indicates number of node
failures that can be tolerated without loss of data. D must be a number from 1
through 4 and M must be any value that divides into D evenly. For example, +2:2
and +4:2 are valid, but +1:2 and +3:2 are not.
Nx Where N is the number of independent mirrored copies of the data that will be
stored. N must be a number, with 1 through 8 being valid choices.
-w <width>
Specifies the number of nodes across which a file is striped. Typically, w = N + M, but width can also
mean the total of the number of nodes that are used.
You can set a maximum width policy of 32, but the actual protection is still subject to the limitations on N
and M.
-c {on | off}
Specifies whether write-coalescing is turned on.
-g <restripe goal>
Specifies the restripe goal. The following values are valid:
repair
reprotect
rebalance
retune
-e <encoding>
Specifies the encoding of the filename. The following values are valid:
EUC-JP
EUC-JP-MS
EUC-KR
ISO-8859-1
ISO-8859-10
ISO-8859-13
ISO-8859-14
ISO-8859-15
ISO-8859-160
ISO-8859-2
ISO-8859-3
ISO-8859-4
ISO-8859-5
ISO-8859-6
ISO-8859-7
ISO-8859-8
avoid Writes all associated file data and metadata to HDDs only. The data and metadata
of the file are stored so that SSD storage is avoided, unless doing so would result
in an out-of-space condition.
metadata Writes both file data and metadata to HDDs. One mirror of the metadata for
the file is on SSD storage if possible, but the strategy for data is to avoid SSD
storage.
metadata- Writes file data to HDDs and metadata to SSDs, when available. All copies of
write metadata for the file are on SSD storage if possible, and the strategy for data is to
avoid SSD storage.
data Uses SSD node pools for both data and metadata. Both the metadata for the file
and user data, one copy if using mirrored protection and all blocks if FEC, are on
SSD storage if possible.
Topics:
• isi smb log-level filters create
• isi smb log-level filters delete
• isi smb log-level filters list
• isi smb log-level filters view
• isi smb log-level modify
• isi smb log-level view
• isi smb openfiles close
• isi smb openfiles list
• isi smb sessions delete
• isi smb sessions delete-user
• isi smb sessions list
• isi smb settings global modify
• isi smb settings global view
• isi smb settings shares modify
• isi smb settings shares view
• isi smb settings zone modify
• isi smb settings zone view
• isi smb shares create
• isi smb shares delete
• isi smb shares list
• isi smb shares modify
• isi smb shares permission create
• isi smb shares permission delete
• isi smb shares permission list
• isi smb shares permission modify
• isi smb shares permission view
• isi smb shares view
Syntax
isi smb log-level filters create <level> (always | error | warning | info |
verbose | debug | trace)
[{--ops | -o} <string>]
[{--ip-addrs | -i} <string>]
[{--verbose | -v}]
[{--help | -h}]
Options
<level>
The logging level for the new filter. Valid logging levels are:
● always
● error
● warning
● info
● verbose
● debug
● trace
{--ops | -o} <string>
List all SMB operations to filter against. Repeat for each operation.
{--ip-addrs | -i} <string>
List IPv4 and IPv6 addresses to filter against. Repeat for each IP address.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi smb log-level filters delete { <id> | --level <string> | --all }
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
<id>
Deletes a specific SMB log filter, by ID.
<level>
Deletes all SMB log filters at a specified level. The following levels are valid:
● always
● error
● warning
● info
Syntax
isi smb log-level filters list
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
{--limit | -l} <integer>
Displays the specified number of SMB log-level filters.
--format {table | json | csv | list}
Displays SMB log-level filters in table, JSON, comma-separated, or list format.
{--no-header | -a}
Does not display headers in comma-separated or table format.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi smb log-level filters view { <id> | --level <string> }
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
<id>
The ID of the SMB log-level filter to view.
{--level | -l} <string>
Specifies a log-level to view. The following levels are valid:
● always
● error
● warning
● info
● verbose
● debug
● trace
--help | -h
Display help for this command.
Syntax
isi smb log-level modify <level> (always | error | warning | info | verbose
| debug | trace | unknown)
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
<level>
Specifies a log level to set for the SMB service. The following levels are valid:
Syntax
isi smb log-level view
Options
There are no options for this command.
To view a list of open files, run the isi smb openfiles list command.
Syntax
isi smb openfiles close <id>
[{--force | -f}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
<id>
Specifies the ID of the open file to close.
{--force | -f}
Suppresses command-line prompts and messages.
Examples
The following command closes a file with an ID of 32:
Syntax
isi smb openfiles list
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
{--limit | -l} <integer>
Displays no more than the specified number of smb openfiles.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
NOTE: Any open files are automatically closed before an SMB session is deleted.
Required Privileges
ISI_PRIV_SMB
Options
<computer-name>
Required. Specifies the computer name. If a --user, --uid, or --sid option is not specified, the
system deletes all SMB sessions associated with this computer.
--user-name | -U <string>
Specifies the name of the user. Deletes only those SMB sessions to the computer that are associated
with the specified user.
--uid <id>
Specifies a numeric user identifier. Deletes only those SMB sessions to the computer that are associated
with the specified user identifier.
--sid <sid>
Specifies a security identifier. Deletes only those SMB sessions to the computer that are associated with
the security identifier.
--force | -f
Specifies that the command execute without prompting for confirmation.
--verbose | -v
Displays more detailed information.
--help | -h
Display help for this command.
Examples
The following command deletes all SMB sessions associated with a computer named computer1:
The following command deletes all SMB sessions associated with a computer named computer1 and a user named user1:
Any open files are automatically closed before an SMB session is deleted.
Required Privileges
ISI_PRIV_SMB
Options
<user-name>
Required. Specifies the user name. If the --computer-name option is omitted, the system deletes all
SMB sessions associated with this user.
{--computer-name | -C} <string>
Deletes only the user's SMB sessions that are associated with the specified computer.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Examples
The following command deletes all SMB sessions associated with a user called user1:
The following command deletes all SMB sessions associated with a user called user1 and a computer called computer1:
Syntax
isi smb sessions list
[--node-lnn <integer>]
[{--limit | -l} <integer>]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Required Privileges
ISI_PRIV_SMB
Options
{--limit | -l} <integer>
Specifies the maximum number of SMB sessions to list.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi smb settings global modify
[--access-based-share-enum {yes | no}]
[--revert-access-based-share-enum]
[--dot-snap-accessible-child {yes | no}]
[--revert-dot-snap-accessible-child]
[--dot-snap-accessible-root]
[--revert-dot-snap-accessible-root]
[--dot-snap-visible-child {yes | no}]
[--revert-dot-snap-visible-child]
[--dot-snap-visible-root {yes | no}]
[--revert-dot-snap-visible-root]
[--enable-security-signatures {yes | no}]
[--revert-enable-security-signatures]
[--guest-user <string>]
[--revert-guest-user]
[--ignore-eas {yes | no}]
[--revert-ignore-eas]
[--onefs-cpu-multiplier <integer>]
[--revert-onefs-cpu-multiplier]
[--onefs-num-workers <integer>]
[--revert-onefs-num-workers]
[--reject-unencrypted-access {yes | no}]
[--revert-reject-unencrypted-access]
[--require-security-signatures {yes | no}]
[--revert-require-security-signatures]
[--server-side-copy {yes | no}]
Required Privileges
ISI_PRIV_SMB
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--dot-snap-accessible-child {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible in subdirectories of the share root.
The default setting is no.
--revert-dot-snap-accessible-child
Sets the value to the system default for --dot-snap-accessible-child.
--dot-snap-accessible-root {yes | no}
Specifies whether to make the /ifs/.snapshot directory accessible at the share root. The default
setting is yes.
--revert-dot-snap-accessible-root
Sets the value to the system default for --dot-snap-accessible-root.
--dot-snap-visible-child {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible in subdirectories of the share root.
The default setting is no.
--revert-dot-snap-visible-child
Sets the value to the system default for --dot-snap-visible-child.
--dot-snap-visible-root {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible at the root of the share. The default
setting is no.
--revert-dot-snap-visible-root
Sets the value to the system default for --dot-snap-visible-root.
--enable-security-signatures {yes | no}
Indicates whether the server supports signed SMB packets.
--revert-enable-security-signatures
Sets the value to the system default for --enable-security-signatures.
--guest-user <integer>
Specifies the fully qualified user to use for guest access.
--revert-guest-user
Sets the value to the system default for --guest-user.
Syntax
isi smb settings global view
Options
There are no options for this command.
Syntax
isi smb settings shares modify
[--access-based-enumeration {yes | no}]
[--revert-access-based-enumeration]
[--access-based-enumeration-root-only {yes | no}]
[--revert-access-based-enumeration-root-only]
[--allow-delete-readonly {yes | no}]
[--revert-allow-delete-readonly]
[--allow-execute-always {yes | no}]
[--revert-allow-execute-always]
[--ca-timeout <integer>]
[--revert-ca-timeout]
[--strict-ca-lockout {yes | no}]
[--revert-strict-ca-lockout]
[--ca-write-integrity {none | write-read-coherent | full}]
[--revert-ca-write-integrity]
[--change-notify {all | norecurse | none}]
[--revert-change-notify]
[--create-permissions {"default acl" | "inherit mode bits" | "use create mask and
mode"}]
[--revert-create-permissions]
[--directory-create-mask <integer>]
[--revert-directory-create-mask]
[--directory-create-mode <integer>]
[--revert-directory-create-mode]
[--file-create-mask <integer>]
[--revert-file-create-mask]
[--file-create-mode <integer>]
[--revert-file-create-mode]
[--file-filtering-enabled {yes | no}]
[--revert-file-filtering-enabled]
[--file-filter-extensions <string>]
[--clear-file-filter-extensions]
[--add-file-filter-extensions <string>]
Options
--access-based-enumeration {yes | no}
Specifies whether access-based enumeration is enabled.
--revert-access-based-enumeration
Sets the value to the system default for --access-based-enumeration.
--access-based-enumeration-root-only {yes | no}
Specifies whether access-based enumeration is only enabled on the root directory of the share.
--revert-access-based-enumeration-root-only
Sets the value to the system default for --access-based-enumeration-root-only.
--allow-delete-readonly {yes | no}
Specifies whether read-only files can be deleted.
--revert-allow-delete-readonly
Sets the value to the system default for --allow-delete-readonly.
--allow-execute-always {yes | no}
Specifies whether a user with read access to a file can also execute the file.
--revert-allow-execute-always
Sets the value to the system default for --allow-execute-always.
--ca-timeout <integer>
The amount of time, in seconds, a persistent handle is retained after a client is disconnected or a server
fails. The default is 120 seconds.
--revert-ca-timeout
Sets the value to the system default for --ca-timeout.
--strict-ca-lockout {yes | no}
none Continuously available writes are not handled differently than other writes to
the cluster. If you specify none and a node fails, you may experience data loss
without notification. Therefore, we do not recommend this option.
write-read- Ensures that writes to the share are moved to persistent storage before a
coherent success message is returned to the SMB client that sent the data. This is the
default setting.
full Ensures that writes to the share are moved to persistent storage before a
success message is returned to the SMB client that sent the data, and prevents
OneFS from granting SMB clients write-caching and handle-caching leases.
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--change-notify {norecurse | all | none}
Defines the change notify setting. The acceptable values are norecurse, all, and none.
--revert-change-notify
Sets the value to the system default for --change-notify.
--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}
Sets the default permissions to apply when a file or directory is created.
--revert-create-permissions
Sets the value to the system default for --create-permissions.
--directory-create-mask <integer>
Defines which mask bits are applied when a directory is created.
--revert-directory-create-mask
Sets the value to the system default for --directory-create-mask.
--directory-create-mode <integer>
Defines which mode bits are applied when a directory is created.
--revert-directory-create-mode
Sets the value to the system default for --directory-create-mode.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--file-create-mode <integer>
Defines which mode bits are applied when a file is created.
--revert-file-create-mode
Sets the value to the system default for --file-create-mode.
--file-filtering-enabled {yes | no}
If set to yes, enables file filtering at the share level. The default setting is no.
--revert-file-filtering-enabled
Sets the value for the system default of --file-filtering-enabled.
--file-filter-type {deny | allow}
If set to allow, allows the specified file types to be written to the share. The default setting is deny.
Syntax
isi smb settings shares view
[--zone <string>]
Options
--zone <string>
Specifies the name of the access zone. Displays only the settings for shares in the specified zone.
Syntax
isi smb settings zone modify
[--access-based-share-enum {yes | no}]
[--revert-access-based-share-enum]
[--enable-security-signatures {yes | no}]
[--revert-enable-security-signatures]
[--reject-unencrypted-access {yes | no}]
[--revert-reject-unencrypted-access]
[--require-security-signatures {yes | no}]
[--revert-require-security-signatures]
[--server-side-copy {yes | no}]
[--revert-server-side-copy]
[--support-multichannel {yes | no}]
[--revert-support-multichannel]
[--support-smb2 {yes | no}]
[--revert-support-smb2]
[--support-smb3-encryption {yes | no}]
[--revert-support-smb3-encryption]
[--zone <string>]
[--verbose | -v
[--help | -h]
Required Privileges
ISI_PRIV_SMB
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--enable-security-signatures {yes | no}
Indicates whether the server supports signed SMB packets.
--revert-enable-security-signatures
Sets the value to the system default for --enable-security-signatures.
--reject-unencrypted-access {yes | no}
Rejects unencrypted client sessions.
--revert-reject-unencrypted-access
Sets the value to the system default for --reject-unencrypted-access.
--require-security-signatures {yes | no}
Specifies whether packet signing is required. If set to yes, signing is always required. If set to no,
signing is not required but clients requesting signing will be allowed to connect if the --enable-
security-signatures option is set to yes.
--revert-require-security-signatures
Sets the value to the system default for --require-security-signatures.
--server-side-copy {yes | no}
Enables or disables SMB server-side copy functionality. The default is yes.
--revert-server-side-copy
Syntax
isi smb settings zone view
[--zone <string>]
Options
--zone <string>
The name of the access zone for which you are viewing SMB settings.
Syntax
isi smb shares create <name> <path>
[--zone <string>]
[--inheritable-path-acl {yes | no}]
[--continuously-available {yes | no}]
[--create-path
[--host-acl <string>]
[--description <string>]
[--csc-policy {none | documents | manual | programs}]
Required Privileges
ISI_PRIV_SMB
Options
<name>
Required. Specifies the name for the new SMB share.
<path>
Required. Specifies the full path of the SMB share to create, beginning at /ifs.
--zone <string>
Specifies the access zone the new SMB share is assigned to. If no access zone is specified, the new
SMB share is assigned to the default System zone.
{--inheritable-path-acl | -i} {yes | no}
If set to yes, if the parent directory has an inheritable access control list (ACL), its ACL will be inherited
on the share path. The default setting is no.
--create-path
Creates the SMB-share path if one doesn't exist.
--host-acl <string>
Specifies the ACL that defines host access. Specify --host-acl for each additional host ACL clause.
--description <string>
Specifies a description for the SMB share.
--csc-policy {none | documents | manual | programs}
Sets the client-side caching policy for the share.
none Continuously available writes are not handled differently than other writes to
the cluster. If you specify none and a node fails, you may experience data loss
without notification. Therefore, we do not recommend this option.
write-read- Ensures that writes to the share are moved to persistent storage before a
coherent success message is returned to the SMB client that sent the data. This is the
default setting.
full Ensures that writes to the share are moved to persistent storage before a
success message is returned to the SMB client that sent the data, and prevents
OneFS from granting SMB clients write-caching and handle-caching leases.
--mangle-byte-start <string>
Specifies the wchar_t starting point for automatic invalid byte mangling.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
Syntax
isi smb shares delete <share>
[--zone <string>]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Examples
The following command deletes a share named "test-smb" in the "example-zone" access zone without displaying a warning
prompt:
Syntax
isi smb shares list
[--zone <string>]
[{--limit | -l} <integer>]
[--sort (id | name | path | description)]
[{--descending | -d}]
[--format (table | csv | list | json)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
--zone <string>
Specifies the access zone. Displays all SMB shares in the specified zone. If no access zone is specified,
the system displays all SMB shares in the default System zone.
{--limit | -l} <integer>
Specifies the maximum number of items to list.
--sort {name | path | description}
Specifies the field to sort items by.
Syntax
isi smb shares modify <share>
[--name <string>]
[--path <path>]
[--zone <string>]
[--new-zone <string>]
[--host-acl <host-acl>]
[--revert-host-acl]
[--clear-host-acl]
[--add-host-acl <string>]
[--remove-host-acl <string>]
[--description <string>]
[--csc-policy {manual | documents | programs | none}]
[--revert-csc-policy]
[--allow-variable-expansion {yes | no}]
[--revert-allow-variable-expansion]
[--auto-create-directory {yes | no}]
[--revert-auto-create-directory {yes | no}]
[--browsable {yes | no}]
[--revert-browsable]
[--allow-execute-always {yes | no}]
[--revert-allow-execute-always]
[--directory-create-mask <integer>]
[--revert-directory-create-mask]
[--strict-locking {yes | no}]
[--revert-strict-locking]
[--hide-dot-files {yes | no}]
[--revert-hide-dot-files]
[--impersonate-guest {always | "bad user" | never}]
[--revert-impersonate-guest]
[--strict-flush {yes | no}]
[--revert-strict-flush]
[--access-based-enumeration {yes | no}]
[--revert-access-based-enumeration]
[--access-based-enumeration-root-only {yes | no}]
[--revert-access-based-enumeration-root-only]
[--ca-timeout <integer>]
[--revert-ca-timeout]
[--strict-ca-lockout {yes | no}]
[--revert-strict-ca-lockout]
[--ca-write-integrity {none | write-read-coherent | full}]
[--revert-ca-write-integrity]
[--mangle-byte-start <integer>]
Options
<share>
Required. Specifies the name of the SMB share to modify.
--name <name>
Specifies the name for the SMB share.
--path <path>
Specifies a new path for the SMB share, starting in /ifs.
--zone <string>
Specifies the access zone that the SMB share is assigned to. If no access zone is specified, the system
modifies the SMB share with the specified name assigned to the default System zone, if found.
--new-zone <string>
Specifies the new access zone that SMB share will be reassigned to.
--host-acl <host-acl>
An ACL expressing which hosts are allowed access. Specify --host-acl for each additional host ACL
clause.
--revert-host-acl
Sets the value to the system default for --host-acl.
--clear-host-acl
Clears the value of an ACL that expresses which hosts are allowed access.
--add-host-acl <string>
Adds an ACL expressing which hosts are allowed access. Specify --add-host-acl for each additional
host ACL clause to add.
none Continuously available writes are not handled differently than other writes to
the cluster. If you specify none and a node fails, you may experience data loss
without notification. Therefore, we do not recommend this option.
write-read- Ensures that writes to the share are moved to persistent storage before a
coherent success message is returned to the SMB client that sent the data. This is the
default setting.
full Ensures that writes to the share are moved to persistent storage before a
success message is returned to the SMB client that sent the data, and prevents
OneFS from granting SMB clients write-caching and handle-caching leases.
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--mangle-byte-start <interger>
Specifies the wchar_t starting point for automatic byte mangling.
--revert-mangle-byte-start
Sets the value to the system default for --mangle-byte-start.
--file-create-mask <integer>
Specifies the file create mask bits.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}
Sets the create permissions for new files and directories in a share.
--revert-create-permissions
Sets the value to the system default for --create-permissions.
--mangle-map <mangle-map>
The character mangle map. Specify --mangle-map for each additional character mangle map.
--revert-mangle-map
Sets the value to the system default for --mangle-map.
--clear-mangle-map
Clears the value for character mangle map.
--add-mangle-map <string>
Syntax
isi smb shares permission create <share> {<user> | --group <name>
| --gid <id> | --sid <string> | --wellknown <string>}
{--run-as-root | --permission-type | -d {allow | deny}
--permission {full | change | read}}
[--zone <zone>]
[--verbose
[--help | -h]
Required Privileges
ISI_PRIV_SMB
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
{--permission-type | -d} {deny | allow}
Specifies whether to allow or deny a permission.
Syntax
isi smb shares permission delete <share> {<user> | --group <name>
|--gid <id> | --uid <id> | --sid <string> | --wellknown <string>}
[--zone <string>]
[--force | -f]
[--verbose | -v]
[--help | -h
Required Privileges
ISI_PRIV_SMB
Options
<share>
Required. Specifies the SMB share name.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
Syntax
isi smb shares permission list <share>
[--zone <zone>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--help | -h]
Required Privileges
ISI_PRIV_SMB
Options
<share>
Specifies the name of the SMB share to display.
--zone <zone>
Specifies the access zone to display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--help | -h
Display help for this command.
Syntax
isi smb shares permission modify <share> { <user> | --group <name> | --gid
<id> | --uid <id> | --sid <sid> | --wellknown <name> }
[({--permission-type | -d} (allow | deny){--permission | -p} (full |
change | read) | --run-as-root]
[--zone <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMB
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
{--permission-type | -d} {deny | allow}
Specifies whether to allow or deny a permission.
{--permission | -p} {read | full | change}
Specifies the level of control to allow or deny.
--run-as-root {yes | no}
If set to yes, allows the account to run as root. The default setting is no.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
--help | -h
Display help for this command.
Syntax
isi smb shares permission view <share> {<user> |
--group <name> | --gid <integer>
| --uid <integer> | --sid <string>
| --wellknown <string>}
[--zone <string>]
[--help | -h]
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <integer>
Specifies a numeric group identifier.
--uid <integer>
Specifies a numeric user identifier.
--sid <string>
Specifies a security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
--help | -h
Display help for this command.
Syntax
isi smb shares view <share>
[--zone <string>]
Options
<share>
Topics:
• isi snapshot aliases delete
• isi snapshot aliases list
• isi snapshot aliases modify
• isi snapshot aliases view
• isi snapshot locks create
• isi snapshot locks delete
• isi snapshot locks list
• isi snapshot locks modify
• isi snapshot locks view
• isi snapshot schedules create
• isi snapshot schedules delete
• isi snapshot schedules list
• isi snapshot schedules modify
• isi snapshot schedules pending list
• isi snapshot schedules view
• isi snapshot settings modify
• isi snapshot settings view
• isi snapshot snapshots create
• isi snapshot snapshots delete
• isi snapshot snapshots list
• isi snapshot snapshots modify
• isi snapshot snapshots view
• isi snapshot writable create
• isi snapshot writable delete
• isi snapshot writable list
• isi snapshot writable view
Syntax
isi snapshot aliases delete {<alias> | --all}
[--force | -f]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Syntax
isi snapshot aliases list
[--limit | -l <integer>]
[--sort {id | name | target_id | target_name | created}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
Syntax
isi snapshot aliases modify <alias>
[--name <snapshot>]
[--target <snapshot>}
[--verbose]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<alias>
Modifies the specified snapshot alias.
Specify as a snapshot-alias name or ID.
--name <snapshot>
Specifies a new name for the snapshot alias.
--target <snapshot>
Reassigns the snapshot alias to the specified snapshot or the live version of the file system.
Specify as a snapshot ID or name. To target the live version of the file system, specify LIVE.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command
Syntax
isi snapshot aliases view <alias>
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<alias>
Displays detailed information about the specified snapshot alias.
Specify as a snapshot-alias name or ID.
{--help | -h}
Displays help for this command
Syntax
isi snapshot locks create <snapshot>
[--comment <string>]
[--expires | -x <timestamp>]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Specifies the name of the snapshot to apply this lock to.
{--comment | -c} <string>
Specifies a comment to describe the lock.
Specify as any string.
{--expires | -x} {<timestamp> | <duration>}
Specifies when the lock will be automatically deleted by the system.
If this option is not specified, the snapshot lock will exist indefinitely.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
{--help | -h}
Displays help for this command
Syntax
isi snapshot locks delete <snapshot> <id>
[--force | -f]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Deletes a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot lock.
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
{--help | -h}
Displays help for this command
Syntax
isi snapshot locks list <snapshot>
[--limit | -l <integer>]
[--sort {id | comment | expires | count}]
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Displays all locks belonging to the specified snapshot.
Specify as a snapshot name.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command
It is recommended that you do not modify the expiration date of snapshot locks and do not run this command.
Modifying the expiration date of a snapshot lock that was created by OneFS might result in data loss.
Syntax
isi snapshot locks modify <snapshot> <id>
{--expires | -x {<timestamp> | --clear-expires}
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Modifies a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
{--expires | -x} {<timestamp> | <duration>}
Specifies when the lock will be automatically deleted by the system.
If this option is not specified, the snapshot lock will exist indefinitely.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--clear-expires
Removes the duration period for the snapshot lock. If specified, the snapshot lock will exist on the
cluster indefinitely.
{--verbose | -v}
Displays a message confirming that the snapshot lock was modified.
{--help | -h}
Examples
The following command causes a snapshot lock applied to Wednesday_Backup to expire in three weeks:
Syntax
isi snapshot locks view <snapshot> <id>
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Specifies the snapshot to view locks for.
Specify as a snapshot name or ID.
<id>
Displays the specified lock.
Specify as a snapshot lock ID.
{--help | -h}
Displays help for this command
Syntax
isi snapshot schedules create <name> <path> <pattern> <schedule>
[--alias | -a <alias>]
[--duration | -x <duration>]
[--verbose | -v]
[--help | -f]
Required Privileges
ISI_PRIV_SNAPSHOT
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--alias <alias>
Specifies an alias for the latest snapshot generated based on the schedule. The alias enables you to
quickly locate the most recent snapshot that was generated according to the schedule.
Specify as any string.
{--duration | -x} <duration>
Specifies how long snapshots generated according to the schedule are stored on the cluster before
OneFS automatically deletes them.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
{--verbose | -v}
Display more detailed information.
{--help | -f}
Display help for this command.
Syntax
isi snapshot schedules delete {<schedule-name> | <all>}
[--force | -f]
[--verbose | -v]
[--help | -f]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<schedule-name>
Deletes the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
<all>
Deletes all snapshot schedules.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot schedule.
{--verbose | -v}
Display more detailed information.
{--help | -f}
Display help for this command.
Syntax
isi snapshot schedules list
[{--limit | -l} <integer>]
[--sort (id | name | path | pattern | schedule | duration | alias |
next_run | next_snapshot)]
[{--descending | -d}]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Syntax
isi snapshot schedules modify <schedule-name>
[{--alias | -a} <string> | --clear-alias]
[--name <string>]
[--path <path>]
[--pattern <pattern>]
[--schedule <schedule>]
[{--duration | -x} <duration> | --clear-duration]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<schedule-name>
Modifies the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
--name <name>
Specifies a new name for the schedule.
Specify as any string.
{--alias | -a} <name>
Specifies an alias for the latest snapshot generated based on the schedule. The alias enables you to
quickly locate the most recent snapshot that was generated according to the schedule. If specified,
the specified alias will be applied to the next snapshot generated by the schedule, and all subsequently
generated snapshots.
Specify as any string.
--path <path>
Specifies a new directory path for this snapshot schedule. If specified, snapshots generated by the
schedule will contain only this directory path.
Specify as a directory path.
--pattern <naming-pattern>
Specifies a pattern by which snapshots created according to the schedule are named.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
{--duration | -x} <duration>
Specifies how long snapshots generated according to the schedule are stored on the cluster before
OneFS automatically deletes them.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--clear-duration
Removes the duration period for snapshots created according to the schedule. If specified, generated
snapshots will exist on the cluster indefinitely.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot schedules pending list
[--begin | -b <timestamp>]
[--end | -e <timestamp>]
[--limit | -l <integer>]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -h]
[--help| -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
{--begin | -b} <timestamp>
Displays only snapshots that are scheduled to be generated after the specified date.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are scheduled to be generated
after the current time.
{--end | -e} <time>
Displays only snapshots that are scheduled to be generated before the specified date.
Specify <time> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are scheduled to be generated
before 30 days after the begin time.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot schedules view <schedule-name>
[--help| -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<schedule-name>
Displays information about the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
{--help | -f}
Display help for this command.
Syntax
isi snapshot settings modify
{--service {enable | disable}
| --autocreate {enable | disable}
| --autodelete {enable | disable}
| --reserve <integer>
| --global-visible-accessible {yes | no}
| --nfs-root-accessible {yes | no}
| --nfs-root-visible {yes | no}
| --nfs-subdir-accessible {yes | no}
| --smb-root-accessible {yes | no}
| --smb-root-visible {yes | no}
| --smb-subdir-accessible {yes | no}
| --local-root-accessible {yes | no}
| --local-root-visible {yes | no}
| --local-subdir-accessible {yes | no}}...
[--verbose | -v]
[--help| -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Syntax
isi snapshot settings view
[--help| -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
There are no options for this command.
Syntax
isi snapshot snapshots create <path>
[--name <string>]
[{--expires | -x} <timestamp>]
[{--alias | -a} <string>]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<path>
Specifies the path of the snapshot. Must be within /ifs.
[--name <string>]
Specifies the name for the snapshot. If this field is omitted, the snapshot is named automatically by the
system.
[{--expires | -x} <timestamp>]
Specifies the duration until or time at which the snapshot is going to expire.
[{--alias | -a} <string>]
Specifies an alternate name for this snapshot.
[{--verbose | -v}]
Displays more detailed information about the snapshot.
{--help | -f}
Syntax
isi snapshot snapshots delete { <snapshot> | --schedule <str> | --type (alias | real)
| --all }
[{--force | -f}]
[{--verbose | -v}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Deletes the specified snapshot.
Specify as a snapshot name or ID.
--schedule <str>
Deletes all snapshots created according to the specified schedule.
Specify as a snapshot schedule name or ID.
--type (alias | real)
Deletes all snapshots of the specified type.
The following types are valid:
--all
Deletes all snapshots.
{--force | -f}
Does not prompt you to confirm that you want to delete the snapshot.
{--verbose | -v}
Displays more detailed information.
{--help | -f}
Display help for this command.
Syntax
isi snapshot snapshots list
[--state (all | active | deleting)]
[{--limit | -l} <integer>]
[--sort (id | name | path | has_locks | schedule | target_id | target_name | created |
expires | size | shadow_bytes | pct_reserve | pct_filesystem | state)]
[{--descending | -d}]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
--state <state>
Displays only snapshots and snapshot aliases that exist in the specified state.
The following states are valid:
all Displays all snapshots and snapshot aliases that are currently occupying space on
the cluster.
active Displays only snapshots and snapshot aliases that have not been deleted.
deleting Displays only snapshots that have been deleted but are still occupying space on
the cluster. The space occupied by deleted snapshots will be freed the next time
the snapshot delete job is run.
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of
storage space consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot snapshots modify <snapshot>
[{--alias | -a} <string>]
[--name <string>]
[{--expires | -x} <timestamp> | --clear-expires]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Modifies the specified snapshot.
Specify as the name or ID of a snapshot.
[{--alias | -a} <string>]
Specifies an alternate name for the snapshot.
[--name <string>]
Specifies the name of the snapshot.
{--expires | -x} <timestamp>
Specifies the duration until or time at which the snapshot will expire.
You cannot modify the expiration date of a snapshot alias.
Syntax
isi snapshot snapshots view <snapshot>
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot>
Displays information about the specified snapshot.
Specify as a snapshot name or ID.
{--help | -f}
Display help for this command.
Syntax
isi snapshot writable create <src-snapshot> <destination-path>
[{--help | -h}]
[{--verbose| -v}]
Options
<src-snapshot>
Specifies the name or numeric ID of the source snapshot.
<destination-path>
Specifies the absolute path of the writable snapshot. The path must be within the /ifs file system.
{help | -h}
Syntax
isi snapshot writable delete <writable-snapshot-path> | --all
[{--force | -f}]
[{--help | -h}]
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<writable-snapshot-path>
Specifies the absolute path of the writable snapshot to delete. The path must be within the /ifs file
system.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot lock.
{--help | -h}
Displays help for this command.
{--verbose | -v}
Displays a message confirming that the writable snapshot was deleted.
Syntax
isi snapshot writable list
[--state {all | active | deleting}]
[{--limit | -l} <integer>]
[--sort {dest-path | src-path | src-snapshot | created | log_size | physical_size |
state}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z ]
[--help | -h]
[--verbose | -h]
Options
--state {all | active | deleting}
Lists only the writable snapshots that exist in the specified state.
The following states are valid:
all Displays all writable snapshots that currently occupy space on the cluster.
active Displays only writable snapshots that are not deleted.
deleting Displays only writable snapshots that are deleted but still occupy space on the
cluster. The space occupied by deleted snapshots is freed the next time the
snapshot delete job runs.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in descending order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi snapshot writable view <snapshot-path>
[--help | -h]
Required Privileges
ISI_PRIV_SNAPSHOT
Options
<snapshot-path>
The absolute path of the writable snapshot. The path must be within the /ifs filesystem.
{--help | -h}
Displays help for this command.
Topics:
• isi snmp settings modify
• isi snmp settings view
Required privileges
ISI_PRIV_SNMP
Syntax
isi snmp settings modify
[--service {<boolean>}]
[--system-location <string>]
[--revert-system-location]
[--system-contact <string>]
[--revert-system-contact]
[--snmp-v1-v2c-access {<boolean>}]
[--revert-snmp-v1-v2c-access]
[--read-only-community| -c <string>]
[--revert-read-only-community]
[--snmp-v3-access {<boolean>}]
[--revert-snmp-v3-access]
[--snmp-v3-read-only-user | -u <string>]
[--revert-snmp-v3-read-only-user]
[--snmp-v3-auth-protocol {SHA | MD5}]
[--snmp-v3-priv-protocol {AES | DES}]
[--snmp-v3-security-level {noAuthNoPriv | authNoPriv | authPriv}]
[--snmp-v3-password | -p <string>]
[--revert-snmp-v3-password]
[--set-snmp-v3-password]
[--snmp-v3-priv-password <string>]
[--revert-snmp-v3-priv-password]
[--set-snmp-v3-priv-password]
[--verbose | -v]
Options
--service {<boolean>}
Enables or disables the SNMP service.
--system-location <string>
The location of the SNMP system.
--revert-system-location
Syntax
isi snmp settings view
Topics:
• isi ssh settings modify
Required privileges
ISI_PRIV_AUTH
Syntax
isi ssh settings modify
[--banner <path>]
[--ca-signature-algorithms <string>]
[--ciphers <string>]
[--host-key-algorithms <string>]
[--ignore-rhosts <boolean>]
[--kex-algorithms <string>]
[--login-grace-time <duration>]
[--log-level <string>]
[--macs <string>]
[--max-auth-tries <integer>]
[--max-sessions <integer>]
[--max-startups <string>]
[--permit-empty-passwords <boolean>]
[--permit-root-login <boolean>]
[--port <integer>]
[--print-motd <boolean>]
[--pubkey-accepted-key-types <string>]
[--strict-modes <boolean>]
[--subsystem <string>]
[--syslog-facility <string>]
[--tcp-keep-alive <boolean>]
[--auth-settings-template ( (password | publickey | both | any | custom)]
[--authentication-methods <string>]
[--challenge-response-authentication <boolean>]
[--keyboard-interactive-authentication <boolean>]
[--match <string>]
[--password-authentication <boolean>]
[--pubkey-authentication <boolean>]
[--use-dns <boolean>]
[--use-pam <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Argument formats
<duration> : Duration expressed as an <integer>[YMWDHms]
<path> : An absolute path within the /ifs file system.
Topics:
• isi statistics client
• isi statistics data-reduction
• isi statistics data-reduction view
• isi statistics drive
• isi statistics heat
• isi statistics list keys
• isi statistics list operations
• isi statistics protocol
• isi statistics pstat
• isi statistics query current
• isi statistics query history
Syntax
isi statistics client
[--numeric]
[--local-addresses <string>]
[--local_names <string>]
[--remote_addresses <integer>]
[--remote_names <string>]
[--user-ids <integer>]
[--user-names <string>]
[--protocols <value>]
[--classes <string>]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit]
[--long]
[--totalby <column>]
[--output <column>]
[--sort <column>]
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--numeric
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
● Node
● {Proto | protocol}
● Class
● {UserId | user.id}
● {UserName | user.name}
● {LocalAddr | local_addr}
● {LocalName | local_name}
● {RemoteAddr | remote_addr}
● {RemoteName | remote_name}
--output <column>
Specifies which columns to display. The following values are valid:
{TimeMin | Displays the minimum elapsed time taken to complete an operation. Displayed in
time_min} microseconds.
{TimeAvg | Displays the average elapsed time taken to complete an operation. Displayed in
time_avg} microseconds.
Node Displays the node on which the operation was performed.
{Proto | Displays the protocol of the operation.
protocol}
Class Displays the class of the operation.
{UserID | Displays the numeric UID of the user issuing the operation request.
user.id}
{UserName | Displays the resolved text name of the UserID. If resolution cannot be performed,
user.name} UNKNOWN is displayed.
{LocalAddr | Displays the local IP address of the user issuing the operation request.
local_addr}
{LocalName | Displays the local host name of the user issuing the operation request.
local_name}
{RemoteAddr | Displays the remote IP address of the user issuing the operation request.
remote_addr}
{RemoteName | Displays the remote client name of the user issuing the operation request.
remote_name}
--sort <column>
Specifies how rows are ordered. The following values are valid:
● {NumOps | num_operations}
● {Ops | operation_rate}
● {InMax | in_max}
● {InMin | in_min}
● In
● {InAvg | in_avg}
● {OutMax | out_max}
● {OutMin | out_min}
● Out
● {OutAvg | out_avg}
● {TimeMax | time_max}
● {TimeMin | time_min}
● {TimeAvg | time_avg}
● Node
● {Proto | protocol}
● Class
● {UserID | user.id}
● {UserName | user.name}
● {LocalAddr | local_addr}
● {LocalName | local_name}
● {RemoteAddr | remote_addr}
● {RemoteName | remote_name}
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format,
or top-style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
Syntax
isi statistics data-reduction <action>
[--resolution <integer>]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
{--help | -h}
Displays help for this command.
Syntax
isi statistics data-reduction view
[--resolution <integer>]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
{--help | -h}
Displays help for this command.
Syntax
isi statistics drive
[--type <value>]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit <integer>]
[--long]
[--output <column>]
[--sort <column>]
[--format][--top]
[--no-header]
[--no-footer]
[--verbose]
Options
--type <string>
Specifies the drive types for which statistics will be reported. The default setting is all drives. The
following values are valid:
● sata
● sas
● ssd
{ --nodes | -n} <node>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list,
for example, --nodes 1,2. The default value is all. The following values are valid:
● all
● <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this parameter also disables the
display of units within the data table.
{--interval | -I} <integer>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--output <column>
Specifies which columns to display. The following values are valid:
● {Timestamp | time}
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics heat
[--events <string>]
[--pathdepth <integer>]
[--maxpath <integer>]
[--classes <string>]
[--numeric]
Options
--events <string>
Specifies which event types for the specified information are reported. The following values are valid:
blocked Access to the LIN was blocked waiting for a resource to be released by another
operation. Class is other.
contended A LIN is experiencing cross-node contention; it is being accessed simultaneously
through multiple nodes. Class is other.
deadlocked The attempt to lock the LIN resulted in deadlock. Class is other.
getattr A file or directory attribute has been read. Class is namespace_read.
link The LIN has been linked into the file system; the LIN associated with this event is
the parent directory and not the linked LIN. Class is namespace_write.
lock The LIN is locked. Class is other.
lookup A name is looked up in a directory; the LIN for the directory searched is the one
associated with the event. Class is namespace_read.
read A read was performed. Class is read.
rename A file or directory was renamed. The LIN associated with this event is the
directory where the rename took place for either the source directory or the
destination directory, if they differ. Class is namespace_write.
setattr A file or directory attribute has been added, modified, or deleted. Class is
namespace_write.
unlink A file or directory has been unlinked from the file system, the LIN associated
with this event is the parent directory of the removed item. Class is
namespace_write.
write A write was performed. Class is write.
-pathdepth <integer>
Reduces paths to the specified depth.
--maxpath <integer>
Specifies the maximum path length to look up in the file system.
--classes <string>
Specifies which classes for the specified information will be reported. The default setting is all classes.
The following values are valid:
--numeric
If text identifiers of local hosts, remote clients, or users are in the list of columns to display (the default
setting is for them to be displayed), display the unresolved numeric equivalent of these columns.
{ --nodes | -n} <value>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated
list—for example, --nodes 1,2. The default value is all. The following values are valid:
● all
● <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option also disables the
display of units within the data table.
{--interval | -I} <integer>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
--limit <integer>
Displays only the specified number of entries after totaling and ordering.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
● Node
● {Event | event_name}
● {Class | class_name}
● LIN
● Path
--output <column>
Specifies the columns to display. The following values are valid:
{Ops | Displays the rate at which an operation has been performed. Displayed in
operation_rat operations per second.
e}
Node Displays the node on which the operation was performed.
{Event | Displays the name of the event.
event_name}
{ Class | Displays the class of the operation.
class_name}
LIN Displays the LIN for the file or directory associated with the event.
Path Displays the path associated with the event LIN.
--sort <column>
Specifies how rows are ordered. The following values are valid:
● {Ops | operation_rate}
● Node
● {Event | event_name}
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format,
or top-style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified in a comma-separated
list, for example --protocols http,papi. The following values are valid:
● nfs3
● smb1
● nlm
● ftp
● http
● siq
● smb2
● nfs4
● papi
● jobd
● irp
● lsass_in
● lsass_out
● hdfs
● console
● ssh
● s3
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format,
or top-style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
--classes <class>
Specifies which operation classes to report statistics on. The following values are valid:
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified in a comma-separated
list, for example --protocols http,papi. The following values are valid:
● all
● external
● ftp
● hdfs
● http
● internal
● irp
● jobd
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
● Node
● {Proto | protocol}
● Class
● {Op | operation}
--output <column>
Specifies which columns to display. The following values are valid:
{timestamp | Displays the time at which the isi statistics tool last gathered data.
time} Displayed in POSIX time (number of seconds elapsed since January 1, 1970).
Specify <time-and-date> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
{TimeMin | Displays the minimum elapsed time taken to complete an operation. Displayed in
time_min} microseconds.
{TimeAvg | Displays the average elapsed time taken to complete an operation. Displayed in
time_avg} microseconds.
{TimeStdDev | Displays the elapsed time taken to complete an operation as a standard deviation
time_standard from the mean elapsed time.
_dev}
Node Displays the node on which the operation was performed.
{Proto | Displays the protocol of the operation.
protocol}
Class Displays the class of the operation.
--sort <column>
Specifies how rows are ordered. The following values are valid:
● Class
● In
● InAvg | in_avg}
● InMax | in_max}
● InMin | in_min}
● InStdDev | in_standard_dev}
● Node
● NumOps | operation_count}
● Op | operation}
● Ops | operation_rate}
● Out
● OutAvg | out_avg}
● OutMax | out_max}
● OutMin | out_min}
● OutStdDev | out_standard_dev}
● Proto | protocol}
● TimeAvg | time_avg}
● TimeMax | time_max}
● TimeMin | time_min}
● TimeStamp | time}
● TimeStdDev | time_standard_dev}
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format,
or top-style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics pstat
[--protocol <protocol>]
[--degraded]
[--interval <integer>]
[--repeat <integer>]
[--format]
[--verbose]
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics query history
[--keys <string>]
[--substr]
[--raw]
[--nodes <value>]
[--degraded]
[--interval <number>]
[--repeat <number>]
[--limit]
[--long]
[--format]
[--no-header]
Options
--keys <string> ...
Specifies which statistics should be reported for requested nodes, where the value for <string> is a
statistics key. Use the isi statistics list keys command for a complete listing of statistics
keys.
--substr
Matches the statistics for '.*<key> .*' for every key specified with --keys.
--raw
Outputs complex objects as hex.
{ --nodes | -n} <node>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list,
for example, --nodes 1,2. The default value is all. The following values are valid:
● all
● <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
{--interval | -i} <float>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format,
or top-style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics query history
[--keys <string>]
Options
--keys <string> ...
Specifies which statistics should be reported for requested nodes, where the value for <string> is a
statistics key. Use the isi statistics list keys command for a complete listing of statistics
keys.
--substr
Matches the statistics for '.*<key> .*' for every key specified with --keys.
--begin <time>
Specifies begin time in UNIX Epoch timestamp format.
--end <time>
Specifies end time in UNIX Epoch timestamp format.
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--memory-only
Retrieves only the statistics in memory, not those persisted to disk.
--raw
Outputs complex objects as hex.
{ --nodes | -n} <node>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list,
for example, --nodes 1,2. The default value is all. The following values are valid:
● all
● <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option also disables the
display of units within the data table.
{--interval | -i} <float>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Topics:
• isi status
isi status
Displays information about the current status of the nodes on the cluster.
Syntax
isi status
[--all-nodes | -a]
[--node | -n <integer>]
[--all-nodepools | -p]
[--nodepool | -l <string>]
[--quiet | -q]
[--verbose | -v]
Options
--all-nodes | -a
Display node-specific status for all nodes on a cluster.
--node | -n <integer>
Display node-specific status for the node specified by its logical node number (LNN).
--all-nodepools | -p
Display node pool status for all node pools in the cluster.
--nodepool | -l <string>
Display node pool status for the specified node pool.
--quiet | -q
Display less detailed information.
--verbose | -v
Display more detailed information for the --nodepool or --all-nodepools options.
Topics:
• isi storagepool list
• isi storagepool nodepools create
• isi storagepool nodepools delete
• isi storagepool nodepools list
• isi storagepool nodepools modify
• isi storagepool nodepools view
• isi storagepool nodetypes list
• isi storagepool settings modify
• isi storagepool settings view
• isi storagepool tiers create
• isi storagepool tiers delete
• isi storagepool tiers list
• isi storagepool tiers modify
• isi storagepool tiers view
• isi storagepool unprovisioned view
Syntax
Options
--format
Displays node pools and tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Syntax
isi storagepool nodepools create <name>
[--lnns <lnns>]
[--verbose]
Options
<name>
Specifies the name for the node pool. Names must begin with a letter or an underscore and may contain
only letters, numbers, hyphens, underscores, or periods.
{--lnns <lnns> | -n <lnns>}
Specifies the nodes in this pool. Nodes can be a comma-separated list or range of LNNs—for example,
1,4,10,12,14,15 or 1-6.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
<name>
Specifies the name of the node pool to be deleted.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
{--limit | -l} <integer>
Specifies the number of node pools to display.
--format
Displays tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool nodepools modify <name>
[{--protection-policy | -p} <string>]
[{--lnns | -n} <integer>] | [--add-lnns <integer>] | --remove-lnns <integer>] | --node-
type-ids <integer>]
[--add-node-type-ids <integer> | --remove-node-type-ids <integer>]
[{--tier -t} <string> | --clear-tier]
[{--l3 | -3}{yes | no}]
[{--assess | -a}]
[{--set-name | -s} <string>]
The following command adds the node pool hq_datastore to an existing tier named archive-1:
The following command specifies the node types to include in the node pool:
The following command adds (or merges) the node types to the specified node pool, v200_25gb_8gb:
Syntax
Options
<name>
Specifies the name of the storage pool.
{--verbose | -v}
Displays more detailed information.
Syntax
Syntax
isi storagepool settings modify
[--automatically-manage-protection {all | files_at_default | none}]
[--automatically-manage-io-optimization {all | files_at_default | none}]
[--protect-directories-one-level-higher {yes | no}]
[--global-namespace-acceleration-enabled {yes | no}]
[--virtual-hot-spare-deny-writes {yes | no}]
[--virtual-hot-spare-hide-spare {yes | no}]
[--virtual-hot-spare-limit-drives <integer>]
[--virtual-hot-spare-limit-percent <integer>]
[--spillover-target <string>]
[--spillover-anywhere]
[--spillover-enabled {yes | no}]
[--ssd-l3-cache-default-enabled {yes | no}]
[--ssd-qab-mirrors {one | all}]
[--ssd-system-btree-mirrors {one | all}]
[--ssd-system-delta-mirrors {one | all}]
[--verbose]
Required Privileges
ISI_PRIV_SMARTPOOLS
Options
--automatically-manage-protection {all | files_at_default | none}
Specifies whether SmartPools manages files' protection settings.
--automatically-manage-io-optimization {all | files_at_default | none}
Specifies whether SmartPools manages I/O optimization settings for files.
Examples
The following command specifies that SSDs on newly created node pools are to be used as L3 cache:
The following command specifies that 20 percent of node resources can be used for the virtual hot spare:
Syntax
isi storagepool settings view
Options
There are no options for this command.
Example
The following command displays the global SmartPools settings on your cluster:
Syntax
Options
<name>
Specifies the name for the storage pool tier. Specify as any string.
--children <string>
Specifies a node pool to be added to the tier. For each node pool that you intend to add, include a
separate --children argument.
Example
The following command creates a tier and adds two node pools to the tier:
Syntax
Options
{<name> | --all}
Specifies the tier to delete. The acceptable values are the name of the tier or all.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
{--limit | -l}
Specifies the number of storage pool tiers to display.
--format
Displays tiers in the specified format. The following values are valid:
Syntax
Options
<name>
Specifies the tier to be modified.
{--set-name | -s} <string>
Sets the new name for the tier.
{--children | -c} <string>
Specifies the node pools that are children of the tier. Specify --children for each additional node
pool.
--clear-children
Clears the value for node pools that are children of the tier.
--add-children <string>
Add node pools that are children of the tier. Specify --add-children for each additional node pool to
add.
--remove-children <string>
Remove node pools that are children of the tier. Specify --remove-children for each additional
node pool to remove.
{--verbose | -v}
Displays more detailed information.
NOTE: Names must be under 256 characters, begin with a letter or underscore, and must contain only letters, numbers,
hyphens, underscores, or periods.
Syntax
Options
<name>
Specifies the name of the tier.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
{--limit | -l} <integer>
Limits the number of unprovisioned nodes and drives to display.
--format
Displays the list of unprovisioned nodes and drives in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi supportassist contacts modify
[--primary-first-name <string>]
[--primary-last-name <string>]
[--primary-email <string>]
[--primary-phone <string>]
[--primary-language <string>]
[--secondary-first-name <string>]
[--secondary-last-name <string>]
[--secondary-email <string>]
[--secondary-phone <string>]
[--secondary-language <string>]
Options
--primary-first-name <string>
First name of the primary contact.
--primary-last-name <string>
Last name of the primary contact.
--primary-email <string>
Email address of the primary contact.
--primary-phone <string>
Phone number of the primary contact.
Syntax
isi supportassist contacts view
Syntax
isi supportassist provision start
[--access-key <string>]
[--pin <string>]
Options
--access-key <string>
Access key used for provisioning.
--pin <string>
PIN used for provisioning.
Provision a hardware key (if present) by running isi supportassist provision start.
Syntax
isi supportassist provision view
[--interactive -i]
Options
--interactive -i
Show interactive auto-refreshing view of provision status.
Syntax
isi supportassist settings modify
[--network-pools <network-pool>| --clear-network-pools | --add-network-pools
<network-pool> | --remove-network-pools <network-pool>]
[--connection-mode (direct | gateway)]
[--gateway-host <string> | --clear-gateway-host]
[--gateway-port <integer>]
[--backup-gateway-host <string> | --clear-backup-gateway-host]
[--backup-gateway-port <integer>]
[--enable-remote-support <boolean>]
[--automatic-case-creation <boolean>]
[--enable-service <boolean>]
[--enable-download <boolean>]
Options
--network-pools <network-pool>
Network pool identifier. Specify --network-pools for each additional network pool identifier.
<network-pool> is a string that identifies the ID of a pool consisting of a subnet name and a pool name
separated by a : or a .. Examples: subnet0:pool0; subnet1:pool1; subnet1:pool2.
<network-pool> must use a static allocation method. See isi network pools list for more
information on eligible network pools.
IPv4 or IPv6 network pools are supported. However, IPv4 and IPv6-family subnets and
pools cannot be mixed. Example: isi supportassist settings modify --network
pools="ipv6subnet.ipv6pool"
--clear-network-pools
Clear the list of network pools.
--add-network-pools <network-pool>
Add items to list of network pools. Specify --add-network-pools for each additional network pool
identifier to add.
--remove-network-pools <network-pool>
Syntax
isi supportassist settings view
Syntax
isi supportassist telemetry modify
[--telemetry-enabled <boolean>]
[--telemetry-persist <boolean>]
[--telemetry-threads <integer>]
[--offline-collection-period <integer>]
Syntax
isi supportassist telemetry view
Topics:
• isi sync certificates peer delete
• isi sync certificates peer import
• isi sync certificates peer list
• isi sync certificates peer modify
• isi sync certificates peer view
• isi sync certificates server delete
• isi sync certificates server import
• isi sync certificates server list
• isi sync certificates server modify
• isi sync certificates server view
• isi sync jobs cancel
• isi sync jobs list
• isi sync jobs pause
• isi sync jobs reports list
• isi sync jobs reports view
• isi sync jobs resume
• isi sync jobs start
• isi sync jobs view
• isi sync policies create
• isi sync policies delete
• isi sync policies disable
• isi sync policies enable
• isi sync policies list
• isi sync policies modify
• isi sync policies reset
• isi sync policies resolve
• isi sync policies view
• isi sync recovery allow-write
• isi sync recovery resync-prep
• isi sync reports list
• isi sync reports rotate
• isi sync reports subreports list
• isi sync reports subreports view
• isi sync reports view
• isi sync rules create
• isi sync rules delete
• isi sync rules list
• isi sync rules modify
• isi sync rules reports list
• isi sync rules reports view
• isi sync rules view
• isi sync service policies create
• isi sync service policies delete
• isi sync service policies disable
• isi sync service policies enable
Syntax
isi sync certificates peer delete <id>
[--force]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
{--force | -f}
Do not prompt for confirmation of delete.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer import <certificate-path>
[--name <string>]
[--description <string>]
[--verbose]
Syntax
isi sync certificates peer list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
The number of SyncIQ certificate peers to list.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer modify <id>
[--name <string>]
[--description <string>]
[--verbose]
Syntax
isi sync certificates peer view <id>
[--format (list | json)]
Options
<id>
System certificate identifier or certificate name.
--format (list | json)
Displays output in list (default) or JavaScript Object Notation (JSON) format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates server delete <id>
[--force]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
Syntax
isi sync certificates server import <certificate-path> <certificate-key-path>
[--name <string>]
[--certificate-key-password <string>]
[--verbose]
Options
<certificate-path>
Local path to the TLS certificate file in PEM, DER, or PCKS#12 format. This certificate file is copied into
the system certificate store, and you can remove it after import.
<certificate-key-path>
Local path to the TLS certificate key file in PEM, DER, or PCKS#12 format. This certificate key file is
copied into the system certificate store, and you should remove it after import.
--name <string>
Administrator-configured certificate identifier.
--certificate-key-password <string>
The password for the certificate key, if the private key is password encrypted.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates server list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
The number of SyncIQ certificate servers to list.
--format {table | json | csv | list}
Syntax
isi sync certificates server modify <id>
[--name <string>]
[--description <string>]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
--name <string>
Administrator-configured certificate identifier.
--description <string>
Description field for administrative convenience.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer view <id>
[--format (list | json)]
Options
<id>
System certificate identifier or certificate name.
--format (list | json)
Displays output in list (default) or JavaScript Object Notation (JSON) format.
{--no-header | -a}
Syntax
isi sync jobs cancel {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Cancels a job that was created according to the specified replication policy.
Specify as a replication policy name or ID.
--all
Cancels all currently running replication jobs.
--verbose
Displays more detailed information.
Syntax
isi sync jobs list
[--state <state>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays information about replication jobs for all policies.
--state <state>
Displays only jobs in the specified state.
The following values are valid:
Syntax
isi sync jobs pause {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Pauses a job that was created according to the specified replication policy.
Specify as a replication policy name.
--all
Pauses all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs reports list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi sync jobs reports view <policy>
Options
<policy>
Displays information about a replication job created according to the specified replication policy.
Specify as a replication policy name or ID.
Syntax
isi sync jobs resume {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Resumes a paused job that was created by the specified policy.
Specify as a replication policy name.
--all
Resumes all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs start <policy-name>
[--test]
[--source-snapshot <snapshot>]
[--verbose]
Options
<policy-name>
Starts a replication job for the specified replication policy.
--test
Creates a replication policy report that reflects the number of files and directories that would be
replicated if the specified policy was run. You can test only policies that have not been run before.
--source-snapshot <snapshot>
Replicates data according to the specified SnapshotIQ snapshot. If specified, a snapshot is not
generated for the replication job. Replicating data according to snapshots generated by the SyncIQ
tool is not supported.
Specify as a snapshot name or ID. The source directory of the policy must be contained in the specified
snapshot. This option is valid only if the last replication job completed successfully or if you are
performing a full or differential replication. If the last replication job completed successfully, the specified
snapshot must be more recent than the snapshot referenced by the last replication job.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs view <policy>
Options
<policy>
Displays information about a running replication job created according to the specified policy.
Specify as a replication policy name or ID.
Syntax
isi sync policies create <name> <action> (copy | sync)
<source-root-path> <target-host> <target-path>
[--enabled (yes | no)]
[--description <string>]
[--check-integrity (yes | no)]
[--source-include-directories | -i <string>]
[--source-exclude-directories | -e <string>]
[--source-subnet <subnet> | --source-pool <pool>]
[--target-snapshot-archive (on | off)]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--sync-existing-target-snapshot-pattern<string>]
[--sync-existing-snapshot-expiration<boolean>]
[--target-detect-modifications (on | off)]
[--source-snapshot-archive (on | off)]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing (yes | no)]
[--schedule | -S (<schedule>]
[--job-delay <duration>]
[--skip-when-source-unmodified (true | false)]
[--rpo-alert <duration>]
[--log-level (fatal | error | notice | info | copy | debug | trace)]
[--log-removed-files (yes | no)]
[--workers-per-node | -w <integer>]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--restrict-target-network (on | off)]
[--target-compare-initial-sync (on | off)]
[--accelerated-failback (yes | no)]
[--priority (0 | 1 | normal | high)]
[--cloud-deep-copy (deny | allow | force)]
[--bandwidth-reservation <integer>]
[--target-certificate-id <string>]
[--ocsp-issuer-certificate-id <string>]
[--ocsp-address <string>]
[--encryption-cipher-list <string>]
[--elliptic-curve-list <string>]
[--linked-service-policies <string>]
[--delete-quotas (yes | no)]
[--password (<password>]
[--set-password)]
[--verbose | -v]
Options
<name>
Specifies a name for the replication policy.
Specify as any string.
<action>
Specifies the type of replication policy.
The following types of replication policy are valid:
copy Creates a copy policy that adds copies of all files from the source to the target.
<source-root-path>
Specifies the directory on the local cluster that files are replicated from.
Specify as a full directory path.
<target-host>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
● The fully qualified domain name of any node in the target cluster.
● The host name of any node in the target cluster.
● The name of a SmartConnect zone in the target cluster.
● The IPv4 or IPv6 address of any node in the target cluster.
● localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job connects
to a dynamically allocated IP address, SmartConnect might reassign the address while a replication
job is running, which would disconnect the job and cause it to fail.
<target-path>
Specifies the directory on the target cluster that files are replicated to.
Specify as a full directory path.
--enabled (yes | no)
Determines whether the policy is enabled or disabled.
The default value is yes.
--description <string>
Specifies a description of the replication policy.
--check-integrity (yes | no}
Specifies whether to perform a checksum on each file data packet that is affected by the SyncIQ job.
If this option is set to yes, and the checksum values do not match, SyncIQ retransmits the file data
packet.
The default value is yes.
{--source-include-directories | -i} <path>
Includes only the specified directories in replication.
Specify as any directory path contained in the root directory. You can specify multiple directories by
specifying --source-include-directories multiple times within a command. For example, if the
root directory is /ifs/data, you could specify the following:
--source-subnet <subnet>
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
--sync-existing-target-snapshot-pattern <string>
When enabled, this defines the naming pattern for the snapshot on the destination cluster.
--sync-existing-snapshot-expiration <boolean>
When enabled, the target expire duration will use the same time duration of the source expire duration.
--target-detect-modifications {on | off}
Determines whether SyncIQ checks the target directory for modifications before replicating files.
CAUTION: Specifying off could result in data loss. It is recommended that you consult
Isilon Technical Support before specifying off.
--source-snapshot-archive {on | off}
Determines whether archival snapshots are retained on the source cluster. If this option is set to off,
SyncIQ will still maintain one snapshot at a time for the policy to facilitate replication.
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to
when-snapshot-taken. The default value is asterisk (*).
--snapshot-sync-existing (yes | no)
If set to Yes, snapshot-triggered replication jobs will include replications taken before the policy creation
time. The default is No. If set to yes, set --schedule when-snapshot-taken.
{--schedule | -S} {<schedule> | when-source-modified | when-snapshot-taken}
Specifies how often data will be replicated. Specifying when-source-modified causes OneFS
to replicate data every time that the source directory of the policy is modified. Specifying when-
snapshot-taken causes OneFS to replicate data every time that a snapshot is taken of the source
directory.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--job-delay <duration>
Specifies the amount of time after the source directory is modified that SyncIQ waits before starting a
replication job. If the --schedule of this replication policy is set to when-source-modified, and
the contents of the source directory are modified, SyncIQ will wait the specified amount of time before
starting a replication job.
The default value is 0 seconds.
--skip-when-source-unmodified {true | false}
Causes the policy not to be run if the contents of the source directory have not been modified since the
last time the policy has been run. If --schedule of this replication policy is set to <schedule>, and the
policy is scheduled to run before changes have been made to the contents of the source directory, the
policy will not be run.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example,
assume you set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job
starts at 3:30 PM; if the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if --schedule is set to
<schedule>.
NOTE: This option is valid only if RPO alerts have been globally enabled through SyncIQ settings.
The events have an event ID of 400040020.
--log-level (fatal | error | notice | info | copy| debug | trace)
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
● fatal
● error
● notice
● info
● copy
● debug
● trace
The default value is info.
--log-removed-files {yes | no}
Determines whether SyncIQ retains a log of all files that are deleted when a synchronization policy is run.
This parameter has no effect for copy policies.
The default value is no.
{--workers-per-node | -w} <integer>
Specifies the number of workers per node that are generated by SyncIQ to perform each replication job
for the policy.
The default value is 3.
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect
only to nodes in the specified zone. If off is specified, does not restrict replication jobs to specific
nodes on the target cluster.
--target-compare-initial-sync (on | off)
Determines whether the full or differential replications are performed for this policy. Full or differential
replications are performed the first time a policy is run and after a policy has been reset. If set to on,
performs a differential replication. If set to off, performs a full replication.
If differential replication is enabled the first time a replication policy is run, the policy will run slower
without any benefit.
The default value is off.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than
waiting to perform those tasks during the failback process. Performing these tasks ahead of time will
increase the speed of failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority. If set to 1, the policy is
high-priority.
--cloud-deep-copy (deny | allow | force)
Determines how the policy replicates CloudPools smartlinks. If set to deny, SyncIQ replicates all
CloudPools smartlinks to the target cluster as smartlinks; if the target cluster does not support the
smartlinks, the job will fail. If set to force, SyncIQ replicates all smartlinks to the target cluster as
regular files. If set to allow, SyncIQ will attempt to replicate smartlinks to the target cluster as
smartlinks; if the target cluster does not support the smartlinks, SyncIQ will replicate the smartlinks as
regular files.
--bandwidth-reservation <integer>
The desired bandwidth reservation for this policy, in kb/s. This feature does not activate unless a SyncIQ
bandwidth rule is in effect.
--target-certificate-id <string>
The identifier of the target cluster certificate being used for encryption.
--ocsp-issuer-certificate-id <string>
The identifier of the certificate authority that issued the certificate whose revocation status is being
checked.
--ocsp-address <string>
The address of the OCSP responder to which you want to connect.
--encryption-cipher-list <string>
The cipher list being used with cluster encryption. For SyncIQ targets, this is a list of supported ciphers.
For SyncIQ sources, the list of ciphers is used in order.
Syntax
isi sync policies delete {<policy> | --all}
[--local-only]
[--force]
[--verbose]
Options
<policy>
Deletes the specified replication policy.
--all
Deletes all replication policies.
--local-only
Does not break the target association on the target cluster. Not deleting a policy association on the
target cluster will cause the target directory to remain in a read-only state.
NOTE: If SyncIQ is unable to communicate with the target cluster, you must specify this option to
successfully delete the policy.
{--force | -f}
Deletes the policy, even if an associated job is currently running. Also, does not prompt you to confirm
the deletion.
CAUTION: Forcing a policy to delete might cause errors if an associated replication job is
currently running.
Syntax
isi sync policies disable {<policy> | --all}
[--verbose]
Options
<policy>
Disables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Disables all replication policies on the cluster.
--verbose
Displays more detailed information.
Syntax
isi sync policies enable {<policy> | --all}
[--verbose]
Options
<policy>
Enables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Enables all replication policies on the cluster.
--verbose
Displays more detailed information.
Syntax
isi sync policies list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays a table of all replication policies.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync policies modify <policy>
[--name | -n <new-policy-name>]
[--source-root-path <root-path>]
[--action | -A <policy-type>]
[--enabled <boolean>]
[--target-host <target-cluster>]
[--description <string>]
[--check-integrity <boolean>]
[--source-include-directories | -i <string>]
[--clear-source-include-directories]
[--add-source-include-directories <string>]
[--remove-source-include-directories <string>]
[--source-exclude-directories | -e <string>]
[--clear-source-exclude-directories]
[--add-source-exclude-directories <string>]
[--remove-source-exclude-directories <string>]
[--source-subnet <string> --source-pool <string>]
[--target-path | -p <target-path>]
[--target-snapshot-archive {on | off}]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--sync-existing-target-snapshot-pattern<string>]
[--sync-existing-snapshot-expiration<boolean>]
[--target-detect-modifications {on | off}]
[--source-snapshot-archive {on | off}]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing {yes | no}]
[--schedule | -S <schedule>]
[--job-delay <duration>]
[--skip-when-source-unmodified {true | false}]
[--rpo-alert <duration>]
[--log-level (fatal | error | notice | info | copy | debug | trace)]
[--log-removed-files {yes | no}]
[--workers-per-node | -w <integer>]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--restrict-target-network {on | off}]
[--target-compare-initial-sync {on | off}]
[--accelerated-failback {yes | no}]
[--priority {0 | 1}]
[--cloud-deep-copy {deny | allow | force}]
[--bandwidth-reservation <integer> | --clear-bandwidth-reservation]
[--target-certificate-id <string>]
[--ocsp-issuer-certificate-id <string>]
[--ocsp-address <string>]
[--encryption-cipher-list <string>]
[--elliptic-curve-list <string>]
[--linked-service-policies <string> | --clear-linked-service-policies | --add-linked-
service-policies
<string> | --remove-linked-service-policies <string>]
[--delete-quotas <boolean>]
[--password <password>]
[--clear-source-network]
[--set-password]
[--verbose | -v]
[--force | -f]
copy Creates a copy policy that adds copies of all files from the source to the target.
sync Creates a synchronization policy that synchronizes data on the source cluster to
the target cluster and deletes all files on the target cluster that are not present on
the source cluster.
--enabled <boolean>
Enables a policy.
{--target-host | -C} <target-cluster>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
● The fully qualified domain name of any node in the target cluster.
● The host name of any node in the target cluster.
● The name of a SmartConnect zone in the target cluster.
● The IPv4 or IPv6 address of any node in the target cluster.
● localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job connects
to a dynamically allocated IP address, SmartConnect might reassign the address while a replication
job is running, which would disconnect the job and cause it to fail.
--description <string>
Specifies a description of this replication policy.
--check-integrity {true | false}
Specifies whether to perform a checksum on each file data packet that is affected by the SyncIQ job.
If this option is set to true and the checksum values do not match, SyncIQ retransmits the file data
packet.
The default value is true.
{--source-include-directories | -i} <path>
Includes only the specified directories in replication.
Specify as any directory path contained in the root directory. You can specify multiple directories by
specifying --source-include-directories multiple times within a command. For example, if the
root directory is /ifs/data, you could specify the following:
--clear-source-include-directories
Clears the list of included directories.
--add-source-include-directories <path>
--clear-source-exclude-directories
Clears the list of excluded directories.
--add-source-exclude-directories <path>
Adds the specified directory to the list of excluded directories.
--remove-source-exclude-directories <path>
Removes the specified directory from the list of excluded directories.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the local cluster.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the local cluster.
{--target-path | -p} <target-path>
Specifies the directory on the target cluster that files are replicated to.
Specify as a full directory path.
--target-snapshot-archive {on | off}
Determines whether archival snapshots are generated on the target cluster. If this option is set to off,
SyncIQ will still maintain exactly one snapshot at a time on the target cluster to facilitate failback. You
must activate a SnapshotIQ license on the target cluster to generate archival snapshots on the target
cluster.
--target-snapshot-pattern <naming-pattern>
Specifies the snapshot naming pattern for snapshots that are generated by replication jobs on the target
cluster.
The default naming pattern is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
SIQ-%{SrcCluster}-%{PolicyName}-latest
--sync-existing-target-snapshot-pattern <string>
When enabled, this defines the naming pattern for the snapshot on the destination cluster.
--sync-existing-snapshot-expiration <boolean>
When enabled, the target expire duration will use the same time duration of the source expire duration.
--target-detect-modifications {on | off}
Determines whether SyncIQ checks the target directory for modifications before replicating files.
CAUTION: Specifying off could result in data loss. It is recommended that you consult
Isilon Technical Support before specifying off.
--source-snapshot-archive {on | off}
Determines whether archival snapshots are retained on the source cluster. If this option is set to off,
SyncIQ will still maintain one snapshot at a time for the policy to facilitate replication.
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <pattern>
Specifies the naming pattern for snapshots to be synced. If the --schedule of this replication policy
is set to when-snapshot-taken, and a snapshot is taken of the source directory, and the snapshot
name matches the specified naming pattern, SyncIQ will replicate the snapshot to the target cluster.
The default value is "*", which causes all snapshots of the source directory to be replicated if the
--schedule of the policy is set to when-snapshot-taken.
--snapshot-sync-existing {yes | no}
Determines whether the policy replicates the data conatined snapshots taken before the policy was
created.
NOTE: Because this setting cannot be modified after the policy is initially created, this option
cannot be specified with isi sync policies modify.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
To configure a policy to be run only manually, specify the following option:
--schedule ""
--job-delay <duration>
Specifies the amount of time after the source directory is modified that SyncIQ waits before starting a
replication job. If the --schedule of this replication policy is set to when-source-modified, and
the contents of the source directory are modified, SyncIQ will wait the specified amount of time before
starting a replication job.
The default value is 0 seconds.
--clear-job-delay
Clears the amount of time after the source directory is modified that SyncIQ waits before starting a
replication job.
--skip-when-source-unmodified {true | false}
Causes the policy not to be run if the contents of the source directory have not been modified since the
last time the policy has been run. If --schedule of this replication policy is set to <schedule>, and the
policy is scheduled to run before changes have been made to the contents of the source directory, the
policy will not be run.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example,
assume you set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job
starts at 3:30 PM; if the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network {on | off}
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect
only to nodes in the specified zone. If off is specified, does not restrict replication jobs to specific
nodes on the target cluster.
--target-compare-initial-sync {on | off}
Determines whether the full or differential replications are performed for this policy. Full or differential
replications are performed the first time a policy is run and after a policy has been reset. If set to on,
performs a differential replication. If set to off, performs a full replication.
--name <value>
Selects only files whose names match the specified string.
You can include the following wildcards:
● *
● [ ]
● ?
The following options are valid only for copy policies:
--accessed-after '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months |
years} ago}'
Selects files that have been accessed since the specified time. This predicate is valid only for
copy policies.
--accessed-before '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months |
years} ago}'
Selects files that have not been accessed since the specified time. This predicate is valid only
for copy policies.
--accessed-time '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months |
years} ago}'
Selects files that were accessed at the specified time. This predicate is valid only for copy
policies.
--birth-after '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months |
years} ago}'
Selects files that were created after the specified time. This predicate is valid only for copy
policies.
--birth-before '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months |
years} ago}'
Selects files that were created before the specified time. This predicate is valid only for copy
policies.
You can use the following <link> values to combine and alter the options available for predicates:
--and
Selects files that meet the criteria of the options that come before and after this value.
--or
Selects files that meet either the criterion of the option that comes before this value or the
criterion of the option that follows this value.
Syntax
isi sync policies reset {<policy> | --all}
[--verbose]
Options
<policy>
Resets the specified replication policy.
Specify as a replication policy name or ID
--all
Resets all replication policies
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync policies resolve <policy>
[--force]
Options
<policy>
Resolves the specified replication policy.
Specify as a replication policy name or ID.
{--force | -f}
Suppresses command-line prompts and messages.
Syntax
isi sync policies view <policy>
Options
<policy>
Displays information about the specified replication policy.
Specify as a replication policy name or ID.
Syntax
isi sync recovery allow-write <policy-name>
[--revert]
[--log-level <level>]
[--workers-per-node <integer>]
[--verbose]
Options
<policy-name>
Allows writes for the target directory of the specified replication policy.
Specify as a replication policy name, a replication policy ID, or the path of a target directory.
--revert
Reverts an allow-writes operation on the local cluster only. This action does not affect the source
cluster of the replication policy.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
● fatal
● error
● notice
● info
● copy
● debug
● trace
The default value is info.
{--workers-per-node | -w}<integer>
Syntax
isi sync recovery resync-prep <policy-name>
[--verbose]
Options
<policy-name>
Targets the following replication policy.
Specify as a replication policy name or ID. The replication policy must be a synchronization policy.
--verbose
Displays more detailed information.
Syntax
isi sync reports list
[--policy-name <policy>]
[--state <state>]
[--reports-per-policy <integer>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--policy-name <policy>
Displays only replication reports that were created for the specified policy.
--state <state>
Displays only replication reports whose jobs are in the specified state.
--reports-per-policy <integer>
Displays no more than the specified number of reports per policy. The default value is 10.
Syntax
isi sync reports rotate
[--verbose]
Options
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync reports subreports list <policy> <job-id>
[--limit]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
Syntax
isi sync reports subreports view <policy> <job-id> <subreport-id>
Options
<policy>
Displays a sub report about the specified replication policy. Specify as a replication policy name.
<job-id>
Displays a sub report about the specified replication job. Specify as a replication job ID.
<subreport-id>
Syntax
isi sync reports view <policy> <job-id>
Options
<policy>
Displays a replication report about the specified replication policy.
<job-id>
Displays a replication report about the job with the specified ID.
Syntax
isi sync rules create <type> <interval> <days> <limit>
[--description <string>]
[--verbose]
Options
<type>
Specifies the type of performance rule. The following values are valid:
file_count
Creates a performance rule that limits the number of files that can be sent by replication jobs
per second.
bandwidth
Creates a performance rule that limits the amount of bandwidth that replication jobs are
allowed to consume.
<interval>
Enforces the performance rule on the specified hours of the day. Specify in the following format:
<hh>:<mm>-<hh>:<mm>
<days>
Enforces the performance rule on the specified days of the week.
The following values are valid:
X Specifies Sunday
M Specifies Monday
T Specifies Tuesday
You can include multiple days by specifying multiple values separated by commas. You can also include a
range of days by specifying two values separated by a dash.
<limit>
Specifies the maximum number of files that can be sent or KBs that can be consumed per second by
replication jobs.
--description <string>
Specifies a description of this performance rule.
--verbose
Displays more detailed information.
Syntax
isi sync rules delete {<id> | --all | --type <type>}
[--force]
[--verbose]
Options
<id>
Deletes the performance rule of the specified ID.
--all
Deletes all performance rules.
--type <type>
Deletes all performance rules of the specified type. The following values are valid:
file_count
Deletes all performance rules that limit the number of files that can be sent by replication jobs
per second.
bandwidth
Deletes all performance rules that limit the amount of bandwidth that replication jobs are
allowed to consume.
--force
Does not prompt you to confirm that you want to delete the performance rule.
--verbose
Displays more detailed information.
Syntax
isi sync rules list
[--type <type>]
[--limit]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--type <type>
Displays only performance rules of the specified type. The following values are valid:
file_count
Displays only performance rules that limit the number of files that can be sent by replication
jobs per second.
bandwidth
Displays only performance rules that limit the amount of bandwidth that replication jobs are
allowed to consume.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync rules modify <id>
[--interval <interval>]
[--days <days>]
[--limit <integer>]
[--enabled {true | false}]
[--description <string>]
[--verbose]
<hh>:<mm>-<hh>:<mm>
X Specifies Sunday
M Specifies Monday
T Specifies Tuesday
W Specifies Wednesday
R Specifies Thursday
F Specifies Friday
S Specifies Saturday
You can include multiple days by specifying multiple values separated by commas. You can also include a
range of days by specifying two values separated by a dash.
--limit <limit>
Specifies the maximum number of files that can be sent or KBs that can be consumed per second by
replication jobs.
--enabled {true | false}
Determines whether the policy is enabled or disabled.
--description <string>
Specifies a description of this performance rule.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync rules reports list
[--policy-id <string>]
[--start <integer>]
[--end <integer>]
[--sort (name | speed)]
[--descending]
Options
--policy-id <string>
A SyncIQ policy identifier.
Syntax
isi sync rules reports view <policy-id>
[--start <integer>]
[--end <integer>]
Options
<policy-id>
A SyncIQ policy identifier.
{--start | -s} <integer>
Beginning time stamp for the bandwidth report.
{--end | -e} <integer>
Ending time stamp for the bandwidth report.
Syntax
isi sync rules view <id>
Options
<id>
Displays information about the replication performance rule with the specified ID.
Syntax
isi sync service policies create <name> <target-host>
[--enabled (yes | no)]
[--description <string>]
[--check-integrity (yes | no)]
[--source-subnet <subnet> | --source-pool <pool>]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing (yes | no)]
[--schedule (<schedule> | when-source-modified
| when-snapshot-taken)]
[--rpo-alert <duration>]
[--log-level <level>]
[--workers-per-node <integer>]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--restrict-target-network (on | off)]
[--target-compare-initial-sync (on | off)]
[--accelerated-failback (yes | no)]
[--priority (0 | 1 | normal | high)]
[--bandwidth-reservation <integer>]
[--target-certificate-id <string>]
[--ocsp-issuer-certificate-id <string>]
[--ocsp-address <string>]
[--encryption-cipher-list <string>]
[--linked-data-policies <string>]
[--replicated-services <string>]
[--service-history-max-age <duration>]
[--service-history-max-count <integer>]
[--password (<password>]
[--set-password)]
[--verbose]
Options
<name>
Specifies a name for the replication service policy.
Specify as any string.
<target-host>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
● The fully qualified domain name of any node in the target cluster.
● The host name of any node in the target cluster.
● The name of a SmartConnect zone in the target cluster.
● The IPv4 or IPv6 address of any node in the target cluster.
● localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job connects
to a dynamically allocated IP address, SmartConnect might reassign the address while a replication
job is running, which would disconnect the job and cause it to fail.
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to
when-snapshot-taken. The default value is asterisk (*).
--snapshot-sync-existing (yes | no)
If set to Yes, snapshot-triggered replication jobs will include replications taken before the policy creation
time. The default is No. If set to yes, set --schedule when-snapshot-taken.
{--schedule | -S} (<schedule> | when-source-modified | when-snapshot-taken)
Specifies how often replication policy is executed. Specifying when-source-modified causes OneFS
to replicate data every time that the source directory of the policy is modified. Specifying when-
snapshot-taken causes OneFS to replicate data every time that a snapshot is taken of the source
directory.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect
only to nodes in the specified zone. If off is specified, does not restrict replication jobs to specific
nodes on the target cluster.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than
waiting to perform those tasks during the failback process. Performing these tasks ahead of time will
increase the speed of failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
Syntax
isi sync service policies delete <policy> | --all
[--local-only]
[--force]
[--verbose]
Options
<policy>
Deletes the specified replication service policy.
--all
Syntax
isi sync service policies disable <policy> | --all
[--verbose]
Options
<policy>
Disables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Disables all replication policies on the cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies enable <policy> | --all
[--verbose]
Options
<policy>
Enables the specified replication service policy. Specify as a replication service policy name or ID.
--all
Enables all replication service policies on the cluster.
Syntax
isi sync service policies list
[--limit <integer>]
[--sort (id | name | source_root_path | enabled | target_host | target_path
| target_snapshot_pattern | target_snapshot_expiration | target_snapshot_alias
| source_snapshot_pattern | source_snaphot_expiration | snapshot_sync_pattern |
snapshot_sync_existing | schedule | rpo_alert | log_level | workers_per_node
| report_max_age | report_max_count | force_interface | restrict_target_network
| expected_dataloss | disable_fofb | disable_file_split | accelerated_failback
| database_mirrored | source_domain_marked | priority | bandwidth_reservation |
last_job_state | last_started | last_success | password_set | conflicted |
has_sync_date | source_certificate_id | ocsp_address | encryption_cipher_list |
encrypted | linked_data_policies | replicated_services | service_history_max_age |
service_history_max_count) ]
[--descending]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays a table of all replication service policies.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
{--descending | -d}
Displays output in reverse order.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies modify <policy>
[--name <service_policy_name>]
[--enabled (yes | no)]
[--target-host <target-cluster>]
[--description <service-policy-description>]
[--check-integrity (yes | no)]
[--source-subnet <subnet> --source-pool <pool>]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing (yes | no)]
[--schedule (<schedule> | when-source-modified | when-snapshot-taken)]
[--rpo-alert <duration>]
[--clear-rpo-alert]
[--log-level <level>]
[--workers-per-node <integer> | --clear-rpo]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--restrict-target-network (on | off)]
[--accelerated-failback (yes | no)]
[--priority (0 | 1 | normal | high)]
[--bandwidth-reservation <integer>]
[--clear-bandwidth-reservation]
[--target-certificate-id <string>]
[--ocsp-issuer-certificate-id <string>]
[--ocsp-address <string>]
[--encryption-cipher-list <string>]
[--linked-data-policies <string>]
[--clear-linked-data-policies]
[--add-linked-data-policies <string>...]
[--remove-linked-data-policies <string>...]
[--replicated-services <string>]
[--clear-replicated-services]
[--add-replicated-services <string>...]
[--remove-replicated-services <string>...]
[--service-history-max-age <duration>]
[--service-history-max-count <integer>]
[--password (<password>]
[--set-password)]
[--clear-source-network]
[--verbose]
[--force]
Options
<policy>
A replication service policy name.
{--name | -n} <service_policy_name>
Specifies a name for the replication service policy.
Specify as any string.
--enabled (yes | no)
Determines whether the service policy is enabled or disabled.
The default value is yes.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job connects
to a dynamically allocated IP address, SmartConnect might reassign the address while a replication
job is running, which would disconnect the job and cause it to fail.
--description <service-policy-description>
Specifies a description of the replication service policy.
--check-integrity (yes | no}
Specifies whether to perform a checksum on each file data packet that is affected by the replication
policy. If this option is set to yes, and the checksum values do not match, SyncIQ retransmits the file
data packet.
The default value is yes.
--source-subnet <subnet>
Restricts replication service policies to running only on nodes in the specified subnet on the local cluster.
If you specify this option, you must also specify --source-pool.
--source-pool <pool>
Restricts replication service policies to running only on nodes in the specified pool on the local cluster. If
you specify this option, you must also specify --source-subnet.
--target-snapshot-pattern <naming-pattern>
Specifies the snapshot naming pattern for snapshots that are generated by replication jobs on the target
cluster.
The default naming pattern is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
SIQ-%{SrcCluster}-%{PolicyName}-latest
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to
when-snapshot-taken. The default value is asterisk (*).
--snapshot-sync-existing (yes | no)
If set to Yes, snapshot-triggered replication jobs will include replications taken before the policy creation
time. The default is No. If set to yes, set --schedule when-snapshot-taken.
{--schedule | -S} (<schedule> | when-source-modified | when-snapshot-taken)
Specifies how often replication policy is executed. Specifying when-source-modified causes OneFS
to replicate data every time that the source directory of the policy is modified. Specifying when-
snapshot-taken causes OneFS to replicate data every time that a snapshot is taken of the source
directory.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st
month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both
"saturday" and "sat" are valid.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example,
assume you set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job
starts at 3:30 PM; if the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if --schedule is set to
<schedule>.
NOTE: This option is valid only if RPO alerts have been globally enabled through SyncIQ settings.
The events have an event ID of 400040020.
--clear-rpo-alert
Clears an RPO alert.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
● fatal
● error
● notice
● info
● copy
● debug
● trace
The default value is info.
{--workers-per-node | -w} <integer>
Specifies the number of workers per node that are generated by SyncIQ to perform each replication job
for the policy.
The default value is 3.
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect
only to nodes in the specified zone. If off is specified, does not restrict replication jobs to specific
nodes on the target cluster.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than
waiting to perform those tasks during the failback process. Performing these tasks ahead of time will
increase the speed of failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority. If set to 1, the policy is
high-priority.
--bandwidth-reservation <integer>
The desired bandwidth reservation for this policy, in kb/s. This feature does not activate unless a SyncIQ
bandwidth rule is in effect.
--clear-bandwidth-reservation
Clears a bandwidth reservation for this service policy.
--target-certificate-id <string>
The identifier of the target cluster certificate being used for encryption.
--ocsp-issuer-certificate-id <string>
The identifier of the certificate authority that issued the certificate whose revocation status is being
checked.
--ocsp-address <string>
The address of the OCSP responder to which you want to connect.
--encryption-cipher-list <string>
The cipher list being used with cluster encryption. For SyncIQ targets, this is a list of supported ciphers.
For SyncIQ sources, the list of ciphers is used in order.
--linked-data-policies <string>...
A list of SyncIQ policy identifiers whose source root directories will be used to filter service replication.
Specify this option again for each additional service policy identifier.
--clear-linked-data-policies
Clear the list of SyncIQ policy identifiers.
--add-linked-data-policies <string>...
Add items to the list of SyncIQ policy identifiers. Repeat for multiple policies.
--remove-linked-data-policies <string>...
Remove items from the list of SyncIQ policy identifiers. Repeat for multiple policies.
--replicated-services <string>...
A list of services to replicate. Specify again for each additional service.
--clear-replicated-services
Clear the list of services to replicate.
--add-replicated-services <string>...
Add items to the list of services to replicate. Repeat for multiple replicated services.
--remove-replicated-services <string>...
Remove items from the list of services to replicate. Repeat for multiple replicated services.
--service-history-max-age <duration>
The maximum age of service information to maintain.
Syntax
isi sync service policies reset <policy> | --all
[--verbose]
Options
<policy>
Resets the specified replication service policy. Specify as a replication service policy name or ID
--all
Resets all replication policies
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies resolve <policy>
[--force]
Syntax
isi sync service policies view <policy>
Options
<policy>
Displays information about the specified replication service policy.
Specify as a replication service policy name or ID.
Syntax
isi sync service recovery allow-write <policy-name> <timestamp> <tgt-path>
[--log-level (fatal | error | notice | info | copy | debug | trace)]
[--skip-copy (yes | no)]
[--skip-map (yes | no)]
[--skip-failover (yes | no)]
[--verbose]
Options
<policy-name>
The policy name for the job to fail over/fail back.
<timestamp>
The time stamp for a service replication policy backup from which you are restoring.
<tgt-path>
The directory to output the service replication files for restoration.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
● fatal
● error
● notice
Syntax
isi sync service recovery resync-prep <policy-name>
[--verbose]
Options
<policy-name>
The policy name for the job you are preparing for re-synchronization.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target break <policy> | --target-path <path>
[--force]
[--verbose]
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
{--force | -f}
Syntax
isi sync service target cancel <policy> | --target-path <path> | --all
[--verbose]
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
--all
Cancel all running jobs targeted to this cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target list
[--target-path <path>]
[--limit <integer>]
[--sort (name | source_host | target_path | last_job_state | failover_failback_state)]
[--descending]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
--target-path <path>
Show target policies that have the specified target path.
--sort (name | source_host | target_path | last_job_state | failover_failback_state)
Sorts output displayed by the specified attribute.
{--descending | -d}
Displays output in reverse order.
--format (table | json | csv | list)
Syntax
isi sync service target view <policy> | --target-path <path>
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
Syntax
isi sync settings modify
[--service(on | off | paused)]
[--source-subnet <string>]
[--source-pool <string>]
[--restrict-target-network <boolean>]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--rpo-alerts <boolean>]
[--bandwidth-reservation-reserve-percentage <integer>]
[--bandwidth-reservation-reserve-absolute <integer> |
--clear-bandwidth-reservation-reserve-absolute]
[--encryption-required <boolean>]
[--cluster-certificate-id <string>]
[--ocsp-issuer-certificate-id <string>]
[--ocsp-address <string>]
[--encryption-cipher-list <string>]
[--renegotiation-period <duration>]
[--service-history-max-age <duration>]
[--service-history-max-count <integer>]
[--use-workers-per-node <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Syntax
isi sync settings view
Options
There are no options for this command.
Breaking a source and target association requires you to reset the replication policy before you can run the policy again.
Depending on the amount of data being replicated, a full or differential replication can take a very long time to complete.
Syntax
isi sync target break {<policy> | --target-path <path>}
[--force]
[--verbose]
Options
<policy>
Removes the association of the specified replication policy targeting this cluster.
Specify as a replication policy name, a replication policy ID, or the path of a target directory.
--target-path <path>
Removes the association of the replication policy targeting the specified directory path.
{--force | -f}
Forces the replication policy association to be removed, even if an associated job is currently running.
CAUTION: Forcing a target break might cause errors if an associated replication job is
currently running.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync target cancel {<policy> | --target-path <path> | --all}
[--verbose]
Options
<policy>
Cancels a replication job created according to the specified replication policy.
Specify as a replication policy name or ID.
--target-path <path>
Cancels a replication job targeting the specified directory.
--all
Cancels all running replication jobs targeting the local cluster.
--verbose
Displays more detailed information.
Syntax
isi sync target list
[--target-path <path>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays a table of all replication policies currently targeting the local cluster.
--target-path <path>
Displays information about the replication policy targeting the specified directory.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync target reports list
[--state <state>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays basic information about all completed replication jobs.
--state <state>
Displays information about only replication jobs in the specified state. The following states are valid:
● scheduled
● running
● paused
● finished
● failed
● canceled
● needs_attention
● unknown
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
Syntax
isi sync target reports subreports list <policy> <job-id>
[--limit]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication report.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target cluster.
duration
Syntax
isi sync target reports subreports view <policy> <job-id> <subreport-id>
Options
<policy>
Displays a sub report about the specified replication policy. Specify as a replication policy name.
<job-id>
Displays a sub report about the specified replication job. Specify as a replication job ID.
<subreport-id>
Displays the subreport with the specified ID.
Syntax
isi sync target reports view <policy> <job-id>
Options
<policy>
Displays a replication report about the specified replication policy.
Syntax
isi sync target view {<policy-name> | --target-path <path>}
Options
<policy-name>
Displays information about the specified policy.
--target-path <path>
Displays information about the policy targeting the specified directory.
Topics:
• isi tape delete
• isi tape list
• isi tape modify
• isi tape rescan
• isi tape view
Syntax
isi tape delete
[--name <string>]
[--all]
[--force | -f]
[--verbose | -v]
[--help | -h]
Required Privileges
ISI_PRIV_NDMP
Options
--name <string>
The name of the NDMP tape or media change device.
--all
Disconnects the cluster from all devices.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
Required Privileges
ISI_PRIV_NDMP
Options
--node <linteger>
Displays only devices that are attached to the node of the specified logical node number (LNN).
--tape
Displays only tape devices.
--mc
Displays only media changer devices.
--activepath
Displays only the active paths of a device.
--format {table | json | csv | list}
Displays devices in table, JSON, CSV, or list format.
{--no-header | -a}
Does not display headers in table or CSV format.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi tape modify --name <name>
[--new-name <string>]
[--close-device]
[--help | -h]
Required Privileges
ISI_PRIV_NDMP
Options
--name <name>
The current device name.
--new-name <string>
The new device name.
--close-device
Forces the device state to closed if the device is currently open. If an NDMP session unexpectedly
stops, a tape or media changer device may be left in an open state, which prevents the device from
being opened again.
{--help | -h}
Displays help for this command.
Syntax
Options
If no options are specified, scans all nodes and ports.
--node <lnn>
Scans only the node of the specified logical node number (LNN).
--port <integer>
Scans only the specified port. If you specify --node, scans only the specified port on the specified
node. If you do not specify --node, scans the specified port on all nodes.
--reconcile
Removes entries for devices or paths that have become inaccessible.
{--help | -h}
Displays help for this command.
Example
To scan the entire cluster for NDMP devices, and remove entries for devices and paths that have become inaccessible, run the
following command:
Syntax
isi tape view --name <name>
[--activepath]
[--format {list | json}]
Required Privileges
ISI_PRIV_NDMP
Options
<name>
The name of the tape or media changer device.
--activepath
Displays only the active paths of the device.
--format {list | json}
Displays devices in list or JSON format.
{--help | -h}
Topics:
• isi upgrade catalog clean
• isi upgrade catalog export
• isi upgrade catalog import
• isi upgrade catalog list
• isi upgrade catalog readme
• isi upgrade catalog remove
• isi upgrade catalog repair
• isi upgrade catalog verify
• isi upgrade cluster add-nodes
• isi upgrade cluster add-remaining-nodes
• isi upgrade cluster archive
• isi upgrade cluster assess
• isi upgrade cluster commit
• isi upgrade cluster drain
• isi upgrade cluster firmware
• isi upgrade cluster firmware start
• isi upgrade cluster from-version
• isi upgrade cluster nodes firmware
• isi upgrade cluster nodes list
• isi upgrade cluster nodes view
• isi upgrade cluster pause
• isi upgrade cluster resume
• isi upgrade cluster retry-last-action
• isi upgrade cluster rollback
• isi upgrade cluster reboot
• isi upgrade cluster settings
• isi upgrade cluster start
• isi upgrade cluster to-version
• isi upgrade cluster unblock
• isi upgrade cluster view
• isi upgrade patches abort
• isi upgrade patches install
• isi upgrade patches list
• isi upgrade patches uninstall
• isi upgrade patches view
Syntax
isi upgrade catalog clean
[{--force | -f}]
[{--help | -h}]
Options
{--force | -f}
Cleans up unused artifacts without asking for confirmation.
{--help | -h}
Displays help for this command.
Syntax
isi upgrade catalog export
[--id <str>]
[--file <path>]
[{--help|-h}]
Options
--file <path>
Displays the verified file to export from the catalog. Must be within /ifs.
--id <str>
Displays the associated hash of the artifact.
--help | -h
Displays help for this command.
Syntax
isi upgrade catalog import
[--file <path>]
[{--help|-h}]
Syntax
isi upgrade catalog list
[--reference <str>]
[--type <OneFS | NFW | DSP | Patch>]
[--version <str>]
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose |-v}]
[{--help | -h}]
Options
--reference <str>
Displays the OneFS component referencing this artifact.
--type <OneFS | NFW | DSP | Patch>
Displays the OneFS process type.
--version <str>
Displays the OneFS version of artifact.
{--limit | -l} <integer>
The number of upgrade catalogs to display.
--format {table | json | csv | list}
Displays upgrade catalogs in table, JSON, CSV or list format.
{--no-header | -a}
Does not display headers in CSV or table formats.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi upgrade catalog readme
[--file <path>]
[--id <str>]
[{--help | -h}]
Options
--file <path>
Displays the unverified file to import to the catalog.
--id <str>
Displays the associated hash of the artifact.
{--help | -h}
Displays help for this command.
Syntax
isi upgrade catalog remove
[--id <str>]
[{--force | -f}]
[{--help | -h}]
Options
--id <str>
Displays the associated hash of the artifact.
{--force | -f}
Removes the artifact and related metadata without asking for confirmation.
{--help | -h}
Displays help for this command.
Syntax
isi upgrade catalog repair
[{--force|-f}]
[{--help|-h}]
Options
--force | -f
Repairs the catalog database without asking for confirmation.
--help | -h
Displays help for this command.
Syntax
isi upgrade catalog verify
[--file <path>]
[--id <hash> | <all>]
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
--file <path>
Displays the unverified file to import to the catalog.
--id <hash> | <all>
Specifies the associated hash of the artifact. 'all' can also be used to select all entries in the catalog.
{--limit | -l} <integer>
The number of upgrade catalogs to display.
--format {table | json | csv | list}
Displays upgrade catalogs in table, JSON, CSV or list format.
{--no-header | -a}
Does not display headers in CSV or table formats.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi upgrade cluster add-nodes <nodes>
[--yes]
Options
<nodes>
List of comma-separated (1,3,7) or dash-separated (1-7) specified logical node numbers (LNNs) to mark
for upgrade.
--yes
Automatically answer yes at the prompt.
Syntax
isi upgrade cluster add-remaining-nodes
[--yes]
Options
--yes
Automatically answer yes at the prompt.
Syntax
isi upgrade cluster archive
[--clear]
Options
--clear
Syntax
isi upgrade cluster assess <action> {<install-image-path> | --install-image-id <string> }
Options
<action>
Specifies actions you can take when assessing an upgrade.
<install-image-path>
Specify absolute path of the upgrade install image. Must be within the/ifs directory.
<install-image-id>
Specify artifact ID of the upgrade install image. Must be a verified ID in the secure catalog.
Syntax
isi upgrade cluster commit
[--yes]
Options
--yes
Automatically answers yes at the upgrade commitment prompt.
Syntax
isi upgrade cluster drain <action>
[--timeout <<integer>>]
--timeout <integer>
Number of seconds for a command timeout.
Syntax
isi upgrade cluster firmware <action>
[--timeout <integer>]
Options
<action>
Specifies actions you can take against the firmware upgrade.
devices Lists all the nodes on the cluster and shows detailed status of the current
firmware for each node.
assess Runs upgrade checks without starting a firmware upgrade.
view Shows overview status of the current firmware upgrade activity.
start Starts upgrade processes.
NOTE: All upgrade processes take a long time to run. The return status of a command only relates
to the issuing of the command itself, not the successful completion of it.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command runs upgrade checks without starting the firmware upgrade.
Syntax
isi upgrade cluster firmware start
[--nodes-to-upgrade <integer_range_list>]
[--fw-pkg <path>]
[--include-device <string>]
[--exclude-device <string>]
[--include-type <string>]
[--exclude-type <string>]
[--no-burn]
[--no-verify]
[--no-reboot]
[--simultaneous | --rolling | --parallel]
[{--force | -f}]
Options
--nodes-to-upgrade <integer_range_list>
Lists comma-separated node LNNs to mark for upgrade or "all" for all the nodes.
--fw-pkg <path>
Specifies the absolute path of the firmware package to start a firmware upgrade. The file path must be
accessible in an /ifs directory. If the path is not specified, the framework looks for a package that is
persisted on the cluster.
--include-device <string>
Lists comma-separated devices to include in firmware upgrade.
--exclude-device <string>
Lists comma-separated devices to exclude in firmware upgrade.
--include-type <string>
Lists comma-separated device types to include in firmware upgrade.
--exclude-type <string>
Lists comma-separated device types to exclude in firmware upgrade.
--no-burn
Does not burn the firmware.
--no-verify
Does not verify the firmware upgrade of all components after an upgrade.
--no-reboot
Does not reboot the node after firmware upgrade.
--simultaneous
Applies firmware simultaneously to all selected nodes at the same time.
--rolling
Applies firmware non-disruptively by rolling to one node at a time.
--parallel
Applies firmware non-disruptively in parallel to multiple nodes at once.
--force | -f
Does not prompt you to confirm that you want to start the firmware upgrade process.
Syntax
isi upgrade cluster from-version
Example
To view information about the cluster version you are upgrading from, run the following command:
Syntax
isi upgrade cluster nodes firmware <action>
[--timeout <integer>]
Options
<action>
Specifies reporting actions you can take regarding node firmware updates.
devices Reports devices on the nodes which are supported in the installed firmware
package.
progress Reports, in list or view format, status information regarding the firmware upgrade.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command displays the status information about the firmware upgrade:
Syntax
isi upgrade cluster nodes list
Example
To list upgrade status for all nodes on the cluster, run the following command:
Syntax
isi upgrade cluster nodes view <lnn>
Options
<lnn>
The logical node number (LNN) of the node for which you want to view upgrade status.
Example
To view the upgrade status for a node with the LNN 1, run the following command:
Node LNN: 1
Node Upgrade State: committed
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: None
Node OS Version: 8.0.0.0
Syntax
isi upgrade cluster pause <action>
[--force-f]
Options
{--force | -f}
Does not prompt for confirmation to pause an upgrade.
Syntax
isi upgrade cluster resume <action>
[--force-f]
Options
{--force | -f}
Does not prompt for confirmation to resume an upgrade.
Syntax
isi upgrade cluster retry-last-action <nodes>
Options
<nodes>
A list of comma-separated (1,3,7) or dash-separated (1-7) logical node numbers to select. You can also
use all to select all the cluster's nodes at any given time.
--skip-optional
Skip the optional pre-upgrade checks.
Syntax
isi upgrade cluster rollback
[--yes]
Options
--yes
Automatically answer yes to the confirmation prompt.
Syntax
isi upgrade cluster reboot
[--nodes <integer_range_list>]
[--drain-timeout <duration>]
[--alert-timeout <duration>]
[{--force | -f}]
Options
--nodes <integer_range_list>
List of comma-specified (1,3,7...) or dash-specified (1-7) node logical node numbers (LNNs) to select. At
any given time during the reboot, you can also enter all to select all the cluster nodes.
--drain-timeout <duration>
Determines the duration that the process waits for SMB clients to disconnect from a node before
rebooting it. Value of '0' will wait indefinitely.
--alert-timeout <duration>
Determines the duration after which drain begins and an alert will be raised.
{--force | -f}
Does not prompt for confirmation of the reboot.
Syntax
isi upgrade cluster settings
Syntax
isi upgrade cluster start <install-image-path>
[--skip-optional]
[--simultaneous | --rolling | --parallel]
[--nodes <integer_range_list>]
[--patch-paths <string>]
[--drain-timeout <duration>]
[--alert-timeout <duration>]
[--fw-pkg <path>]
[--include-device <string>]
[--exclude-device <string>]
[--include-type <string>]
[--exclude-type <string>]
[--no-burn]
[{--force | -f}]
Options
<install-image-path>
The file path of the location of the upgrade install image. The file path must be accessible in a /ifs
directory or by an https:// URL.
--skip-optional
Skips the optional pre-upgrade checks.
--simultaneous
Starts a simultaneous upgrade.
--rolling
Starts a rolling upgrade.
--parallel
Starts a parallel upgrade.
--nodes <integer_range_list>
Lists comma-separated (1,3,7) or dash-separated (1-7) logical node numbers (LNNs) to select for
upgrade.
--patch-paths <string>
Determines comma specified absolute path(s) of one or more patches to be installed during upgrade.
--drain-timeout <duration>
Determines the duration that the process waits for SMB clients to disconnect from a node before
rebooting it. Value of '0' will wait indefinitely.
--alert-timeout <duration>
Determines the duration after drain begins that an alert will be raised.
--fw-pkg <path>
The absolute path of the firmware package to start a Combined OneFS and Firmware Upgrade. The file
path must be accessible in a /ifs directory.
--include-device <string>
Syntax
isi upgrade cluster to-version
Options
There are no options for this command.
Syntax
isi upgrade cluster unblock <action>
[--force-f]
Options
{--force | -f}
Does not prompt for confirmation to unblock an upgrade.
Syntax
isi upgrade cluster view
[{--interactive | -i}]
Options
{--interactive | -i}
Shows interactive auto-refreshing view of the upgrade status.
--by-domain
Aggregates nodes by failure domain.
--show-stalls
Shows possible upgrade stall reasons.
Syntax
isi upgrade patches abort
[--force]
Options
{--force | -f}
Skips the confirmation prompt for this command.
Syntax
isi upgrade patches install <patch>
[--simultaneous | --rolling | --parallel]
[{--force | -f}]
Options
<patch>
The file path location of the patch to install.
--simultaneous
Starts a simultaneous patch process.
--rolling
Starts a rolling patch process.
--parallel
Starts a parallel patch process.
{--force | -f}
Syntax
isi upgrade patches list
[--local]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--local
Lists patch information only on the local node.
{--limit | -l} <integer>
The number of upgrade patches to display.
--format {table | json | csv | list}
Displays upgrade patches in table, JSON, CSV or list format.
{--no-header | -a}
Does not display headers in CSV or table formats.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi upgrade patches uninstall <patch>
[--simultaneous | --rolling | --parallel]
[{--force | -f}
Options
<patch>
The name or ID of the patch to uninstall.
--simultaneous
Starts a simultaneous patch process.
--rolling
Starts a rolling patch process.
Syntax
isi upgrade patches view <patch>
[--local]
Options
<patch>
The name or ID of the patch to view.
--local
Shows patch information only for the local node.
Topics:
• isi version
isi version
Displays cluster version information.
Syntax
isi version
[--format {list | json}]
[--verbose
Options
--format {list | json}
Displays the cluster version information in list or JSON format.
{--verbose | -v}
Displays more detailed cluster version information.
Topics:
• isi worm cdate view
• isi worm create
• isi worm domains create
• isi worm domains list
• isi worm domains modify
• isi worm domains view
• isi worm files delete
• isi worm files view
Syntax
isi worm cdate view
Options
There are no options for this command.
Syntax
isi worm create <path>
Options
<path>
Designates the specified directory as a SmartLock directory. The specified directory must be empty.
Specify as a directory path.
Syntax
isi worm domains create <path>
[--compliance]
[--autocommit-offset <duration>]
[--override-date <timestamp>]
[{--privileged-delete {true | false}]
[--disable-privileged-delete]
[--default-retention {<duration> | forever | use_min
| use_max}]
[--min-retention {<duration> | forever}]
[--max-retention <duration>]
[--mkdir]
[--force]
[--verbose]
Options
<path>
Creates a SmartLock directory at the specified path.
Specify as a directory path.
{--compliance | -C}
Specifies the SmartLock directory as a SmartLock compliance directory. This option is valid only on
clusters running in SmartLock compliance mode.
{--autocommit-offset | -a} <duration>
Specifies an autocommit time period. After a file exists in a SmartLock directory without being modified
for the specified length of time, the file automatically committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To specify no autocommit time period, specify none. The default value is none.
{--override-date | -o} <timestamp>
Specifies an override retention date for the directory. Files committed to a WORM state are not released
from a WORM state until after the specified date, regardless of the maximum retention period for the
directory or whether a user specifies an earlier date to release a file from a WORM state.
Specify <timestamp> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
If you specify this option, you can never enable the privileged delete functionality for the directory.
If a file is then committed to a WORM state in the directory, you will not be able to delete the file
until the retention period has passed.
{--default-retention | -d} {<duration> | forever | use_min | use_max}
Specifies a default retention period. If a user does not explicitly assign a retention period expiration date,
the default retention period is assigned to the file when it is committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To permanently retain WORM committed files by default, specify forever. To assign the minimum
retention period as the default retention period, specify use_min. To assign the maximum retention
period as the default retention period, specify use_max.
{--min-retention | -m} {<duration> | forever}
Specifies a minimum retention period. Files are retained in a WORM state for at least the specified
amount of time.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi worm domains list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV),
or list format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of
storage space consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Syntax
isi worm domains modify <domain>
[--compliance]
[{--autocommit-offset <duration> | --clear-autocommit-offset}]
[{--override-date <timestamp> | --clear-override-date}]
[{--privileged-delete {true | false}]
[--disable-privileged-delete]
[{--default-retention {<duration> | forever | use_min
| use_max} | --clear-default-retention}]
[{--min-retention {<duration> | forever} | --clear-min-retention}]
[{--max-retention | -x} (<duration> | forever) | --clear-max-retention]
[{--exclude | -x} <string>]
[--set-pending-delete]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Options
<domain>
Modifies the specified SmartLock directory.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To specify no autocommit time period, specify none. The default value is none.
--clear-autocommit-offset
Removes the autocommit time period for the given SmartLock directory.
{--override-date | -o} <timestamp>
Specifies an override retention date for the directory. Files committed to a WORM state are not released
from a WORM state until after the specified date, regardless of the maximum retention period for the
directory or whether a user specifies an earlier date to release a file from a WORM state.
Specify <timestamp> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
--clear-override-date
Removes the override retention date for the given SmartLock directory.
{--privileged-delete | -p} {true | false}
Determines whether files in the directory can be deleted through the isi worm files delete
command. This option is available only for SmartLock enterprise directories.
The default value is false.
--disable-privileged-delete
Permanently prevents WORM committed files from being deleted from the SmartLock directory.
NOTE:
If you specify this option, you can never enable the privileged delete functionality for the SmartLock
directory. If a file is then committed to a WORM state in the directory, you will not be able to delete
the file until the retention period expiration date has passed.
{--default-retention | -d} {<duration> | forever | use_min | use_max}
Specifies a default retention period. If a user does not explicitly assign a retention period expiration date,
the default retention period is assigned to the file when it is committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
To permanently retain WORM committed files by default, specify forever. To assign the minimum
retention period as the default retention period, specify use_min. To assign the maximum retention
period as the default retention period, specify use_max.
--clear-default-retention
Removes the default retention period for the given SmartLock directory.
{--min-retention | -m} {<duration> | forever}
Specifies a minimum retention period. Files are retained in a WORM state for at least the specified
amount of time.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi worm domains view <domain>
Options
<domain>
Displays information about the specified SmartLock directory.
Specify as a directory path, ID, or LIN of a SmartLock directory.
Syntax
isi worm files delete <path>
[--force]
[--verbose]
Options
<path>
Deletes the specified file. The file must exist in a SmartLock enterprise directory with the privileged
delete functionality enabled.
Specify as a file path.
--force
Does not prompt you to confirm that you want to delete the file.
--verbose
Displays more detailed information.
Syntax
isi worm files view <path>
[--no-symlinks]
Options
<path>
Displays information about the specified file. The file must be committed to a WORM state.
Specify as a file path.
--no-symlinks
If <path> refers to a file, and the given file is a symbolic link, displays WORM information about the
symbolic link. If this option is not specified, and the file is a symbolic link, displays WORM information
about the file that the symbolic link refers to.
Topics:
• isi zone restrictions create
• isi zone restrictions delete
• isi zone restrictions list
• isi zone zones create
• isi zone zones delete
• isi zone zones list
• isi zone zones modify
• isi zone zones view
Syntax
isi zone restrictions create <zone> {<user> | --uid <integer>
| --group <string> | --gid <integer> | --sid <string>
| --wellknown <string>}
[--verbose]
Options
<zone>
Specifies an access zone by name.
<user>
Specifies a user by name.
--uid <integer>
Specifies a user by UID.
--group <string>
Specifies a group by name.
--gid <integer>
Specifies a group by GID.
--sid <string>
Specifies an object by user or group SID.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
{--verbose | -v}
Returns a success or fail message after running the command.
Syntax
isi zone restrictions delete <zone> {<user> | --uid <integer>
| --group <string> | --gid <integer> | --sid <string>
| --wellknown <string>}
[--force]
[--verbose]
Options
<zone>
Specifies an access zone by name.
<user>
Specifies a user by name.
--uid <integer>
Specifies a user by UID.
--group <string>
Specifies a group by name.
--gid <integer>
Specifies a group by GID.
--sid <string>
Specifies an object by user or group SID.
--wellknown <string>
Specifies an object by well-known SID.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Returns a success or fail message after running the command.
Syntax
isi zone restrictions list <zone>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<zone>
Examples
To display a list of restricted users for the built-in System zone, run the following command:
Syntax
isi zone zones create <name> <path>
[--map-untrusted <workgroup>]
[--auth-providers <provider-type>:<provider-name>]
[--netbios-name <string>]
[--user-mapping-rules <string>]
[--home-directory-umask <integer>]
[--skeleton-directory <string>]
[--cache-entry-expiry <duration>]
[--create-path]
[--force-overlap]
[--groupnet <groupnet>]
[--verbose]
Options
<name>
Specifies the name of the access zone.
<path>
Specifies the base directory path for the zone.
--map-untrusted <workgroup>
Maps untrusted domains to the specified NetBIOS workgroup during authentication.
--auth-providers <provider-type>:<provider-name>
Specifies one or more authentication providers, separated by commas, for authentication to the access
zone. Authentication providers are checked in the order specified. You must specify the name of the
authentication provider in the following format: <provider-type>:<provider-name>.
--netbios-name <string>
Specifies the NetBIOS name.
Syntax
isi zone zones delete <zone>
[--force]
[--verbose]
Options
<zone>
Specifies the name of the access zone to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi zone zones list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Examples
To view a list of all access zones in the cluster, run the following command:
Syntax
isi zone zones modify <zone>
[--name <string>]
[--path <path>]
[--map-untrusted <string>]
[--auth-providers <provider-type>:<provider-name>]
[--clear-auth-providers]
[--add-auth-providers <provider-type>:<provider-name>]
[--remove-auth-providers <provider-type>:<provider-name>]
[--netbios-name <string>]
[--user-mapping-rules <string>]
[--clear-user-mapping-rules]
[--add-user-mapping-rules <string>]
[--remove-user-mapping-rules <string>]
[--home-directory-umask <integer>]
[--skeleton-directory <string>]
[--cache-entry-expiry <duration>]
[--revert-cache-entry-expiry]
[--create-path]
[--force-overlap]
[--verbose]
Options
<zone>
Specifies the name of the access zone to modify.
--name <string>
Specifies a new name for the access zone. You cannot change the name of the built-in System access
zone.
Syntax
isi zone zones view <zone>
Options
<zone>
Specifies the name of the access zone to view.