OceanStor Dorado 6.1.x HyperLock Feature Guide
OceanStor Dorado 6.1.x HyperLock Feature Guide
6.1.x
Issue 06
Date 2023-10-31
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://e.huawei.com
Vulnerability
Huawei's regulations on product vulnerability management are subject to "Vul. Response Process". For
details about the policy, see the following website:https://www.huawei.com/en/psirt/vul-response-process
For enterprise customers who need to obtain vulnerability information, visit:https://
securitybulletin.huawei.com/enterprise/en/security-advisory
Purpose
This document describes the file system HyperLock feature of storage systems,
including its working principle, application scenarios, configuration process, and
reference information.
NOTE
HyperLock is the WORM feature developed by Huawei. This feature applies to storage
systems of 6.1.3 and later versions.
NOTICE
This document is updated periodically with the software version. The operations
described in this document use the latest version as an example. Note that the
supported functions and features vary according to the software version. The
content in this document is for reference only.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue
contains all the changes made in earlier issues.
Issue 06 (2023-10-31)
This issue is the sixth official release.
Issue 05 (2023-04-20)
This issue is the fifth official release.
Issue 04 (2022-11-15)
This issue is the fourth official release. The updates are as follows:
Updated the section "Configuring and Managing WORM Using CLI Commands".
Issue 03 (2022-08-25)
This issue is the third official release. The updates are as follows:
Updated the description in "Creating a WORM File System".
Issue 02 (2022-01-25)
This issue is the second official release. The updates are as follows:
Optimized descriptions about some operations.
Issue 01 (2021-12-30)
This issue is the first official release.
Contents
C Glossary................................................................................................................................... 99
D Acronyms and Abbreviations........................................................................................... 115
1 Feature Description
The Write Once Read Many (WORM) feature developed by Huawei is called
HyperLock. It protects the integrity, confidentiality, and accessibility of data,
meeting secure storage requirements.
1.1 Overview
1.2 License Requirements and Compatible Products
1.3 Working Principle
1.4 Impact and Restrictions
1.5 Application Scenarios
1.1 Overview
This section describes the background, definition, and benefits of the WORM
feature.
Background
With the development of technologies and society and explosive increase of
information, secure access and application of data are attached great importance.
As required by laws and regulations, important data such as case documents of
courts, medical records, and financial documents can only be read but cannot be
written within a specific period. Therefore, measures must be taken to prevent
such data from being tampered with. In the storage industry, WORM is the most
common method used to archive and back up data, ensure secure data access,
and prevent data tampering.
Definition
A file protected by WORM enters the read-only state immediately after data is
written to it. In read-only state, the file can be read, but cannot be deleted,
modified, or renamed. The WORM feature can prevent data from being tampered
with, meeting data security requirements of enterprises and organizations.
File systems with the WORM feature configured are called WORM file systems.
WORM can only be configured by administrators. There are two WORM modes:
NOTE
In 6.1.3 and later versions, WORM supports the regulatory compliance mode.
In 6.1.7 and later versions, WORM supports the enterprise compliance mode.
Benefits
Table 1-2 describes the benefits provided by the WORM feature for customers.
Benefit Description
Data tampering Archiving and protecting critical data from being tampered
proof with, the WORM feature helps enterprises and organizations
avoid legal risks in confidential file archiving and reduce
economic loss caused by information leak.
License Requirements
WORM is a value-added feature that requires a license.
NOTE
To obtain the license, contact your local Huawei representative office or Huawei authorized
distributor.
Specifications
The WORM specifications depend on the product model. For detailed
specifications, refer to the Specifications Query (https://
info.support.huawei.com/storage/spec/#/home).
Basic Concepts
● WORM compliance clock
To prevent users from changing protection periods of files by changing the
system time, storage systems maintain a WORM compliance clock. The
WORM compliance clock includes a global security compliance clock and a
WORM file system compliance clock.
WORM file Each WORM file system The system will automatically
system maintains a regulatory clock. use the global security
regulatory The protection periods of regulation clock to initialize
clock files are based on the the WORM file system
regulatory clock. compliance clock upon the
creation of a WORM file
system. You do not need to
manually initialize the
WORM file system
compliance clock.
The WORM file system compliance clock is calibrated by using the global
security compliance clock per hour. The calibration rules are as follows:
– If the time of the WORM file system compliance clock exceeds that of the
global security compliance clock, set the time value of the WORM file
system compliance clock to that of the global security compliance clock.
– If the time of the WORM file system compliance clock does not reach
that of the global security compliance clock and the time difference
between the two clocks is not larger than 138 seconds, set the time value
of the WORM file system compliance clock to that of the global security
compliance clock. If the time difference between the two clocks exceeds
138 seconds, add 138 seconds to the time value of the WORM file system
compliance clock.
● File states
There are four file states in a WORM file system, as described in Table 1-4.
Initial All newly created files are in the initial state. Files in the initial
state can be read, written, and modified by all users.
Expired Files in the expired state can be deleted and read and their
properties can be viewed. However, these files cannot be
modified or renamed..
Appending Data can be added to the end of files in the appending state
and these files cannot be deleted, truncated, or renamed.
● File signature
The signature is used to verify the file integrity. The file signature in a WORM
file system refers to the file fingerprint that is automatically calculated when
the file is entering the protection state. For example, if a disk of a WORM file
system malfunctions, you can verify file signatures to ensure that files in the
WORM file system are not damaged after the disk recovery. For details about
the operations, see 2.2.9 Verifying the File Signature.
● WORM properties of a file system
After the WORM feature is configured for a file system, the file system has
the WORM properties. The WORM properties apply to files in the WORM file
system. You can view the WORM properties to determine the lock time and
overdue time of a file. Table 1-5 lists WORM properties of a file system.
Property Description
Lockout Wait Indicates how long files will enter the locked state by
Time default after being modified. This parameter is valid only
when Automatic Lockout is enabled.
not changed as the file is accessed. The value of atime is calculated in the
following two types of scenarios:
– Automatic submission for protection
No matter whether you set the atime property or not: atime = WORM file
system compliance clock's value after files are modified + Lockout wait
time + Default retention period
– Manual submission for protection
▪ If atime is set and Current system clock < atime < Current value of
the WORM file system compliance clock + Minimum retention
period, atime = Current value of the WORM file system compliance
clock + Minimum retention period.
▪ If atime is set but atime > Current value of the WORM file system
compliance clock + Maximum retention period: atime = Current value
of the WORM file system compliance clock + Maximum retention
period
NOTE
For some Linux operating systems, atime set by touch -a -t time file is
regarded as illegal and is truncated by the system. You can run stat file to
check whether the value of atime is the same as the set value. If they are
not the same, the value is truncated by the system. Run chmod ugo-w file
to set the file to locked. atime = Current value of the WORM file system
compliance clock + Default retention period.
Working Principle
With the WORM technology, data can be written to files once only, and cannot be
rewritten, modified, deleted, or renamed. If a common file system is protected by
the WORM feature, files in the file system can be read only within the protection
period. After a WORM file system is created, you need to map it to application
servers using the NFS or CIFS protocol.
WORM enables files in the WORM file system to be shifted between initial state,
locked state, appending state, and expired state, preventing important data from
being incorrectly or maliciously tampered within a specified period. Figure 1-1
shows how a file shifts from one state to another.
1
Initial state Locked state Expired state
3
5
6
7
Appending
state
1. Initial to locked: You can shift a file from the initial state to the locked state
using the following methods:
– If the automatic lock mode is enabled, the file automatically enters the
locked state a specific period after a change.
– Manually set the file to the locked state. Before locking the file, you can
specify a protection period for the file or use the default protection
period.
2. Locked to locked: In the locked state, you can manually extend the protection
periods of files. Protection periods cannot be shortened.
3. Locked to expired: After the WORM file system compliance clock reaches the
file overdue time, files shift from the locked state to the expired state.
4. Expired to locked: You can extend the protection periods of files to shift them
from the expired state to the locked state.
5. Locked to appending: You can delete the read-only permission of files to shift
the files from the locked state to the appending state.
NOTE
● Only files of 0 bytes can shift from the locked state to the appending state.
● Files in the appending state are protected. When the protection period expires,
data can be added to the end of the files and the files can be deleted.
6. Appending to locked: You can manually set files in the appending state to the
locked state to ensure that files cannot be modified.
7. Expired to appending: You can manually set files in the expired state to the
appending state.
NOTE
Only files of 0 bytes can shift from the locked state to the appending state.
Users can save files to a WORM file system and set the WORM properties of the
files to the locked state based on service requirements. Figure 1-2 shows the read
and write permissions of files in the different states in a WORM file system.
Figure 1-2 Read and write permissions of WORM files in different states
Initial Readability
Locked
Appending
WORM file system The files cannot be
deleted, modified, or
File A renamed, but data
can be added to the
Application
end of the files.
server
File B
Read
File C
Expired
Write operation
Read operation
File status
Supported Standards
The WORM feature complies with the Securities and Exchange Commission (SEC)
Rule 17a-4(f) standard.
NOTE
SEC Rule 17a-4(f) is a regulation issued by the SEC in the U.S.A on February 12, 1997. This
regulation specifies data protection features that electronic storage devices must provide to
ensure the reliability of financial securities transaction data.
For example, a large number of litigation files are generated in courts. According
to laws and regulations, the protection periods of litigation files can be set to
permanent, long-term, and short-term based on the characteristics of the files.
Table 1-6 uses litigation files in Chinese courts as an example.
Three WORM file systems can be established to create three WORM file systems
with different file protection periods for the three types of litigation files.
● Permanent: A WORM file system is created for litigation files that are always
needed by the court. Litigation files stored in the file system can be
permanently protected, preventing the files from being accidentally or
maliciously tampered with.
● 60 years: A WORM file system is created for litigation files that are needed by
the court for a long time. Litigation files stored in the file system can be
protected for 60 years, during which litigation files can only be viewed, but
cannot be modified, deleted, or renamed.
● 30 years: A WORM file system is created for litigation files that are needed by
the court for a short time. Litigation files stored in the file system can be
protected for 30 years, during which litigation files can only be viewed, but
cannot be modified, deleted, or renamed.
Start
Create a WORM file When you create a WORM file system for the first time, you need to
system. initialize the global WORM regulatory clock of the storage system.
End
Context
● On the DeviceManager interface, WORM is displayed in Feature of
HyperLock.
● To use CIFS/NFS to share WORM file systems, check that the NAS
Foundation license is available.
● To configure the WORM feature for a vStore, check that the SmartMulti-
Tenant license is available.
Procedure
Step 1 Choose Settings > License Management.
Step 2 In the middle function pane, verify that HyperLock is displayed in the feature list.
NOTICE
● If no license file has been imported, import a license file by referring to the
initialization guide.
● If HyperLock is not displayed in the feature list, contact technical support
engineers.
----End
Prerequisites
Before creating a WORM file system, ensure that:
● The device is working correctly.
● The license file of the WORM feature is valid.
Context
When you create a WORM file system for the first time, the super administrator
must initialize the global WORM regulatory clock of the storage system. There are
two methods to initialize the global regulatory clock:
● Method 1: When creating a WORM file system on DeviceManager for the first
time, enable Global WORM Regulatory Clock to initialize the global
regulatory clock to the current system time and time zone. This section
describes the method.
● Method 2: Run the change system secure_compliance_clock date=?
command on the CLI to initialize the global regulatory clock. For details about
the command, visit Command/Event/Error Code Query.
In the preceding command, you can set the date field in either of the
following ways:
– Enter the time manually in the format year-month-day/
hour:minute:second.
– Use the string now to set the system time of the current device.
You can view the current device time using the Time field in the
command output of the show system general command.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 In the vStore drop-down list in the upper left corner, select the vStore for which
you want to create a file system.
Step 3 Click Create.
The Create File System page is displayed on the right.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
For some device models, you can click in the upper right corner of the page to enable
SmartGUI. SmartGUI mines users' historical operation data and builds a configuration
parameter recommendation model based on user profiles to recommend configuration
parameters for the block service and file service. After SmartGUI is enabled, the system
presets parameters based on recommendations when you create a file system. You can click
Modify in the upper right corner to modify the parameters or directly click OK to create a
file system.
Parameter Description
Parameter Description
NOTE
– If Native is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– You are advised to configure a default UNIX user for the CIFS
service in Services > File Service > Authentication Users >
User Mappings > Set Mapping Parameter. The UNIX user
must be an existing local authentication user, NIS domain
user, or LDAP domain user.
– You are advised to configure a default Windows user for the
NFS service in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter. The
Windows user must be an existing local authentication user
or AD domain user.
– Only 6.1.5 and later versions support the Native security
style.
● NTFS
Controls CIFS users' permissions with Windows NT ACLs.
NOTE
– If NTFS is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default Windows
user for the NFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default Windows user must be an existing
local authentication user or AD domain user.
● UNIX
Controls NFS users' permissions with UNIX mode bits or
NFSv4 ACLs.
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The UNIX user must be an existing local
authentication user, NIS domain user, or LDAP domain user.
– In this mode, the default UNIX permission of the file system
root directory is 755. To change the value, run the change
file_system general file_system_id=? unix_permissions=?
command. For details about the command, visit Command/
Event/Error Code Query.
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set to
Native.
– Only 6.1.5 and later versions support this parameter.
Step 5 Set the capacity and tuning information of the file system.
Table 2-2 describes the parameters.
Parameter Description
Capacity Alarm Alarm threshold of the file system capacity. An alarm will be
Threshold (%) generated when the threshold is reached.
NOTE
● Capacity Alarm Threshold (%) is hidden. To display hidden
parameters, select Advanced.
● Capacity threshold = File system capacity x (1 - Reserved
snapshot space ratio (%)) x Capacity alarm threshold (%)
● The alarm is cleared only when the used capacity of the file
system is smaller than Max {90% of the threshold capacity,
threshold capacity - 1 GB}.
Parameter Description
Auto Expansion When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is greater than this threshold, the storage
(%) system automatically triggers file system capacity
expansion.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion or Auto
expansion/reduction.
● The value of Auto Expansion Trigger Threshold (%) must be
greater than that of Auto Reduction Trigger Threshold (%).
● Only 6.1.5 and later versions support this parameter.
Auto Reduction When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is smaller than this threshold, the storage
(%) system automatically triggers space reclamation to reduce
the file system capacity.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion/reduction.
● Only 6.1.5 and later versions support this parameter.
Parameter Description
Application Type Application type of the file system. Preset application types
are provided for typical applications. In file service scenarios,
possible options are NAS_Default, NAS_Virtual_Machine,
NAS_Database, NAS_Large_File, Office_Automation,
NAS_Others, and NAS_EDA.
NOTE
● The Application Request Size and File System Distribution
Algorithm parameters are set for preset application types. The
value of Application Request Size is 16 KB for NAS_Default,
NAS_Virtual_Machine, Office_Automation, NAS_Others, and
NAS_EDA, 8 KB for NAS_Database, and 32 KB for
NAS_Large_File. If Application Type is set to NAS_Default,
NAS_Large_File, Office_Automation, NAS_Others, or
NAS_EDA, File System Distribution Algorithm is Directory
balance mode. In this mode, directories are evenly allocated to
each controller by quantity. If Application Type is set to
NAS_Virtual_Machine or NAS_Database, File System
Distribution Algorithm is Performance mode. In this mode,
directories are preferentially allocated to the controller to which
the shared IP address belongs, improving access performance of
directories and files.
● When SmartCompression and SmartDedupe licenses are
imported to the system, the preset application types also display
whether SmartCompression and SmartDedupe are enabled.
For details, see SmartDedupe and SmartCompression Feature
Guide for File of the desired product model and version.
● Application Type cannot be changed once being configured.
You are advised to set the value based on the service I/O model.
● To create an application type, run the create workload_type
general name=? io_size=? command. For details, visit
Command/Event/Error Code Query.
● You can also run the create file_system general or change
file_system general command to create or modify a file system
respectively. For details, visit Command/Event/Error Code
Query.
Parameter Description
Step 6 If a HyperMetro vStore pair has been created for the selected vStore, you need to
configure HyperMetro for the newly created file system.
Specify Remote Storage Pool for creating a remote file system. The system will
create a remote file system on the remote device of the HyperMetro vStore pair
and add the local and remote file systems to a HyperMetro pair.
For details about HyperMetro, see the HyperMetro Feature Guide for File of the
desired version.
Step 7 Configure shares for the file system.
● Set NFS shares for the file system.
a. Enable NFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The read/write permission of all clients is preset in the system, and
the default root permission of clients is root_squash. You can click
Modify on the right of Share to modify the share information.
● Set CIFS shares for the file system.
a. Enable CIFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the full control permission for everyone. You can
click Modify on the right of Share to modify the share information.
1. Enable Quota.
NOTE
The directory quota of a file system takes effect only for dtrees whose quota
function is enabled. In addition, the quota of each dtree is limited separately.
– User quota
User quota: limits the space usage or file quantity used by a single user.
i. Click Select.
The Select User page is displayed.
ii. Select the users for which you want to create a quota.
○ If you select All users, the quota limits the space usage or file
quantity of each user in the system.
○ If you select Specified users, click Add. On the Add User page
that is displayed, select the UNIX Users or Windows Users tab,
and select one or more desired users. Then click OK.
NOTE
If you set User Type to Local authentication user, select the desired
users in the list below.
If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
Parameter Description
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Parameter Description
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new
files cannot be added. Operations on existing files are
not affected.
[Value range]
1 to 2 billion
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the
system generates an alarm but new files can still be
added. After the hard quota is reached, new files cannot
be added.
[Value range]
1 to 2 billion
The value must be smaller than that of Hard Quota.
NOTE
– If you do not set the space quota or file quantity quota, the storage system only
collects statistics on but does not control the space usage or file quantity. To view
the statistics about used space quota and used file quantity quota, choose Services
> File Service > Quotas > Quota Reports, and select the desired file system.
– To modify a quota, click More on the right of the quota and choose Modify.
– To delete a quota, select the quota and click Delete above the list or click More on
the right of the quota.
– The parameters for creating a quota are preset. A quota is created for a file system
only after the file system has been created.
NOTE
Step 10 (Applicable to 6.1.6 and later versions) If an antivirus server has been configured
for the vStore you selected, you can configure the antivirus service for the file
system.
NOTE
You can choose Settings > File Service > Antivirus Service to check whether the antivirus
server has been configured. If you need to configure the antivirus server, see section
"Configuring Antivirus Servers" in the Security Configuration Guide specific to your product
model and version.
The antivirus server scans the file system based on the preset scan policy. After a
scan policy is configured for the file system, the system automatically creates a
scan task for the file system. You can choose Settings > File Service > Antivirus
Service to manage the task.
1. Enable On-Demand Scan and select an on-demand scan policy.
Select or deselect Scan Now as required. After Scan Now is selected, the
system immediately scans the file system based on the selected on-demand
scan policy. You must set the scan duration.
NOTE
Step 11 Select Advanced in the upper right corner and set the audit log items of the file
system. The system records audit logs of operations on the file system. The audit
log items include Create, Delete, Read, Write, Open, Close, Rename, List
folders, Obtain properties, Set properties, Obtain security properties, Set
security properties, Obtain extension properties, and Set extension properties.
NOTE
● To ensure that the selected audit log items take effect, choose Settings > File Service >
Audit Log to enable the audit log function.
● If too many audit logs are generated and the audit log collection speed is lower than
the audit log writing speed, the temporary buffer space may be insufficient, causing
service interruption risks. You are advised to properly configure the items to be audited.
For example, configure only Create, Delete, and Write for a file system.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Step 13 Set the WORM (Write Once Read Many) properties of the file system. The WORM
file system ensures that a file enters the protected state after being written. In this
case, the file cannot be modified, moved, or deleted, but can be read for multiple
times.
NOTE
The WORM properties are hidden. To display hidden parameters, select Advanced.
Parameter Description
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state. This parameter is displayed only when
Automatic Lockout is enabled.
[Value range]
1 minute to 10 years.
[Default value]
If Automatic Lockout is enabled, the default value is 2
hours.
WORM Audit Log After WORM Audit Log File System is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Compliance.
[Default value]
Disabled
Parameter Description
Global WORM Before creating a WORM file system for the first time, you
Regulatory Clock need to initialize the WORM regulatory clock. After this
parameter is enabled, the global security regulatory clock is
initialized to the current system time and time zone.
The WORM regulatory clock prevents modification to file
protection periods caused by system time tampering
attacks. The WORM regulatory clock includes a global
WORM regulatory clock and a file system WORM regulatory
clock. To initialize the WORM regulatory clock, you only
need to initialize the global WORM regulatory clock. The file
system WORM regulatory clock will be automatically
initialized using the global WORM regulatory clock when a
WORM file system is created.
NOTICE
● The global WORM regulatory clock cannot be modified after
being initialized. Before the setting, ensure that the system time
and time zone are correct.
● Only super administrators can initialize the global WORM
regulatory clock.
NOTE
After the task is created successfully, the Execution Result page is displayed. You can view
details about the current task on this page.
----End
Follow-up Procedure
● If automatic lockout is disabled for the WORM file system, you must manually
set files to enter the protection state. If automatic lockout is enabled for the
WORM file system, you can also manually set the files to enter the protection
state within the Lockout Wait Time (hours) after a modification. For details,
see 2.1.5 Setting a File to Enter the Protection State.
● If automatic deletion is disabled for the WORM file system, you must
manually delete files that have expired. For details, see 2.2.7 Manually
Deleting an Expired File from a WORM File System.
For operations on sharing file systems, see Basic Storage Service Configuration
Guide for File.
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Step 2 Set a file in the WORM file system to the locked state.
1. Right-click the file that you want to set to the locked state.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and select
Read-only. Then click Apply.
After the file enters the locked state, Accessed of the file indicates the
overdue time of the file, as shown in Figure 2-2.
NOTE
In Windows, you cannot set a protection period for a file. You can only use the default
protection period of the WORM file system, which is 70 years.
4. Click OK.
NOTE
If the size of the file is not 0 bytes, skip the following steps.
Step 3 (Optional) Shift the file whose size is 0 bytes from the locked state to the
appending state.
1. Right-click the desired file.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and
deselect Read-only. Then click Apply.
4. Click OK.
Step 5 (Optional) Set a file in the appending state to the locked state.
1. Right-click the desired file.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and select
Read-only. Then click Apply.
4. Click OK.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
Step 2 (Optional) Run the touch -a -t time file command to set the protection period of
a file.
● time indicates the overdue time of the file.
● file indicates the name of the file for which you want to set the overdue time.
NOTE
If you have not run the touch -a -t time file command to set the protection period of the
file, the protection period of the newly created file is the default protection period of the
WORM file system.
Step 3 Run the chmod ugo-w file command to set the file to the locked state.
file indicates the name of the file that you want to set to the locked state.
NOTE
If the size of the file is not 0 bytes, skip the following steps.
Step 4 (Optional) Run the chmod ugo+w file command to set the file of 0 bytes to the
appending state.
file indicates the name of the file that you want to set to the appending state.
Step 5 (Optional) Run the echo content >>file command to add contents that need to be
protected to the end of the file.
● content indicates the contents to be added.
● file indicates the name of the file to which you want to add contents.
Step 6 Run the cat file command to read the file.
file indicates the name of the file that you want to read.
Step 7 (Optional) Run the chmod ugo-w file command to set a file in the appending
state to the locked state.
file indicates the name of the file that you want to set to the locked state.
----End
Prerequisites
● The WORM compliance clock has been initialized.
● At least one WORM file system has been created in the storage system.
● You have the permission to view the WORM compliance clock.
Context
Only a super administrator or vStore WORM administrator can query the WORM
compliance clock.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 View the WORM compliance clock.
● Run the show system secure_compliance_clock command to view the
current global security compliance clock.
admin:/>show system secure_compliance_clock
Secure Compliance Clock : 2021-10-15/17:44:57 UTC+08:00
Expired Time : --
Worm Clock : 2021-10-15/17:53:28 UTC+08:00
Is Worm Audit Log Fs : No
Litigation Num :0
NOTE
----End
Prerequisites
● A WORM file system has been created.
● You have the permission to view the properties of the WORM file system.
Context
● On the file system management page, you can click to refresh file system
information.
● On the file system management page, you can click and select the file
system parameters you want to view.
● On the file system management page, you can click or next to a
parameter to change the display order of file systems.
● On the file system management page, you can click to export file system
information to your local PC.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Select a vStore from the vStore drop-down list in the upper left corner.
Step 3 In the function pane, view file system information about the vStore.
Parameter Description
Parameter Description
ID ID of a file system.
Data Protection Capacity used for data protection on the file system.
Available Amount of user data that can be written to the file system.
Parameter Description
Quota Status Quota status of a file system. The value can be:
● Disabled: The quota statistics function is disabled for
the file system. The system does not collect statistics on
the quota usage of the file system. In this case, hard
and soft quotas do not take effect.
● Initializing: The system is scanning the space usage or
file quantity in the file system.
● Enabled: The quota statistics function has been enabled
for the file system. The system collects statistics on the
space usage or file quantity used by the file system.
Security Style It is used to set the access control style of a file system in
multi-protocol mode.
NOTE
Only 6.1.5 and later versions support Mixed and Native.
● Mixed
Allows users of both CIFS and NFS clients to access and
control file systems. The last configured permissions
prevail.
● Native
Controls CIFS users' permissions with Windows NT ACLs
and NFS users' permissions with UNIX permissions
(UNIX mode bits, POSIX ACLs, and NFSv4 ACLs).
Windows NT ACLs and UNIX permissions will neither
affect nor synchronize with each other.
– For CIFS share access, Windows NT ACLs determine
whether Windows users have access permission.
NOTE
If Windows NT ACLs do not exist, UNIX mode bits
determine whether Windows users have access permission.
– For NFS share access, access permission of UNIX
users is determined by UNIX permissions.
● NTFS
Controls CIFS users' permissions with Windows NT
ACLs.
● UNIX
Controls NFS users' permissions with UNIX mode bits or
NFSv4 ACLs.
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file
or directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set
to Native.
– Only 6.1.5 and later versions support this parameter.
Step 4 (Optional) Click the name of a file system to view its summary, share, quota, and
protection information. If the WORM function is enabled for a file system, you can
click Advanced to view the WORM information of the file system.
NOTE
You can select Only show shares of the file system or Only show quotas of the file
system to filter the data. If you do not select these options, the system displays the data of
the file system and dtrees in the file system.
----End
Prerequisites
A WORM file system has been created.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Select the vStore to which the desired file system belongs from the vStore drop-
down list in the upper left corner.
Step 3 Click More on the right of the desired file system and select Modify.
The Modify File System page is displayed on the right.
NOTE
You can also click the name of the desired file system. In the upper right corner of the page
that is displayed, select Modify from the Operation drop-down list.
Capacity Alarm Alarm threshold of the file system capacity. An alarm will
Threshold (%) be generated when the threshold is reached.
NOTE
● Capacity Alarm Threshold (%) is hidden. To display hidden
parameters, select Advanced.
● Capacity threshold = File system capacity x (1 - Reserved
snapshot space ratio (%)) x Capacity alarm threshold (%)
● The alarm is cleared only when the used capacity of the file
system is smaller than Max {90% of the threshold capacity,
threshold capacity - 1 GB}.
Parameter Description
Parameter Description
Auto Expansion When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is greater than this threshold, the storage
(%) system automatically triggers file system capacity
expansion.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion or Auto
expansion/reduction.
● The value of Auto Expansion Trigger Threshold (%) must be
greater than that of Auto Reduction Trigger Threshold (%).
● Only 6.1.5 and later versions support this parameter.
Auto Reduction When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is smaller than this threshold, the storage
(%) system automatically triggers space reclamation to reduce
the file system capacity.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion/reduction.
● Only 6.1.5 and later versions support this parameter.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Parameter Description
Parameter Description
Parameter Description
NOTE
– If Native is selected, you are advised to enable user
mapping and set Mapping Mode to Support only user
mapping of this system in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter.
– You are advised to configure a default UNIX user for the
CIFS service in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter. The
UNIX user must be an existing local authentication user, NIS
domain user, or LDAP domain user.
– You are advised to configure a default Windows user for the
NFS service in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter. The
Windows user must be an existing local authentication user
or AD domain user.
– Only 6.1.5 and later versions support the Native security
style.
● NTFS
Controls CIFS users' permissions with Windows NT ACLs.
NOTE
– If NTFS is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default Windows
user for the NFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default Windows user must be an existing
local authentication user or AD domain user.
● UNIX
Controls NFS users' permissions with UNIX mode bits or
NFSv4 ACLs.
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The UNIX user must be an existing local
authentication user, NIS domain user, or LDAP domain user.
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file
or directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set
to Native.
– Only 6.1.5 and later versions support this parameter.
Step 5 Set the audit log items of the file system. The system records audit logs of
operations on the file system. The audit log items include Create, Delete, Read,
Write, Open, Close, Rename, List folders, Obtain properties, Set properties,
Obtain security properties, Set security properties, Obtain extension
properties, and Set extension properties.
NOTE
● To ensure that the selected audit log items take effect, choose Settings > File Service >
Audit Log to enable the audit log function.
● If too many audit logs are generated and the audit log collection speed is lower than
the audit log writing speed, the temporary buffer space may be insufficient, causing
service interruption risks. You are advised to properly configure the items to be audited.
For example, configure only Create, Delete, and Write for a file system.
Step 6 Set the WORM properties of the file system. The WORM file system ensures that a
file enters the protected state after being written. In this case, the file cannot be
modified, moved, or deleted, but can be read for multiple times.
NOTE
Due to the sensitivity of a WORM file system to data security, the following configuration
operations on file systems are restricted:
● Only read-only snapshots can be created for the WORM file system. The snapshot file
systems created for the WORM file system also have the WORM feature.
● When configuring the remote replication function:
– If Pair Creation is set to Manual, ensure that the WORM file system modes at
both ends are the same. Otherwise, the primary/secondary relationship cannot be
established.
– If Pair Creation is set to Automatic, ensure that the global WORM regulatory
clock has been initialized on the remote end.
– If the primary file system is a WORM audit log file system, primary/secondary
switchover and disabling protection for the secondary resource are not supported.
This parameter is available only when WORM is enabled for the file system.
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state.
[Value range]
1 minute to 10 years.
Parameter Description
WORM Audit Log After WORM Audit Log File System is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Compliance.
----End
Prerequisites
● Files in the WORM file system to be deleted are not in the protection state.
● You have the permission to delete the WORM file system.
● The WORM file system to be deleted has not been shared in NFS or CIFS
mode.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Select the vStore to which the desired file systems belong from the vStore drop-
down list in the upper left corner.
Step 3 Select one or more desired file systems and click Delete.
NOTE
----End
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Step 3 View the status of the file. Table 2-10 describes related parameters.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
Step 2 Run the stat file command to view the status of a file.
file indicates the name of the file whose status you want to view.
linux-11:/mnt/fs1 # stat demo
File: `demo'
Size: 12 Blocks: 8 IO Block: 4096 regular file
Device: 802h/2050dInode: 3760144 Links: 1
Access: (0444/-r--r--r--) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2020-10-10 06:00:00.000000000 +0800
Modify: 2014-11-29 11:57:10.000000000 +0800
Change: 2014-11-29 11:57:55.000000000 +0800
----End
Prerequisites
● Protection periods cannot be shortened. The protection period of a file after
accumulative extensions cannot be longer than the maximum protection
period.
● CIFS users can use a third-party tool (such as the Far Manager graphical tool)
to change atime to extend the protection period of locked, appended, or
expired files.
Procedure
Step 1 Access a WORM file system shared in NFS mode.
Step 2 Run the touch -a -t time file command to extend the protection period of a file.
● time indicates the overdue time of the file.
● file indicates the name of the file.
Step 3 Run the stat file command to query the extended protection period.
linux-11:/mnt/fs1 # touch -a -t 203010100600 demo
linux-11:/mnt/fs1 # stat demo
File: `demo'
Size: 12 Blocks: 8 IO Block: 4096 regular file
Device: 802h/2050dInode: 3760144 Links: 1
Access: (0444/-r--r--r--) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2030-10-10 06:00:00.000000000 +0800
Modify: 2014-11-29 11:57:10.000000000 +0800
Change: 2014-11-29 23:55:41.000000000 +0800
----End
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Step 2 Select the expired file that you want to delete.
1. Right-click the file that you want to delete.
2. Choose Delete from the shortcut menu that is displayed.
The Delete File dialog box is displayed.
Step 3 Confirm your operation.
Click OK.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
Step 2 Run the rm -f file command to delete an expired file.
file indicates the name of the expired file that you want to delete.
Step 3 Run the stat file command to check whether the expired file is deleted.
file indicates the name of the expired file that you have deleted.
linux-11:/mnt/fs1 # rm -f demo
linux-11:/mnt/fs1 # stat demo
stat: cannot stat `demo': No such file or directory
----End
Prerequisites
Before performing this operation, ensure that:
● You have created a WORM file system.
● You have the permission to perform this operation.
● A WORM audit log file system has been enabled for the current vStore.
Context
Only the super administrator or the vStore WORM administrator can create
litigation hold tasks.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 Query the list and details about litigation hold tasks in the WORM file system.
Run the show worm_file legal_hold file_system_id=? [ task_id=? ] command to
query the signature of the WORM file.
● file_system_id indicates the ID of the WORM file system. To obtain its value,
run the show file_system worm command without parameters.
● task_id indicates the ID of the litigation hold task.
Example:
Query the list of litigation hold tasks in the file system whose ID is 60.
admin:/>show worm_file legal_hold file_system_id=60
Task ID File System ID File System Name Litigation Name Operation Status Deal Ok File Num
Deal Fail File Num Path
------------ -------------- ---------------- --------------- --------- ------ ---------------- ------------------
-----
Query the details about the litigation hold task whose ID is 257698038272 in the
file system whose ID is 60.
admin:/>show worm_file legal_hold file_system_id=60 task_id=257698038272
Task ID : 257698038272
File System ID : 60
File System Name : worm_fs_1
Litigation Name : dddd
Operation : Set
Status :0
Deal Ok File Num : 0
Deal Fail File Num : 0
Path : /file
Status Details : No Error
Cancel a litigation hold task for the file system whose ID is 1, path is /, and
litigation name is litigation1.
admin:/>create worm_file legal_hold operation=unset litigation_name=litigation1 file_system_id=1 path=/
Command executed successfully.
NOTE
To delete a litigation hold task, run the delete worm_file legal_hold file_system_id=?
task_id=? command.
----End
Prerequisites
Before performing this operation, ensure that:
● You have created a WORM file system.
● You have the permission to perform this operation.
Context
● Only the super administrator or the vStore WORM administrator can verify
the file signature.
● After the WORM file is locked, a signature is automatically generated and
saved for signature query and verification. If a file is modified, the verification
fails. In case of no modification, if the file size is 0, a message is displayed
indicating that no fingerprints exist. If the file size is not 0, the verification is
successful.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 Query the file signature.
Run the show worm_file fingerprint file_system_id=? [task_id=?] command to
query the signature of the WORM file.
● file_system_id indicates the ID of the WORM file system where the WORM
file resides. To obtain its value, run the show file_system worm command
without parameters.
● task_id indicates the ID of the file signature task.
Example:
Query information about all file signature tasks whose file system ID is 1.
admin:/>show worm_file fingerprint file_system_id=1
Task ID File System ID File System Name Fingerprint Scope Algorithm Task Status Path
------- -------------- ---------------- ----------------- --------- ----------- ----
6553600 1 fs_worm0000 Data And Metadata SHA-256 Finish /123
6553792 1 fs_worm0000 Data And Metadata SHA-256 Finish /456
Query information about the file signature task whose file system ID is 1 and task
ID is 6553600.
admin:/>show worm_file fingerprint file_system_id=1 task_id=6553600
Task ID : 6553600
File System ID :1
File System Name : fs_worm0000
Fingerprint Scope : Data And Metadata
Algorithm : SHA-256
Task Status : Finish
Data Fingerprint : a15d44de70edc791acc2e3547f831852c29a0c2a2fe27280b2cbc9db214b4b9a
Metadata Fingerprint : 4aa16040547b73f66250983bad6b0973f76ac652e071931ba6f4e172bf0c2f60
Start Time : 2021-08-21/09:18:37 UTC+08:00
Finish Time : 2021-08-21/09:18:37 UTC+08:00
NOTE
NOTE
● If the file to be verified does not have a signature and the file size is 0, a message is
displayed indicating that the file is empty. If the file size is not 0, the verification is
successful.
● To stop a file signature task, run the delete worm_file fingerprint file_system_id=?
task_id=? command.
----End
A vStore administrator can only manage owning vStores and other configuration
operations can only be performed by the system administrator in system view.
Before creating a WORM file system, ensure that the following conditions are met:
Prerequisites
Before creating a WORM file system, ensure that:
Procedure
Step 1 Choose Services > File Service > File Systems.
NOTE
The screenshot is for reference only and the actual displayed information may vary.
Parameter Description
Parameter Description
NOTE
– If UNIX is selected, you are advised to enable user mapping
and set Mapping Mode to Support only user mapping of
this system in Services > File Service > Authentication
Users > User Mappings > Set Mapping Parameter.
– In addition, you are advised to configure a default UNIX user
for the CIFS service in Services > File Service >
Authentication Users > User Mappings > Set Mapping
Parameter. The default UNIX user must be an existing local
authentication user or NIS/LDAP domain user.
– In this mode, the default UNIX permission of the file system
root directory is 755. To change the value, run the change
file_system general file_system_id=? unix_permissions=?
command. For details about the command, visit Command/
Event/Error Code Query.
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
● Mandatory Lock is recommended if clients using
different protocols simultaneously access the same file or
directory.
● Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
– This parameter is available only when Security Style is set to
Native.
– Only 6.1.5 and later versions support this parameter.
Step 4 Set the capacity and tuning information of the file system.
Table 3-2 describes the parameters.
Capacity Alarm Alarm threshold of the file system capacity. An alarm will be
Threshold (%) generated when the threshold is reached.
NOTE
● Capacity Alarm Threshold (%) is hidden. To display hidden
parameters, click Advanced.
● Capacity threshold = File system capacity x (1 – Reserved
snapshot space ratio (%)) x Capacity alarm threshold (%)
● The alarm is cleared only when the used capacity of the file
system is smaller than 90% of the capacity threshold or the
capacity threshold minus 1 GB (whichever is larger).
Parameter Description
Auto Expansion When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is greater than this threshold, the storage
(%) system automatically triggers file system capacity
expansion.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion or Auto
expansion/reduction.
● The value of Auto Expansion Trigger Threshold (%) must be
greater than that of Auto Reduction Trigger Threshold (%).
● Only 6.1.5 and later versions support this parameter.
Auto Reduction When the ratio of the used capacity to the total capacity of
Trigger Threshold a file system is smaller than this threshold, the storage
(%) system automatically triggers space reclamation to reduce
the file system capacity.
NOTE
● This parameter is displayed only when Capacity Auto-
negotiation Policy is set to Auto expansion/reduction.
● Only 6.1.5 and later versions support this parameter.
Parameter Description
Application Type Application type of the file system. Preset application types
are provided for typical applications. In file service scenarios,
possible options are NAS_Default, NAS_Virtual_Machine,
NAS_Database, NAS_Large_File, Office_Automation, and
NAS_EDA.
NOTE
● The Application Request Size and File System Distribution
Algorithm parameters are set for preset application types. The
value of Application Request Size is 16 KB for NAS_Default,
NAS_Virtual_Machine, Office_Automation, and NAS_EDA, 8
KB for NAS_Database, and 32 KB for NAS_Large_File. If
Application Type is set to NAS_Default, NAS_Large_File,
Office_Automation, or NAS_EDA, File System Distribution
Algorithm is Directory balance mode. In this mode, directories
are evenly allocated to each controller by quantity. If
Application Type is set to NAS_Virtual_Machine or
NAS_Database, File System Distribution Algorithm is
Performance mode. In this mode, directories are preferentially
allocated to the controller to which the shared IP address
belongs, improving access performance of directories and files.
● When SmartCompression and SmartDedupe licenses are
imported to the system, the preset application types also display
whether SmartCompression and SmartDedupe are enabled. For
details, see SmartDedupe and SmartCompression Feature Guide
for File of the desired product model and version.
● Application Type cannot be changed once being configured.
You are advised to set the value based on the service I/O model.
● To create an application type, run the create workload_type
general name=? io_size=? command. For details, visit
Command/Event/Error Code Query.
● You can also run the create file_system general or change
file_system general command to create or modify a file system
respectively. For details, visit Command/Event/Error Code
Query.
Step 5 If a HyperMetro vStore pair has been created for the vStore, you need to configure
a HyperMetro pair for the newly created file system.
Specify Remote Storage Pool for creating a remote file system. The system will
create a remote file system on the remote device of the HyperMetro vStore pair
and add the local and remote file systems to a HyperMetro pair.
For details about HyperMetro, see the HyperMetro Feature Guide for File of the
desired version.
Step 6 Configure shares for the file system.
● Set NFS shares for the file system.
a. Enable NFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the read and write permissions of all clients. You
can click Modify on the right of Share to modify the share
information.
● Set CIFS shares for the file system.
a. Enable CIFS.
b. Set Create From. Possible values are Template or New.
▪ Template
Select a share template from the drop-down list box. The system
presets the description and permission of the created share based on
the selected template. You can click Modify on the right of Share to
modify the share information.
▪ New
The system presets the full control permission for everyone. You can
click Modify on the right of Share to modify the share information.
Step 7 Set a quota for the file system.
NOTE
1. Enable Quota.
NOTE
– Directory quota
The directory quota of a file system limits the space usage or file quantity
used by all dtrees in the file system.
NOTE
The directory quota of a file system takes effect only for dtrees whose quota
function is enabled. In addition, the quota of each dtree is limited separately.
– User quota
User quota: limits the space usage or file quantity used by a single user.
i. Click Select.
The Select User page is displayed.
ii. Select the users for which you want to create a quota.
○ If you select All users, the quota limits the space usage or file
quantity of each user in the system.
○ If you select Specified users, click Add. On the Add User page
that is displayed, select the UNIX Users or Windows Users tab,
and select one or more desired users. Then click OK.
NOTE
If you set User Type to Local authentication user, select the desired
users in the list below.
If you set User Type to LDAP domain user, NIS domain user, or AD
domain user, enter the user names in the Name text box.
To remove added users, click Remove on the right of a desired user, or
select one or more desired users and click Remove.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
○ If you select All user groups, the quota limits the space usage
or file quantity of each user group in the system.
○ If you select Specified user groups, the quota limits the space
usage or file quantity of each specified user group. To add a user
group, click Add. On the Add User Group page that is displayed,
select a user group type and select the desired user groups. Then
click OK.
NOTE
Hard Quota Space hard quota. If the quota is reached, the system
immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be larger than that of Soft Quota.
Soft Quota Space soft quota. If the quota is reached, the system
generates an alarm but still allows writes. After the hard
quota is reached, the system immediately forbids writes.
[Value range]
1 KB to 256 PB
The value must be smaller than that of Hard Quota.
Parameter Description
Hard Quota File quantity hard quota. If the quota is reached, new
files cannot be added. Operations on existing files are
not affected.
[Value range]
1 file to 2 billion files
The value must be larger than that of Soft Quota.
Soft Quota File quantity soft quota. If the quota is reached, the
system generates an alarm but new files can still be
added. After the hard quota is reached, new files cannot
be added.
[Value range]
1 file to 2 billion files
The value must be smaller than that of Hard Quota.
NOTE
– If you do not set the space quota or file quantity quota, the storage system only
collects statistics on but does not control the space usage or file quantity. To view
the statistics about used space quota and used file quantity quota, choose Services
> File Service > Quotas > Quota Reports, and select the desired file system.
– To modify a quota, click More on the right of the quota and select Modify.
– To delete a quota, select the quota and click Delete above the list or click More on
the right of the quota.
– The parameters for creating a quota are preset. A quota is created for a file system
only after the file system has been created.
NOTE
Step 9 Select Advanced in the upper right corner and set the audit log items of the file
system. The system records audit logs of operations on the file system. The audit
log items include Create, Delete, Read, Write, Open, Close, Rename, List
folders, Obtain properties, Set properties, Obtain security properties, Set
security properties, Obtain extension properties, and Set extension properties.
NOTE
To ensure that the selected audit log items take effect, choose Settings > File Service >
Audit Log to enable the audit log function.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Step 11 Set the Write Once Read Many (WORM) properties of the file system. The WORM
file system ensures that a file enters the protected state after being written. In this
case, the file cannot be modified, moved, or deleted, but can be read for multiple
times.
NOTE
The WORM properties are hidden. To display hidden parameters, click Advanced.
Parameter Description
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state. This parameter is displayed only when
Automatic Lockout is enabled.
[Value range]
1 minute to 10 years.
[Default value]
If Automatic Lockout is enabled, the default value is 2
hours.
WORM Audit Log After the WORM audit log file system is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Regulatory
compliance.
[Default value]
Disabled
NOTE
After the task is created successfully, the Execution Result page is displayed. You can view
details about the current task on this page.
----End
Follow-up Procedure
● If automatic lockout is disabled for the WORM file system, you must manually
set files to enter the protection state. If automatic lockout is enabled for the
WORM file system, you can also manually set the files to enter the protection
state within the Lockout Wait Time (hours) after a modification. For details,
see 3.1.4 Setting a File to Enter the Protection State.
● If automatic deletion is disabled for the WORM file system, you must
manually delete files that have expired. For details, see 3.2.7 Manually
Deleting an Expired File from a WORM File System.
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Step 2 Set a file in the WORM file system to the locked state.
1. Right-click the file that you want to set to the locked state.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and select
Read-only. Then click Apply.
After the file enters the locked state, Accessed of the file indicates the
overdue time of the file, as shown in Figure 3-1.
NOTE
In Windows, you cannot set a protection period for a file. You can only use the default
protection period of the WORM file system, which is 70 years.
4. Click OK.
NOTE
If the size of the file is not 0 bytes, skip the following steps.
Step 3 (Optional) Shift the file whose size is 0 bytes from the locked state to the
appending state.
1. Right-click the desired file.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and
deselect Read-only. Then click Apply.
4. Click OK.
Step 5 (Optional) Set a file in the appending state to the locked state.
1. Right-click the desired file.
The shortcut menu is displayed.
2. Choose Properties from the shortcut menu that is displayed.
The Properties dialog box is displayed.
3. In the Properties dialog box that is displayed, click the General tab and select
Read-only. Then click Apply.
4. Click OK.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
Step 2 (Optional) Run the touch -a -t time file command to set the protection period of
a file.
● time indicates the overdue time of the file.
● file indicates the name of the file for which you want to set the overdue time.
NOTE
If you have not run the touch -a -t time file command to set the protection period of the
file, the protection period of the newly created file is the default protection period of the
WORM file system.
Step 3 Run the chmod ugo-w file command to set the file to the locked state.
file indicates the name of the file that you want to set to the locked state.
NOTE
If the size of the file is not 0 bytes, skip the following steps.
Step 4 (Optional) Run the chmod ugo+w file command to set the file of 0 bytes to the
appending state.
file indicates the name of the file that you want to set to the appending state.
Step 5 (Optional) Run the echo content >>file command to add contents that need to be
protected to the end of the file.
● content indicates the contents to be added.
● file indicates the name of the file to which you want to add contents.
file indicates the name of the file that you want to read.
Step 7 (Optional) Run the chmod ugo-w file command to set a file in the appending
state to the locked state.
file indicates the name of the file that you want to set to the locked state.
----End
Prerequisites
● The WORM compliance clock has been initialized.
● At least one WORM file system has been created in the storage system.
● You have the permission to view the WORM compliance clock.
Context
Only a super administrator or vStore WORM administrator can query the WORM
compliance clock.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 View the WORM compliance clock.
● Run the show system secure_compliance_clock command to view the
current global security compliance clock.
admin:/>show system secure_compliance_clock
Secure Compliance Clock : 2021-10-15/17:44:57 UTC+08:00
● Run the show file_system worm file_system_id=? command to view the
current WORM file system compliance clock.
admin:/>show file_system worm file_system_id=2
ID :2
Name : testfs2
Capacity : 100.000GB
Type : Thin
Worm Type : Compliance
Auto Lock : No
Auto Del : No
Max Protect Period : 70 Year(s)
Min Protect Period : 3 Year(s)
Default Protect Period : 70 Year(s)
Auto Lock Time : 2 Hour(s)
Expired Time : --
Worm Clock : 2021-10-15/17:53:28 UTC+08:00
Is Worm Audit Log Fs : No
Litigation Num :0
NOTE
----End
Prerequisites
● A WORM file system has been created.
● You have the permission to view the properties of the WORM file system.
Context
● On the file system management page, you can click to refresh file system
information.
● On the file system management page, you can click and select the file
system parameters you want to view.
● On the file system management page, you can click or next to a
parameter to change the display order of file systems.
● On the file system management page, you can click to export file system
information to your local PC.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 In the function pane, view file system information about the vStore.
Parameter Description
ID ID of a file system.
Data Protection Capacity used for data protection on the file system.
Available Amount of user data that can be written to the file system.
Parameter Description
Security Style Used to set the access control style of a file system in
multi-protocol mode.
Step 3 (Optional) Click the name of a file system to view its summary, share, quota, and
protection information. If the WORM function is enabled for a file system, you can
click Advanced to view the WORM information of the file system.
NOTE
You can select Only show shares of the file system or Only show quotas of the file
system to filter the data. If you do not select these options, the system displays the data of
the file system and dtrees in the file system.
----End
Prerequisites
A WORM file system has been created.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Click More on the right of the desired file system and select Modify.
The Modify File System page is displayed on the right.
NOTE
You can also click the name of the desired file system. In the upper right corner of the page
that is displayed, click Modify from the Operation drop-down list.
Capacity Alarm Alarm threshold of the file system capacity. An alarm will
Threshold (%) be generated when the threshold is reached.
Atime Update Indicates the Atime update frequency. The options can be
Frequency Hourly and Daily.
Parameter Description
Parameter Description
NAS Lock Policy NAS Lock Policy includes Mandatory Lock and Advisory
Lock.
Mandatory Lock is recommended if clients using different
protocols simultaneously access the same file or directory.
Advisory Lock is recommended if high read and write
performance is required and clients using different
protocols do not access the same file or directory
simultaneously.
NOTE
This parameter is available only when Security Style is set to
Native.
Step 4 Set the WORM properties of the file system. The WORM file system ensures that a
file enters the protected state after being written. In this case, the file cannot be
modified, moved, or deleted, but can be read for multiple times.
NOTE
Due to the sensitivity of a WORM file system to data security, the following configuration
operations on file systems are restricted:
● Only read-only snapshots can be created for the WORM file system. The snapshot file
systems created for the WORM file system also have the WORM feature.
● When configured the remote replication function:
– If Pair Creation is set to Manual, ensure that the WORM file system modes at
both ends are the same. Otherwise, the primary/secondary relationship cannot be
established.
– If Pair Creation is set to Automatic, ensure that the global WORM regulatory
clock has been initialized on the remote end.
– If the primary file system is a WORM audit log file system, primary/secondary
switchover and disabling protection for the secondary resource are not supported.
This parameter is available only when WORM is enabled for the file system.
Parameter Description
Lockout Wait Indicates the wait time before a file automatically enters the
Time locked state.
[Value range]
1 minute to 10 years.
Parameter Description
WORM Audit Log After the WORM audit log file system is enabled, the system
File System records operation logs of the WORM file system, including
Add a litigation, Remove a litigation, and privileged
deletion of Enterprise WORM file systems.
NOTE
This parameter is available only when Mode is set to Regulatory
compliance.
----End
Prerequisites
● Files in the WORM file system to be deleted are not in the protection state.
● You have the permission to delete the WORM file system.
● The WORM file system to be deleted has not been shared in NFS or CIFS
mode.
Procedure
Step 1 Choose Services > File Service > File Systems.
Step 2 Select one or more desired file systems and click Delete.
NOTE
----End
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Step 3 View the status of the file. Table 3-10 describes related parameters.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
Step 2 Run the stat file command to view the status of a file.
file indicates the name of the file whose status you want to view.
linux-11:/mnt/fs1 # stat demo
File: `demo'
Size: 12 Blocks: 8 IO Block: 4096 regular file
Device: 802h/2050dInode: 3760144 Links: 1
Access: (0444/-r--r--r--) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2020-10-10 06:00:00.000000000 +0800
Modify: 2014-11-29 11:57:10.000000000 +0800
Change: 2014-11-29 11:57:55.000000000 +0800
----End
Prerequisites
● Protection periods cannot be shortened. The protection period of a file after
accumulative extensions cannot be longer than the maximum protection
period.
● CIFS users can use a third-party tool (such as the Far Manager graphical tool)
to change atime to extend the protection period of locked, appended, or
expired files.
Procedure
Step 1 Access a WORM file system shared in NFS mode.
Step 2 Run the touch -a -t time file command to extend the protection period of a file.
● time indicates the overdue time of the file.
● file indicates the name of the file.
Step 3 Run the stat file command to query the extended protection period.
linux-11:/mnt/fs1 # touch -a -t 203010100600 demo
linux-11:/mnt/fs1 # stat demo
File: `demo'
Size: 12 Blocks: 8 IO Block: 4096 regular file
Device: 802h/2050dInode: 3760144 Links: 1
Access: (0444/-r--r--r--) Uid: ( 0/ root) Gid: ( 0/ root)
Access: 2030-10-10 06:00:00.000000000 +0800
Modify: 2014-11-29 11:57:10.000000000 +0800
Change: 2014-11-29 23:55:41.000000000 +0800
----End
Windows-based Client
Step 1 Access a WORM file system shared in CIFS mode.
Click OK.
----End
Linux-based Client
Step 1 Access a WORM file system shared in NFS mode.
----End
Prerequisites
Before performing this operation, ensure that:
● You have created a WORM file system.
● You have the permission to perform this operation.
● A WORM audit log file system has been enabled for the current vStore.
Context
Only the super administrator or the vStore WORM administrator can create
litigation hold tasks.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 Query the list and details about litigation hold tasks in the WORM file system.
Run the show worm_file legal_hold file_system_id=? [ task_id=? ] command to
query the signature of the WORM file.
● file_system_id indicates the ID of the WORM file system. To obtain its value,
run the show file_system worm command without parameters.
● task_id indicates the ID of the litigation hold task.
Example:
Query the list of litigation hold tasks in the file system whose ID is 60.
admin:/>show worm_file legal_hold file_system_id=60
Task ID File System ID File System Name Litigation Name Operation Status Deal Ok File Num
Deal Fail File Num Path
------------ -------------- ---------------- --------------- --------- ------ ---------------- ------------------
-----
257698038272 60 worm_fs_1 dddd Set 0 0 0 /
file
257698038017 60 worm_fs_1 fffff Set 0 0
0 /ddd
Query the details about the litigation hold task whose ID is 257698038272 in the
file system whose ID is 60.
admin:/>show worm_file legal_hold file_system_id=60 task_id=257698038272
Task ID : 257698038272
File System ID : 60
File System Name : worm_fs_1
Litigation Name : dddd
Operation : Set
Status :0
Deal Ok File Num : 0
Deal Fail File Num : 0
Path : /file
Status Details : No Error
● operation indicates the operation for a litigation hold task. Its values are as
follows:
– set: Set a litigation hold task.
– unset: Cancel a litigation hold task.
● litigation_name indicates the litigation name. The value contains 1 to 255
ASCII characters, including digits, letters, underscores (_), hyphens (-), and
periods (.).
● file_system_id indicates the ID of the WORM file system. To obtain its value,
run the show file_system worm command without parameters.
● path indicates the file or path for setting or canceling the litigation hold task.
Example:
Set a litigation hold task for the file system whose ID is 1 and file path is /. The
litigation name is litigation1.
admin:/>create worm_file legal_hold operation=set litigation_name=litigation1 file_system_id=1
path=/
Command executed successfully.
Cancel a litigation hold task for the file system whose ID is 1, path is /, and
litigation name is litigation1.
admin:/>create worm_file legal_hold operation=unset litigation_name=litigation1 file_system_id=1 path=/
Command executed successfully.
NOTE
To delete a litigation hold task, run the delete worm_file legal_hold file_system_id=?
task_id=? command.
----End
Prerequisites
Before performing this operation, ensure that:
● You have created a WORM file system.
● You have the permission to perform this operation.
Context
● Only the super administrator or the vStore WORM administrator can verify
the file signature.
● After the WORM file is locked, a signature is automatically generated and
saved for signature query and verification. If a file is modified, the verification
fails. In case of no modification, if the file size is 0, a message is displayed
indicating that no fingerprints exist. If the file size is not 0, the verification is
successful.
Procedure
Step 1 Log in to the CLI of the storage system.
Step 2 Query the file signature.
Run the show worm_file fingerprint file_system_id=? [task_id=?] command to
query the signature of the WORM file.
● file_system_id indicates the ID of the WORM file system where the WORM
file resides. To obtain its value, run the show file_system worm command
without parameters.
● task_id indicates the ID of the file signature task.
Example:
Query information about all file signature tasks whose file system ID is 1.
admin:/>show worm_file fingerprint file_system_id=1
Task ID File System ID File System Name Fingerprint Scope Algorithm Task Status Path
------- -------------- ---------------- ----------------- --------- ----------- ----
6553600 1 fs_worm0000 Data And Metadata SHA-256 Finish /123
6553792 1 fs_worm0000 Data And Metadata SHA-256 Finish /456
Query information about the file signature task whose file system ID is 1 and task
ID is 6553600.
admin:/>show worm_file fingerprint file_system_id=1 task_id=6553600
Task ID : 6553600
File System ID :1
File System Name : fs_worm0000
Fingerprint Scope : Data And Metadata
Algorithm : SHA-256
Task Status : Finish
Data Fingerprint : a15d44de70edc791acc2e3547f831852c29a0c2a2fe27280b2cbc9db214b4b9a
Metadata Fingerprint : 4aa16040547b73f66250983bad6b0973f76ac652e071931ba6f4e172bf0c2f60
Start Time : 2021-08-21/09:18:37 UTC+08:00
Finish Time : 2021-08-21/09:18:37 UTC+08:00
NOTE
NOTE
● If the file to be verified does not have a signature and the file size is 0, a message is
displayed indicating that the file is empty. If the file size is not 0, the verification is
successful.
● To stop a file signature task, run the delete worm_file fingerprint file_system_id=?
task_id=? command.
----End
This section provides some CLI commands for configuring and managing WORM
file systems.
NOTE
C Glossary
A
AC power module The module that transfers the external AC power
supply into the power supply for internal use.
Application server A service processing node (a computer device) on the
network. Application programs of data services run
on the application server.
Asynchronous remote A kind of remote replication. When the data at the
replication primary site is updated, the data does not need to be
updated synchronously at the mirroring site to finish
the update. In this way, performance is not reduced
due to data mirroring.
Air baffle It optimizes the ventilation channels and improves
the heat dissipation capability of the system.
Audit log guarantee A mode for recording audit logs. This mode
mode preferentially ensures that the audit log function is
normal and no audit log is missing.
Audit log non- A mode for recording audit logs. In this mode,
guarantee mode services are running properly. Audit logs may be
missing.
B
Backup A collection of data stored on (usually removable)
non-volatile storage media for purposes of recovery
in case the original copy of data is lost or becomes
inaccessible; also called a backup copy. To be useful
for recovery, a backup must be made by copying the
source data image when it is in a consistent state.
The act of creating a backup.
C
Cache hit ratio The ratio of the number of cache hits to the number
of all I/Os during a read task, usually expressed as a
percentage.
Captive screw Specially designed to lock into place on a parent
board or motherboard, allowing for easy installation
and removal of attached pieces without release of
the screw.
Challenge Handshake A password-based authentication protocol that uses a
Authentication challenge to verify that a user has access rights to a
Protocol system. A hash of the supplied password with the
challenge is sent for comparison so the cleartext
password is never sent over the connection.
Compliance mode A protection mode of WORM. In compliance mode,
files within their protection period cannot be changed
or deleted by either the file user or by the system
administrator. Files with expired protection periods
can be deleted but not changed by the file user or
the system administrator.
Controller The control logic in a disk or tape that performs
command decoding and execution, host data transfer,
serialization and deserialization of data, error
detection and correction, and overall management of
device operations. The control logic in a storage
subsystem that performs command transformation
and routing, aggregation (RAID, mirroring, striping, or
other), high-level error recovery, and performance
optimization for multiple storage devices.
Controller enclosure An enclosure that accommodates controllers and
provides storage services. It is the core component of
a storage system and generally consists of
components, such as controllers, power supplies, and
fans.
Copying A pair state. The state indicates that the source LUN
data is being synchronized to the target LUN.
Container root Space used to store the metadata for running
directory container images and container instances.
Container image An image is a special file system, which provides the
programs, libraries, resources, and configuration files
required for running containers. It also contains
configuration parameters, for example, for
anonymous disks, environment variables, and users.
The image does not contain dynamic data, and its
content will not be modified after construction.
Containerized An image can start multiple containers, and an
application application can contain one or a group of containers.
D
Data compression The process of encoding data to reduce its size. Lossy
compression (i.e., compression using a technique in
which a portion of the original information is lost) is
acceptable for some forms of data (e.g., digital
images) in some applications, but for most IT
applications, lossless compression (i.e., compression
using a technique that preserves the entire content of
the original data, and from which the original data
can be reconstructed exactly) is required.
Data flow A process that involves processing data extracted
from the source system. These processes include:
filtering, integration, calculation, and summary,
finding and solving data inconsistency, and deleting
invalid data so that the processed data meets the
requirements of the destination system for the input
data.
Data migration A movement of data or information between
information systems, formats, or media. Migration is
performed for reasons such as possible decay of
storage media, obsolete hardware or software
(including obsolete data formats), changing
performance requirements, the need for cost
efficiencies etc.
Data source A system, database (database user; database
instance), or file that can make BOs persistent.
Deduplication The replacement of multiple copies of data — at
variable levels of granularity — with references to a
shared copy in order to save storage space and/or
bandwidth.
Dirty data Data that is stored temporarily on the cache and has
not been written onto disks.
E
eDevLUN Logical storage array space created by a third-party
storage array.
Expansion module A component used for expansion.
Expansion Connects a storage system to more disk enclosures
through connection cables, expanding the capacity of
the storage system.
F
Field replaceable unit A unit or component of a system that is designed to
be replaced in the field, i.e., without returning the
system to a factory or repair depot. Field replaceable
units may either be customer-replaceable or their
replacement may require trained service personnel.
Firmware Low-level software for booting and operating an
intelligent device. Firmware generally resides in read-
only memory (ROM) on the device.
Flash Translation Layer Flash Translation Layer (FTL) organizes and manages
host data, enables host data to be allocated to NAND
flash chips of SSDs in an orderly manner, maintains
the mapping relationship between logical block
addresses (LBAs) and physical block addresses
(PBAs), and implements garbage collection, wear
leveling, and bad block management.
Front-end port The port that connects the controller enclosure to the
service side and transfers service data. Front-end port
types are Fibre Channel and iSCSI.
Front-end interconnect On a storage device, all controllers share the front-
I/O module (FIM) end interface modules.
G
Garbage collection The process of reclaiming resources that are no
longer in use. Garbage collection has uses in many
aspects of computing and storage. For example, in
flash storage, background garbage collection can
improve write performance by reducing the need to
perform whole block erasures prior to a write.
Gateway A device that receives data via one protocol and
transmits it via another.
H
Hard disk tray The tray that bears the hard disk.
Heartbeat Heartbeat supports node communication, fault
diagnosis, and event triggering. Heartbeats are
protocols that require no acknowledgement. They are
transmitted between two devices. The device can
judge the validity status of the peer device.
Hit ratio The ratio of directly accessed I/Os from the cache to
all I/Os.
Hot swap The substitution of a replacement unit (RU) in a
system for a defective unit, where the substitution
can be performed while the system is performing its
normal functioning normally. Hot swaps are physical
operations typically performed by humans.
HyperMetro A value-added service of storage systems.
HyperMetro means two datasets (on two storage
systems) can provide storage services as one dataset
to achieve load balancing among applications and
failover without service interruption.
HyperMetro domain A HyperMetro configuration object generally; made
up of two storage arrays and one quorum server.
HyperMetro services can be created on a HyperMetro
domain.
I
In-band management The management control information of the network
and the carrier service information of the user
network are transferred through the same logical
channel. In-band management enables users to
manage storage arrays through commands.
Management commands are sent through service
channels, such as I/O write and read channels. The
advantages of in-band management include high
speed, stable transfer, and no additional
management network ports required.
Initiator The system component that originates an I/O
command over an I/O interconnect. The endpoint
that originates a SCSI I/O command sequence. I/O
adapters, network interface cards, and intelligent I/O
interconnect control ASICs are typical initiators.
L
Load balance A method of adjusting the system, application
components, and data to averagely distribute the
applied I/Os or computing requests to physical
resources of the system.
Logical unit The addressable entity within a SCSI target that
executes I/O commands.
Logical unit number The SCSI identifier of a logical unit within a target.
Industry shorthand, when phrased as "LUN", for the
logical unit indicated by the logical unit number.
LUN formatting The process of writing 0 bits in the data area of the
logical drive and generating related parity bits so that
the logical drive can be in the ready state.
LUN mapping A storage system maps LUNs to application servers
so that application servers can access storage
resources.
LUN migration A method for the LUN data to migrate between
different physical storage spaces while ensuring data
integrity and uninterrupted operation of host
services.
LUN snapshot A type of snapshot created for a LUN. This snapshot
is both readable and writable and is mainly used to
provide a snapshot LUN from point-in-time LUN
data.
M
Maintenance terminal A computer connected through a serial port or
management network port. It maintains the storage
system.
Management interface The module that integrates one or more
module management network ports.
Management network An entity that provides means to transmit and
process network management information.
Management network The network port on the controller enclosure
port connected to the maintenance terminal. It is provided
for the remote maintenance terminal. Its IP address
can be modified with the change of the customer's
environment.
N
NVM Express A host controller interface with a register interface
and command set designed for PCI Express-based
SSDs.
NVMe SSD A solid state disk (SSD) with a non-volatile memory
express (NVMe) interface. Compared with other
SSDs, such SSDs can deliver higher performance and
shorter latency.
O
Out-of-band A management mode used during out-of-band
management networking. The management and control
information of the network and the bearer service
information of the user network are transmitted
through different logical channels.
P
Power failure When an external power failure occurs, the AC PEM
protection depends on the battery for power supply. This
ensures the integrity of the dirty data in the cache.
Pre-copy When the system monitors a failing member disk in a
RAID group, the system copies the data from the disk
to a hot spare disk in advance.
Palm-sized NVMe SSD A palm-sized NVMe SSD is a type of NVMe SSD of
which the dimensions (H x W x D) are 160 mm x 79.8
mm x 9.5 mm (neither 3.5-inch nor 2.5-inch).
Q
Quorum server A server that can provide arbitration services for
clusters or HyperMetro to prevent the resource access
conflicts of multiple application servers.
Quorum Server Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the quorum server decides which
site wins the arbitration.
R
RAID level The application of different redundancy types to a
logical drive. A RAID level improves the fault
tolerance or performance of the logical drive but
reduces the available capacity of the logical drive.
You must specify a RAID level for each logical drive.
Ransomware file When launching attacks, ransomware usually
interception generates encrypted files with special file name
extensions. In light of this, the system intercepts the
write to files with specific file name extensions to
block the extortion from known ransomware and
protect file systems in the storage system.
Real-time ransomware Ransomware has similar I/O behavior characteristics.
detection By analyzing file I/O behavior characteristics, the
system quickly filters out abnormal files and
performs deep content analysis on the abnormal files
to detect files attacked by ransomware. Then, secure
snapshots are created for file systems where files
have been attacked, and alarms are reported to
notify the data protection administrator, limiting the
impact of ransomware and reducing losses.
S
Script A parameterized list of primitive I/O interconnect
operations intended to be executed in sequence.
Often used with respect to ports, most of which are
able to execute scripts of I/O commands
autonomously (without policy processor assistance).
A sequence of instructions intended to be parsed and
carried out by a command line interpreter or other
scripting language. Perl, VBScript, JavaScript and Tcl
are all scripting languages.
Serial port An input/output location (channel) that sends and
receives data (one bit at a time) to and from the CPU
of a computer or a communications device. Serial
ports are used for serial data communication and as
interfaces for some peripheral devices, such as mouse
devices and printers.
Service data The user and/or network information required for the
normal functioning of services.
Service network port The network port that is used to store services.
Simple network An IETF protocol for monitoring and managing
management protocol systems and devices in a network. The data being
monitored and managed is defined by an MIB. The
functions supported by the protocol are the request
and retrieval of data, the setting or writing of data,
and traps that signal the occurrence of events.
Single point of failure One component or path in a system, the failure of
which would make the system inoperable.
Slot A position defined by an upper guide rail and the
corresponding lower guide rail in a frame. A slot
houses a board.
Small computer system A collection of ANSI standards and proposed
interface standards that define I/O interconnects primarily
intended for connecting storage subsystems or
devices to hosts through host bus adapters. Originally
intended primarily for use with small (desktop and
desk-side workstation) computers, SCSI has been
extended to serve most computing needs, and is
arguably the most widely implemented I/O
interconnect in use today.
Snapshot A point in time copy of a defined collection of data.
Clones and snapshots are full copies. Depending on
the system, snapshots may be of files, LUNs, file
systems, or any other type of container supported by
the system.
Snapshot copy A copy of a snapshot LUN.
Source LUN The LUN where the original data is located.
Static Priority Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the preferred site always wins the
arbitration.
Storage system An integrated system that consists of the following
parts: controller, storage array, host bus adapter,
physical connection between storage units, and all
control software.
Storage unit An abstract definition of backup storage media for
storing backup data. The storage unit is connected to
the actual storage media used to back up data.
T
Target The endpoint that receives a SCSI I/O command
sequence.
Target LUN The LUN on which target data resides.
Thin LUN A logic disk that can be accessed by hosts. It
dynamically allocates storage resources from the thin
pool according to the actual capacity requirements of
users.
Topology The logical layout of the components of a computer
system or network and their interconnections.
Topology deals with questions of what components
are directly connected to other components from the
standpoint of being able to communicate. It does not
deal with questions of physical location of
components or interconnecting cables. The
communication infrastructure that provides Fibre
Channel communication among a set of PN_Ports
(e.g., a Fabric, an Arbitrated Loop, or a combination
of the two).
U
User interface The space where users interact with a machine.
U-shaped bracket It is an optional structural part like letter "U". It is
located between the mounting ear of a chassis and
the mounting bar of a cabinet or bay and is used to
adjust the locations of the chassis and mounting bar
of the cabinet or bay.
W
Wear leveling A set of algorithms utilized by a flash controller to
distribute writes and erases across the cells in a flash
device. Cells in flash devices have a limited ability to
survive write cycles. The purpose of wear leveling is
to delay cell wear out and prolong the useful life of
the overall flash device.
Write amplification Increase in the number of write operations by the
device beyond the number of write operations
requested by hosts.
Write amplification The ratio of the number of write operations on the
factor device to the number of write operations requested
by the host.
Write back A caching technology in which the completion of a
write request is signaled as soon as the data is in the
cache. Actual writing to non-volatile media occurs at
a later time. Write back includes inherent risks: an
application will take action predicated on the write
completion signal, and a system failure before the
data is written to non-volatile media will cause
media contents to be inconsistent with that
subsequent action. For these reasons, sufficient write
back implementations include mechanisms to
preserve cache contents across system failures
(including power failures) and a flushed cache at
system restart time.
Write Once Read Many A type of storage, designed for fixed content, that
preserves what is written to it in an immutable
fashion. Optical disks are an example of WORM
storage.
Write through A caching technology in which the completion of a
write request is not signaled until data is safely
stored on non-volatile media. Write performance
equipped with the write through technology is
approximately that of a non-cached system. However,
if the written data is also held in a cache, subsequent
read performance may be dramatically improved.
Z
Zone A collection of Fibre Channel N_Ports and/or
NL_Ports (i.e., device ports) that are permitted to
communicate with each other via the fabric. Any two
N_Ports and/or NL_Ports that are not members of at
least one common zone are not permitted to
communicate via the fabric. Zone membership may
be specified by: 1) port location on a switch, (i.e.,
Domain_ID and port number); or, 2) the device's
N_Port_Name; or, 3) the device's address identifier;
or, 4) the device's Node_Name. Well-known
addresses are implicitly included in every zone.
AD Active Directory
DN Distinguished Name
FC Fibre Channel
IP Internet Protocol