Jump To Close Expand all Collapse all Table of contents Storage Administration Guide 1. Overview Expand section "1. Overview" Collapse section "1. Overview" 1.1. What's New in Red Hat Enterprise Linux 6 I. File Systems Expand section "I. File Systems" Collapse section "I. File Systems" 2. File System Structure and Maintenance Expand section "2. File System Structure and Maintenance" Collapse section "2. File System Structure and Maintenance" 2.1. Overview of Filesystem Hierarchy Standard (FHS) Expand section "2.1. Overview of Filesystem Hierarchy Standard (FHS)" Collapse section "2.1. Overview of Filesystem Hierarchy Standard (FHS)" 2.1.1. FHS Organization Expand section "2.1.1. FHS Organization" Collapse section "2.1.1. FHS Organization" 2.1.1.1. Gathering File System Information 2.1.1.2. The /boot/ Directory 2.1.1.3. The /dev/ Directory 2.1.1.4. The /etc/ Directory 2.1.1.5. The /lib/ Directory 2.1.1.6. The /media/ Directory 2.1.1.7. The /mnt/ Directory 2.1.1.8. The /opt/ Directory 2.1.1.9. The /proc/ Directory 2.1.1.10. The /sbin/ Directory 2.1.1.11. The /srv/ Directory 2.1.1.12. The /sys/ Directory 2.1.1.13. The /usr/ Directory 2.1.1.14. The /var/ Directory 2.2. Special Red Hat Enterprise Linux File Locations 2.3. The /proc Virtual File System 2.4. Discard unused blocks 3. Encrypted File System Expand section "3. Encrypted File System" Collapse section "3. Encrypted File System" 3.1. Mounting a File System as Encrypted 3.2. Additional Information 4. Btrfs 5. The Ext3 File System Expand section "5. The Ext3 File System" Collapse section "5. The Ext3 File System" 5.1. Creating an Ext3 File System 5.2. Converting to an Ext3 File System 5.3. Reverting to an Ext2 File System 6. The Ext4 File System Expand section "6. The Ext4 File System" Collapse section "6. The Ext4 File System" 6.1. Creating an Ext4 File System 6.2. Mounting an Ext4 File System 6.3. Resizing an Ext4 File System 6.4. Backup ext2/3/4 File Systems 6.5. Restore an ext2/3/4 File System 6.6. Other Ext4 File System Utilities 7. Global File System 2 8. The XFS File System Expand section "8. The XFS File System" Collapse section "8. The XFS File System" 8.1. Creating an XFS File System 8.2. Mounting an XFS File System 8.3. XFS Quota Management 8.4. Increasing the Size of an XFS File System 8.5. Repairing an XFS File System 8.6. Suspending an XFS File System 8.7. Backup and Restoration of XFS File Systems 8.8. Other XFS File System Utilities 9. Network File System (NFS) Expand section "9. Network File System (NFS)" Collapse section "9. Network File System (NFS)" 9.1. How NFS Works Expand section "9.1. How NFS Works" Collapse section "9.1. How NFS Works" 9.1.1. Required Services 9.2. pNFS 9.3. NFS Client Configuration Expand section "9.3. NFS Client Configuration" Collapse section "9.3. NFS Client Configuration" 9.3.1. Mounting NFS File Systems using /etc/fstab 9.4. autofs Expand section "9.4. autofs" Collapse section "9.4. autofs" 9.4.1. Improvements in autofs Version 5 over Version 4 9.4.2. autofs Configuration 9.4.3. Overriding or Augmenting Site Configuration Files 9.4.4. Using LDAP to Store Automounter Maps 9.5. Common NFS Mount Options 9.6. Starting and Stopping NFS 9.7. NFS Server Configuration Expand section "9.7. NFS Server Configuration" Collapse section "9.7. NFS Server Configuration" 9.7.1. The /etc/exports Configuration File 9.7.2. The exportfs Command Expand section "9.7.2. The exportfs Command" Collapse section "9.7.2. The exportfs Command" 9.7.2.1. Using exportfs with NFSv4 9.7.3. Running NFS Behind a Firewall Expand section "9.7.3. Running NFS Behind a Firewall" Collapse section "9.7.3. Running NFS Behind a Firewall" 9.7.3.1. Discovering NFS exports 9.7.4. Hostname Formats 9.7.5. NFS over RDMA 9.8. Securing NFS Expand section "9.8. Securing NFS" Collapse section "9.8. Securing NFS" 9.8.1. NFS Security with AUTH_SYS and export controls 9.8.2. NFS security with AUTH_GSS Expand section "9.8.2. NFS security with AUTH_GSS" Collapse section "9.8.2. NFS security with AUTH_GSS" 9.8.2.1. NFS security with NFSv4 9.8.3. File Permissions 9.9. NFS and rpcbind Expand section "9.9. NFS and rpcbind" Collapse section "9.9. NFS and rpcbind" 9.9.1. Troubleshooting NFS and rpcbind 9.10. References 10. FS-Cache Expand section "10. FS-Cache" Collapse section "10. FS-Cache" 10.1. Performance Guarantee 10.2. Setting Up a Cache 10.3. Using the Cache With NFS Expand section "10.3. Using the Cache With NFS" Collapse section "10.3. Using the Cache With NFS" 10.3.1. Cache Sharing 10.3.2. Cache Limitations With NFS 10.4. Setting Cache Cull Limits 10.5. Statistical Information 10.6. References II. Storage Administration Expand section "II. Storage Administration" Collapse section "II. Storage Administration" 11. Storage Considerations During Installation Expand section "11. Storage Considerations During Installation" Collapse section "11. Storage Considerations During Installation" 11.1. Updates to Storage Configuration During Installation 11.2. Overview of Supported File Systems 11.3. Special Considerations 12. File System Check Expand section "12. File System Check" Collapse section "12. File System Check" 12.1. Best Practices for fsck 12.2. Filesystem-Specific Information for fsck Expand section "12.2. Filesystem-Specific Information for fsck" Collapse section "12.2. Filesystem-Specific Information for fsck" 12.2.1. ext2, ext3, and ext4 12.2.2. XFS 12.2.3. Btrfs 13. Partitions Expand section "13. Partitions" Collapse section "13. Partitions" 13.1. Viewing the Partition Table 13.2. Creating a Partition Expand section "13.2. Creating a Partition" Collapse section "13.2. Creating a Partition" 13.2.1. Making the Partition 13.2.2. Formatting and Labeling the Partition 13.2.3. Add to /etc/fstab 13.3. Removing a Partition 13.4. Resizing a Partition 14. LVM (Logical Volume Manager) Expand section "14. LVM (Logical Volume Manager)" Collapse section "14. LVM (Logical Volume Manager)" 14.1. What is LVM2? 14.2. Using system-config-lvm Expand section "14.2. Using system-config-lvm" Collapse section "14.2. Using system-config-lvm" 14.2.1. Utilizing Uninitialized Entities 14.2.2. Adding Unallocated Volumes to a Volume Group 14.2.3. Migrating Extents 14.2.4. Adding a New Hard Disk Using LVM 14.2.5. Adding a New Volume Group 14.2.6. Extending a Volume Group 14.2.7. Editing a Logical Volume 14.3. LVM References 15. Swap Space Expand section "15. Swap Space" Collapse section "15. Swap Space" 15.1. Adding Swap Space Expand section "15.1. Adding Swap Space" Collapse section "15.1. Adding Swap Space" 15.1.1. Extending Swap on an LVM2 Logical Volume 15.1.2. Creating an LVM2 Logical Volume for Swap 15.1.3. Creating a Swap File 15.2. Removing Swap Space Expand section "15.2. Removing Swap Space" Collapse section "15.2. Removing Swap Space" 15.2.1. Reducing Swap on an LVM2 Logical Volume 15.2.2. Removing an LVM2 Logical Volume for Swap 15.2.3. Removing a Swap File 15.3. Moving Swap Space 16. Disk Quotas Expand section "16. Disk Quotas" Collapse section "16. Disk Quotas" 16.1. Configuring Disk Quotas Expand section "16.1. Configuring Disk Quotas" Collapse section "16.1. Configuring Disk Quotas" 16.1.1. Enabling Quotas 16.1.2. Remounting the File Systems 16.1.3. Creating the Quota Database Files 16.1.4. Assigning Quotas per User 16.1.5. Assigning Quotas per Group 16.1.6. Setting the Grace Period for Soft Limits 16.2. Managing Disk Quotas Expand section "16.2. Managing Disk Quotas" Collapse section "16.2. Managing Disk Quotas" 16.2.1. Enabling and Disabling 16.2.2. Reporting on Disk Quotas 16.2.3. Keeping Quotas Accurate 16.3. Disk Quota References 17. Redundant Array of Independent Disks (RAID) Expand section "17. Redundant Array of Independent Disks (RAID)" Collapse section "17. Redundant Array of Independent Disks (RAID)" 17.1. RAID Types 17.2. RAID Levels and Linear Support 17.3. Linux RAID Subsystems 17.4. RAID Support in the Installer 17.5. Configuring RAID Sets 17.6. Advanced RAID Device Creation 18. Using the mount Command Expand section "18. Using the mount Command" Collapse section "18. Using the mount Command" 18.1. Listing Currently Mounted File Systems Expand section "18.1. Listing Currently Mounted File Systems" Collapse section "18.1. Listing Currently Mounted File Systems" 18.1.1. Specifying the File System Type 18.2. Mounting a File System Expand section "18.2. Mounting a File System" Collapse section "18.2. Mounting a File System" 18.2.1. Specifying the File System Type 18.2.2. Specifying the Mount Options 18.2.3. Sharing Mounts 18.2.4. Moving a Mount Point 18.3. Unmounting a File System 18.4. mount Command References Expand section "18.4. mount Command References" Collapse section "18.4. mount Command References" 18.4.1. Manual Page Documentation 18.4.2. Useful Websites 19. The volume_key function Expand section "19. The volume_key function" Collapse section "19. The volume_key function" 19.1. Commands 19.2. Using volume_key as an individual user 19.3. Using volume_key in a larger organization Expand section "19.3. Using volume_key in a larger organization" Collapse section "19.3. Using volume_key in a larger organization" 19.3.1. Preparation for saving encryption keys 19.3.2. Saving encryption keys 19.3.3. Restoring access to a volume 19.3.4. Setting up emergency passphrases 19.4. volume_key References 20. Access Control Lists Expand section "20. Access Control Lists" Collapse section "20. Access Control Lists" 20.1. Mounting File Systems Expand section "20.1. Mounting File Systems" Collapse section "20.1. Mounting File Systems" 20.1.1. NFS 20.2. Setting Access ACLs 20.3. Setting Default ACLs 20.4. Retrieving ACLs 20.5. Archiving File Systems With ACLs 20.6. Compatibility with Older Systems 20.7. ACL References 21. Solid-State Disk Deployment Guidelines Expand section "21. Solid-State Disk Deployment Guidelines" Collapse section "21. Solid-State Disk Deployment Guidelines" 21.1. Deployment Considerations 21.2. Tuning Considerations 22. Write Barriers Expand section "22. Write Barriers" Collapse section "22. Write Barriers" 22.1. Importance of Write Barriers 22.2. Enabling/Disabling Write Barriers 22.3. Write Barrier Considerations 23. Storage I/O Alignment and Size Expand section "23. Storage I/O Alignment and Size" Collapse section "23. Storage I/O Alignment and Size" 23.1. Parameters for Storage Access 23.2. Userspace Access 23.3. Standards 23.4. Stacking I/O Parameters 23.5. Logical Volume Manager 23.6. Partition and File System Tools 24. Setting Up A Remote Diskless System Expand section "24. Setting Up A Remote Diskless System" Collapse section "24. Setting Up A Remote Diskless System" 24.1. Configuring a tftp Service for Diskless Clients 24.2. Configuring DHCP for Diskless Clients 24.3. Configuring an Exported File System for Diskless Clients 25. Device Mapper Multipathing and Virtual Storage Expand section "25. Device Mapper Multipathing and Virtual Storage" Collapse section "25. Device Mapper Multipathing and Virtual Storage" 25.1. Virtual Storage 25.2. DM-Multipath III. Online Storage Expand section "III. Online Storage" Collapse section "III. Online Storage" 26. Fibre Channel Expand section "26. Fibre Channel" Collapse section "26. Fibre Channel" 26.1. Fibre Channel API 26.2. Native Fibre Channel Drivers and Capabilities 27. Set up an iSCSI Target and Initiator Expand section "27. Set up an iSCSI Target and Initiator" Collapse section "27. Set up an iSCSI Target and Initiator" 27.1. iSCSI Target Creation 27.2. iSCSI Initiator Creation 28. Persistent Naming Expand section "28. Persistent Naming" Collapse section "28. Persistent Naming" 28.1. WWID 28.2. UUID and Other Persistent Identifiers 29. Removing a Storage Device 30. Removing a Path to a Storage Device 31. Adding a Storage Device or Path 32. Configuring a Fibre-Channel Over Ethernet Interface Expand section "32. Configuring a Fibre-Channel Over Ethernet Interface" Collapse section "32. Configuring a Fibre-Channel Over Ethernet Interface" 32.1. Fibre-Channel over Ethernet (FCoE) Target Set up 33. Configuring an FCoE Interface to Automatically Mount at Boot 34. Scanning Storage Interconnects 35. Configuring iSCSI Offload and Interface Binding Expand section "35. Configuring iSCSI Offload and Interface Binding" Collapse section "35. Configuring iSCSI Offload and Interface Binding" 35.1. Viewing Available iface Configurations 35.2. Configuring an iface for Software iSCSI 35.3. Configuring an iface for iSCSI Offload 35.4. Binding/Unbinding an iface to a Portal 36. Scanning iSCSI Targets with Multiple LUNs or Portals 37. Resizing an Online Logical Unit Expand section "37. Resizing an Online Logical Unit" Collapse section "37. Resizing an Online Logical Unit" 37.1. Resizing Fibre Channel Logical Units 37.2. Resizing an iSCSI Logical Unit 37.3. Updating the Size of Your Multipath Device 37.4. Changing the Read/Write State of an Online Logical Unit Expand section "37.4. Changing the Read/Write State of an Online Logical Unit" Collapse section "37.4. Changing the Read/Write State of an Online Logical Unit" 37.4.1. Rescanning logical units 37.4.2. Updating the R/W state of a multipath device 37.4.3. Documentation 38. Adding/Removing a Logical Unit Through rescan-scsi-bus.sh 39. Modifying Link Loss Behavior Expand section "39. Modifying Link Loss Behavior" Collapse section "39. Modifying Link Loss Behavior" 39.1. Fibre Channel 39.2. iSCSI Settings With dm-multipath Expand section "39.2. iSCSI Settings With dm-multipath" Collapse section "39.2. iSCSI Settings With dm-multipath" 39.2.1. NOP-Out Interval/Timeout 39.2.2. replacement_timeout 39.3. iSCSI Root 40. Controlling the SCSI Command Timer and Device Status 41. Online Storage Configuration Troubleshooting A. Revision History Legal Notice Settings Close Language: 简体中文 日本語 English Français Language: 简体中文 日本語 English Français Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 日本語 English Français Language: 简体中文 日本語 English Français Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Enterprise Linux 20.7. ACL References Refer to the following man pages for more information. man acl — Description of ACLs man getfacl — Discusses how to get file access control lists man setfacl — Explains how to set file access control lists man star — Explains more about the star utility and its many options Previous Next