Jump To Close Expand all Collapse all Table of contents Administration Guide I. Overview Expand section "I. Overview" Collapse section "I. Overview" 1. Platform Introduction Expand section "1. Platform Introduction" Collapse section "1. Platform Introduction" 1.1. About Red Hat Gluster Storage 1.2. About glusterFS 1.3. About On-premise Installation 1.4. About Public Cloud Installation 2. Red Hat Gluster Storage Architecture and Concepts Expand section "2. Red Hat Gluster Storage Architecture and Concepts" Collapse section "2. Red Hat Gluster Storage Architecture and Concepts" 2.1. Red Hat Gluster Storage Architecture 2.2. Red Hat Gluster Storage for On-premise Architecture 2.3. Red Hat Gluster Storage for Public Cloud Architecture 2.4. Storage Concepts 3. Key Features Expand section "3. Key Features" Collapse section "3. Key Features" 3.1. Elasticity 3.2. No Metadata with the Elastic Hashing Algorithm 3.3. Scalability 3.4. High Availability and Flexibility 3.5. Flexibility 3.6. No Application Rewrites 3.7. Simple Management 3.8. Modular, Stackable Design II. Red Hat Gluster Storage Administration On-Premise Expand section "II. Red Hat Gluster Storage Administration On-Premise" Collapse section "II. Red Hat Gluster Storage Administration On-Premise" 4. Getting Started with Red Hat Gluster Storage Server Expand section "4. Getting Started with Red Hat Gluster Storage Server" Collapse section "4. Getting Started with Red Hat Gluster Storage Server" 4.1. Port Information 4.2. Starting and Stopping the glusterd service 5. Trusted Storage Pools Expand section "5. Trusted Storage Pools" Collapse section "5. Trusted Storage Pools" 5.1. Adding Servers to the Trusted Storage Pool 5.2. Removing Servers from the Trusted Storage Pool 6. Red Hat Gluster Storage Volumes Expand section "6. Red Hat Gluster Storage Volumes" Collapse section "6. Red Hat Gluster Storage Volumes" 6.1. Setting up Gluster Storage Volumes using gdeploy Expand section "6.1. Setting up Gluster Storage Volumes using gdeploy" Collapse section "6.1. Setting up Gluster Storage Volumes using gdeploy" 6.1.1. Getting Started 6.1.2. Setting up a Trusted Storage Pool 6.1.3. Setting up the Backend 6.1.4. Creating a Volume 6.1.5. Mounting Clients 6.1.6. Configuring a Volume 6.1.7. Configuration File 6.2. Managing Volumes using Heketi Expand section "6.2. Managing Volumes using Heketi" Collapse section "6.2. Managing Volumes using Heketi" 6.2.1. Prerequisites 6.2.2. Installing Heketi 6.2.3. Starting the Heketi Server 6.2.4. Setting up the Topology 6.2.5. Creating a Volume 6.2.6. Deleting a Volume 6.3. About Encrypted Disk 6.4. Formatting and Mounting Bricks Expand section "6.4. Formatting and Mounting Bricks" Collapse section "6.4. Formatting and Mounting Bricks" 6.4.1. Creating Bricks Manually 6.5. Creating Distributed Volumes 6.6. Creating Replicated Volumes Expand section "6.6. Creating Replicated Volumes" Collapse section "6.6. Creating Replicated Volumes" 6.6.1. Creating Two-way Replicated Volumes 6.6.2. Creating Three-way Replicated Volumes 6.7. Creating Distributed Replicated Volumes Expand section "6.7. Creating Distributed Replicated Volumes" Collapse section "6.7. Creating Distributed Replicated Volumes" 6.7.1. Creating Two-way Distributed Replicated Volumes 6.7.2. Creating Three-way Distributed Replicated Volumes 6.8. Creating Dispersed Volumes 6.9. Creating Distributed Dispersed Volumes 6.10. Starting Volumes 7. Accessing Data - Setting Up Clients Expand section "7. Accessing Data - Setting Up Clients" Collapse section "7. Accessing Data - Setting Up Clients" 7.1. Native Client Expand section "7.1. Native Client" Collapse section "7.1. Native Client" 7.1.1. Installing Native Client 7.1.2. Upgrading Native Client 7.1.3. Mounting Red Hat Gluster Storage Volumes 7.2. NFS Expand section "7.2. NFS" Collapse section "7.2. NFS" 7.2.1. Using NFS to Mount Red Hat Gluster Storage Volumes 7.2.2. Troubleshooting NFS 7.2.3. NFS-Ganesha 7.3. SMB Expand section "7.3. SMB" Collapse section "7.3. SMB" 7.3.1. Setting up CTDB for Samba 7.3.2. Sharing Volumes over SMB 7.3.3. Mounting Volumes using SMB 7.3.4. Starting and Verifying your Configuration 7.3.5. Disabling SMB Shares 7.4. POSIX Access Control Lists Expand section "7.4. POSIX Access Control Lists" Collapse section "7.4. POSIX Access Control Lists" 7.4.1. Setting POSIX ACLs 7.4.2. Retrieving POSIX ACLs 7.4.3. Removing POSIX ACLs 7.4.4. Samba and ACLs 8. Integrating Red Hat Gluster Storage with Windows Active Directory Expand section "8. Integrating Red Hat Gluster Storage with Windows Active Directory" Collapse section "8. Integrating Red Hat Gluster Storage with Windows Active Directory" 8.1. Prerequisites 8.2. Integration Expand section "8.2. Integration" Collapse section "8.2. Integration" 8.2.1. Configure Authentication 8.2.2. Join Active Directory Domain 8.2.3. Verify/Test Active Directory and Services 9. Configuring Network Encryption in Red Hat Gluster Storage Expand section "9. Configuring Network Encryption in Red Hat Gluster Storage" Collapse section "9. Configuring Network Encryption in Red Hat Gluster Storage" 9.1. Prerequisites 9.2. Configuring Network Encryption for a New Trusted Storage Pool Expand section "9.2. Configuring Network Encryption for a New Trusted Storage Pool" Collapse section "9.2. Configuring Network Encryption for a New Trusted Storage Pool" 9.2.1. Enabling Management Encryption 9.2.2. Enabling I/O encryption for a Volume 9.3. Configuring Network Encryption for an existing Trusted Storage Pool Expand section "9.3. Configuring Network Encryption for an existing Trusted Storage Pool" Collapse section "9.3. Configuring Network Encryption for an existing Trusted Storage Pool" 9.3.1. Enabling I/O encryption for a Volume 9.3.2. Enabling Management Encryption 9.4. Expanding Volumes Expand section "9.4. Expanding Volumes" Collapse section "9.4. Expanding Volumes" 9.4.1. Certificate Signed with a Common Certificate Authority 9.4.2. Self-signed Certificates 9.5. Authorizing a New Client Expand section "9.5. Authorizing a New Client" Collapse section "9.5. Authorizing a New Client" 9.5.1. Certificate Signed with a Common Certificate Authority 9.5.2. Self-signed Certificates 10. Managing Red Hat Gluster Storage Volumes Expand section "10. Managing Red Hat Gluster Storage Volumes" Collapse section "10. Managing Red Hat Gluster Storage Volumes" 10.1. Configuring Volume Options 10.2. Configuring Transport Types for a Volume 10.3. Expanding Volumes Expand section "10.3. Expanding Volumes" Collapse section "10.3. Expanding Volumes" 10.3.1. Expanding a Tiered Volume 10.4. Shrinking Volumes Expand section "10.4. Shrinking Volumes" Collapse section "10.4. Shrinking Volumes" 10.4.1. Shrinking a Geo-replicated Volume 10.4.2. Shrinking a Tiered Volume 10.4.3. Stopping a remove-brick Operation 10.5. Migrating Volumes Expand section "10.5. Migrating Volumes" Collapse section "10.5. Migrating Volumes" 10.5.1. Replacing a Subvolume on a Distribute or Distribute-replicate Volume 10.5.2. Replacing an Old Brick with a New Brick on a Replicate or Distribute-replicate Volume 10.5.3. Replacing an Old Brick with a New Brick on a Distribute Volume 10.6. Replacing Hosts Expand section "10.6. Replacing Hosts" Collapse section "10.6. Replacing Hosts" 10.6.1. Replacing a Host Machine with a Different Hostname 10.6.2. Replacing a Host Machine with the Same Hostname 10.7. Rebalancing Volumes Expand section "10.7. Rebalancing Volumes" Collapse section "10.7. Rebalancing Volumes" 10.7.1. Rebalance Throttling 10.7.2. Displaying Status of a Rebalance Operation 10.7.3. Stopping a Rebalance Operation 10.8. Setting up Shared Storage Volume 10.9. Stopping Volumes 10.10. Deleting Volumes 10.11. Managing Split-brain Expand section "10.11. Managing Split-brain" Collapse section "10.11. Managing Split-brain" 10.11.1. Preventing Split-brain 10.11.2. Recovering from File Split-brain 10.11.3. Triggering Self-Healing on Replicated Volumes 10.12. Non Uniform File Allocation (NUFA) 11. Managing Containerized Red Hat Gluster Storage Expand section "11. Managing Containerized Red Hat Gluster Storage" Collapse section "11. Managing Containerized Red Hat Gluster Storage" 11.1. Prerequisites 11.2. Starting a Container 11.3. Creating a Trusted Storage Pool 11.4. Creating a Volume 11.5. Mounting a Volume 12. Managing Tiering Expand section "12. Managing Tiering" Collapse section "12. Managing Tiering" 12.1. Tiering Architecture 12.2. Key Benefits of Tiering 12.3. Tiering Limitations 12.4. Attaching a Tier to a Volume Expand section "12.4. Attaching a Tier to a Volume" Collapse section "12.4. Attaching a Tier to a Volume" 12.4.1. Attaching a Tier to a Geo-replicated Volume 12.5. Configuring a Tiering Volume Expand section "12.5. Configuring a Tiering Volume" Collapse section "12.5. Configuring a Tiering Volume" 12.5.1. Configuring Watermarks 12.5.2. Configuring Promote and Demote Frequency 12.5.3. Configuring Read and Write Frequency 12.5.4. Configuring Target Data Size 12.5.5. Configuring the File Count per Cycle 12.6. Displaying Tiering Status Information 12.7. Detaching a Tier from a Volume Expand section "12.7. Detaching a Tier from a Volume" Collapse section "12.7. Detaching a Tier from a Volume" 12.7.1. Detaching a Tier of a Geo-replicated Volume 13. Configuring Red Hat Gluster Storage for Enhancing Performance Expand section "13. Configuring Red Hat Gluster Storage for Enhancing Performance" Collapse section "13. Configuring Red Hat Gluster Storage for Enhancing Performance" 13.1. Disk Configuration Expand section "13.1. Disk Configuration" Collapse section "13.1. Disk Configuration" 13.1.1. Hardware RAID 13.1.2. JBOD 13.2. Brick Configuration 13.3. Network 13.4. Memory Expand section "13.4. Memory" Collapse section "13.4. Memory" 13.4.1. Virtual Memory Parameters 13.5. Small File Performance Enhancements Expand section "13.5. Small File Performance Enhancements" Collapse section "13.5. Small File Performance Enhancements" 13.5.1. Enabling Lookup Optimization 13.6. Replication 14. Managing Geo-replication Expand section "14. Managing Geo-replication" Collapse section "14. Managing Geo-replication" 14.1. About Geo-replication 14.2. Replicated Volumes vs Geo-replication 14.3. Preparing to Deploy Geo-replication Expand section "14.3. Preparing to Deploy Geo-replication" Collapse section "14.3. Preparing to Deploy Geo-replication" 14.3.1. Exploring Geo-replication Deployment Scenarios 14.3.2. Geo-replication Deployment Overview 14.3.3. Prerequisites 14.3.4. Setting Up your Environment 14.3.5. Configuring a Meta-Volume 14.4. Starting Geo-replication Expand section "14.4. Starting Geo-replication" Collapse section "14.4. Starting Geo-replication" 14.4.1. Starting a Geo-replication Session 14.4.2. Verifying a Successful Geo-replication Deployment 14.4.3. Displaying Geo-replication Status Information 14.4.4. Configuring a Geo-replication Session 14.4.5. Stopping a Geo-replication Session 14.4.6. Deleting a Geo-replication Session 14.5. Starting Geo-replication on a Newly Added Brick or Node Expand section "14.5. Starting Geo-replication on a Newly Added Brick or Node" Collapse section "14.5. Starting Geo-replication on a Newly Added Brick or Node" 14.5.1. Starting Geo-replication for a New Brick or New Node 14.5.2. Starting Geo-replication for a New Brick on an Existing Node 14.6. Disaster Recovery Expand section "14.6. Disaster Recovery" Collapse section "14.6. Disaster Recovery" 14.6.1. Promoting a Slave to Master 14.6.2. Failover and Failback 14.7. Creating a Snapshot of Geo-replicated Volume 14.8. Example - Setting up Cascading Geo-replication 14.9. Recommended Practices 14.10. Troubleshooting Geo-replication Expand section "14.10. Troubleshooting Geo-replication" Collapse section "14.10. Troubleshooting Geo-replication" 14.10.1. Tuning Geo-replication performance with Change Log 14.10.2. Triggering Explicit Sync on Entries 14.10.3. Synchronization Is Not Complete 14.10.4. Issues with File Synchronization 14.10.5. Geo-replication Status is Often Faulty 14.10.6. Intermediate Master is in a Faulty State 14.10.7. Remote gsyncd Not Found 15. Managing Directory Quotas Expand section "15. Managing Directory Quotas" Collapse section "15. Managing Directory Quotas" 15.1. Enabling Quotas 15.2. Setting Limits 15.3. Setting the Default Soft Limit 15.4. Displaying Quota Limit Information Expand section "15.4. Displaying Quota Limit Information" Collapse section "15.4. Displaying Quota Limit Information" 15.4.1. Displaying Quota Limit Information Using the df Utility 15.5. Setting Timeout 15.6. Setting Alert Time 15.7. Removing Disk Limits 15.8. Disabling Quotas 16. Managing Snapshots Expand section "16. Managing Snapshots" Collapse section "16. Managing Snapshots" 16.1. Prerequisites 16.2. Creating Snapshots 16.3. Cloning a Snapshot 16.4. Listing of Available Snapshots 16.5. Getting Information of all the Available Snapshots 16.6. Getting the Status of Available Snapshots 16.7. Configuring Snapshot Behavior 16.8. Activating and Deactivating a Snapshot 16.9. Deleting Snapshot Expand section "16.9. Deleting Snapshot" Collapse section "16.9. Deleting Snapshot" 16.9.1. Deleting Multiple Snapshots 16.10. Restoring Snapshot 16.11. Accessing Snapshots 16.12. Scheduling of Snapshots Expand section "16.12. Scheduling of Snapshots " Collapse section "16.12. Scheduling of Snapshots " 16.12.1. Prerequisites 16.12.2. Snapshot Scheduler Options 16.13. User Serviceable Snapshots Expand section "16.13. User Serviceable Snapshots" Collapse section "16.13. User Serviceable Snapshots" 16.13.1. Enabling and Disabling User Serviceable Snapshot 16.13.2. Viewing and Retrieving Snapshots using NFS / FUSE 16.13.3. Viewing and Retrieving Snapshots using CIFS for Windows Client 16.14. Troubleshooting 17. Monitoring Red Hat Gluster Storage Expand section "17. Monitoring Red Hat Gluster Storage" Collapse section "17. Monitoring Red Hat Gluster Storage" 17.1. Prerequisites 17.2. Installing Nagios Expand section "17.2. Installing Nagios" Collapse section "17.2. Installing Nagios" 17.2.1. Installing Nagios Server 17.2.2. Configuring Red Hat Gluster Storage Nodes for Nagios 17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool Expand section "17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool" Collapse section "17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool" 17.3.1. Configuring Nagios 17.3.2. Verifying the Configuration 17.3.3. Using Nagios Server GUI 17.4. Monitoring Notifications Expand section "17.4. Monitoring Notifications" Collapse section "17.4. Monitoring Notifications" 17.4.1. Configuring Nagios Server to Send Mail Notifications 17.4.2. Configuring Simple Network Management Protocol (SNMP) Notification 17.5. Nagios Advanced Configuration Expand section "17.5. Nagios Advanced Configuration" Collapse section "17.5. Nagios Advanced Configuration" 17.5.1. Creating Nagios User 17.5.2. Changing Nagios Password 17.5.3. Configuring SSL 17.5.4. Integrating LDAP Authentication with Nagios 17.6. Configuring Nagios Manually 17.7. Troubleshooting Nagios Expand section "17.7. Troubleshooting Nagios" Collapse section "17.7. Troubleshooting Nagios" 17.7.1. Troubleshooting NSCA and NRPE Configuration Issues 18. Monitoring Red Hat Gluster Storage Gluster Workload Expand section "18. Monitoring Red Hat Gluster Storage Gluster Workload" Collapse section "18. Monitoring Red Hat Gluster Storage Gluster Workload" 18.1. Running the Volume Profile Command Expand section "18.1. Running the Volume Profile Command" Collapse section "18.1. Running the Volume Profile Command" 18.1.1. Start Profiling 18.1.2. Displaying the I/O Information 18.1.3. Stop Profiling 18.2. Running the Volume Top Command Expand section "18.2. Running the Volume Top Command" Collapse section "18.2. Running the Volume Top Command" 18.2.1. Viewing Open File Descriptor Count and Maximum File Descriptor Count 18.2.2. Viewing Highest File Read Calls 18.2.3. Viewing Highest File Write Calls 18.2.4. Viewing Highest Open Calls on a Directory 18.2.5. Viewing Highest Read Calls on a Directory 18.2.6. Viewing Read Performance 18.2.7. Viewing Write Performance 18.3. gstatus Command Expand section "18.3. gstatus Command" Collapse section "18.3. gstatus Command" 18.3.1. gstatus Command 18.3.2. Executing the gstatus command 18.4. Listing Volumes 18.5. Displaying Volume Information 18.6. Performing Statedump on a Volume 18.7. Displaying Volume Status 18.8. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool Expand section "18.8. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" Collapse section "18.8. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" 18.8.1. Troubleshooting a network issue in the Red Hat Gluster Storage Trusted Storage Pool 19. Detecting Data Corruption with BitRot Expand section "19. Detecting Data Corruption with BitRot" Collapse section "19. Detecting Data Corruption with BitRot" 19.1. Enabling and Disabling the BitRot daemon 19.2. Modifying BitRot Detection Behavior 19.3. Restore a bad file 20. Managing Red Hat Gluster Storage Logs Expand section "20. Managing Red Hat Gluster Storage Logs" Collapse section "20. Managing Red Hat Gluster Storage Logs" 20.1. Log Rotation 20.2. Red Hat Gluster Storage Component Logs and Location 20.3. Configuring the Log Format 20.4. Configuring the Log Level 20.5. Suppressing Repetitive Log Messages 20.6. Geo-replication Logs Expand section "20.6. Geo-replication Logs" Collapse section "20.6. Geo-replication Logs" 20.6.1. Viewing the Geo-replication Master Log Files 20.6.2. Viewing the Geo-replication Slave Log Files 21. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions Expand section "21. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" Collapse section "21. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" 21.1. Location of Scripts 21.2. Prepackaged Scripts 22. Red Hat Gluster Storage Utilities Expand section "22. Red Hat Gluster Storage Utilities" Collapse section "22. Red Hat Gluster Storage Utilities" 22.1. Glusterfind Configuration Options Expand section "22.1. Glusterfind Configuration Options" Collapse section "22.1. Glusterfind Configuration Options" 22.1.1. Adding or Replacing a Brick from an Existing Glusterfind Session III. Red Hat Gluster Storage Administration on Public Cloud Expand section "III. Red Hat Gluster Storage Administration on Public Cloud" Collapse section "III. Red Hat Gluster Storage Administration on Public Cloud" 23. Accessing Red Hat Gluster Storage using Amazon Web Services Expand section "23. Accessing Red Hat Gluster Storage using Amazon Web Services" Collapse section "23. Accessing Red Hat Gluster Storage using Amazon Web Services" 23.1. Launching Red Hat Gluster Storage Instances 23.2. Verifying that Red Hat Gluster Storage Instance is Running 23.3. Provisioning Storage Expand section "23.3. Provisioning Storage" Collapse section "23.3. Provisioning Storage" 23.3.1. Provisioning Storage for Two-way Replication Volumes 23.3.2. Provisioning Storage for Three-way Replication Volumes 23.4. Stopping and Restarting Red Hat Gluster Storage Instance 24. Accessing Red Hat Gluster Storage using Microsoft Azure IV. Data Access with Other Interfaces Expand section "IV. Data Access with Other Interfaces" Collapse section "IV. Data Access with Other Interfaces" 25. Managing Object Store Expand section "25. Managing Object Store" Collapse section "25. Managing Object Store" 25.1. Architecture Overview 25.2. Components of Object Store 25.3. Advantages of using Object Store 25.4. Limitations 25.5. Prerequisites 25.6. Configuring the Object Store Expand section "25.6. Configuring the Object Store" Collapse section "25.6. Configuring the Object Store" 25.6.1. Configuring a Proxy Server 25.6.2. Configuring the Authentication Service 25.6.3. Configuring Object Servers 25.6.4. Configuring Container Servers 25.6.5. Configuring Account Servers 25.6.6. Configuring Swift Object and Container Constraints 25.6.7. Configuring Object Expiration 25.6.8. Exporting the Red Hat Gluster Storage Volumes 25.6.9. Starting and Stopping Server 25.7. Starting the Services Automatically 25.8. Working with the Object Store Expand section "25.8. Working with the Object Store" Collapse section "25.8. Working with the Object Store" 25.8.1. Creating Containers and Objects 25.8.2. Creating Subdirectory under Containers 25.8.3. Working with Swift ACLs 26. Administering the Hortonworks Data Platform on Red Hat Gluster Storage Expand section "26. Administering the Hortonworks Data Platform on Red Hat Gluster Storage" Collapse section "26. Administering the Hortonworks Data Platform on Red Hat Gluster Storage" 26.1. Deployment Scenarios Expand section "26.1. Deployment Scenarios" Collapse section "26.1. Deployment Scenarios" 26.1.1. Red Hat Gluster Storage Trusted Storage Pool with Two Additional Servers 26.1.2. Red Hat Gluster Storage Trusted Storage Pool with One Additional Server 26.1.3. Red Hat Gluster Storage Trusted Storage Pool only 26.1.4. Deploying Hadoop on an existing Red Hat Gluster Storage Trusted Storage Pool 26.1.5. Deploying Hadoop on a New Red Hat Gluster Storage Trusted Storage Pool 26.2. Administration of HDP Services with Ambari on Red Hat Gluster Storage 26.3. Managing Users of the System 26.4. Running Hadoop Jobs Across Multiple Red Hat Gluster Storage Volumes 26.5. Scaling Up and Scaling Down Expand section "26.5. Scaling Up and Scaling Down" Collapse section "26.5. Scaling Up and Scaling Down" 26.5.1. Scaling Up 26.5.2. Scaling Down 26.6. Creating a Snapshot of Hadoop enabled Red Hat Gluster Storage Volumes 26.7. Creating Quotas on Hadoop enabled Red Hat Gluster Storage Volume V. Appendices Expand section "V. Appendices" Collapse section "V. Appendices" 27. Troubleshooting Expand section "27. Troubleshooting" Collapse section "27. Troubleshooting" 27.1. Identifying locked file and clear locks 27.2. Retrieving File Path from the Gluster Volume Expand section "27.2. Retrieving File Path from the Gluster Volume" Collapse section "27.2. Retrieving File Path from the Gluster Volume" 27.2.1. Retrieving Known File Name 27.2.2. Retrieving Unknown File Name 27.2.3. Retrieving File Path using gfid String 28. Recommended Configurations - Dispersed Volume 29. Nagios Configuration Files 30. Manually Recovering File Split-brain A. Revision History Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Gluster Storage Part III. Red Hat Gluster Storage Administration on Public Cloud Previous Next