Jump To Close Expand all Collapse all Table of contents Administration Guide I. Preface Expand section "I. Preface" Collapse section "I. Preface" 1. Preface Expand section "1. Preface" Collapse section "1. Preface" 1.1. About Red Hat Gluster Storage 1.2. About glusterFS 1.3. About On-premises Installation II. Overview Expand section "II. Overview" Collapse section "II. Overview" 2. Architecture and Concepts Expand section "2. Architecture and Concepts" Collapse section "2. Architecture and Concepts" 2.1. Architecture 2.2. On-premises Architecture 2.3. Storage Concepts III. Configure and Verify Expand section "III. Configure and Verify" Collapse section "III. Configure and Verify" 3. Considerations for Red Hat Gluster Storage Expand section "3. Considerations for Red Hat Gluster Storage" Collapse section "3. Considerations for Red Hat Gluster Storage" 3.1. Firewall and Port Access Expand section "3.1. Firewall and Port Access" Collapse section "3.1. Firewall and Port Access" 3.1.1. Configuring the Firewall 3.1.2. Port Access Requirements 3.2. Feature Compatibility Support 4. Adding Servers to the Trusted Storage Pool Expand section "4. Adding Servers to the Trusted Storage Pool" Collapse section "4. Adding Servers to the Trusted Storage Pool" 4.1. Adding Servers to the Trusted Storage Pool 4.2. Removing Servers from the Trusted Storage Pool 5. Setting Up Storage Volumes Expand section "5. Setting Up Storage Volumes" Collapse section "5. Setting Up Storage Volumes" 5.1. Setting up Gluster Storage Volumes using gdeploy Expand section "5.1. Setting up Gluster Storage Volumes using gdeploy" Collapse section "5.1. Setting up Gluster Storage Volumes using gdeploy" 5.1.1. Getting Started 5.1.2. Setting up a Trusted Storage Pool 5.1.3. Setting up the Backend Expand section "5.1.3. Setting up the Backend " Collapse section "5.1.3. Setting up the Backend " 5.1.3.1. Using the [backend-setup] Module 5.1.3.2. Creating Backend by Setting up PV, VG, and LV 5.1.4. Creating Volumes 5.1.5. Mounting Clients 5.1.6. Configuring a Volume Expand section "5.1.6. Configuring a Volume" Collapse section "5.1.6. Configuring a Volume" 5.1.6.1. Adding and Removing a Brick 5.1.6.2. Rebalancing a Volume 5.1.6.3. Starting, Stopping, or Deleting a Volume 5.1.7. Configuration File 5.1.8. Deploying NFS Ganesha using gdeploy Expand section "5.1.8. Deploying NFS Ganesha using gdeploy" Collapse section "5.1.8. Deploying NFS Ganesha using gdeploy" 5.1.8.1. Prerequisites 5.1.8.2. Supported Actions 5.1.9. Deploying Samba / CTDB using gdeploy Expand section "5.1.9. Deploying Samba / CTDB using gdeploy" Collapse section "5.1.9. Deploying Samba / CTDB using gdeploy" 5.1.9.1. Prerequisites 5.1.9.2. Setting up Samba 5.1.9.3. Setting up CTDB 5.1.10. Enabling SSL on a Volume Expand section "5.1.10. Enabling SSL on a Volume" Collapse section "5.1.10. Enabling SSL on a Volume" 5.1.10.1. Creating a Volume and Enabling SSL 5.1.10.2. Enabling SSL on an Existing Volume: 5.1.11. Limiting Gluster Resources 5.1.12. Gdeploy log files 5.2. Managing Volumes using Heketi Expand section "5.2. Managing Volumes using Heketi" Collapse section "5.2. Managing Volumes using Heketi" 5.2.1. Prerequisites 5.2.2. Installing Heketi 5.2.3. Starting the Heketi Server Expand section "5.2.3. Starting the Heketi Server" Collapse section "5.2.3. Starting the Heketi Server" 5.2.3.1. Starting the Server 5.2.3.2. Verifying the Configuration 5.2.4. Setting up the Topology Expand section "5.2.4. Setting up the Topology" Collapse section "5.2.4. Setting up the Topology" 5.2.4.1. Prerequisites 5.2.4.2. Topology Setup 5.2.5. Creating a Volume 5.2.6. Expanding a Volume 5.2.7. Deleting a Volume 5.3. About Encrypted Disk 5.4. Formatting and Mounting Bricks Expand section "5.4. Formatting and Mounting Bricks" Collapse section "5.4. Formatting and Mounting Bricks" 5.4.1. Creating Bricks Manually Expand section "5.4.1. Creating Bricks Manually" Collapse section "5.4.1. Creating Bricks Manually" 5.4.1.1. Creating a Thinly Provisioned Logical Volume 5.4.2. Using Subdirectory as the Brick for Volume 5.4.3. Reusing a Brick from a Deleted Volume 5.4.4. Cleaning An Unusable Brick 5.5. Creating Distributed Volumes 5.6. Creating Replicated Volumes Expand section "5.6. Creating Replicated Volumes" Collapse section "5.6. Creating Replicated Volumes" 5.6.1. Creating Two-way Replicated Volumes (Deprecated) 5.6.2. Creating Three-way Replicated Volumes 5.6.3. Creating Sharded Replicated Volumes Expand section "5.6.3. Creating Sharded Replicated Volumes" Collapse section "5.6.3. Creating Sharded Replicated Volumes" 5.6.3.1. Supported use cases 5.6.3.2. Configuration Options 5.6.3.3. Finding the pieces of a sharded file 5.7. Creating Distributed Replicated Volumes Expand section "5.7. Creating Distributed Replicated Volumes" Collapse section "5.7. Creating Distributed Replicated Volumes" 5.7.1. Creating Two-way Distributed Replicated Volumes 5.7.2. Creating Three-way Distributed Replicated Volumes 5.8. Creating Arbitrated Replicated Volumes Expand section "5.8. Creating Arbitrated Replicated Volumes" Collapse section "5.8. Creating Arbitrated Replicated Volumes" 5.8.1. Arbitrated volume requirements Expand section "5.8.1. Arbitrated volume requirements" Collapse section "5.8.1. Arbitrated volume requirements" 5.8.1.1. System requirements for nodes hosting arbiter bricks 5.8.1.2. Arbiter capacity requirements 5.8.2. Arbitration logic 5.8.3. Creating an arbitrated replicated volume 5.8.4. Creating multiple arbitrated replicated volumes across fewer total nodes 5.8.5. Converting to an arbitrated volume 5.8.6. Converting an arbitrated volume to a three-way replicated volume 5.8.7. Tuning recommendations for arbitrated volumes 5.9. Creating Dispersed Volumes 5.10. Creating Distributed Dispersed Volumes 5.11. Starting Volumes 6. Creating Access to Volumes Expand section "6. Creating Access to Volumes" Collapse section "6. Creating Access to Volumes" 6.1. Native Client Expand section "6.1. Native Client" Collapse section "6.1. Native Client" 6.1.1. Installing Native Client 6.1.2. Upgrading Native Client 6.1.3. Mounting Red Hat Gluster Storage Volumes Expand section "6.1.3. Mounting Red Hat Gluster Storage Volumes" Collapse section "6.1.3. Mounting Red Hat Gluster Storage Volumes" 6.1.3.1. Mount Commands and Options 6.1.3.2. Mounting Volumes Manually 6.1.3.3. Mounting Volumes Automatically 6.1.3.4. Manually Mounting Sub-directories Using Native Client 6.1.3.5. Testing Mounted Volumes 6.2. NFS Expand section "6.2. NFS" Collapse section "6.2. NFS" 6.2.1. Support Matrix 6.2.2. Gluster NFS Expand section "6.2.2. Gluster NFS" Collapse section "6.2.2. Gluster NFS" 6.2.2.1. Setting up CTDB for Gluster NFS Expand section "6.2.2.1. Setting up CTDB for Gluster NFS " Collapse section "6.2.2.1. Setting up CTDB for Gluster NFS " 6.2.2.1.1. Prerequisites 6.2.2.1.2. Port and Firewall Information for Gluster NFS 6.2.2.1.3. Configuring CTDB on Red Hat Gluster Storage Server 6.2.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes Expand section "6.2.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes" Collapse section "6.2.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes" 6.2.2.2.1. Manually Mounting Volumes Using Gluster NFS 6.2.2.2.2. Automatically Mounting Volumes Using Gluster NFS 6.2.2.2.3. Automatically Mounting Subdirectories Using NFS 6.2.2.2.4. Testing Volumes Mounted Using Gluster NFS 6.2.2.3. Troubleshooting Gluster NFS 6.2.3. NFS Ganesha Expand section "6.2.3. NFS Ganesha" Collapse section "6.2.3. NFS Ganesha" 6.2.3.1. Supported Features of NFS-Ganesha 6.2.3.2. Setting up NFS Ganesha Expand section "6.2.3.2. Setting up NFS Ganesha" Collapse section "6.2.3.2. Setting up NFS Ganesha" 6.2.3.2.1. Port and Firewall Information for NFS-Ganesha 6.2.3.2.2. Prerequisites to run NFS-Ganesha 6.2.3.2.3. Configuring the Cluster Services 6.2.3.2.4. Creating the ganesha-ha.conf file 6.2.3.2.5. Configuring NFS-Ganesha using Gluster CLI 6.2.3.2.6. Exporting and Unexporting Volumes through NFS-Ganesha 6.2.3.2.7. Verifying the NFS-Ganesha Status 6.2.3.3. Accessing NFS-Ganesha Exports Expand section "6.2.3.3. Accessing NFS-Ganesha Exports" Collapse section "6.2.3.3. Accessing NFS-Ganesha Exports" 6.2.3.3.1. Mounting exports in NFSv3 Mode 6.2.3.3.2. Mounting exports in NFSv4 Mode 6.2.3.3.3. Finding clients of an NFS server using dbus 6.2.3.4. Modifying the NFS-Ganesha HA Setup Expand section "6.2.3.4. Modifying the NFS-Ganesha HA Setup" Collapse section "6.2.3.4. Modifying the NFS-Ganesha HA Setup" 6.2.3.4.1. Adding a Node to the Cluster 6.2.3.4.2. Deleting a Node in the Cluster 6.2.3.5. Modifying the Default Export Configurations Expand section "6.2.3.5. Modifying the Default Export Configurations" Collapse section "6.2.3.5. Modifying the Default Export Configurations" 6.2.3.5.1. Providing Permissions for Specific Clients 6.2.3.5.2. Enabling and Disabling NFSv4 ACLs 6.2.3.5.3. Providing Pseudo Path for NFSv4 Mount 6.2.3.5.4. Exporting Subdirectories 6.2.3.5.5. Configuring Upcall Poll Interval 6.2.3.5.6. Enabling all_squash option 6.2.3.6. Configuring Kerberized NFS-Ganesha Expand section "6.2.3.6. Configuring Kerberized NFS-Ganesha" Collapse section "6.2.3.6. Configuring Kerberized NFS-Ganesha" 6.2.3.6.1. Setting up the NFS-Ganesha Server: 6.2.3.6.2. Setting up the NFS Client 6.2.3.7. NFS-Ganesha Service Downtime Expand section "6.2.3.7. NFS-Ganesha Service Downtime" Collapse section "6.2.3.7. NFS-Ganesha Service Downtime" 6.2.3.7.1. Modifying the Fail-over Time 6.2.3.8. Manually Configuring NFS-Ganesha Exports 6.2.3.9. Troubleshooting 6.3. SMB Expand section "6.3. SMB" Collapse section "6.3. SMB" 6.3.1. Requirements for using SMB with Red Hat Gluster Storage 6.3.2. Setting up CTDB for Samba 6.3.3. Sharing Volumes over SMB 6.3.4. Configuring User Access to Shared Volumes Expand section "6.3.4. Configuring User Access to Shared Volumes" Collapse section "6.3.4. Configuring User Access to Shared Volumes" 6.3.4.1. Configuring the Apple Create Context for macOS users 6.3.4.2. Configuring read/write access for a non-privileged user 6.3.5. Mounting Volumes using SMB Expand section "6.3.5. Mounting Volumes using SMB" Collapse section "6.3.5. Mounting Volumes using SMB" 6.3.5.1. Manually mounting volumes exported with SMB on Red Hat Enterprise Linux 6.3.5.2. Manually mounting volumes exported with SMB on Microsoft Windows Expand section "6.3.5.2. Manually mounting volumes exported with SMB on Microsoft Windows" Collapse section "6.3.5.2. Manually mounting volumes exported with SMB on Microsoft Windows" 6.3.5.2.1. Using Microsoft Windows Explorer to manually mount a volume 6.3.5.2.2. Using Microsoft Windows command line interface to manually mount a volume 6.3.5.3. Manually mounting volumes exported with SMB on macOS 6.3.5.4. Configuring automatic mounting for volumes exported with SMB on Red Hat Enterprise Linux 6.3.5.5. Configuring automatic mounting for volumes exported with SMB on Microsoft Windows 6.3.5.6. Configuring automatic mounting for volumes exported with SMB on macOS 6.3.6. Starting and Verifying your Configuration 6.3.7. Disabling SMB Shares 6.3.8. Accessing Snapshots in Windows Expand section "6.3.8. Accessing Snapshots in Windows" Collapse section "6.3.8. Accessing Snapshots in Windows" 6.3.8.1. Configuring Shadow Copy 6.3.8.2. Accessing Snapshot 6.3.9. Tuning Performance Expand section "6.3.9. Tuning Performance" Collapse section "6.3.9. Tuning Performance" 6.3.9.1. Enabling Metadata Caching 6.3.9.2. Enhancing Directory Listing Performance 6.3.9.3. Enhancing File/Directory Create Performance 6.4. POSIX Access Control Lists Expand section "6.4. POSIX Access Control Lists" Collapse section "6.4. POSIX Access Control Lists" 6.4.1. Setting ACLs with setfacl 6.4.2. Checking current ACLs with getfacl 6.4.3. Mounting volumes with ACLs enabled 6.4.4. Checking ACL enablement on a mounted volume 6.5. Managing Object Store Expand section "6.5. Managing Object Store" Collapse section "6.5. Managing Object Store" 6.5.1. Architecture Overview 6.5.2. Components of Object Store 6.5.3. Advantages of using Object Store 6.5.4. Limitations 6.5.5. Swift API Support Matrix 6.5.6. Prerequisites 6.5.7. Configuring the Object Store Expand section "6.5.7. Configuring the Object Store" Collapse section "6.5.7. Configuring the Object Store" 6.5.7.1. Configuring a Proxy Server Expand section "6.5.7.1. Configuring a Proxy Server" Collapse section "6.5.7.1. Configuring a Proxy Server" 6.5.7.1.1. Configuring a Proxy Server for HTTPS 6.5.7.2. Configuring the Authentication Service Expand section "6.5.7.2. Configuring the Authentication Service" Collapse section "6.5.7.2. Configuring the Authentication Service" 6.5.7.2.1. Integrating with the Keystone Authentication Service 6.5.7.2.2. Integrating with the GSwauth Authentication Service Expand section "6.5.7.2.2. Integrating with the GSwauth Authentication Service" Collapse section "6.5.7.2.2. Integrating with the GSwauth Authentication Service" 6.5.7.2.2.1. Managing Account Services in GSwauth 6.5.7.2.2.2. Managing User Services in GSwauth 6.5.7.2.2.3. Managing Accounts and Users Information 6.5.7.2.3. Integrating with the TempAuth Authentication Service 6.5.7.3. Configuring Object Servers 6.5.7.4. Configuring Container Servers 6.5.7.5. Configuring Account Servers 6.5.7.6. Configuring Swift Object and Container Constraints 6.5.7.7. Configuring Object Expiration Expand section "6.5.7.7. Configuring Object Expiration" Collapse section "6.5.7.7. Configuring Object Expiration" 6.5.7.7.1. Setting Up Object Expiration 6.5.7.7.2. Using Object Expiration 6.5.7.7.3. Running Object Expirer Service 6.5.7.8. Exporting the Red Hat Gluster Storage Volumes 6.5.7.9. Starting and Stopping Server 6.5.8. Starting the Services Automatically 6.5.9. Working with the Object Store Expand section "6.5.9. Working with the Object Store" Collapse section "6.5.9. Working with the Object Store" 6.5.9.1. Creating Containers and Objects 6.5.9.2. Creating Subdirectory under Containers 6.5.9.3. Working with Swift ACLs 6.6. Checking Client Operating Versions 7. Integrating Red Hat Gluster Storage with Windows Active Directory Expand section "7. Integrating Red Hat Gluster Storage with Windows Active Directory" Collapse section "7. Integrating Red Hat Gluster Storage with Windows Active Directory" 7.1. Prerequisites 7.2. Integration Expand section "7.2. Integration" Collapse section "7.2. Integration" 7.2.1. Configure Authentication Expand section "7.2.1. Configure Authentication " Collapse section "7.2.1. Configure Authentication " 7.2.1.1. Basic Samba Configuration 7.2.1.2. Alternative Configuration using ad backend 7.2.1.3. Verifying the Samba Configuration 7.2.1.4. nsswitch Configuration 7.2.2. Join Active Directory Domain 7.2.3. Verify/Test Active Directory and Services IV. Manage Expand section "IV. Manage" Collapse section "IV. Manage" 8. Managing Snapshots Expand section "8. Managing Snapshots" Collapse section "8. Managing Snapshots" 8.1. Prerequisites 8.2. Creating Snapshots 8.3. Cloning a Snapshot 8.4. Listing of Available Snapshots 8.5. Getting Information of all the Available Snapshots 8.6. Getting the Status of Available Snapshots 8.7. Configuring Snapshot Behavior 8.8. Activating and Deactivating a Snapshot 8.9. Deleting Snapshot Expand section "8.9. Deleting Snapshot" Collapse section "8.9. Deleting Snapshot" 8.9.1. Deleting Multiple Snapshots 8.10. Restoring Snapshot 8.11. Accessing Snapshots 8.12. Scheduling of Snapshots Expand section "8.12. Scheduling of Snapshots " Collapse section "8.12. Scheduling of Snapshots " 8.12.1. Prerequisites 8.12.2. Snapshot Scheduler Options 8.13. User Serviceable Snapshots Expand section "8.13. User Serviceable Snapshots" Collapse section "8.13. User Serviceable Snapshots" 8.13.1. Enabling and Disabling User Serviceable Snapshot 8.13.2. Viewing and Retrieving Snapshots using NFS / FUSE 8.13.3. Viewing and Retrieving Snapshots using CIFS for Windows Client 8.14. Troubleshooting 9. Managing Directory Quotas Expand section "9. Managing Directory Quotas" Collapse section "9. Managing Directory Quotas" 9.1. Enabling and Disabling Quotas 9.2. Before Setting a Quota on a Directory 9.3. Limiting Disk Usage Expand section "9.3. Limiting Disk Usage" Collapse section "9.3. Limiting Disk Usage" 9.3.1. Setting Disk Usage Limits 9.3.2. Viewing Current Disk Usage Limits Expand section "9.3.2. Viewing Current Disk Usage Limits" Collapse section "9.3.2. Viewing Current Disk Usage Limits" 9.3.2.1. Viewing Quota Limit Information Using the df Utility 9.3.3. Setting Quota Check Frequency (Timeouts) 9.3.4. Setting Logging Frequency (Alert Time) 9.3.5. Removing Disk Usage Limits 10. Managing Geo-replication Expand section "10. Managing Geo-replication" Collapse section "10. Managing Geo-replication" 10.1. About Geo-replication 10.2. Replicated Volumes vs Geo-replication 10.3. Preparing to Deploy Geo-replication Expand section "10.3. Preparing to Deploy Geo-replication" Collapse section "10.3. Preparing to Deploy Geo-replication" 10.3.1. Exploring Geo-replication Deployment Scenarios 10.3.2. Geo-replication Deployment Overview 10.3.3. Prerequisites 10.3.4. Setting Up your Environment Expand section "10.3.4. Setting Up your Environment " Collapse section "10.3.4. Setting Up your Environment " 10.3.4.1. Setting Up your Environment for Geo-replication Session 10.3.4.2. Setting Up your Environment for a Secure Geo-replication Slave 10.3.5. Configuring a Meta-Volume 10.4. Starting Geo-replication Expand section "10.4. Starting Geo-replication" Collapse section "10.4. Starting Geo-replication" 10.4.1. Starting a Geo-replication Session 10.4.2. Verifying a Successful Geo-replication Deployment 10.4.3. Displaying Geo-replication Status Information 10.4.4. Configuring a Geo-replication Session Expand section "10.4.4. Configuring a Geo-replication Session" Collapse section "10.4.4. Configuring a Geo-replication Session" 10.4.4.1. Geo-replication Checkpoints Expand section "10.4.4.1. Geo-replication Checkpoints" Collapse section "10.4.4.1. Geo-replication Checkpoints" 10.4.4.1.1. About Geo-replication Checkpoints 10.4.4.1.2. Configuring and Viewing Geo-replication Checkpoint Information 10.4.5. Stopping a Geo-replication Session 10.4.6. Deleting a Geo-replication Session 10.5. Starting Geo-replication on a Newly Added Brick, Node, or Volume Expand section "10.5. Starting Geo-replication on a Newly Added Brick, Node, or Volume" Collapse section "10.5. Starting Geo-replication on a Newly Added Brick, Node, or Volume" 10.5.1. Starting Geo-replication for a New Brick or New Node 10.5.2. Starting Geo-replication for a New Brick on an Existing Node 10.5.3. Starting Geo-replication for a New Volume 10.6. Scheduling Geo-replication as a Cron Job 10.7. Disaster Recovery Expand section "10.7. Disaster Recovery" Collapse section "10.7. Disaster Recovery" 10.7.1. Failover: Promoting a Slave to Master 10.7.2. Failback: Resuming Master and Slave back to their Original State 10.8. Creating a Snapshot of Geo-replicated Volume 10.9. Example - Setting up Cascading Geo-replication 10.10. Recommended Practices 10.11. Troubleshooting Geo-replication Expand section "10.11. Troubleshooting Geo-replication" Collapse section "10.11. Troubleshooting Geo-replication" 10.11.1. Tuning Geo-replication performance with Change Log 10.11.2. Triggering Explicit Sync on Entries 10.11.3. Synchronization Is Not Complete 10.11.4. Issues with File Synchronization 10.11.5. Geo-replication Status is Often Faulty 10.11.6. Intermediate Master is in a Faulty State 10.11.7. Remote gsyncd Not Found 11. Managing Red Hat Gluster Storage Volumes Expand section "11. Managing Red Hat Gluster Storage Volumes" Collapse section "11. Managing Red Hat Gluster Storage Volumes" 11.1. Configuring Volume Options 11.2. Setting Multiple Volume Option 11.3. Supported Volume Options 11.4. Configuring a volume to be mounted read-only 11.5. Configuring Transport Types for a Volume 11.6. Reserving Storage on a Volume 11.7. Expanding Volumes Expand section "11.7. Expanding Volumes" Collapse section "11.7. Expanding Volumes" 11.7.1. Expanding a Tiered Volume Expand section "11.7.1. Expanding a Tiered Volume" Collapse section "11.7.1. Expanding a Tiered Volume" 11.7.1.1. Expanding a Cold Tier Volume 11.7.1.2. Expanding a Hot Tier Volume 11.7.2. Expanding a Dispersed or Distributed-dispersed Volume 11.7.3. Expanding Underlying Logical Volume 11.8. Shrinking Volumes Expand section "11.8. Shrinking Volumes" Collapse section "11.8. Shrinking Volumes" 11.8.1. Shrinking a Geo-replicated Volume 11.8.2. Shrinking a Tiered Volume Expand section "11.8.2. Shrinking a Tiered Volume " Collapse section "11.8.2. Shrinking a Tiered Volume " 11.8.2.1. Shrinking a Cold Tier Volume 11.8.2.2. Shrinking a Hot Tier Volume 11.8.3. Stopping a remove-brick Operation 11.9. Migrating Volumes Expand section "11.9. Migrating Volumes" Collapse section "11.9. Migrating Volumes" 11.9.1. Replacing a Subvolume on a Distribute or Distribute-replicate Volume 11.9.2. Replacing an Old Brick with a New Brick on a Replicate or Distribute-replicate Volume 11.9.3. Replacing an Old Brick with a New Brick on a Distribute Volume 11.9.4. Replacing an Old Brick with a New Brick on a Dispersed or Distributed-dispersed Volume 11.9.5. Reconfiguring a Brick in a Volume 11.10. Replacing Hosts Expand section "11.10. Replacing Hosts" Collapse section "11.10. Replacing Hosts" 11.10.1. Replacing a Host Machine with a Different Hostname 11.10.2. Replacing a Host Machine with the Same Hostname 11.11. Rebalancing Volumes Expand section "11.11. Rebalancing Volumes" Collapse section "11.11. Rebalancing Volumes" 11.11.1. Rebalance Throttling 11.11.2. Displaying Rebalance Progress 11.11.3. Stopping a Rebalance Operation 11.12. Setting up Shared Storage Volume 11.13. Stopping Volumes 11.14. Deleting Volumes 11.15. Managing Split-brain Expand section "11.15. Managing Split-brain" Collapse section "11.15. Managing Split-brain" 11.15.1. Preventing Split-brain Expand section "11.15.1. Preventing Split-brain" Collapse section "11.15.1. Preventing Split-brain" 11.15.1.1. Configuring Server-Side Quorum 11.15.1.2. Configuring Client-Side Quorum 11.15.2. Recovering from File Split-brain Expand section "11.15.2. Recovering from File Split-brain" Collapse section "11.15.2. Recovering from File Split-brain" 11.15.2.1. Recovering File Split-brain from the Mount Point 11.15.2.2. Recovering File Split-brain from the gluster CLI 11.15.3. Recovering GFID Split-brain from the gluster CLI 11.15.4. Triggering Self-Healing on Replicated Volumes 11.16. Recommended Configurations - Dispersed Volume 12. Managing Red Hat Gluster Storage Logs Expand section "12. Managing Red Hat Gluster Storage Logs" Collapse section "12. Managing Red Hat Gluster Storage Logs" 12.1. Log Rotation 12.2. Red Hat Gluster Storage Component Logs and Location 12.3. Configuring the Log Format 12.4. Configuring the Log Level 12.5. Suppressing Repetitive Log Messages 12.6. Geo-replication Logs Expand section "12.6. Geo-replication Logs" Collapse section "12.6. Geo-replication Logs" 12.6.1. Viewing the Geo-replication Master Log Files 12.6.2. Viewing the Geo-replication Slave Log Files 13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions Expand section "13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" Collapse section "13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" 13.1. Location of Scripts 13.2. Prepackaged Scripts 14. Detecting BitRot Expand section "14. Detecting BitRot" Collapse section "14. Detecting BitRot" 14.1. Enabling and Disabling the BitRot daemon 14.2. Modifying BitRot Detection Behavior 14.3. Restoring a bad file 15. Incremental Backup Assistance using Glusterfind Expand section "15. Incremental Backup Assistance using Glusterfind" Collapse section "15. Incremental Backup Assistance using Glusterfind" 15.1. Glusterfind Configuration Options Expand section "15.1. Glusterfind Configuration Options" Collapse section "15.1. Glusterfind Configuration Options" 15.1.1. Adding or Replacing a Brick from an Existing Glusterfind Session 16. Managing Tiering Expand section "16. Managing Tiering" Collapse section "16. Managing Tiering" 16.1. Tiering Architecture 16.2. Key Benefits of Tiering 16.3. Tiering Limitations 16.4. Attaching a Tier to a Volume Expand section "16.4. Attaching a Tier to a Volume" Collapse section "16.4. Attaching a Tier to a Volume" 16.4.1. Attaching a Tier to a Geo-replicated Volume 16.5. Configuring a Tiering Volume Expand section "16.5. Configuring a Tiering Volume" Collapse section "16.5. Configuring a Tiering Volume" 16.5.1. Configuring Watermarks 16.5.2. Configuring Promote and Demote Frequency 16.5.3. Configuring Read and Write Frequency 16.5.4. Configuring Target Data Size 16.5.5. Configuring the File Count per Cycle 16.6. Displaying Tiering Status Information 16.7. Detaching a Tier from a Volume Expand section "16.7. Detaching a Tier from a Volume" Collapse section "16.7. Detaching a Tier from a Volume" 16.7.1. Detaching a Tier of a Geo-replicated Volume V. Monitor and Tune Expand section "V. Monitor and Tune" Collapse section "V. Monitor and Tune" 17. Monitoring Red Hat Gluster Storage Expand section "17. Monitoring Red Hat Gluster Storage" Collapse section "17. Monitoring Red Hat Gluster Storage" 17.1. Prerequisites 17.2. Installing Nagios Expand section "17.2. Installing Nagios" Collapse section "17.2. Installing Nagios" 17.2.1. Installing Nagios Server 17.2.2. Configuring Red Hat Gluster Storage Nodes for Nagios 17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool Expand section "17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool" Collapse section "17.3. Monitoring Red Hat Gluster Storage Trusted Storage Pool" 17.3.1. Configuring Nagios 17.3.2. Verifying the Configuration 17.3.3. Using Nagios Server GUI 17.4. Monitoring Notifications Expand section "17.4. Monitoring Notifications" Collapse section "17.4. Monitoring Notifications" 17.4.1. Configuring Nagios Server to Send Mail Notifications 17.4.2. Configuring Simple Network Management Protocol (SNMP) Notification 17.5. Nagios Advanced Configuration Expand section "17.5. Nagios Advanced Configuration" Collapse section "17.5. Nagios Advanced Configuration" 17.5.1. Creating Nagios User 17.5.2. Changing Nagios Password 17.5.3. Configuring SSL 17.5.4. Integrating LDAP Authentication with Nagios 17.6. Configuring Nagios Manually 17.7. Troubleshooting Nagios Expand section "17.7. Troubleshooting Nagios" Collapse section "17.7. Troubleshooting Nagios" 17.7.1. Troubleshooting NSCA and NRPE Configuration Issues 18. Monitoring Red Hat Gluster Storage Gluster Workload Expand section "18. Monitoring Red Hat Gluster Storage Gluster Workload" Collapse section "18. Monitoring Red Hat Gluster Storage Gluster Workload" 18.1. Profiling volumes Expand section "18.1. Profiling volumes" Collapse section "18.1. Profiling volumes" 18.1.1. Server-side volume profiling using volume profile Expand section "18.1.1. Server-side volume profiling using volume profile" Collapse section "18.1.1. Server-side volume profiling using volume profile" 18.1.1.1. Start Profiling 18.1.1.2. Displaying the I/O Information 18.1.1.3. Stop Profiling 18.1.2. Client-side volume profiling (FUSE only) 18.2. Running the Volume Top Command Expand section "18.2. Running the Volume Top Command" Collapse section "18.2. Running the Volume Top Command" 18.2.1. Viewing Open File Descriptor Count and Maximum File Descriptor Count 18.2.2. Viewing Highest File Read Calls 18.2.3. Viewing Highest File Write Calls 18.2.4. Viewing Highest Open Calls on a Directory 18.2.5. Viewing Highest Read Calls on a Directory 18.2.6. Viewing Read Performance 18.2.7. Viewing Write Performance 18.3. gstatus Command Expand section "18.3. gstatus Command" Collapse section "18.3. gstatus Command" 18.3.1. gstatus Command Expand section "18.3.1. gstatus Command" Collapse section "18.3.1. gstatus Command" 18.3.1.1. Prerequisites 18.3.2. Executing the gstatus command 18.4. Listing Volumes 18.5. Displaying Volume Information 18.6. Obtaining Node Information 18.7. Retrieving Current Volume Option Settings Expand section "18.7. Retrieving Current Volume Option Settings" Collapse section "18.7. Retrieving Current Volume Option Settings" 18.7.1. Retrieving Value of a Specific Volume Option 18.7.2. Retrieving all Options of a Volume 18.7.3. Retrieving all Global Options 18.8. Viewing complete volume state with statedump Expand section "18.8. Viewing complete volume state with statedump" Collapse section "18.8. Viewing complete volume state with statedump" 18.8.1. Gathering information from the server 18.8.2. Gathering information from the client 18.8.3. Controlling statedump output location 18.9. Displaying Volume Status 18.10. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool Expand section "18.10. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" Collapse section "18.10. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" 18.10.1. Troubleshooting a network issue in the Red Hat Gluster Storage Trusted Storage Pool 19. Managing Resource Usage 20. Tuning for Performance Expand section "20. Tuning for Performance" Collapse section "20. Tuning for Performance" 20.1. Disk Configuration Expand section "20.1. Disk Configuration" Collapse section "20.1. Disk Configuration" 20.1.1. Hardware RAID 20.1.2. JBOD 20.2. Brick Configuration Expand section "20.2. Brick Configuration" Collapse section "20.2. Brick Configuration" 20.2.1. Many Bricks per Node 20.2.2. Port Range Configuration 20.3. Network 20.4. Memory Expand section "20.4. Memory" Collapse section "20.4. Memory" 20.4.1. Virtual Memory Parameters 20.5. Small File Performance Enhancements Expand section "20.5. Small File Performance Enhancements" Collapse section "20.5. Small File Performance Enhancements" 20.5.1. Enabling Lookup Optimization 20.6. Replication 20.7. Directory Operations Expand section "20.7. Directory Operations" Collapse section "20.7. Directory Operations" 20.7.1. Enabling Metadata Caching 20.8. LVM Cache for Red Hat Gluster Storage Expand section "20.8. LVM Cache for Red Hat Gluster Storage" Collapse section "20.8. LVM Cache for Red Hat Gluster Storage" 20.8.1. About LVM Cache Expand section "20.8.1. About LVM Cache" Collapse section "20.8.1. About LVM Cache" 20.8.1.1. LVM Cache vs. DM-Cache 20.8.1.2. LVM Cache vs. Gluster Tiered Volumes 20.8.1.3. Arbiter Bricks 20.8.1.4. Writethrough vs. Writeback 20.8.1.5. Cache-Friendly Workloads 20.8.2. Choosing the Size and Speed of Your Cache Devices 20.8.3. Configuring LVM Cache 20.8.4. Managing LVM Cache Expand section "20.8.4. Managing LVM Cache" Collapse section "20.8.4. Managing LVM Cache" 20.8.4.1. Changing the Mode of an Existing Cache Pool 20.8.4.2. Checking Your Configuration 20.8.4.3. Detaching a Cache Pool 21. Nagios Configuration Files VI. Security Expand section "VI. Security" Collapse section "VI. Security" 22. Configuring Network Encryption in Red Hat Gluster Storage Expand section "22. Configuring Network Encryption in Red Hat Gluster Storage" Collapse section "22. Configuring Network Encryption in Red Hat Gluster Storage" 22.1. Preparing Certificates 22.2. Configuring Network Encryption for a New Trusted Storage Pool Expand section "22.2. Configuring Network Encryption for a New Trusted Storage Pool" Collapse section "22.2. Configuring Network Encryption for a New Trusted Storage Pool" 22.2.1. Enabling Management Encryption 22.2.2. Enabling I/O Encryption 22.3. Configuring Network Encryption for an existing Trusted Storage Pool Expand section "22.3. Configuring Network Encryption for an existing Trusted Storage Pool" Collapse section "22.3. Configuring Network Encryption for an existing Trusted Storage Pool" 22.3.1. Enabling I/O Encryption 22.4. Enabling Management Encryption 22.5. Expanding Volumes Expand section "22.5. Expanding Volumes" Collapse section "22.5. Expanding Volumes" 22.5.1. Certificate signed by a Common Certificate Authority 22.5.2. Self-signed Certificates 22.6. Authorizing a New Client Expand section "22.6. Authorizing a New Client" Collapse section "22.6. Authorizing a New Client" 22.6.1. Certificate Signed by a Common Certificate Authority 22.6.2. Self-signed Certificates 22.7. Deauthorizing a Client 22.8. Disabling Network Encryption VII. Troubleshoot Expand section "VII. Troubleshoot" Collapse section "VII. Troubleshoot" 23. Resolving Common Issues Expand section "23. Resolving Common Issues" Collapse section "23. Resolving Common Issues" 23.1. Identifying locked file and clear locks 23.2. Retrieving File Path from the Gluster Volume Expand section "23.2. Retrieving File Path from the Gluster Volume" Collapse section "23.2. Retrieving File Path from the Gluster Volume" 23.2.1. Retrieving Known File Name 23.2.2. Retrieving Unknown File Name 23.2.3. Retrieving File Path using gfid String 23.2.4. Controlling Self-heal for Dispersed Volumes 23.3. Resolving glusterd Crash 23.4. Restarting a dead/failed brick VIII. Appendices Expand section "VIII. Appendices" Collapse section "VIII. Appendices" 24. Starting and Stopping the glusterd service 25. Manually Recovering File Split-brain A. Revision History Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Gluster Storage Part VII. Troubleshoot Previous Next