Jump To Close Expand all Collapse all Table of contents Administration Guide I. Preface Expand section "I. Preface" Collapse section "I. Preface" 1. Preface Expand section "1. Preface" Collapse section "1. Preface" 1.1. About Red Hat Gluster Storage 1.2. About glusterFS 1.3. About On-premises Installation II. Overview Expand section "II. Overview" Collapse section "II. Overview" 2. Architecture and Concepts Expand section "2. Architecture and Concepts" Collapse section "2. Architecture and Concepts" 2.1. Architecture 2.2. On-premises Architecture 2.3. Storage Concepts III. Configure and Verify Expand section "III. Configure and Verify" Collapse section "III. Configure and Verify" 3. Considerations for Red Hat Gluster Storage Expand section "3. Considerations for Red Hat Gluster Storage" Collapse section "3. Considerations for Red Hat Gluster Storage" 3.1. Firewall and Port Access Expand section "3.1. Firewall and Port Access" Collapse section "3.1. Firewall and Port Access" 3.1.1. Configuring the Firewall 3.1.2. Port Access Requirements 3.2. Feature Compatibility Support 4. Adding Servers to the Trusted Storage Pool Expand section "4. Adding Servers to the Trusted Storage Pool" Collapse section "4. Adding Servers to the Trusted Storage Pool" 4.1. Adding Servers to the Trusted Storage Pool 4.2. Removing Servers from the Trusted Storage Pool 5. Setting Up Storage Volumes Expand section "5. Setting Up Storage Volumes" Collapse section "5. Setting Up Storage Volumes" 5.1. Setting up Gluster Storage Volumes using gdeploy Expand section "5.1. Setting up Gluster Storage Volumes using gdeploy" Collapse section "5.1. Setting up Gluster Storage Volumes using gdeploy" 5.1.1. Getting Started 5.1.2. Setting up a Trusted Storage Pool 5.1.3. Setting up the Backend Expand section "5.1.3. Setting up the Backend " Collapse section "5.1.3. Setting up the Backend " 5.1.3.1. Using the [backend-setup] Module 5.1.3.2. Creating Backend by Setting up PV, VG, and LV 5.1.4. Creating Volumes 5.1.5. Mounting Clients 5.1.6. Configuring a Volume Expand section "5.1.6. Configuring a Volume" Collapse section "5.1.6. Configuring a Volume" 5.1.6.1. Adding and Removing a Brick 5.1.6.2. Rebalancing a Volume 5.1.6.3. Starting, Stopping, or Deleting a Volume 5.1.7. Configuration File 5.1.8. Deploying NFS Ganesha using gdeploy Expand section "5.1.8. Deploying NFS Ganesha using gdeploy" Collapse section "5.1.8. Deploying NFS Ganesha using gdeploy" 5.1.8.1. Prerequisites 5.1.8.2. Supported Actions 5.1.9. Deploying Samba / CTDB using gdeploy Expand section "5.1.9. Deploying Samba / CTDB using gdeploy" Collapse section "5.1.9. Deploying Samba / CTDB using gdeploy" 5.1.9.1. Prerequisites 5.1.9.2. Setting up Samba 5.1.9.3. Setting up CTDB 5.1.10. Enabling SSL on a Volume Expand section "5.1.10. Enabling SSL on a Volume" Collapse section "5.1.10. Enabling SSL on a Volume" 5.1.10.1. Creating a Volume and Enabling SSL 5.1.10.2. Enabling SSL on an Existing Volume: 5.1.11. Gdeploy log files 5.2. About Encrypted Disk 5.3. Formatting and Mounting Bricks Expand section "5.3. Formatting and Mounting Bricks" Collapse section "5.3. Formatting and Mounting Bricks" 5.3.1. Creating Bricks Manually Expand section "5.3.1. Creating Bricks Manually" Collapse section "5.3.1. Creating Bricks Manually" 5.3.1.1. Creating a Thinly Provisioned Logical Volume 5.3.2. Using Subdirectory as the Brick for Volume 5.3.3. Reusing a Brick from a Deleted Volume 5.3.4. Cleaning An Unusable Brick 5.4. Creating Distributed Volumes 5.5. Creating Replicated Volumes Expand section "5.5. Creating Replicated Volumes" Collapse section "5.5. Creating Replicated Volumes" 5.5.1. Creating Three-way Replicated Volumes 5.5.2. Creating Sharded Replicated Volumes Expand section "5.5.2. Creating Sharded Replicated Volumes" Collapse section "5.5.2. Creating Sharded Replicated Volumes" 5.5.2.1. Supported use cases 5.5.2.2. Configuration Options 5.5.2.3. Finding the pieces of a sharded file 5.6. Creating Distributed Replicated Volumes Expand section "5.6. Creating Distributed Replicated Volumes" Collapse section "5.6. Creating Distributed Replicated Volumes" 5.6.1. Creating Three-way Distributed Replicated Volumes 5.7. Creating Arbitrated Replicated Volumes Expand section "5.7. Creating Arbitrated Replicated Volumes" Collapse section "5.7. Creating Arbitrated Replicated Volumes" 5.7.1. Arbitrated volume requirements Expand section "5.7.1. Arbitrated volume requirements" Collapse section "5.7.1. Arbitrated volume requirements" 5.7.1.1. System requirements for nodes hosting arbiter bricks 5.7.1.2. Arbiter capacity requirements 5.7.2. Arbitration logic 5.7.3. Creating an arbitrated replicated volume 5.7.4. Creating multiple arbitrated replicated volumes across fewer total nodes 5.7.5. Converting to an arbitrated volume 5.7.6. Converting an arbitrated volume to a three-way replicated volume 5.7.7. Tuning recommendations for arbitrated volumes 5.8. Creating Dispersed Volumes 5.9. Creating Distributed Dispersed Volumes 5.10. Starting Volumes 6. Creating Access to Volumes Expand section "6. Creating Access to Volumes" Collapse section "6. Creating Access to Volumes" 6.1. Client Support Information Expand section "6.1. Client Support Information" Collapse section "6.1. Client Support Information" 6.1.1. Cross Protocol Data Access 6.1.2. Client Operating System Protocol Support 6.1.3. Transport Protocol Support 6.2. Native Client Expand section "6.2. Native Client" Collapse section "6.2. Native Client" 6.2.1. Installing Native Client 6.2.2. Upgrading Native Client 6.2.3. Mounting Red Hat Gluster Storage Volumes Expand section "6.2.3. Mounting Red Hat Gluster Storage Volumes" Collapse section "6.2.3. Mounting Red Hat Gluster Storage Volumes" 6.2.3.1. Mount Commands and Options 6.2.3.2. Mounting Volumes Manually 6.2.3.3. Mounting Volumes Automatically 6.2.3.4. Manually Mounting Sub-directories Using Native Client 6.2.3.5. Testing Mounted Volumes 6.3. NFS Expand section "6.3. NFS" Collapse section "6.3. NFS" 6.3.1. Support Matrix 6.3.2. Gluster NFS (Deprecated) Expand section "6.3.2. Gluster NFS (Deprecated)" Collapse section "6.3.2. Gluster NFS (Deprecated)" 6.3.2.1. Setting up CTDB for Gluster NFS (Deprecated) Expand section "6.3.2.1. Setting up CTDB for Gluster NFS (Deprecated) " Collapse section "6.3.2.1. Setting up CTDB for Gluster NFS (Deprecated) " 6.3.2.1.1. Prerequisites 6.3.2.1.2. Port and Firewall Information for Gluster NFS 6.3.2.1.3. Configuring CTDB on Red Hat Gluster Storage Server 6.3.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes (Deprecated) Expand section "6.3.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes (Deprecated)" Collapse section "6.3.2.2. Using Gluster NFS to Mount Red Hat Gluster Storage Volumes (Deprecated)" 6.3.2.2.1. Manually Mounting Volumes Using Gluster NFS (Deprecated) 6.3.2.2.2. Automatically Mounting Volumes Using Gluster NFS (Deprecated) 6.3.2.2.3. Automatically Mounting Subdirectories Using NFS (Deprecated) 6.3.2.2.4. Testing Volumes Mounted Using Gluster NFS (Deprecated) 6.3.2.3. Troubleshooting Gluster NFS (Deprecated) 6.3.3. NFS Ganesha Expand section "6.3.3. NFS Ganesha" Collapse section "6.3.3. NFS Ganesha" 6.3.3.1. Supported Features of NFS-Ganesha 6.3.3.2. Setting up NFS Ganesha Expand section "6.3.3.2. Setting up NFS Ganesha" Collapse section "6.3.3.2. Setting up NFS Ganesha" 6.3.3.2.1. Port and Firewall Information for NFS-Ganesha 6.3.3.2.2. Prerequisites to run NFS-Ganesha 6.3.3.2.3. Configuring the Cluster Services 6.3.3.2.4. Creating the ganesha-ha.conf file 6.3.3.2.5. Configuring NFS-Ganesha using Gluster CLI 6.3.3.2.6. Exporting and Unexporting Volumes through NFS-Ganesha 6.3.3.2.7. Verifying the NFS-Ganesha Status 6.3.3.3. Accessing NFS-Ganesha Exports Expand section "6.3.3.3. Accessing NFS-Ganesha Exports" Collapse section "6.3.3.3. Accessing NFS-Ganesha Exports" 6.3.3.3.1. Mounting exports in NFSv3 Mode 6.3.3.3.2. Mounting exports in NFSv4 Mode 6.3.3.3.3. Finding clients of an NFS server using dbus 6.3.3.3.4. Finding authorized client list and other information from an NFS server using dbus 6.3.3.4. Modifying the NFS-Ganesha HA Setup Expand section "6.3.3.4. Modifying the NFS-Ganesha HA Setup" Collapse section "6.3.3.4. Modifying the NFS-Ganesha HA Setup" 6.3.3.4.1. Adding a Node to the Cluster 6.3.3.4.2. Deleting a Node in the Cluster 6.3.3.4.3. Replacing a Node in the Cluster 6.3.3.5. Modifying the Default Export Configurations Expand section "6.3.3.5. Modifying the Default Export Configurations" Collapse section "6.3.3.5. Modifying the Default Export Configurations" 6.3.3.5.1. Providing Permissions for Specific Clients 6.3.3.5.2. Enabling and Disabling NFSv4 ACLs 6.3.3.5.3. Providing Pseudo Path for NFSv4 Mount 6.3.3.5.4. Exporting Subdirectories Expand section "6.3.3.5.4. Exporting Subdirectories" Collapse section "6.3.3.5.4. Exporting Subdirectories" 6.3.3.5.4.1. Enabling all_squash option 6.3.3.5.5. Unexporting Subdirectories 6.3.3.6. Configuring Kerberized NFS-Ganesha Expand section "6.3.3.6. Configuring Kerberized NFS-Ganesha" Collapse section "6.3.3.6. Configuring Kerberized NFS-Ganesha" 6.3.3.6.1. Setting up the NFS-Ganesha Server 6.3.3.6.2. Setting up the NFS Client 6.3.3.7. NFS-Ganesha Service Downtime Expand section "6.3.3.7. NFS-Ganesha Service Downtime" Collapse section "6.3.3.7. NFS-Ganesha Service Downtime" 6.3.3.7.1. Modifying the Fail-over Time 6.3.3.8. Tuning Readdir Performance for NFS-Ganesha 6.3.3.9. Troubleshooting NFS Ganesha 6.4. SMB Expand section "6.4. SMB" Collapse section "6.4. SMB" 6.4.1. Requirements for using SMB with Red Hat Gluster Storage 6.4.2. Setting up CTDB for Samba 6.4.3. Sharing Volumes over SMB 6.4.4. Configuring User Access to Shared Volumes Expand section "6.4.4. Configuring User Access to Shared Volumes" Collapse section "6.4.4. Configuring User Access to Shared Volumes" 6.4.4.1. Configuring the Apple Create Context for macOS users 6.4.4.2. Configuring read/write access for a non-privileged user 6.4.5. Mounting Volumes using SMB Expand section "6.4.5. Mounting Volumes using SMB" Collapse section "6.4.5. Mounting Volumes using SMB" 6.4.5.1. Manually mounting volumes exported with SMB on Red Hat Enterprise Linux 6.4.5.2. Manually mounting volumes exported with SMB on Microsoft Windows Expand section "6.4.5.2. Manually mounting volumes exported with SMB on Microsoft Windows" Collapse section "6.4.5.2. Manually mounting volumes exported with SMB on Microsoft Windows" 6.4.5.2.1. Using Microsoft Windows Explorer to manually mount a volume 6.4.5.2.2. Using Microsoft Windows command line interface to manually mount a volume 6.4.5.3. Manually mounting volumes exported with SMB on macOS 6.4.5.4. Configuring automatic mounting for volumes exported with SMB on Red Hat Enterprise Linux 6.4.5.5. Configuring automatic mounting for volumes exported with SMB on Microsoft Windows 6.4.5.6. Configuring automatic mounting for volumes exported with SMB on macOS 6.4.6. Starting and Verifying your Configuration 6.4.7. Disabling SMB Shares 6.4.8. Accessing Snapshots in Windows Expand section "6.4.8. Accessing Snapshots in Windows" Collapse section "6.4.8. Accessing Snapshots in Windows" 6.4.8.1. Configuring Shadow Copy 6.4.8.2. Accessing Snapshot 6.4.9. Tuning Performance Expand section "6.4.9. Tuning Performance" Collapse section "6.4.9. Tuning Performance" 6.4.9.1. Enabling Metadata Caching 6.4.9.2. Enhancing Directory Listing Performance 6.4.9.3. Enhancing File/Directory Create Performance 6.5. POSIX Access Control Lists Expand section "6.5. POSIX Access Control Lists" Collapse section "6.5. POSIX Access Control Lists" 6.5.1. Setting ACLs with setfacl 6.5.2. Checking current ACLs with getfacl 6.5.3. Mounting volumes with ACLs enabled 6.5.4. Checking ACL enablement on a mounted volume 6.6. Checking Client Operating Versions 7. Integrating Red Hat Gluster Storage with Windows Active Directory Expand section "7. Integrating Red Hat Gluster Storage with Windows Active Directory" Collapse section "7. Integrating Red Hat Gluster Storage with Windows Active Directory" 7.1. Prerequisites 7.2. Integration Expand section "7.2. Integration" Collapse section "7.2. Integration" 7.2.1. Configure Authentication Expand section "7.2.1. Configure Authentication " Collapse section "7.2.1. Configure Authentication " 7.2.1.1. Basic Samba Configuration 7.2.1.2. Alternative Configuration using ad backend 7.2.1.3. Verifying the Samba Configuration 7.2.1.4. nsswitch Configuration 7.2.2. Join Active Directory Domain 7.2.3. Verify/Test Active Directory and Services IV. Manage Expand section "IV. Manage" Collapse section "IV. Manage" 8. Managing Snapshots Expand section "8. Managing Snapshots" Collapse section "8. Managing Snapshots" 8.1. Prerequisites 8.2. Creating Snapshots 8.3. Cloning a Snapshot 8.4. Listing of Available Snapshots 8.5. Getting Information of all the Available Snapshots 8.6. Getting the Status of Available Snapshots 8.7. Configuring Snapshot Behavior 8.8. Activating and Deactivating a Snapshot 8.9. Deleting Snapshot Expand section "8.9. Deleting Snapshot" Collapse section "8.9. Deleting Snapshot" 8.9.1. Deleting Multiple Snapshots 8.10. Restoring Snapshot 8.11. Accessing Snapshots 8.12. Scheduling of Snapshots Expand section "8.12. Scheduling of Snapshots " Collapse section "8.12. Scheduling of Snapshots " 8.12.1. Prerequisites 8.12.2. Snapshot Scheduler Options 8.13. User Serviceable Snapshots Expand section "8.13. User Serviceable Snapshots" Collapse section "8.13. User Serviceable Snapshots" 8.13.1. Enabling and Disabling User Serviceable Snapshot 8.13.2. Viewing and Retrieving Snapshots using NFS / FUSE 8.13.3. Viewing and Retrieving Snapshots using CIFS for Windows Client 8.14. Troubleshooting Snapshots 9. Managing Directory Quotas Expand section "9. Managing Directory Quotas" Collapse section "9. Managing Directory Quotas" 9.1. Enabling and Disabling Quotas 9.2. Before Setting a Quota on a Directory 9.3. Limiting Disk Usage Expand section "9.3. Limiting Disk Usage" Collapse section "9.3. Limiting Disk Usage" 9.3.1. Setting Disk Usage Limits 9.3.2. Viewing Current Disk Usage Limits Expand section "9.3.2. Viewing Current Disk Usage Limits" Collapse section "9.3.2. Viewing Current Disk Usage Limits" 9.3.2.1. Viewing Quota Limit Information Using the df Utility 9.3.3. Setting Quota Check Frequency (Timeouts) 9.3.4. Setting Logging Frequency (Alert Time) 9.3.5. Removing Disk Usage Limits 10. Managing Geo-replication Expand section "10. Managing Geo-replication" Collapse section "10. Managing Geo-replication" 10.1. About Geo-replication 10.2. Replicated Volumes vs Geo-replication 10.3. Preparing to Deploy Geo-replication Expand section "10.3. Preparing to Deploy Geo-replication" Collapse section "10.3. Preparing to Deploy Geo-replication" 10.3.1. Exploring Geo-replication Deployment Scenarios 10.3.2. Geo-replication Deployment Overview 10.3.3. Prerequisites 10.3.4. Setting Up your Environment Expand section "10.3.4. Setting Up your Environment " Collapse section "10.3.4. Setting Up your Environment " 10.3.4.1. Setting Up your Environment for Geo-replication Session 10.3.4.2. Setting Up your Environment for a Secure Geo-replication Slave 10.3.5. Configuring a Meta-Volume 10.4. Starting Geo-replication Expand section "10.4. Starting Geo-replication" Collapse section "10.4. Starting Geo-replication" 10.4.1. Starting a Geo-replication Session 10.4.2. Verifying a Successful Geo-replication Deployment 10.4.3. Displaying Geo-replication Status Information 10.4.4. Configuring a Geo-replication Session Expand section "10.4.4. Configuring a Geo-replication Session" Collapse section "10.4.4. Configuring a Geo-replication Session" 10.4.4.1. Geo-replication Checkpoints Expand section "10.4.4.1. Geo-replication Checkpoints" Collapse section "10.4.4.1. Geo-replication Checkpoints" 10.4.4.1.1. About Geo-replication Checkpoints 10.4.4.1.2. Configuring and Viewing Geo-replication Checkpoint Information 10.4.5. Stopping a Geo-replication Session 10.4.6. Deleting a Geo-replication Session 10.5. Setting up Geo-replication using gdeploy Expand section "10.5. Setting up Geo-replication using gdeploy" Collapse section "10.5. Setting up Geo-replication using gdeploy" 10.5.1. Setting up geo-replication as root user using gdeploy 10.5.2. Setting up a secure geo-replication session using gdeploy 10.5.3. Controlling geo-replication sessions using gdeploy 10.6. Starting Geo-replication on a Newly Added Brick, Node, or Volume Expand section "10.6. Starting Geo-replication on a Newly Added Brick, Node, or Volume" Collapse section "10.6. Starting Geo-replication on a Newly Added Brick, Node, or Volume" 10.6.1. Starting Geo-replication for a New Brick or New Node 10.6.2. Starting Geo-replication for a New Brick on an Existing Node 10.6.3. Starting Geo-replication for a New Volume 10.7. Scheduling Geo-replication as a Cron Job 10.8. Disaster Recovery Expand section "10.8. Disaster Recovery" Collapse section "10.8. Disaster Recovery" 10.8.1. Failover: Promoting a Slave to Master 10.8.2. Failback: Resuming Master and Slave back to their Original State 10.9. Creating a Snapshot of Geo-replicated Volume 10.10. Example - Setting up Cascading Geo-replication 10.11. Recommended Practices 10.12. Troubleshooting Geo-replication Expand section "10.12. Troubleshooting Geo-replication" Collapse section "10.12. Troubleshooting Geo-replication" 10.12.1. Tuning Geo-replication performance with Change Log 10.12.2. Triggering Explicit Sync on Entries 10.12.3. Synchronization Is Not Complete 10.12.4. Issues with File Synchronization 10.12.5. Geo-replication Status is Often Faulty 10.12.6. Intermediate Master is in a Faulty State 10.12.7. Remote gsyncd Not Found 11. Managing Red Hat Gluster Storage Volumes Expand section "11. Managing Red Hat Gluster Storage Volumes" Collapse section "11. Managing Red Hat Gluster Storage Volumes" 11.1. Configuring Volume Options 11.2. Setting Multiple Volume Option 11.3. Supported Volume Options 11.4. Configuring a volume to be mounted read-only 11.5. Configuring Transport Types for a Volume 11.6. Reserving Storage on a Volume 11.7. Expanding Volumes Expand section "11.7. Expanding Volumes" Collapse section "11.7. Expanding Volumes" 11.7.1. Expanding a Tiered Volume Expand section "11.7.1. Expanding a Tiered Volume" Collapse section "11.7.1. Expanding a Tiered Volume" 11.7.1.1. Expanding a Cold Tier Volume 11.7.1.2. Expanding a Hot Tier Volume 11.7.2. Expanding a Dispersed or Distributed-dispersed Volume 11.7.3. Expanding Underlying Logical Volume 11.8. Shrinking Volumes Expand section "11.8. Shrinking Volumes" Collapse section "11.8. Shrinking Volumes" 11.8.1. Shrinking a Geo-replicated Volume 11.8.2. Shrinking a Tiered Volume Expand section "11.8.2. Shrinking a Tiered Volume " Collapse section "11.8.2. Shrinking a Tiered Volume " 11.8.2.1. Shrinking a Cold Tier Volume 11.8.2.2. Shrinking a Hot Tier Volume 11.8.3. Stopping a remove-brick Operation 11.9. Migrating Volumes Expand section "11.9. Migrating Volumes" Collapse section "11.9. Migrating Volumes" 11.9.1. Replacing a Subvolume on a Distribute or Distribute-replicate Volume 11.9.2. Replacing an Old Brick with a New Brick on a Replicate or Distribute-replicate Volume 11.9.3. Replacing an Old Brick with a New Brick on a Distribute Volume 11.9.4. Replacing an Old Brick with a New Brick on a Dispersed or Distributed-dispersed Volume 11.9.5. Reconfiguring a Brick in a Volume 11.10. Replacing Hosts Expand section "11.10. Replacing Hosts" Collapse section "11.10. Replacing Hosts" 11.10.1. Replacing a Host Machine with a Different Hostname 11.10.2. Replacing a Host Machine with the Same Hostname 11.11. Rebalancing Volumes Expand section "11.11. Rebalancing Volumes" Collapse section "11.11. Rebalancing Volumes" 11.11.1. Rebalance Throttling 11.11.2. Displaying Rebalance Progress 11.11.3. Stopping a Rebalance Operation 11.12. Setting up Shared Storage Volume 11.13. Stopping Volumes 11.14. Deleting Volumes 11.15. Managing Split-brain Expand section "11.15. Managing Split-brain" Collapse section "11.15. Managing Split-brain" 11.15.1. Preventing Split-brain Expand section "11.15.1. Preventing Split-brain" Collapse section "11.15.1. Preventing Split-brain" 11.15.1.1. Configuring Server-Side Quorum 11.15.1.2. Configuring Client-Side Quorum 11.15.2. Recovering from File Split-brain Expand section "11.15.2. Recovering from File Split-brain" Collapse section "11.15.2. Recovering from File Split-brain" 11.15.2.1. Recovering File Split-brain from the Mount Point 11.15.2.2. Recovering File Split-brain from the gluster CLI 11.15.3. Recovering GFID Split-brain from the gluster CLI 11.15.4. Triggering Self-Healing on Replicated Volumes 11.16. Recommended Configurations - Dispersed Volume 11.17. Consistent time attributes within Replica and Disperse subvolumes Expand section "11.17. Consistent time attributes within Replica and Disperse subvolumes" Collapse section "11.17. Consistent time attributes within Replica and Disperse subvolumes" 11.17.1. Pre-requisites 11.17.2. Enabling and disabling the Consistent Time Feature 11.17.3. Advantages of Consistent Time Feature 11.17.4. Extended Attribute Format 11.17.5. Upgrade 11.17.6. Limitations 12. Managing Red Hat Gluster Storage Logs Expand section "12. Managing Red Hat Gluster Storage Logs" Collapse section "12. Managing Red Hat Gluster Storage Logs" 12.1. Log Rotation 12.2. Red Hat Gluster Storage Component Logs and Location 12.3. Configuring the Log Format 12.4. Configuring the Log Level 12.5. Suppressing Repetitive Log Messages 12.6. Geo-replication Logs Expand section "12.6. Geo-replication Logs" Collapse section "12.6. Geo-replication Logs" 12.6.1. Viewing the Geo-replication Master Log Files 12.6.2. Viewing the Geo-replication Slave Log Files 13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions Expand section "13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" Collapse section "13. Managing Red Hat Gluster Storage Volume Life-Cycle Extensions" 13.1. Location of Scripts 13.2. Prepackaged Scripts 14. Detecting BitRot Expand section "14. Detecting BitRot" Collapse section "14. Detecting BitRot" 14.1. Enabling and Disabling the BitRot daemon 14.2. Modifying BitRot Detection Behavior 14.3. Restoring a bad file 15. Incremental Backup Assistance using Glusterfind Expand section "15. Incremental Backup Assistance using Glusterfind" Collapse section "15. Incremental Backup Assistance using Glusterfind" 15.1. Glusterfind Configuration Options Expand section "15.1. Glusterfind Configuration Options" Collapse section "15.1. Glusterfind Configuration Options" 15.1.1. Adding or Replacing a Brick from an Existing Glusterfind Session 16. Managing Tiering (Deprecated) Expand section "16. Managing Tiering (Deprecated)" Collapse section "16. Managing Tiering (Deprecated)" 16.1. Tiering Architecture (Deprecated) 16.2. Key Benefits of Tiering (Deprecated) 16.3. Tiering Limitations (Deprecated) 16.4. Attaching a Tier to a Volume (Deprecated) Expand section "16.4. Attaching a Tier to a Volume (Deprecated)" Collapse section "16.4. Attaching a Tier to a Volume (Deprecated)" 16.4.1. Attaching a Tier to a Geo-replicated Volume (Deprecated) 16.5. Configuring a Tiering Volume (Deprecated) Expand section "16.5. Configuring a Tiering Volume (Deprecated)" Collapse section "16.5. Configuring a Tiering Volume (Deprecated)" 16.5.1. Configuring Watermarks (Deprecated) 16.5.2. Configuring Promote and Demote Frequency (Deprecated) 16.5.3. Configuring Read and Write Frequency (Deprecated) 16.5.4. Configuring Target Data Size (Deprecated) 16.5.5. Configuring the File Count per Cycle (Deprecated) 16.6. Displaying Tiering Status Information (Deprecated) 16.7. Detaching a Tier from a Volume (Deprecated) Expand section "16.7. Detaching a Tier from a Volume (Deprecated)" Collapse section "16.7. Detaching a Tier from a Volume (Deprecated)" 16.7.1. Detaching a Tier of a Geo-replicated Volume (Deprecated) V. Monitor and Tune Expand section "V. Monitor and Tune" Collapse section "V. Monitor and Tune" 17. Monitoring Red Hat Gluster Storage Gluster Workload Expand section "17. Monitoring Red Hat Gluster Storage Gluster Workload" Collapse section "17. Monitoring Red Hat Gluster Storage Gluster Workload" 17.1. Profiling volumes Expand section "17.1. Profiling volumes" Collapse section "17.1. Profiling volumes" 17.1.1. Server-side volume profiling using volume profile Expand section "17.1.1. Server-side volume profiling using volume profile" Collapse section "17.1.1. Server-side volume profiling using volume profile" 17.1.1.1. Start Profiling 17.1.1.2. Displaying the I/O Information 17.1.1.3. Stop Profiling 17.1.2. Client-side volume profiling (FUSE only) 17.2. Running the Volume Top Command Expand section "17.2. Running the Volume Top Command" Collapse section "17.2. Running the Volume Top Command" 17.2.1. Viewing Open File Descriptor Count and Maximum File Descriptor Count 17.2.2. Viewing Highest File Read Calls 17.2.3. Viewing Highest File Write Calls 17.2.4. Viewing Highest Open Calls on a Directory 17.2.5. Viewing Highest Read Calls on a Directory 17.2.6. Viewing Read Performance 17.2.7. Viewing Write Performance 17.3. Listing Volumes 17.4. Displaying Volume Information 17.5. Obtaining Node Information 17.6. Retrieving Current Volume Option Settings Expand section "17.6. Retrieving Current Volume Option Settings" Collapse section "17.6. Retrieving Current Volume Option Settings" 17.6.1. Retrieving Value of a Specific Volume Option 17.6.2. Retrieving all Options of a Volume 17.6.3. Retrieving all Global Options 17.7. Viewing complete volume state with statedump Expand section "17.7. Viewing complete volume state with statedump" Collapse section "17.7. Viewing complete volume state with statedump" 17.7.1. Gathering information from the server 17.7.2. Gathering information from the client 17.7.3. Controlling statedump output location 17.8. Displaying Volume Status 17.9. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool Expand section "17.9. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" Collapse section "17.9. Troubleshooting issues in the Red Hat Gluster Storage Trusted Storage Pool" 17.9.1. Troubleshooting a network issue in the Red Hat Gluster Storage Trusted Storage Pool 18. Managing Resource Usage 19. Tuning for Performance Expand section "19. Tuning for Performance" Collapse section "19. Tuning for Performance" 19.1. Disk Configuration Expand section "19.1. Disk Configuration" Collapse section "19.1. Disk Configuration" 19.1.1. Hardware RAID 19.1.2. JBOD 19.2. Brick Configuration Expand section "19.2. Brick Configuration" Collapse section "19.2. Brick Configuration" 19.2.1. Many Bricks per Node 19.2.2. Port Range Configuration 19.3. Network 19.4. Memory Expand section "19.4. Memory" Collapse section "19.4. Memory" 19.4.1. Virtual Memory Parameters 19.5. Small File Performance Enhancements Expand section "19.5. Small File Performance Enhancements" Collapse section "19.5. Small File Performance Enhancements" 19.5.1. Enabling Lookup Optimization 19.6. Replication 19.7. Directory Operations Expand section "19.7. Directory Operations" Collapse section "19.7. Directory Operations" 19.7.1. Enabling Metadata Caching 19.8. LVM Cache for Red Hat Gluster Storage Expand section "19.8. LVM Cache for Red Hat Gluster Storage" Collapse section "19.8. LVM Cache for Red Hat Gluster Storage" 19.8.1. About LVM Cache Expand section "19.8.1. About LVM Cache" Collapse section "19.8.1. About LVM Cache" 19.8.1.1. LVM Cache vs. DM-Cache 19.8.1.2. LVM Cache vs. Gluster Tiered Volumes 19.8.1.3. Arbiter Bricks 19.8.1.4. Writethrough vs. Writeback 19.8.1.5. Cache-Friendly Workloads 19.8.2. Choosing the Size and Speed of Your Cache Devices 19.8.3. Configuring LVM Cache 19.8.4. Managing LVM Cache Expand section "19.8.4. Managing LVM Cache" Collapse section "19.8.4. Managing LVM Cache" 19.8.4.1. Changing the Mode of an Existing Cache Pool 19.8.4.2. Checking Your Configuration 19.8.4.3. Detaching a Cache Pool VI. Security Expand section "VI. Security" Collapse section "VI. Security" 20. Configuring Network Encryption in Red Hat Gluster Storage Expand section "20. Configuring Network Encryption in Red Hat Gluster Storage" Collapse section "20. Configuring Network Encryption in Red Hat Gluster Storage" 20.1. Preparing Certificates 20.2. Configuring Network Encryption for a New Trusted Storage Pool Expand section "20.2. Configuring Network Encryption for a New Trusted Storage Pool" Collapse section "20.2. Configuring Network Encryption for a New Trusted Storage Pool" 20.2.1. Enabling Management Encryption 20.2.2. Enabling I/O Encryption 20.3. Configuring Network Encryption for an existing Trusted Storage Pool Expand section "20.3. Configuring Network Encryption for an existing Trusted Storage Pool" Collapse section "20.3. Configuring Network Encryption for an existing Trusted Storage Pool" 20.3.1. Enabling I/O Encryption 20.4. Enabling Management Encryption 20.5. Expanding Volumes Expand section "20.5. Expanding Volumes" Collapse section "20.5. Expanding Volumes" 20.5.1. Certificate signed by a Common Certificate Authority 20.5.2. Self-signed Certificates 20.6. Authorizing a New Client Expand section "20.6. Authorizing a New Client" Collapse section "20.6. Authorizing a New Client" 20.6.1. Certificate Signed by a Common Certificate Authority 20.6.2. Self-signed Certificates 20.7. Deauthorizing a Client Expand section "20.7. Deauthorizing a Client" Collapse section "20.7. Deauthorizing a Client" 20.7.1. To Remove an Authorized Client From the Allowed List 20.7.2. To Revoke SSL/TLS Certificate Authorization Using a SSL Certificate Revocation List 20.8. Disabling Network Encryption VII. Troubleshoot Expand section "VII. Troubleshoot" Collapse section "VII. Troubleshoot" 21. Resolving Common Issues Expand section "21. Resolving Common Issues" Collapse section "21. Resolving Common Issues" 21.1. Identifying locked file and clear locks 21.2. Retrieving File Path from the Gluster Volume Expand section "21.2. Retrieving File Path from the Gluster Volume" Collapse section "21.2. Retrieving File Path from the Gluster Volume" 21.2.1. Retrieving Known File Name 21.2.2. Retrieving Unknown File Name 21.2.3. Retrieving File Path using gfid String 21.2.4. Controlling Self-heal for Dispersed Volumes 21.3. Resolving glusterd Crash 21.4. Restarting a dead/failed brick 21.5. Deactivating a group configuration VIII. Appendices Expand section "VIII. Appendices" Collapse section "VIII. Appendices" 22. Starting and Stopping the glusterd service 23. Manually Recovering File Split-brain A. Revision History Legal Notice Settings Close Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 English Language: 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Part III. Configure and Verify Previous Next