Jump To Close Expand all Collapse all Table of contents Administration Guide I. Overview Expand section "I. Overview" Collapse section "I. Overview" 1. Platform Introduction Expand section "1. Platform Introduction" Collapse section "1. Platform Introduction" 1.1. About Red Hat Storage 1.2. About glusterFS 1.3. About On-premise Installation 1.4. About Public Cloud Installation 2. Red Hat Storage Architecture and Concepts Expand section "2. Red Hat Storage Architecture and Concepts" Collapse section "2. Red Hat Storage Architecture and Concepts" 2.1. Red Hat Storage Architecture 2.2. Red Hat Storage Server for On-premise Architecture 2.3. Red Hat Storage Server for Public Cloud Architecture 2.4. Storage Concepts 3. Key Features Expand section "3. Key Features" Collapse section "3. Key Features" 3.1. Elasticity 3.2. No Metadata with the Elastic Hashing Algorithm 3.3. Scalability 3.4. High Availability and Flexibility 3.5. Flexibility 3.6. No Application Rewrites 3.7. Simple Management 3.8. Modular, Stackable Design II. Red Hat Storage Administration On-Premise Expand section "II. Red Hat Storage Administration On-Premise" Collapse section "II. Red Hat Storage Administration On-Premise" 4. The glusterd Service Expand section "4. The glusterd Service" Collapse section "4. The glusterd Service" 4.1. Starting and Stopping the glusterd service 5. Trusted Storage Pools Expand section "5. Trusted Storage Pools" Collapse section "5. Trusted Storage Pools" 5.1. Adding Servers to the Trusted Storage Pool 5.2. Removing Servers from the Trusted Storage Pool 6. Red Hat Storage Volumes Expand section "6. Red Hat Storage Volumes" Collapse section "6. Red Hat Storage Volumes" 6.1. About Encrypted Disk 6.2. Formatting and Mounting Bricks 6.3. Creating Distributed Volumes 6.4. Creating Replicated Volumes Expand section "6.4. Creating Replicated Volumes" Collapse section "6.4. Creating Replicated Volumes" 6.4.1. Creating Two-way Replicated Volumes 6.4.2. Creating Three-way Replicated Volumes 6.5. Creating Distributed Replicated Volumes Expand section "6.5. Creating Distributed Replicated Volumes" Collapse section "6.5. Creating Distributed Replicated Volumes" 6.5.1. Creating Two-way Distributed Replicated Volumes 6.5.2. Creating Three-way Distributed Replicated Volumes 6.6. Creating Striped Volumes 6.7. Creating Distributed Striped Volumes 6.8. Creating Striped Replicated Volumes 6.9. Creating Distributed Striped Replicated Volumes 6.10. Starting Volumes 7. Accessing Data - Setting Up Clients Expand section "7. Accessing Data - Setting Up Clients" Collapse section "7. Accessing Data - Setting Up Clients" 7.1. Securing Red Hat Storage Client Access 7.2. Native Client Expand section "7.2. Native Client" Collapse section "7.2. Native Client" 7.2.1. Installing Native Client 7.2.2. Upgrading Native Client 7.2.3. Mounting Red Hat Storage Volumes 7.3. NFS Expand section "7.3. NFS" Collapse section "7.3. NFS" 7.3.1. Using NFS to Mount Red Hat Storage Volumes 7.3.2. Troubleshooting NFS 7.3.3. NFS Ganesha 7.4. SMB Expand section "7.4. SMB" Collapse section "7.4. SMB" 7.4.1. Sharing Volumes over SMB 7.4.2. Mounting Volumes using SMB 7.5. Configuring Automated IP Failover for NFS and SMB Expand section "7.5. Configuring Automated IP Failover for NFS and SMB" Collapse section "7.5. Configuring Automated IP Failover for NFS and SMB" 7.5.1. Setting Up CTDB 7.5.2. Starting and Verifying your Configuration 7.6. POSIX Access Control Lists Expand section "7.6. POSIX Access Control Lists" Collapse section "7.6. POSIX Access Control Lists" 7.6.1. Setting POSIX ACLs 7.6.2. Retrieving POSIX ACLs 7.6.3. Removing POSIX ACLs 7.6.4. Samba and ACLs 8. Managing Red Hat Storage Volumes Expand section "8. Managing Red Hat Storage Volumes" Collapse section "8. Managing Red Hat Storage Volumes" 8.1. Configuring Volume Options 8.2. Configuring Transport Types for a Volume 8.3. Expanding Volumes 8.4. Shrinking Volumes Expand section "8.4. Shrinking Volumes" Collapse section "8.4. Shrinking Volumes" 8.4.1. Stopping a remove-brick Operation 8.5. Migrating Volumes Expand section "8.5. Migrating Volumes" Collapse section "8.5. Migrating Volumes" 8.5.1. Replacing a Subvolume on a Distribute or Distribute-replicate Volume 8.5.2. Replacing an Old Brick with a New Brick on a Replicate or Distribute-replicate Volume 8.5.3. Replacing an Old Brick with a New Brick on a Distribute Volume 8.6. Replacing Hosts Expand section "8.6. Replacing Hosts" Collapse section "8.6. Replacing Hosts" 8.6.1. Replacing a Host Machine with a Different Hostname 8.6.2. Replacing a Host Machine with the Same Hostname 8.7. Rebalancing Volumes Expand section "8.7. Rebalancing Volumes" Collapse section "8.7. Rebalancing Volumes" 8.7.1. Displaying Status of a Rebalance Operation 8.7.2. Stopping a Rebalance Operation 8.8. Stopping Volumes 8.9. Deleting Volumes 8.10. Managing Split-brain Expand section "8.10. Managing Split-brain" Collapse section "8.10. Managing Split-brain" 8.10.1. Preventing Split-brain 8.10.2. Recovering from File Split-brain 8.10.3. Triggering Self-Healing on Replicated Volumes 8.11. Non Uniform File Allocation (NUFA) 9. Configuring Red Hat Storage for Enhancing Performance Expand section "9. Configuring Red Hat Storage for Enhancing Performance" Collapse section "9. Configuring Red Hat Storage for Enhancing Performance" 9.1. Disk Configuration Expand section "9.1. Disk Configuration" Collapse section "9.1. Disk Configuration" 9.1.1. Hardware RAID 9.1.2. JBOD 9.2. Brick Configuration 9.3. Network 9.4. Memory Expand section "9.4. Memory" Collapse section "9.4. Memory" 9.4.1. Virtual Memory Parameters 9.5. Small File Performance Enhancements 9.6. Number of Clients 9.7. Replication 10. Managing Geo-replication Expand section "10. Managing Geo-replication" Collapse section "10. Managing Geo-replication" 10.1. About Geo-replication 10.2. Replicated Volumes vs Geo-replication 10.3. Preparing to Deploy Geo-replication Expand section "10.3. Preparing to Deploy Geo-replication" Collapse section "10.3. Preparing to Deploy Geo-replication" 10.3.1. Exploring Geo-replication Deployment Scenarios 10.3.2. Geo-replication Deployment Overview 10.3.3. Prerequisites 10.3.4. Setting Up your Environment for Geo-replication Session 10.3.5. Setting Up your Environment for a Secure Geo-replication Slave 10.4. Starting Geo-replication Expand section "10.4. Starting Geo-replication" Collapse section "10.4. Starting Geo-replication" 10.4.1. Starting a Geo-replication Session 10.4.2. Verifying a Successful Geo-replication Deployment 10.4.3. Displaying Geo-replication Status Information 10.4.4. Configuring a Geo-replication Session 10.4.5. Stopping a Geo-replication Session 10.4.6. Deleting a Geo-replication Session 10.5. Starting Geo-replication on a Newly Added Brick Expand section "10.5. Starting Geo-replication on a Newly Added Brick" Collapse section "10.5. Starting Geo-replication on a Newly Added Brick" 10.5.1. Starting Geo-replication for a New Brick on a New Node 10.5.2. Starting Geo-replication for a New Brick on an Existing Node 10.6. Disaster Recovery Expand section "10.6. Disaster Recovery" Collapse section "10.6. Disaster Recovery" 10.6.1. Promoting a Slave to Master 10.6.2. Failover and Failback 10.7. Creating a Snapshot of Geo-replicated Volume 10.8. Example - Setting up Cascading Geo-replication 10.9. Recommended Practices 10.10. Troubleshooting Geo-replication Expand section "10.10. Troubleshooting Geo-replication" Collapse section "10.10. Troubleshooting Geo-replication" 10.10.1. Tuning Geo-replication performance with Change Log 10.10.2. Synchronization Is Not Complete 10.10.3. Issues with File Synchronization 10.10.4. Geo-replication Status is Often Faulty 10.10.5. Intermediate Master is in a Faulty State 10.10.6. Remote gsyncd Not Found 11. Managing Directory Quotas Expand section "11. Managing Directory Quotas" Collapse section "11. Managing Directory Quotas" 11.1. Enabling Quotas 11.2. Setting Limits 11.3. Setting the Default Soft Limit 11.4. Displaying Quota Limit Information Expand section "11.4. Displaying Quota Limit Information" Collapse section "11.4. Displaying Quota Limit Information" 11.4.1. Displaying Quota Limit Information Using the df Utility 11.5. Setting Timeout 11.6. Setting Alert Time 11.7. Removing Disk Limits 11.8. Disabling Quotas 12. Managing Snapshots Expand section "12. Managing Snapshots" Collapse section "12. Managing Snapshots" 12.1. Prerequisites 12.2. Snapshot Commands 12.3. User Serviceable Snapshots Expand section "12.3. User Serviceable Snapshots" Collapse section "12.3. User Serviceable Snapshots" 12.3.1. Enabling and Disabling User Serviceable Snapshot 12.3.2. Viewing and Retrieving Snapshots using NFS / FUSE 12.3.3. Viewing and Retrieving Snapshots using CIFS for Windows Client 12.4. Troubleshooting 13. Monitoring Red Hat Storage Expand section "13. Monitoring Red Hat Storage" Collapse section "13. Monitoring Red Hat Storage" 13.1. Prerequisites 13.2. Installing Nagios Expand section "13.2. Installing Nagios" Collapse section "13.2. Installing Nagios" 13.2.1. Installing Nagios Server 13.2.2. Configuring Red Hat Storage Nodes for Nagios 13.3. Monitoring Red Hat Storage Trusted Storage Pool Expand section "13.3. Monitoring Red Hat Storage Trusted Storage Pool" Collapse section "13.3. Monitoring Red Hat Storage Trusted Storage Pool" 13.3.1. Configuring Nagios 13.3.2. Verifying the Configuration 13.3.3. Using Nagios Server GUI 13.4. Monitoring Notifications Expand section "13.4. Monitoring Notifications" Collapse section "13.4. Monitoring Notifications" 13.4.1. Configuring Nagios Server to Send Mail Notifications 13.4.2. Configuring Simple Network Management Protocol (SNMP) Notification 13.5. Nagios Advanced Configuration Expand section "13.5. Nagios Advanced Configuration" Collapse section "13.5. Nagios Advanced Configuration" 13.5.1. Creating Nagios User 13.5.2. Changing Nagios Password 13.5.3. Configuring SSL 13.5.4. Integrating LDAP Authentication with Nagios 13.6. Configuring Nagios Manually 13.7. Troubleshooting Nagios Expand section "13.7. Troubleshooting Nagios" Collapse section "13.7. Troubleshooting Nagios" 13.7.1. Troubleshooting NSCA and NRPE Configuration Issues 13.7.2. Troubleshooting General Issues 14. Monitoring Red Hat Storage Workload Expand section "14. Monitoring Red Hat Storage Workload" Collapse section "14. Monitoring Red Hat Storage Workload" 14.1. Running the Volume Profile Command Expand section "14.1. Running the Volume Profile Command" Collapse section "14.1. Running the Volume Profile Command" 14.1.1. Start Profiling 14.1.2. Displaying the I/O Information 14.1.3. Stop Profiling 14.2. Running the Volume Top Command Expand section "14.2. Running the Volume Top Command" Collapse section "14.2. Running the Volume Top Command" 14.2.1. Viewing Open File Descriptor Count and Maximum File Descriptor Count 14.2.2. Viewing Highest File Read Calls 14.2.3. Viewing Highest File Write Calls 14.2.4. Viewing Highest Open Calls on a Directory 14.2.5. Viewing Highest Read Calls on a Directory 14.2.6. Viewing Read Performance 14.2.7. Viewing Write Performance 14.3. gstatus Command Expand section "14.3. gstatus Command" Collapse section "14.3. gstatus Command" 14.3.1. gstatus Command 14.3.2. Installing gstatus during an ISO Installation 14.3.3. Executing the gstatus command 14.4. Listing Volumes 14.5. Displaying Volume Information 14.6. Performing Statedump on a Volume 14.7. Displaying Volume Status 14.8. Troubleshooting issues in the Red Hat Storage Trusted Storage Pool Expand section "14.8. Troubleshooting issues in the Red Hat Storage Trusted Storage Pool" Collapse section "14.8. Troubleshooting issues in the Red Hat Storage Trusted Storage Pool" 14.8.1. Troubleshooting a network issue in the Red Hat Storage Trusted Storage Pool 15. Managing Red Hat Storage Logs Expand section "15. Managing Red Hat Storage Logs" Collapse section "15. Managing Red Hat Storage Logs" 15.1. Log Rotation 15.2. Red Hat Storage Component Logs and Location 15.3. Configuring the Log Format 15.4. Configuring the Log Level 15.5. Suppressing Repetitive Log Messages 15.6. Geo-replication Logs Expand section "15.6. Geo-replication Logs" Collapse section "15.6. Geo-replication Logs" 15.6.1. Viewing the Geo-replication Master Log Files 15.6.2. Viewing the Geo-replication Slave Log Files 16. Managing Red Hat Storage Volume Life-Cycle Extensions Expand section "16. Managing Red Hat Storage Volume Life-Cycle Extensions" Collapse section "16. Managing Red Hat Storage Volume Life-Cycle Extensions" 16.1. Location of Scripts 16.2. Prepackaged Scripts III. Red Hat Storage Administration on Public Cloud Expand section "III. Red Hat Storage Administration on Public Cloud" Collapse section "III. Red Hat Storage Administration on Public Cloud" 17. Launching Red Hat Storage Server for Public Cloud Expand section "17. Launching Red Hat Storage Server for Public Cloud" Collapse section "17. Launching Red Hat Storage Server for Public Cloud" 17.1. Launching Red Hat Storage Instances 17.2. Verifying that Red Hat Storage Instance is Running 18. Provisioning Storage Expand section "18. Provisioning Storage" Collapse section "18. Provisioning Storage" 18.1. Provisioning Storage for Two-way Replication Volumes 18.2. Provisioning Storage for Three-way Replication Volumes 19. Stopping and Restarting Red Hat Storage Instance IV. Data Access with Other Interfaces Expand section "IV. Data Access with Other Interfaces" Collapse section "IV. Data Access with Other Interfaces" 20. Managing Object Store Expand section "20. Managing Object Store" Collapse section "20. Managing Object Store" 20.1. Architecture Overview 20.2. Components of Object Storage 20.3. Advantages of using Object Store 20.4. Limitations 20.5. Prerequisites 20.6. Configuring the Object Store Expand section "20.6. Configuring the Object Store" Collapse section "20.6. Configuring the Object Store" 20.6.1. Configuring a Proxy Server 20.6.2. Configuring the Authentication Service 20.6.3. Configuring Object Servers 20.6.4. Configuring Container Servers 20.6.5. Configuring Account Servers 20.6.6. Configuring Swift Object and Container Constraints 20.6.7. Configuring Object Expiration 20.6.8. Exporting the Red Hat Storage Volumes 20.6.9. Starting and Stopping Server 20.7. Starting the Services Automatically 20.8. Working with the Object Store Expand section "20.8. Working with the Object Store" Collapse section "20.8. Working with the Object Store" 20.8.1. Creating Containers and Objects 20.8.2. Creating Subdirectory under Containers 20.8.3. Working with Swift ACLs 21. Administering the Hortonworks Data Platform on Red Hat Storage Expand section "21. Administering the Hortonworks Data Platform on Red Hat Storage" Collapse section "21. Administering the Hortonworks Data Platform on Red Hat Storage" 21.1. Deployment Scenarios Expand section "21.1. Deployment Scenarios" Collapse section "21.1. Deployment Scenarios" 21.1.1. Red Hat Storage Trusted Storage Pool with Two Additional Servers 21.1.2. Red Hat Storage Trusted Storage Pool with One Additional Server 21.1.3. Red Hat Storage Trusted Storage Pool only 21.1.4. Deploying Hadoop on an existing Red Hat Storage Trusted Storage Pool 21.1.5. Deploying Hadoop on a New Red Hat Storage Trusted Storage Pool 21.2. Administration of HDP Services with Ambari on Red Hat Storage 21.3. Managing Users of the System 21.4. Running Hadoop Jobs Across Multiple Red Hat Storage Volumes 21.5. Scaling Up and Scaling Down Expand section "21.5. Scaling Up and Scaling Down" Collapse section "21.5. Scaling Up and Scaling Down" 21.5.1. Scaling Up 21.5.2. Scaling Down 21.6. Creating a Snapshot of Hadoop enabled Red Hat Storage Volumes 21.7. Creating Quotas on Hadoop enabled Red Hat Storage Volume V. Appendices Expand section "V. Appendices" Collapse section "V. Appendices" 22. Troubleshooting 23. Nagios Configuration Files A. Revision History Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Gluster Storage Part V. Appendices Previous Next