OneFS CLI Command Reference - Dell Inc
OneFS CLI Command Reference - Dell Inc
Version 8.1.2
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
This chapter describes this reference guide, and provides information about how to
get assistance from Isilon techical support.
Self-service support
EMC provides the Isilon Advisor (IA), a free application that enables customers to self-
support common Isilon issues.
The Isilon Advisor is the same application that is used by EMC Isilon Technical Support
Engineers and Field Representatives to resolve service requests. You can use it to
diagnose and troubleshoot issues. You can also use it to analyze the current health of
your cluster and identify items that require attention. This can help you avoid issues
that might arise in the future.
For more information about Isilon Advisor, and to download the latest version, see
https://help.psapps.emc.com/pages/viewpage.action?pageId=2853972.
This chapter contains documentation of the OneFS CLI commands isi antivirus
policies create through isi config.
19
OneFS isi commands A through C
Options
<name>
Specifies a name for the policy.
--description <string>
Specifies a description for the policy.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "Saturday" and "sat" are valid.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths,
repeat the --path option. For example:
--recursion-depth <integer>
Note
This option has been deprecated and will not impact antivirus scans if specified.
{--verbose | -v}
Displays a message confirming that the antivirus policy was created.
Options
{<name> | --all}
--force | -f
Does not prompt you to confirm that you want to delete the policy.
{--verbose | -v}
Displays a message confirming that the antivirus policy was deleted.
Options
<id>
Modifies the policy with the specified policy identification number.
--description <string>
Specifies a description for the policy.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "Saturday" and "sat" are valid.
--clear-schedule
Deletes the current schedule for the policy.
--clear-impact
Clears the current impact policy for antivirus scan jobs.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths,
repeat the --path option. For example:
Note
If you specify this option, the specified paths will replace all previously specified
paths in the list.
--clear-paths
--add-paths <path>
Adds the specified path to the list of paths to scan.
--remove-paths <path>
Removes the specified path from the list of paths to scan.
--recursion-depth <integer>
Note
This option has been deprecated and will not impact antivirus scans if specified.
{--verbose | -v}
Displays a message confirming that the antivirus policy was modified.
Options
<policy>
Runs the specified policy.
--report-id <id>
Assigns the specified ID to the report generated for this run of the avscan policy.
If you do not specify an ID, OneFS will automatically assign one.
Options
<policy>
Displays information on only the policy of the specified ID.
Options
<path>
Quarantines the specified file. Specify as a file path.
{--verbose | -v}
Displays a message confirming that the file has been quarantined.
Options
<name>
Removes the specified file from quarantine. Specify as a file path.
{--verbose | -v}
Displays a message confirming that the file was removed from quarantine.
Options
<scan-id>
Deletes the antivirus report with the specified ID.
--all
Deletes all antivirus reports.
--age <integer><time>
Delets all reports older than the specified age.
The following <time> values are valid:
Y
Specifies years
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
{--verbose | -v}
Displays a message confirming that the reports have been deleted.
{--force | -f}
Does not display a confirmation prompt.
Options
--policy-id <string>
Filters output based on the ID of the policy.
--status <status>
Filters output based on the current status of the scan job.
The following values are valid:
Finish
Displays only completed jobs.
Succeeded
Displays only successfully completed jobs.
Failed
Displays only failed jobs.
Cancelled
Displays only cancelled jobs.
Started
Displays only running jobs.
Paused
Displays only paused jobs.
Resumed
Displays only jobs that were paused, then resumed.
Pending
Displays only pending jobs.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
id
Sorts output by the ID of the antivirus report.
policy_id
Sorts output by the ID of the policy that created the report.
status
Sorts output by the status of the antivirus scan.
start
Sorts output by the time that the antivirus scan started.
files
Sorts output by the number of files that were scanned by the antivirus scan.
infections
Sorts output by the number of threats detected by the antivirus scan.
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Displays the antivirus report of the specified ID.
Options
<id>
Displays information about the threat with the specified ID.
Options
<path>
Scans the specified file.
--report-id <id>
Assigns the specified ID to the report generated for this antivirus scan. If you do
not specify an ID, OneFS will automatically assign one.
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--verbose | -v}
Displays a message confirming that the server has been added.
Options
<url> | --all
Deletes the specified ICAP server.
{--verbose | -v}
Displays a message confirming that OneFS has disconnected from the ICAP
server.
{--force | -f}
Does not display a confirmation prompt.
Options
{--limit | -l} <integer>
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
url
Sorts output by the URL of the server.
description
Sorts output by the description of the server.
enabled
Sorts output by the state of the server.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--verbose | -v}
Options
<url>
Displays information about the specified ICAP server.
Options
--fail-open {true | false}
If --scan-on-open is set to true, determines whether users can access files
that cannot be scanned. If this option is set to false, users cannot access a file
until the file is scanned by an ICAP server.
If --scan-on-open is set to true, this option has no effect.
--glob-filter <string>
Specifies a file name or extension. To specify multiple filters, you must include
multiple --glob-filter options within the same command. Specifying this
option will remove any existing glob filters.
You can include the following wildcards:
Wildca Description
rd
charac
ter
* Matches any string in place of the asterisk.
For example, specifying "m*" would match "movies" and "m123"
Note
If you specify this option, the specified filters will replace all previously specified
filters in the list.
--clear-glob-filters
Clears the list of filters.
--add-glob-filters <string>
Adds the specified filters to the list of filters.
--remove-glob-filters <string>
Removes the specified filters to the list of filters.
--path-prefix <path>
If specified, only files contained in the specified directory path will be scanned.
This option affects only on-access scans. To specify multiple directories, you
must include multiple --path-prefix options within the same command.
Specifying this option will remove any existing path prefixes.
Note
If you specify this option, the specified filters will replace all previously specified
filters in the list.
--clear-path-prefixes
Clears the list of paths.
--add-path-prefixes <path>
Adds the specified paths to the list of paths.
--remove-path-prefixes <path>
Removes the specified paths to the list of paths.
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--scan-size-maximum <integer>{k | M | G | T | P}
If specified, OneFS will not send files larger than the specified size to an ICAP
server to be scanned.
Note
Although the parameter accepts values larger than 2GB, OneFS does not scan
files larger than 2GB.
{--verbose | -v}
Displays a message confirming that the settings have been modified.
Options
There are no options for this command.
Options
<path>
Displays information about the file of the specified path.
{--verbose | -v}
Displays more detailed information.
OneFS displays output similar to the following text when you run the previous
command:
Options
--lnn<integer>
Displays a logical node number view of the progress of delivery of the protocol
audit events to the CEE server and syslog. The view includes the timestamp of
the last captured protocol audit event and the timestamp of the last event sent to
the CEE server and syslog corresponding to the node.
The following command displays the progress of delivery of the protocol audit events
to the CEE server and syslog for the current node:
The following command displays a logical node number view of the progress of
delivery of the protocol audit events to the CEE server and syslog:
Options
--protocol-auditing-enabled {yes | no}
Enables or disables the auditing of data-access requests through the SMB, NFS,
and HDFS protocols.
--clear-audited-zones
Clears the entire list of access zones to be audited if protocol auditing is enabled.
--cee-server-uris <uris>
Specifies one or more CEE server URIs, separated by commas, where audit logs
will be forwarded if protocol auditing is enabled. The OneFS CEE export service
uses round robin load-balancing when exporting events to multiple CEE servers.
This option overwrites all entries in the list of CEE server URIs. To add or remove
URIs without affecting current entries, use --add-cee-server-uris or --
remove-cee-server-uris.
--clear-cee-server-uris
Clears the entire list of CEE server URIs to which audit logs are forwarded if
protocol auditing is enabled.
--add-cee-server-uris <uris>
Adds one or more CEE server URIs, separated by commas, to the list of URIs
where audit logs are forwarded if protocol auditing is enabled.
--remove-cee-server-uris <uris>
Removes one or more CEE server URIs, separated by commas, from the list of
URIs where audit logs are forwarded if protocol auditing is enabled.
--hostname <string>
Specifies the name of the storage cluster to use when forwarding protocol events
—typically, the SmartConnect zone name. When SmartConnect is not
implemented, the value must match the hostname of the cluster as your third-
party audit application recognizes it. If the field is left blank, events from each
node are filled with the node name (clustername + lnn). This setting is required
only if needed by your third-party audit application.
--cee-log-time <date>
Specifies a date after which the audit CEE forwarder will forward protocol access
logs. Specify <date> in the following format:
[protocol]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
--syslog-log-time <date>
Specifies a date after which the audit syslog forwarder will forward logs. To
forward SMB, NFS, and HDFS traffic logs, specify protocol. To forward
[protocol|config]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
{--verbose | -v}
Displays the results of running the command.
Options
There are no options for this command.
Examples
The following command displays the audit settings configured on the cluster:
Options
--audit-failure <event types>
Specifies one or more filters, separated by commas, for auditing protocol event
types that failed. The following event types are valid:
l close
l create
l delete
l get_security
l logoff
l logon
l read
l rename
l set_security
l tree_connect
l write
l all
This option overwrites the current list of filtered event types. To add or remove
filters without affecting the current list, configure settings with --add-audit-
failure or --remove-audit-failure.
--clear-audit-failure
Clears all filters for auditing protocol event types that failed.
l logoff
l logon
l read
l rename
l set_security
l tree_connect
l write
l all
This option overwrites the current list of filtered event types. To add or remove
filters without affecting the current list, configure settings with --add-audit-
success or --remove-audit-success.
--clear-audit-success
Clears all filters for auditing protocol event types that succeeded.
--clear-syslog-audit-events
Clears all auditing protocol event types that are forwarded to syslog.
{--verbose | -v}
Displays the results of running the command.
Note
Each audited event consumes system resources; you should only log events that are
supported by your auditing application.
Options
--zone<access zone>
Specifies the name of the access zone to view.
Examples
The following command displays the audit settings configured in the zoneA access
zone:
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the name of the audit topic to modify. Valid values are protocol and
config.
--max-cached-messages <integer>
Specifies the maximum number of audit messages to cache before writing them
to a persistent store. The larger the number, the more efficiently audit events can
be processed. If you specify 0, each audit event is sent synchronously.
{--verbose | -v}
Displays the results of running the command.
Options
<name>
Specifies the name of the audit topic whose properties you want to view. Valid
values are protocol and config.
Options
<user>
Specifies the user name.
--sid <string>
Specifies the user by SID.
--uid <integer>
Specifies the user by UID
<path>
Specifies the path of the file or directory under /ifs.
--zone <string>
--share <string>
Specifies an SMB share name for which to report share configurations and file/
directory access information.
{--numeric | -n}
Displays the numeric identifier of the user.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the fully-qualified Active Directory domain name, which can be resolved
to an IPv4 or an IPv6 address. The domain name will also be used as the provider
name.
<user>
Specifies the user name of an account that has permission to join machine
accounts to the Active Directory domain.
--password <string>
Specifies the password of the provided user account. If you omit this option, you
will be prompted to supply a password.
--organizational-unit <string>
Specifies the name of the organizational unit (OU) to connect to on the Active
Directory server. Specify the OU in the form OuName or OuName1/SubName2.
--groupnet <groupnet>
Specifies the groupnet referenced by the Active Directory provider. The groupnet
is a top-level networking container that manages hostname resolution against
DNS nameservers and contains subnets and IP address pools. The groupnet
specifies which networking properties the Active Directory provider will use when
communicating with external servers.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>{Y|M|
W|D|H|m|s}.
Specifies whether to send an alert if the domain goes offline. If this option is set
to yes, notifications are sent as specified in the global notification rules. The
default value is no.
--findable-groups <string>...
Specifies a list of groups that can be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--findable-users <string>...
Specifies a list of users that can be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--home-directory-template <path>
Specifies the template path to use when creating home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
Note
If you are using Active Directory with Services for UNIX (SFU), spaces in
Windows-created directory names are converted to underscores for UNIX
compatibility.
--ignored-trusted-domains <dns-domain>...
Specifies a list of trusted domains to ignore if --ignore-all-trusts is
disabled. Repeat this option to specify multiple list items.
--include-trusted-domains <dns-domain>...
Specifies a list of trusted domain to include if --ignore-all-trusts is
enabled. Repeat this option to specify multiple list items.
--machine-name <string>
Specifies hostname or machine name used to join the authentication provider as a
record in the machines list.
--login-shell <path>
Specifies the full path to the login shell to use if the Active Directory server does
not provide login-shell information. This setting applies only to users who access
the file system through SSH.
--lookup-domains <string>...
Specifies a list of domains to which user and group lookups are to be limited.
Repeat this option to specify multiple list items.
--machine-password-lifespan <duration>
Sets the maximum age of the machine account password, in the format
<integer>{Y|M|W|D|H|m|s}.
{--node-dc-affinity | -x} <string>
Specifies the domain controller that the node should exclusively communicate
with (affinitize to). This option should be used with a timeout value, which is
configured using the --node-dc-affinity-timeout option. Otherwise, the
default timeout value of 30 minutes is assigned.
Note
This setting is for debugging purposes and should be left unconfigured during
normal operation. To disable this feature, use a timeout value of 0.
{--node-dc-affinity-timeout} <timestamp>
Specifies the timeout setting for the local node affinity to a domain controller,
using the date format <YYYY>-<MM>-<DD> or the date/time format <YYYY>-
<MM>-<DD>T<hh>:<mm>[:<ss>].
Note
--unfindable-groups <string>...
Specifies a list of groups that cannot be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--unfindable-users <string>...
Specifies a list of users that cannot be resolved by this authentication provider.
Repeat this option to specify multiple list items.
{--verbose | -v}
Displays the results of running the command.
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Examples
To leave an Active Directory domain named some.domain.org and delete the
authentication provider that is associated with it, run the following command:
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all the Active Directory providers that the cluster is joined to, run the
following command:
Options
<provider-name>
Specifies the domain name that the Active Directory provider is joined to, which is
also the Active Directory provider name.
--domain-controller <dns-domain>
Specifies a domain controller.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>{Y|M|
W|D|H|m|s}.
--findable-groups <string>...
Specifies a list of groups that can be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--clear-findable-groups
Removes all entries from the list of findable groups.
--add-findable-groups <string>...
Adds an entry to the list of groups that can be resolved by this authentication
provider. Repeat this option to specify multiple list items.
--remove-findable-groups <string>...
Removes an entry from the list of groups that can be resolved by this
authentication provider. Repeat this option to specify multiple list items.
--findable-users <string>...
Specifies a list of users that can be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--clear-findable-users
Removes all entries from the list of findable users.
--add-findable-users <string>...
Adds an entry to the list of users that can be resolved by this authentication
provider. Repeat this option to specify multiple list items.
--remove-findable-users <string>...
Removes an entry from the list of users that can be resolved by this
authentication provider. Repeat this option to specify multiple list items.
--home-directory-template <path>
Specifies the template path to use when creating home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
Note
If you are using Active Directory with Services for UNIX (SFU), spaces in
Windows-created directory names are converted to underscores for UNIX
compatibility.
--ignored-trusted-domains <dns-domain>
Specifies a list of trusted domains to ignore if --ignore-all-trusts is
disabled. Repeat this option to specify multiple list items.
--clear-ignored-trusted-domains
Clears the list of ignored trusted domains if --ignore-all-trusts is disabled.
--add-ignored-trusted-domains <dns-domain>
Adds a domain to the list of trusted domains to ignore if --ignore-all-
trusts is disabled. Repeat this option to specify multiple list items.
--remove-ignored-trusted-domains <dns-domain>
Removes a specified domain from the list of trusted domains to ignore if --
ignore-all-trusts is disabled. Repeat this option to specify multiple list
items.
--include-trusted-domains <dns-domain>
Specifies a list of trusted domains to include if --ignore-all-trusts is
enabled. Repeat this option to specify multiple list items.
--clear-include-trusted-domains
Clears the list of trusted domains to include if --ignore-all-trusts is
enabled.
--add-include-trusted-domains <dns-domain>
Adds a domain to the list of trusted domains to include if --ignore-all-
trusts is enabled. Repeat this option to specify multiple list items.
--remove-include-trusted-domains <dns-domain>
--machine-name <string>
Specifies hostname or machine name used to join the authentication provider as a
record in the machines list.
Note
This setting is for debugging purposes and should be left unconfigured during
normal operation. To disable this feature, use a timeout value of 0.
{--node-dc-affinity-timeout} <timestamp>
Specifies the timeout setting for the local node affinity to a domain controller,
using the date format <YYYY>-<MM>-<DD> or the date/time format <YYYY>-
<MM>-<DD>T<hh>:<mm>[:<ss>].
Note
--login-shell <path>
Specifies the path to the login shell to use if the Active Directory server does not
provide login-shell information. This setting applies only to users who access the
file system through SSH.
--lookup-domains <string>
Specifies a list of domains to which user and group lookups are to be limited.
Repeat this option to specify multiple list items.
--clear-lookup-domains
Clears the list of restricted domains for user and group lookups.
--add-lookup-domains <string>
Adds an entry to the restricted list of domains to use for user and group lookups.
Repeat this option to specify multiple list items.
--remove-lookup-domains <string>
Removes an entry from the list of domains to use for user and group lookups.
Repeat this option to specify multiple list items.
--machine-password-lifespan <duration>
Sets the maximum age of the machine account password, in the format
<integer>{Y|M|W|D|H|m|s}.
--nss-enumeration {yes | no}
Specifies whether to allow the Active Directory provider to respond to getpwent
and getgrent requests.
--unfindable-groups <string>...
Specifies a list of groups that cannot be resolved by this authentication provider.
Repeat this option to specify multiple list items.
--clear-unfindable-groups
Removes all entries from the list of unfindable groups.
--add-unfindable-groups <string>...
Adds an entry to the list of groups that cannot be resolved by this authentication
provider. Repeat this option to specify multiple list items.
--remove-unfindable-groups <string>...
Removes an entry from the list of groups that cannot be resolved by this
authentication provider. Repeat this option to specify multiple list items.
--unfindable-users <string>...
--add-unfindable-users <string>...
Adds an entry to the list of users that cannot be resolved by this authentication
provider. Repeat this option to specify multiple list items.
--remove-unfindable-users <string>...
Removes an entry from the list of users that cannot be resolved by this
authentication provider. Repeat this option to specify multiple list items.
{--verbose | -v}
Displays the results of running the command.
Options
<provider-name>
Specifies the Active Directory provider name.
Options
<provider-name>
Specifies the Active Directory provider name.
Options
<provider-name>
Specifies the Active Directory provider name.
Options
<provider-name>
Specifies the Active Directory provider name.
--spn <string>
Specifies the service principal name.
--user <string>
Specifies an administrative user account name with permission to add SPNs for
the Active Directory domain.
--password <string>
Specifies the administrative user account password.
Options
<provider-name>
Specifies the Active Directory provider name.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<provider>
Specifies an Active Directory provider.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of trusted domains in an Active Directory
provider named ad.isilon.com:
Options
<provider>
Specifies an Active Directory provider.
Options
<provider-name>
Specifies the name of the provider to view.
{--verbose | -v}
Displays more detailed information.
Options
<error-code>
Specifies the error code to convert.
Examples
To view the definition of error code 4, run the following command:
4 = ERROR_TOO_MANY_OPEN_FILES
[--unmodifiable-groups <string>]
[--unmodifiable-users <string>]
[--user-domain <string>]
[--verbose]
Options
<name>
Sets the file provider name.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
Specifies the path to a group replacement file.
--findable-groups <string>
Specifies a list of groups that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify each additional findable
group. If populated, groups that are not included in this list cannot be resolved.
--findable-users <string>
Specifies a list of users that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify each additional findable user.
If populated, users that are not included in this list cannot be resolved.
--group-domain <string>
Specifies the domain that this provider will use to qualify groups. The default
group domain is FILE_GROUPS.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--listable-groups <string>
Specifies a group that can be listed if --restrict-listable is enabled.
Repeat this option to specify multiple list items. If populated, any groups that are
not included in this list cannot be listed.
--listable-users <string>
--login-shell <path>
Specifies the path to the user's login shell. This setting applies only to users who
access the file system through SSH.
--modifiable-groups <string>
Specifies a group that can be modified in this provider if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items. If
populated, any groups that are not included in this list cannot be modified.
--modifiable-users <string>
Specifies a user that can be modified in this provider if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items. If
populated, any users that are not included in this list cannot be modified.
--netgroup-file <path>
Specifies the path to a netgroup replacement file.
--provider-domain <string>
Specifies the domain that the provider will use to qualify user and group names.
--unfindable-groups <string>
If --restrict-findable is enabled and the findable groups list is empty,
specifies a group that cannot be resolved by this provider. Repeat this option to
specify multiple list items.
--unfindable-users <string>
--unlistable-groups <string>
If --restrict-listable is enabled and the listable groups list is empty,
specifies a group that cannot be listed by this provider. Repeat this option to
specify multiple list items.
--unlistable-users <string>
If --restrict-listable is enabled and the listable users list is empty,
specifies a user that cannot be listed by this provider. Repeat this option to
specify multiple list items.
--unmodifiable-groups <string>
If --restrict-modifiable is enabled and the modifiable groups list is empty,
specifies a group that cannot be modified. Repeat this option to specify multiple
list items.
--unmodifiable-users <string>
If --restrict-modifiable is enabled and the modifiable users list is empty,
specifies a user that cannot be modified. Repeat this option to specify multiple list
items.
--user-domain <string>
Specifies the domain that this provider will use to qualify users. The default user
domain is FILE_USERS.
{--verbose | -v}
Displays more detailed information.
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
[--clear-listable-users]
[--add-listable-users <string>]
[--remove-listable-users <string>]
[--login-shell <path>]
[--modifiable-groups <string>]
[--clear-modifiable-groups]
[--add-modifiable-groups <string>]
[--remove-modifiable-groups <string>]
[--modifiable-users <string>]
[--clear-modifiable-users]
[--add-modifiable-users <string>]
[--remove-modifiable-users <string>]
[--netgroup-file <path>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--ntlm-support {all | v2only | none}]
[--provider-domain <string>]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--restrict-modifiable {yes | no}]
[--unfindable-groups <string>]
[--clear-unfindable-groups]
[--add-unfindable-groups <string>]
[--remove-unfindable-groups <string>]
[--unfindable-users <string>]
[--clear-unfindable-users]
[--add-unfindable-users <string>]
[--remove-unfindable-users <string>]
[--unlistable-groups <string>]
[--clear-unlistable-groups]
[--add-unlistable-groups <string>]
[--remove-unlistable-groups <string>]
[--unlistable-users <string>]
[--clear-unlistable-users]
[--add-unlistable-users <string>]
[--remove-unlistable-users <string>]
[--unmodifiable-groups <string>]
[--clear-unmodifiable-groups]
[--add-unmodifiable-groups <string>]
[--remove-unmodifiable-groups <string>]
[--unmodifiable-users <string>]
[--clear-unmodifiable-users]
[--add-unmodifiable-users <string>]
[--remove-unmodifiable-users <string>]
[--user-domain <string>]
[--verbose]
Options
<provider-name>
Specifies the name of the file provider to modify. This setting cannot be modified.
--name <string>
Specifies an new name for the authentication provider.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
--cache-entry-expiry <duration>
Specifies the length of time after which the cache entry will expire, in the format
<integer>[{Y | M | W | D | H | m | s}]. To turn off cache expiration, set this value to
off.
--findable-groups <string>
Specifies a group that can be found in this provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, any groups
that are not included in this list cannot be resolved. This option overwrites any
existing entries in the findable groups list; to add or remove groups without
affecting current entries, use --add-findable-groups or --remove-
findable-groups.
--clear-findable-groups
Removes all entries from the list of findable groups.
--add-findable-groups <string>
Adds an entry to the list of findable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-groups <string>
Removes an entry from the list of findable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--findable-users <string>
Specifies a user that can be found in the provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, any users
that are not included in this list cannot be resolved. This option overwrites any
existing entries in the findable users list; to add or remove users without affecting
current entries, use --add-findable-users or --remove-findable-
users.
--clear-findable-users
Removes all entries from the list of findable users.
--add-findable-users <string>
Adds an entry to the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-users <string>
Removes an entry from the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--group-domain <string>
Specifies the domain that the provider will use to qualify groups. The default
group domain is FILE_GROUPS.
--group-file <path>
Specifies the path to a group replacement file.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--listable-groups <string>
Specifies a group that can be viewed in this provider if --restrict-listable
is enabled. Repeat this option to specify multiple list items. If populated, any
groups that are not included in this list cannot be viewed. This option overwrites
any existing entries in the listable groups list; to add or remove groups without
affecting current entries, use --add-listable-groups or --remove-
listable-groups.
--clear-listable-groups
Removes all entries from the list of viewable groups.
--add-listable-groups <string>
Adds an entry to the list of viewable groups that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-listable-groups <string>
Removes an entry from the list of viewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--listable-users <string>
Specifies a user that can be viewed in this provider if --restrict-listable is
enabled. Repeat this option to specify multiple list items. If populated, any users
that are not included in this list cannot be viewed. This option overwrites any
existing entries in the listable users list; to add or remove users without affecting
current entries, use --add-listable-users or --remove-listable-
users.
--clear-listable-users
Removes all entries from the list of viewable users.
--add-listable-users <string>
--remove-listable-users <string>
Removes an entry from the list of viewable users that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--login-shell <path>
Specifies the path to the user's login shell. This setting applies only to users who
access the file system through SSH.
--modifiable-groups <string>
Specifies a group that can be modified if --restrict-modifiable is enabled.
Repeat this option to specify multiple list items. If populated, any groups that are
not included in this list cannot be modified. This option overwrites any existing
entries in the modifiable groups list; to add or remove groups without affecting
current entries, use --add-modifiable-groups or --remove-
modifiable-groups.
--clear-modifiable-groups
Removes all entries from the list of modifiable groups.
--add-modifiable-groups <string>
Adds an entry to the list of modifiable groups that is checked if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items.
--remove-modifiable-groups <string>
Removes an entry from the list of modifiable groups that is checked if --
restrict-modifiable is enabled. Repeat this option to specify multiple list
items.
--modifiable-users <string>
Specifies a user that can be modified if --restrict-modifiable is enabled.
Repeat this option to specify multiple list items. If populated, any users that are
not included in this list cannot be modified. This option overwrites any existing
entries in the modifiable users list; to add or remove users without affecting
current entries, use --add-modifiable-users or --remove-modifiable-
users.
--clear-modifiable-users
Removes all entries from the list of modifiable users.
--add-modifiable-users <string>
Adds an entry to the list of modifiable users that is checked if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items.
--remove-modifiable-users <string>
Removes an entry from the list of modifiable users that is checked if --
restrict-modifiable is enabled. Repeat this option to specify multiple list
items.
--netgroup-file <path>
Specifies the path to a netgroup replacement file.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--unfindable-groups <string>
If --restrict-findable is enabled and the findable groups list is empty,
specifies a group that cannot be resolved by this provider. Repeat this option to
specify multiple list items. This option overwrites any existing entries in the
unfindable groups list; to add or remove groups without affecting current entries,
use --add-unfindable-groups or --remove-unfindable-groups.
--clear-unfindable-groups
Removes all entries from the list of unfindable groups.
--add-unfindable-groups <string>
Adds an entry to the list of unfindable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-unfindable-groups <string>
Removes an entry from the list of unfindable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unfindable-users <string>
If --restrict-findable is enabled and the findable users list is empty,
specifies a user that cannot be resolved by this provider. Repeat this option to
specify multiple list items. This option overwrites any existing entries in the
unfindable users list; to add or remove users without affecting current entries,
use --add-unfindable-users or --remove-unfindable-users.
--clear-unfindable-users
Removes all entries from the list of unfindable groups.
--add-unfindable-users <string>
Adds an entry to the list of unfindable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-unfindable-users <string>
Removes an entry from the list of unfindable users that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unlistable-groups <string>
If --restrict-listable is enabled and the viewable groups list is empty,
specifies a group that cannot be listed by this provider. Repeat this option to
specify multiple list items. This option overwrites any existing entries in the
unlistable groups list; to add or remove groups without affecting current entries,
use --add-unlistable-groups or --remove-unlistable-groups.
--clear-unlistable-groups
Removes all entries from the list of unviewable groups.
--add-unlistable-groups <string>
Adds an entry to the list of unviewable groups that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-groups <string>
Removes an entry from the list of unviewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--unlistable-users <string>
If --restrict-listable is enabled and the viewable users list is empty,
specifies a user that cannot be listed by this provider. Repeat this option to
specify multiple list items. This option overwrites any existing entries in the
unlistable users list; to add or remove users without affecting current entries, use
--add-unlistable-users or --remove-unlistable-users.
--clear-unlistable-users
Removes all entries from the list of unviewable users.
--add-unlistable-users <string>
Adds an entry to the list of unviewable users that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-users <string>
Removes an entry from the list of unviewable users that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--unmodifiable-groups <string>
If --restrict-modifiable is enabled and the modifiable groups list is empty,
specifies a group that cannot be modified. Repeat this option to specify multiple
list items. This option overwrites any existing entries in this provider’s
unmodifiable groups list; to add or remove groups without affecting current
--clear-unmodifiable-groups
Removes all entries from the list of unmodifiable groups.
--add-unmodifiable-groups <string>
Adds an entry to the list of unmodifiable groups that is checked if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items.
--remove-unmodifiable-groups <string>
Removes an entry from the list of unmodifiable groups that is checked if --
restrict-modifiable is enabled. Repeat this option to specify multiple list
items.
--unmodifiable-users <string>
If --restrict-modifiable is enabled and the modifiable users list is empty,
specifies a user that cannot be modified. Repeat this option to specify multiple list
items. This option overwrites any existing entries in this provider’s unmodifiable
users list; to add or remove users without affecting current entries, use --add-
unmodifiable-users or --remove-unmodifiable-users.
--clear-unmodifiable-users
Removes all entries from the list of unmodifiable users.
--add-unmodifiable-users <string>
Adds an entry to the list of unmodifiable users that is checked if --restrict-
modifiable is enabled. Repeat this option to specify multiple list items.
--remove-unmodifiable-users <string>
Removes an entry from the list of unmodifiable users that is checked if --
restrict-modifiable is enabled. Repeat this option to specify multiple list
items.
--user-domain <string>
Specifies the domain that this provider will use to qualify users. The default user
domain is FILE_USERS.
{--verbose | -v}
Displays detailed information.
Options
<provider-name>
Specifies the name of the provider to view.
Options
<name>
Specifies the group name.
--gid <integer>
Overrides automatic allocation of the UNIX group identifier (GID) with the
specified value. Setting this option is not recommended.
--add-user <name>
Specifies the name of the user to add to the group. Repeat this option to specify
multiple users.
--add-uid <integer>
Specifies the UID of the user to add to the group. Repeat this option to specify
multiple users.
--add-sid <string>
Specifies the SID of the user to add to the group. Repeat this option to specify
multiple users.
--add-wellknown <name>
Specifies a wellknown persona name to add to the group. Repeat this option to
specify multiple personas.
--sid <string>
Sets the Windows security identifier (SID) for the group, for example
S-1-5-21-13.
--zone <string>
Specifies the access zone in which to create the group.
--provider <string>
Specifies a local authentication provider in the specified access zone.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Suppresses command-line prompts and messages.
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
<group>
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies the name of the access zone that contains the group.
--provider <string>
Specifies the group's authentication provider.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Options
There are no options for this command.
Examples
To flush all cached group information, run the following command:
Options
--domain <string>
Specifies the provider domain.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--new-gid <integer>
Specifies a new GID for the group. Setting this option is not recommended.
--add-uid <integer>
Specifies the UID of a user to add to the group. Repeat this option to specify
multiple list items.
--remove-uid <integer>
Specifies the UID of a user to remove from the group. Repeat this option to
specify multiple list items.
--add-user <name>
Specifies the name of a user to add to the group. Repeat this option to specify
multiple list items.
--remove-user <name>
Specifies the name of a user to remove from the group. Repeat this option to
specify multiple list items.
--add-sid <string>
Specifies the SID of an object to add to the group, for example S-1-5-21-13.
Repeat this option to specify multiple list items.
--remove-sid <string>
Specifies the SID of an object to remove from the group. Repeat this option to
specify multiple list items.
--add-wellknown <name>
Specifies a well-known SID to add to the group. Repeat this option to specify
multiple list items.
--remove-wellknown <name>
Specifies a well-known SID to remove from the group. Repeat this option to
specify multiple list items.
--zone <string>
Specifies the group's access zone.
--provider <string>
Specifies the group's authentication provider.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Suppresses command-line prompts and messages.
Options
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--cached
Displays cached information.
--provider <string>
Specifies the name of an authentication provider.
--show-groups
--zone <string>
Specifies an access zone.
isi auth id
Displays your access token.
Syntax
isi auth id
Options
There are no options for this command.
Options
<realm>
Specifies the Kerberos realm name.
<user>
Specifies the name of a user with permission to create service principal names
(SPNs) in the Kerberos realm.
--keytab-file <string>
Specifies the keytab file to import.
--password <string>
Specifies the password used for joining a Kerberos realm.
--spn <string>
Specifies the SPNs to register. Specify --spn for each additional SPN that you
want to register.
--groupnet <groupnet>
Specifies the groupnet referenced by the Kerberos provider. The groupnet is a
top-level networking container that manages hostname resolution against DNS
nameservers and contains subnets and IP address pools. The groupnet specifies
isi auth id 79
OneFS isi commands A through C
which networking properties the Kerberos provider will use when communicating
with external servers.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution
Center (KDC). Specify --kdc for each additional KDC you want to add to the
realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative
server (master KDC).
--default-domain<string>
Specifies the default Kerberos domain for the Kerberos realm used for translating
Kerberos v4 principal names.
{--verbose | -v}
Displays detailed information.
Options
<provider-name>
Specifies the Kerberos provider name.
{--force | -f}
Specifies not to ask for a confirmation.
Options
<domain>
Specifies the name of the Kerberos domain.
--realm <string>
Specifies the name of the Kerberos realm.
Options
<domain>
Specifies the name of the Kerberos domain.
{--force | -f}
Specifies not to ask for a confirmation.
Options
{--limit | -l} <integer>
Specifies the number of Kerberos domain mappings to display.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Options
<domain>
Specifies the Kerberos domain name.
--realm <string>
Specifies the Kerberos realm name.
Options
<domain>
Specifies the Kerberos domain name.
Options
{--limit | -l} <integer>
Specifies the number of Kerberos providers to display.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Options
<realm>
Specifies the name of the Kerberos realm.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution
Center (KDC). Specify --kdc for each additional KDC you want to add to the
realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative
server (master KDC).
--default-domain <string>
Specifies the default domain for the realm used for translating the v4 principal
names.
Options
<realm>
Specifies the Kerberos realm name.
{--force | -f}
Specifies not to ask for a confirmation.
Options
{--limit | -l} <integer>
Specifies the number of Kerberos realms to display.
--format {table | json | csv | list}
Specifies whether to display the Kerberos realms in a tabular, JSON, CSV, or list
format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Options
<realm>
Specifies the Kerberos realm name.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution
Center (KDC). Specify --kdc for each additional KDC you want to add to the
realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative
server (master KDC).
--default-domain <string>
Specifies the default domain for the Kerberos realm used for translating v4
principal names.
Options
<realm>
Specifies the Kerberos realm name.
Options
<provider-name>
Specifies the Kerberos provider name.
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to create the service principal names
(SPNs) in the Kerberos realm.
<spn>
Specifies the SPN.
--password <string>
Specifies the password used during the modification of a Kerberos realm.
Options
<provider-name>
Specifies the Kerberos provider name.
<spn>
Specifies the service principal name (SPN).
<kvno>
Specifies the key version number.
--all
Deletes all the key versions.
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to join clients to the given Kerberos
domain.
--password <string>
Specifies the password that was used when modifying the Kerberos realm.
{--force | -f}
Specifies not to ask for a confirmation.
Options
<provider-name>
Specifies the Kerberos provider name.
<keytab-file>
Specifies the keytab file to import.
Options
<provider-name>
Specifies the Kerberos provider name.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Options
<provider-name>
Specifies the Kerberos provider name.
[--nt-password-attribute <string>]
[--ntlm-support {all | v2only | none}]
[--provider-domain <string>]
[--require-secure-connection {yes | no}]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--search-scope <scope>]
[--search-timeout <integer>]
[--shell-attribute <string>]
[--uid-attribute <string>]
[--unfindable-groups <string>]
[--unfindable-users <string>]
[--unique-group-members-attribute <string>]
[--unlistable-groups <string>]
[--unlistable-users <string>]
[--user-base-dn <string>]
[--user-domain <string>]
[--user-filter <string>]
[--user-search-scope <scope>]
[--groupnet <groupnet>]
[--template {default | rfc2307 | ad-idmu | ldapsam}
[--bind-password <string>]
[--set-bind-password]
[--verbose]
Options
<name>
Sets the LDAP provider name.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example,
CN=Users,DC=mycompany,DC=com.
--server-uris <string>
Specifies a list of LDAP server URIs to be used when accessing the server.
Repeat this option to specify multiple list items.
Specify the LDAP server URI in the format ldaps://<server>:<port> for secure
LDAP or ldap://<server>:<port> for non-secure LDAP.
The server can be specified as an IPv4 address, an IPv6 address, or a hostname.
If you do not specify a port number, the default port is used; 389 for secure LDAP
or 636 for non-secure LDAP.
Note
If you specify non-secure LDAP, the bind password is transmitted to the server in
clear text.
--alternate-security-identities-attribute <string>
Specifies the name to be used when searching for alternate security identities.
This name is used when OneFS attempts to resolve a Kerberos principal to a user.
--bind-dn <string>
Specifies the distinguished name to use when binding to the LDAP server. For
example, CN=myuser,CN=Users,DC=mycompany,DC=com.
--bind-timeout <integer>
Specifies the timeout in seconds when binding to the LDAP server.
--certificate-authority-file <path>
Specifies the path to the root certificates file.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M
| W | D | H | m | s}].
--cn-attribute <string>
Specifies the LDAP attribute that contains common names. The default value is
cn.
--email-attribute <string>
Specifies the LDAP attribute that contains email addresses. The default value is
mail.
--findable-groups <string>
Specifies a list of groups that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify each additional findable
group. If populated, groups that are not included in this list cannot be resolved.
--findable-users <string>
Specifies a list of users that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify each additional findable user.
If populated, users that are not included in this list cannot be resolved.
--gecos-attribute <string>
Specifies the LDAP attribute that contains GECOS fields. The default value is
gecos.
--gid-attribute <string>
Specifies the LDAP attribute that contains GIDs. The default value is gidNumber.
--group-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
groups.
--group-domain <string>
Specifies the domain that the provider will use to qualify groups. The default
group domain is LDAP_GROUPS.
--group-filter <string>
Sets the LDAP filter for group objects.
--group-members-attribute <string>
Specifies the LDAP attribute that contains group members. The default value is
memberUid.
--group-search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform
LDAP searches for groups.
The following values are valid:
default
Applies the setting in --search-scope.
Note
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information
about home directory variables, see Home directories.
--homedir-attribute <string>
Specifies the LDAP attribute that contains home directories. The default value is
homeDirectory.
--listable-groups <string>
Specifies a list of groups that can be viewed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. If
populated, groups that are not included in this list cannot be viewed.
--listable-users <string>
Specifies a list of users that can be viewed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. If
populated, users that are not included in this list cannot be viewed.
--login-shell <path>
Specifies the pathname of the user's login shell for users who access the file
system through SSH.
--member-of-attribute <string>
Sets the attribute to be used when searching LDAP for reverse memberships.
This LDAP value should be an attribute of the user type posixAccount that
describes the groups in which the POSIX user is a member.
--name-attribute <string>
Specifies the LDAP attribute that contains UIDs, which are used as login names.
The default value is uid.
--netgroup-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
netgroups.
--netgroup-filter <string>
Sets the LDAP filter for netgroup objects.
--netgroup-members-attribute <string>
Specifies the LDAP attribute that contains netgroup members. The default value
is memberNisNetgroup.
--netgroup-search-scope <scope>
Defines the depth from the base distinguished name (DN) to perform LDAP
searches for netgroups.
The following values are valid:
default
Applies the setting in --search-scope.
Note
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN.
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is
nisNetgroupTriple.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly
used value is ntpasswdhash.
--provider-domain <string>
Specifies the domain that the provider will use to qualify user and group names.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform
LDAP searches.
The following values are valid:
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN itself.
--search-timeout <integer>
Specifies the number of seconds after which to stop retrying and fail a search.
The default value is 100.
--shell-attribute <string>
Specifies the LDAP attribute that contains a user's UNIX login shell. The default
value is loginShell.
--uid-attribute <string>
Specifies the LDAP attribute that contains UID numbers. The default value is
uidNumber.
--unfindable-groups <string>
If --restrict-findable is enabled and the findable groups list is empty,
specifies a list of groups that cannot be resolved by this provider. Repeat this
option to specify multiple list items.
--unfindable-users <string>
If --restrict-findable is enabled and the findable users list is empty,
specifies a list of users that cannot be resolved by this provider. Repeat this
option to specify multiple list items.
--unique-group-members-attribute <string>
Specifies the LDAP attribute that contains unique group members. This attribute
is used to determine which groups a user belongs to if the LDAP server is queried
by the user’s DN instead of the user’s name. This setting has no default value.
--unlistable-groups <string>
If --restrict-listable is enabled and the listable groups list is empty,
specifies a list of groups that cannot be listed by this provider that cannot be
viewed. Repeat this option to specify multiple list items.
--unlistable-users <string>
If --restrict-listable is enabled and the listable users list is empty,
specifies a list of users that cannot be listed by this provider that cannot be
viewed. Repeat this option to specify multiple list items.
--user-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
users.
--user-domain <string>
Specifies the domain that the provider will use to qualify users. The default user
domain is LDAP_USERS.
--user-filter <string>
Sets the LDAP filter for user objects.
--user-search-scope <scope>
Defines the depth from the base distinguished name (DN) to perform LDAP
searches for users.
The following values are valid:
default
Applies the search scope that is defined in the default query settings.
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN itself.
--groupnet <groupnet>
Specifies the groupnet referenced by the LDAP provider. The groupnet is a top-
level networking container that manages hostname resolution against DNS
nameservers and contains subnets and IP address pools. The groupnet specifies
which networking properties the LDAP provider will use when communicating
with external servers.
--bind-password <string>
Sets the password for the distinguished name that is used when binding to the
LDAP server. To set the password interactively, use the --set-bind-
password option instead.
--set-bind-password
Interactively sets the password for the distinguished name that is used when
binding to the LDAP server. This option cannot be used with --bind-password.
{--verbose | -v}
Displays the results of running the command.
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
<provider-name>
Specifies the name of the provider to delete.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
[--certificate-authority-file <string>]
[--check-online-interval <duration>]
[--cn-attribute <string>]
[--create-home-directory {yes | no}]
[--crypt-password-attribute <string>]
[--email-attribute <string>]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
[--add-findable-users <string>]
[--remove-findable-users <string>]
[--gecos-attribute <string>]
[--gid-attribute <string>]
[--group-base-dn <string>]
[--group-domain <string>]
[--group-filter <string>]
[--group-members-attribute <string>]
[--group-search-scope <scope>]
[--homedir-attribute <string>]
[--home-directory-template <string>]
[--ignore-tls-errors {yes | no}]
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
[--clear-listable-users]
[--add-listable-users <string>]
[--remove-listable-users <string>]
[--login-shell <string>]
[--member-of-attribute <string>]
[--name-attribute <string>]
[--netgroup-base-dn <string>]
[--netgroup-filter <string>]
[--netgroup-members-attribute <string>]
[--netgroup-search-scope <scope>]
[--netgroup-triple-attribute <string>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--nt-password-attribute <string>]
[--ntlm-support {all | v2only | none}]
[--provider-domain <string>]
[--require-secure-connection {yes | no}]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--search-scope <scope>]
[--search-timeout <integer>]
[--shell-attribute <string>]
[--uid-attribute <string>]
[--unfindable-groups <string>]
[--clear-unfindable-groups]
[--add-unfindable-groups <string>]
[--remove-unfindable-groups <string>]
[--unfindable-users <string>]
[--clear-unfindable-users]
[--add-unfindable-users <string>]
[--remove-unfindable-users <string>]
[--unique-group-members-attribute <string>]
[--unlistable-groups <string>]
[--clear-unlistable-groups]
[--add-unlistable-groups <string>]
[--remove-unlistable-groups <string>]
[--unlistable-users <string>]
[--clear-unlistable-users]
[--add-unlistable-users <string>]
[--remove-unlistable-users <string>]
[--user-base-dn <string>]
[--user-domain <string>]
[--user-filter <string>]
[--user-search-scope <scope>]
[--template {default | rfc2307 | ad-idmu | ldapsam}
[--bind-password <string>]
[--set-bind-password]
[--verbose]
Options
<provider-name>
Specifies the name of the LDAP provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example,
CN=Users,DC=mycompany,DC=com.
--server-uris <string>
Specifies a list of LDAP server URIs to be used when accessing the server.
Repeat this option to specify multiple list items.
Specify the LDAP server URI in the format ldaps://<server>:<port> for secure
LDAP or ldap://<server>:<port> for non-secure LDAP.
The server can be specified as an IPv4 address, an IPv6 address, or a hostname.
If you do not specify a port number, the default port is used; 389 for secure LDAP
or 636 for non-secure LDAP.
Note
If you specify non-secure LDAP, the bind password is transmitted to the server in
clear text.
--clear-server-uris
Removes all entries from the list of server URIs.
--add-server-uris <string>.
Adds an entry to the list of server URIs. Repeat this option to specify multiple list
items.
The server to be added can be specified as an IPv4 address, an IPv6 address, or a
hostname.
--remove-server-uris <string>
Removes an entry from the list of server URIs. Repeat this option to specify
multiple list items.
The server to be removed can be specified as an IPv4 address, an IPv6 address,
or a hostname.
--alternate-security-identities-attribute <string>
Specifies the name to be used when searching for alternate security identities.
This name is used when OneFS attempts to resolve a Kerberos principal to a user.
--bind-dn <string>
Specifies the distinguished name to use when binding to the LDAP server. For
example, CN=myuser,CN=Users,DC=mycompany,DC=com.
--bind-timeout <integer>
Specifies the timeout in seconds when binding to the LDAP server.
--certificate-authority-file <path>
Specifies the path to the root certificates file.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M
| W | D | H | m | s}].
--cn-attribute <string>
Specifies the LDAP attribute that contains common names. The default value is
cn.
--crypt-password-attribute <string>
Specifies the LDAP attribute that contains UNIX passwords. This setting has no
default value.
--email-attribute <string>
Specifies the LDAP attribute that contains email addresses. The default value is
mail.
--findable-groups <string>
Specifies a list of groups that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify multiple list items. If
populated, groups that are not included in this list cannot be resolved in this
provider. This option overwrites the entries in the findable groups list; to add or
--clear-findable-groups
Removes the list of findable groups.
--add-findable-groups <string>
Adds an entry to the list of findable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-groups <string>
Removes an entry from the list of findable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--findable-users <string>
Specifies a list of users that can be found in this provider if --restrict-
findable is enabled. Repeat this option to specify multiple list items. If
populated, users that are not included in this list cannot be resolved in this
provider. This option overwrites the entries in the findable users list; to add or
remove users without affecting current entries, use --add-findable-users
or --remove-findable-users.
--clear-findable-users
Removes the list of findable users.
--add-findable-users <string>
Adds an entry to the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-users <string>
Removes an entry from the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--gecos-attribute <string>
Specifies the LDAP attribute that contains GECOS fields. The default value is
gecos.
--gid-attribute <string>
Specifies the LDAP attribute that contains GIDs. The default value is gidNumber.
--group-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
groups.
--group-domain <string>
Specifies the domain that this provider will use to qualify groups. The default
group domain is LDAP_GROUPS.
--group-filter <string>
Sets the LDAP filter for group objects.
--group-members-attribute <string>
Specifies the LDAP attribute that contains group members. The default value is
memberUid.
--group-search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform
LDAP searches for groups.
The following values are valid:
default
Applies the setting in --search-scope.
Note
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--homedir-attribute <string>
Specifies the LDAP attribute that is used when searching for the home directory.
The default value is homeDirectory.
--listable-groups <string>
Specifies a list of groups that can be viewed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. If
populated, groups that are not included in this list cannot be viewed in this
provider. This option overwrites the entries in the listable groups list; to add or
remove groups without affecting current entries, use --add-listable-
groups or --remove-listable-groups.
--clear-listable-groups
Removes all entries from the list of viewable groups.
--add-listable-groups <string>
--remove-listable-groups <string>
Removes an entry from the list of viewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--listable-users <string>
Specifies a list of users that can be viewed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. If
populated, users that are not included in this list cannot be viewed in this
provider. This option overwrites the entries in the listable users list; to add or
remove users without affecting current entries, use --add-listable-users
or --remove-listable-users.
--clear-listable-users
Removes all entries from the list of viewable users.
--add-listable-users <string>
Adds an entry to the list of listable users that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-listable-users <string>
Removes an entry from the list of viewable users that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--login-shell <path>
Specifies the pathname to the user's login shell, for users who access the file
system through SSH.
--member-of-attribute <string>
Sets the attribute to be used when searching LDAP for reverse memberships.
This LDAP value should be an attribute of the user type posixAccount that
describes the groups in which the POSIX user is a member.
--name-attribute <string>
Specifies the LDAP attribute that contains UIDs, which are used as login names.
The default value is uid.
--netgroup-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
netgroups.
--netgroup-filter <string>
Sets the LDAP filter for netgroup objects.
--netgroup-members-attribute <string>
Specifies the LDAP attribute that contains netgroup members. The default value
is memberNisNetgroup.
--netgroup-search-scope <scope>
Defines the depth from the base distinguished name (DN) to perform LDAP
searches for netgroups.
Note
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN.
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is
nisNetgroupTriple.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly
used value is ntpasswdhash.
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform
LDAP searches.
The following values are valid:
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN itself.
--search-timeout <integer>
Specifies the number of seconds after which to stop retrying and fail a search.
The default value is 100.
--shell-attribute <string>
Specifies the LDAP attribute that is used when searching for a user's UNIX login
shell. The default value is loginShell.
--uid-attribute <string>
Specifies the LDAP attribute that contains UID numbers. The default value is
uidNumber.
--unfindable-groups <string>
Specifies a group that cannot be found in this provider if --restrict-
findable is enabled. Repeat this option to specify multiple list items. This option
overwrites the entries in the unfindable groups list; to add or remove groups
without affecting current entries, use --add-unfindable-groups or --
remove-unfindable-groups.
--clear-unfindable-groups
Removes all entries from the list of unfindable groups.
--add-unfindable-groups <string>
Adds an entry to the list of unfindable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-unfindable-groups <string>
Removes an entry from the list of unfindable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unfindable-users <string>
Specifies a user that cannot be found in this provider if --restrict-findable
is enabled. Repeat this option to specify multiple list items. This option overwrites
the entries in the unfindable users list; to add or remove users without affecting
current entries, use --add-unfindable-users or --remove-unfindable-
users.
--clear-unfindable-users
Removes all entries from the list of unfindable groups.
--add-unfindable-users <string>
Adds an entry to the list of unfindable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-unfindable-users <string>
Removes an entry from the list of unfindable users that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unique-group-members-attribute <string>
Specifies the LDAP attribute that contains unique group members. This attribute
is used to determine which groups a user belongs to if the LDAP server is queried
by the user’s DN instead of the user’s name. This setting has no default value.
--unlistable-groups <string>
Specifies a group that cannot be listed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. This option
overwrites the entries in the unlistable groups list; to add or remove groups
without affecting current entries, use --add-unlistable-groups or --
remove-unlistable-groups.
--clear-unlistable-groups
Removes all entries from the list of unviewable groups.
--add-unlistable-groups <string>
Adds an entry to the list of unviewable groups that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-groups <string>
Removes an entry from the list of unviewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--unlistable-users <string>
Specifies a user that cannot be viewed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. This option
overwrites the entries in the unlistable users list; to add or remove users without
affecting current entries, use --add-unlistable-users or --remove-
unlistable-users.
--clear-unlistable-users
Removes all entries from the list of unviewable users.
--add-unlistable-users <string>
Adds an entry to the list of unviewable users that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-users <string>
--user-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for
users.
--user-domain <string>
Specifies the domain that this provider will use to qualify users. The default user
domain is LDAP_USERS.
--user-filter <string>
Sets the LDAP filter for user objects.
--user-search-scope <scope>
Defines the depth from the base distinguished name (DN) to perform LDAP
searches for users. The valid values are as follows:
The following values are valid:
default
Applies the setting in --search-scope.
Note
base
Searches only the entry at the base DN.
onelevel
Searches all entries exactly one level below the base DN.
subtree
Searches the base DN and all entries below it.
children
Searches all entries below the base DN, excluding the base DN.
--bind-password <string>
Sets the password for the distinguished name that is used when binding to the
LDAP server. To set the password interactively, use the --set-bind-
password option instead.
--set-bind-password
Interactively sets the password for the distinguished name that is used when
binding to the LDAP server. This option cannot be used with --bind-password.
{--verbose | -v}
Displays detailed information.
Options
<provider-name>
Specifies the name of the provider to view.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<provider-name>
Specifies the name of the local provider to modify.
--home-directory-template <string>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--lockout-duration <duration>
Sets the length of time that an account will be inaccessible after multiple failed
login attempts.
--lockout-threshold <integer>
Specifies the number of failed login attempts after which an account will be
locked out.
--lockout-window <duration>
Sets the time in which the number of failed attempts specified by the --
lockout-threshold option must be made for an account to be locked out.
Duration is specified in the format <integer>[{Y | M | W | D | H | m | s}].
--login-shell <string>
Specifies the path to the UNIX login shell.
--machine-name <string>
Specifies the domain to use to qualify user and group names for the provider.
--min-password-age <duration>
Sets the minimum password age, in the format <integer>[{Y | M | W | D | H | m |
s}].
--max-password-age <duration>
Sets the maximum password age, in the format <integer>[{Y | M | W | D | H | m |
s}].
--min-password-length <integer>
Sets the minimum password length.
--password-prompt-time <duration>
Sets the remaining time until a user is prompted for a password change, in the
format <integer>[{Y | M | W | D | H | m | s}].
--remove-password-complexity <string>
Removes items from the list of parameters against which to validate new
passwords. Repeat this command to specify each password- complexity option
that you want to remove.
--password-history-length <integer>
Specifies the number of previous passwords to store to prevent reuse of a
previous password. The max password history length is 24.
{--verbose | -v}
Displays more detailed information.
Options
<provider-name>
Specifies the name of the provider to view.
Options
<level>
Sets the log level for the current node. The log level determines how much
information is logged.
The following values are valid and are organized from least to most information:
l always
l error
l warning
l info
l verbose
l debug
l trace
Note
Levels verbose, debug, and trace may cause performance issues. Levels debug
and trace log information that likely will be useful only when consulting EMC
Isilon Technical Support.
{--verbose | -v}
Displays detailed information.
Options
There are no options for this command.
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for
example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--uid
Generates a mapping if one does not exist for the identity; otherwise, retrieves
the mapped UID.
--gid
Generates a mapping if one does not exist for the identity; otherwise, retrieves
the mapped GID.
--sid
Generates a mapping if one does not exist for the identity; otherwise, retrieves
the mapped SID.
--on-disk
Specifies that the source on-disk identity should be represented by the target
identity.
--2way
Specifies a two-way, or reverse, mapping.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for
example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--zone<string>
Specifies the access zone that the ID mapping is applied to. If no access zone is
specified, the mapping is applied to the default System zone.
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for
example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--all
Deletes all identity mappings in the specified access zone. Can be used in
conjunction with --only-generated and --only-external for additional
filtering.
--only-generated
Only deletes identity mappings that were created automatically and that include a
generated UID or GID from the internal range of user and group IDs. Must be used
in conjunction with --all.
--only-external
Only deletes identity mappings that were created automatically and that include a
UID or GID from an external authentication source. Must be used in conjunction
with --all.
--2way
Specifies or deletes a two-way, or reverse, mapping.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for
example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--zone<string>
Deletes identity mappings in the specified access zone. If no access zone is
specified, mappings are deleted from the default System zone.
Options
If no option is specified, the full kernel mapping database is displayed.
{--file | -f} <path>
Prints the database to the specified output file.
--zone <string>
Displays the database from the specified access zone. If no access zone is
specified, displays all mappings.
Examples
To view the kernel mapping database, run the following command:
Options
You must specify either --all or one of the source options.
--all
Flushes all identity mappings on the cluster.
--source <string>
Specifies the mapping source by identity type, in the format <type>:<value>—for
example, UID:2002.
--source-uid <integer>
Specifies the source identity by UID.
--source-gid <integer>
Specifies the source identity by GID.
--source-sid <string>
Specifies the source identity by SID.
--zone<string>
Specifies the access zone of the source identity. If no access zone is specified,
any mapping for the specified source identity is flushed from the default System
zone.
Options
<file>
Specifies the full path to the file to import. File content must be in the same
format as the output that is displayed by running the isi auth mapping dump
command. File must exist with the /ifs file structure.
{--replace | -o}
Overwrites existing entries in the mapping database file with the file content.
{--verbose | -v}
Displays detailed information.
Options
--zone <string>
Specifies an access zone.
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for
example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for
example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--on-disk
Specifies that the source on-disk identity should be represented by the target
identity.
--2way
Specifies a two-way, or reverse, mapping.
--zone<string>
Specifies the access zone that the ID mapping is applied to. If no access zone is
specified, the mapping is applied to the default System zone.
Options
This command requires <user> or --uid <integer> or --kerberos-principal
<string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--kerberos-principal <string>
Specifies the Kerberos principal by name. For example, user@realm.com.
--zone <string>
Specifies the name of the access zone that contains the mapping.
--primary-gid <integer>
Specifies the primary GID.
--gid <integer>
Specifies a token GID. Repeat this option to specify multiple GIDs.
Options
<id>
Specifies the ID of the source identity type in the format <type>:<value>—for
example, UID:2002.
--uid <integer>
Specifies the mapping source by UID.
--gid <integer>
Specifies the mapping source by GID.
--sid <string>
Specifies the mapping source by SID.
--nocreate
Specifies that nonexistent mappings should not be created.
--zone
Specifies the access zone of the source identity. If no access zone is specified,
OneFS displays mappings from the default System zone.
Examples
The following command displays mappings for a user whose UID is 2002 in the zone3
access zone:
Type Mapping
---------- ----------------------------------------------
Name test1
On-disk UID:2002
Unix UID 2002
Unix GID None
SMB S-1-5-21-1776575851-2890035977-2418728619-1004
NFSv4 test1
Options
<netgroup>
Specifies the netgroup name.
--zone <string>
Specifies the access zone.
--provider <string>
Specifies the authentication provider.
Options
<name>
Sets the name of the NIS provider.
--nis-domain <string>
Specifies the NIS domain name.
--servers <string>
Specifies a list of NIS servers to be used by this provider. Specify the NIS server
as an IPv4 address or hostname. Repeat this option to specify multiple list items.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M
| W | D | H | m | s}].
--findable-groups <string>
Specifies a group that can be found in this provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, groups that
are not included in this list cannot be resolved.
--findable-users <string>
Specifies a user that can be found in this provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, users that
are not included in this list cannot be resolved.
--group-domain <string>
Specifies the domain that this provider will use to qualify groups. The default
group domain is NIS_GROUPS.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--listable-groups <string>
Specifies a group that can be viewed in this provider if --restrict-listable
is enabled. Repeat this option to specify multiple list items. If populated, groups
that are not included in this list cannot be viewed.
--listable-users <string>
Specifies a user that can be viewed in this provider if --restrict-listable is
enabled. Repeat this option to specify multiple list items. If populated, users that
are not included in this list cannot be viewed.
--login-shell <path>
Specifies the path to the user's login shell. This setting applies only to users who
access the file system through SSH.
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--request-timeout <integer>
Specifies the request timeout interval in seconds. The default value is 20.
--retry-time <integer>
Sets the timeout period in seconds after which a request will be retried. The
default value is 5.
--unfindable-groups <string>
If --restrict-findable is enabled and the findable groups list is empty,
specifies a group that cannot be resolved by this provider. Repeat this option to
specify multiple list items.
--unfindable-users <string>
If --restrict-findable is enabled and the findable users list is empty,
specifies a user that cannot be resolved by this provider. Repeat this option to
specify multiple list items.
--unlistable-groups <string>
If --restrict-listable is enabled and the listable groups list is empty,
specifies a group that cannot be viewed by this provider. Repeat this option to
specify multiple list items.
--unlistable-users <string>
If --restrict-listable is enabled and the listable users list is empty,
specifies a user that cannot be viewed by this provider. Repeat this option to
specify multiple list items.
--user-domain <string>
Specifies the domain that this provider will use to qualify users. The default user
domain is NIS_USERS.
--groupnet <groupnet>
Specifies the groupnet referenced by the NIS provider. The groupnet is a top-
level networking container that manages hostname resolution against DNS
nameservers and contains subnets and IP address pools. The groupnet specifies
which networking properties the NIS provider will use when communicating with
external servers.
{--verbose | -v}
Displays the results of running the command.
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Returns a success or fail message after running the command.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
[--add-unfindable-users <string>]
[--remove-unfindable-users <string>]
[--unlistable-groups <string>]
[--clear-unlistable-groups]
[--add-unlistable-groups <string>]
[--remove-unlistable-groups <string>]
[--unlistable-users <string>]
[--clear-unlistable-users]
[--add-unlistable-users <string>]
[--remove-unlistable-users <string>]
[--user-domain <string>]
[--ypmatch-using-tcp {yes | no}]
[--verbose]
Options
<provider-name>
Specifies the name of the NIS provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--nis-domain <string>
Specifies the NIS domain name.
--servers <string>
Specifies a list of NIS server to be used by this provider. Repeat this option to
specify multiple list items. Specify the NIS server as an IPv4 address or
hostname. This option overwrites the entries in the NIS servers list; to add or
remove servers without affecting current entries, use --add-servers or --
remove-servers.
--clear-servers
Removes all entries from the list of NIS servers.
--add-servers <string>
Adds an entry to the list of NIS servers. Repeat this option to specify multiple
items.
--remove-servers <string>
Removes an entry from the list of NIS servers. Repeat this option to specify
multiple items.
--check-online-interval <duration>
Specifies the time between provider online checks, in the format <integer>[{Y | M
| W | D | H | m | s}].
--findable-groups <string>
Specifies a group that can be found in this provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, groups that
are not included in this list cannot be resolved. This option overwrites the entries
in the findable groups list; to add or remove groups without affecting current
entries, use --add-findable-groups or --remove-findable-groups.
--clear-findable-groups
Removes all entries from the list of findable groups.
--add-findable-groups <string>
Adds an entry to the list of findable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-groups <string>
Removes an entry from the list of findable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--findable-users <string>
Specifies a user that can be found in this provider if --restrict-findable is
enabled. Repeat this option to specify multiple list items. If populated, users that
are not included in this list cannot be resolved. This option overwrites the entries
in the findable users list; to add or remove users without affecting current entries,
use --add-findable-users or --remove-findable-users.
--clear-findable-users
Removes all entries from the list of findable users.
--add-findable-users <string>
Adds an entry to the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-findable-users <string>
Removes an entry from the list of findable users that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--group-domain <string>
Specifies the domain that this provider will use to qualify groups. The default
group domain is NIS_GROUPS.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path
must begin with /ifs and can include special character sequences that are
dynamically replaced with strings at home directory creation time that represent
specific variables. For example, %U, %D, and %Z are replaced with the user
name, provider domain name, and zone name, respectively. For more information,
see the Home directories section.
--listable-groups <string>
Specifies a group that can be viewed in this provider if --restrict-listable
is enabled. Repeat this option to specify multiple list items. If populated, groups
that are not included in this list cannot be viewed. This option overwrites the
entries in the listable groups list; to add or remove groups without affecting
current entries, use --add-listable-groups or --remove-listable-
groups.
--clear-listable-groups
Removes all entries from the list of viewable groups.
--add-listable-groups <string>
Adds an entry to the list of viewable groups that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-listable-groups <string>
Removes an entry from the list of viewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--listable-users <string>
Specifies a user that can be viewed in this provider if --restrict-listable is
enabled. Repeat this option to specify multiple list items. If populated, users that
are not included in this list cannot be viewed. This option overwrites the entries in
the listable users list; to add or remove users without affecting current entries,
use --add-listable-users or --remove-listable-users.
--clear-listable-users
Removes all entries from the list of viewable users.
--add-listable-users <string>
Adds an entry to the list of viewable users that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-listable-users <string>
Removes an entry from the list of viewable users that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--login-shell <path>
Specifies the path to the user's login shell. This setting applies only to users who
access the file system through SSH.
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--request-timeout <integer>
Specifies the request timeout interval in seconds. The default value is 20.
--retry-time <integer>
Sets the timeout period in seconds after which a request will be retried. The
default value is 5.
--unfindable-groups <string>
Specifies a group that cannot be found in this provider if --restrict-
findable is enabled. Repeat this option to specify multiple list items. This option
overwrites the entries in the unfindable groups list; to add or remove groups
without affecting current entries, use --add-unfindable-groups or --
remove-unfindable-groups.
--clear-unfindable-groups
Removes all entries from the list of unfindable groups.
--add-unfindable-groups <string>
Adds an entry to the list of unfindable groups that is checked if --restrict-
findable is enabled. Repeat this option to specify multiple list items.
--remove-unfindable-groups <string>
Removes an entry from the list of unfindable groups that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unfindable-users <string>
Specifies a user that cannot be found in this provider if --restrict-findable
is enabled. Repeat this option to specify multiple list items. This option overwrites
the entries in the unfindable users list; to add or remove users without affecting
current entries, use --add-unfindable-users or --remove-unfindable-
users.
--clear-unfindable-users
Removes all entries from the list of unfindable groups.
--add-unfindable-users <string>
--remove-unfindable-users <string>
Removes an entry from the list of unfindable users that is checked if --
restrict-findable is enabled. Repeat this option to specify multiple list
items.
--unlistable-groups <string>
Specifies a group that cannot be listed in this provider if --restrict-
listable is enabled. Repeat this option to specify multiple list items. This option
overwrites the entries in the unlistable groups list; to add or remove groups
without affecting current entries, use --add-unlistable-groups or --
remove-unlistable-groups.
--clear-unlistable-groups
Removes all entries from the list of unlistable groups.
--add-unlistable-groups <string>
Adds an entry to the list of unviewable groups that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-groups <string>
Removes an entry from the list of unviewable groups that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--unlistable-users <string>
Specifies a user that cannot be listed in this provider if --restrict-listable
is enabled. Repeat this option to specify multiple list items. This option overwrites
the entries in the unlistable users list; to add or remove users without affecting
current entries, use --add-unlistable-users or --remove-unlistable-
users.
--clear-unlistable-users
Removes all entries from the list of unviewable users.
--add-unlistable-users <string>
Adds an entry to the list of unviewable users that is checked if --restrict-
listable is enabled. Repeat this option to specify multiple list items.
--remove-unlistable-users <string>
Removes an entry from the list of unviewable users that is checked if --
restrict-listable is enabled. Repeat this option to specify multiple list
items.
--user-domain <string>
Specifies the domain that this provider will use to qualify users. The default user
domain is NIS_USERS.
{--verbose | -v}
Displays the results of running the command.
Options
<provider-name>
Specifies the name of the provider to view.
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Note
When using the --verbose option, the output Read Write: No means that
the privileges are read-only.
Options
There are no options for this command.
Options
<name>
Specifies the name of the role.
--description <string>
Specifies a description of the role.
{--verbose | -v}
Displays the results of running the command.
Options
<role>
Specifies the name of the role to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<role>
Specifies a role by name.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view the members of the SystemAdmin role, run the following command:
In the following sample output, the SystemAdmin role currently contains one member,
a user named admin:
Type Name
----------
user admin
----------
Total: 1
Options
<role>
Specifies the name of the role to modify.
--name <string>
Specifies a new name for the role. Applies to custom roles only.
--description <string>
Specifies a description of the role.
--add-group <string>
Adds a group with the specified name to the role. Repeat this option for each
additional item.
--remove-group <string>
Removes a group with the specified name from the role. Repeat this option for
each additional item.
--add-gid <integer>
Adds a group with the specified GID to the role. Repeat this option for each
additional item.
--remove-gid <integer>
Removes a group with the specified GID from the role. Repeat this option for
each additional item.
--add-uid <integer>
Adds a user with the specified UID to the role. Repeat this option for each
additional item.
--remove-uid <integer>
Removes a user with the specified UID from the role. Repeat this option for each
additional item.
--add-user <string>
Adds a user with the specified name to the role. Repeat this option for each
additional item.
--remove-user <string>
Removes a user with the specified name from the role. Repeat this option for
each additional item.
--add-sid <string>
Adds a user or group with the specified SID to the role. Repeat this option for
each additional item.
--remove-sid <string>
Removes a user or group with the specified SID from the role. Repeat this option
for each additional item.
--add-wellknown <string>
Adds a well-known SID with the specified name—for example, Everyone—to the
role. Repeat this option for each additional item.
--remove-wellknown <string>
Removes a well-known SID with the specified name from the role. Repeat this
option for each additional item.
--add-priv <string>
Adds a read/write privilege to the role. Applies to custom roles only. Repeat this
option for each additional item.
--add-priv-ro <string>
Adds a read-only privilege to the role. Applies to custom roles only. Repeat this
option for each additional item.
--remove-priv <string>
Removes a privilege from the role. Applies to custom roles only. Repeat this
option for each additional item.
{--verbose | -v}
Displays the results of running the command.
Options
<role>
Specifies a role by name.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To list the privileges that are associated with the built-in SecurityAdmin role, run the
following command:
ID
----------------------
ISI_PRIV_LOGIN_CONSOLE
ISI_PRIV_LOGIN_PAPI
ISI_PRIV_LOGIN_SSH
ISI_PRIV_AUTH
ISI_PRIV_ROLE
----------------------
Total: 5
Options
<role>
Specifies the name of the role to view.
Options
--create-over-smb {allow | disallow}
Specifies whether to allow or deny creation of ACLs over SMB.
Note
Inheritable ACLs on the system take precedence over this setting. If inheritable
ACLs are set on a folder, any new files and folders created in that folder will
inherit the folder's ACL. Disabling this setting does not remove ACLs currently set
on files. If you want to clear an existing ACL, run the chmod -b <mode>
<file> command to remove the ACL and set the correct permissions.
replace_users_and_groups
Removes the existing ACL and creates an ACL equivalent to the UNIX
permissions for all users/groups referenced in old ACL. Select this option
only if you want to remove Windows permissions but do not want files to
have synthetic ACLs.
merge
Merges permissions that are applied by chmod with existing ACLs. An ACE
for each identity (owner, group, and everyone) is either modified or created,
but all other ACEs are unmodified. Inheritable ACEs are also left unmodified
to enable Windows users to continue to inherit appropriate permissions.
UNIX users can set specific permissions for each of those three standard
identities, however.
deny
Prevents users from making NFS and local chmod operations. Enable this
setting if you do not want to allow permission sets over NFS.
ignore
Ignores the chmod operation if file has an existing ACL, which prevents an
NFS client from making changes to the ACL. Select this option if you defined
an inheritable ACL on a directory and want to use that ACL for permissions.
CAUTION
If you attempt to run the chmod command on the same permissions that are
currently set on a file with an ACL, you may cause the operation to silently
fail. The operation appears to be successful, but if you were to examine the
permissions on the cluster, you would notice that the chmod command had
no effect. As an alternative, you can run the chmod command away from the
current permissions and then perform a second chmod command to revert to
the original permissions. For example, if your file shows 755 UNIX
permissions and you want to confirm this number, you could run chmod 700
file; chmod 755 file.
owner_group_only
Modifies the owner or group and ACL permissions, which enables the NFS
chown or chgrp operation to function as it does in Windows. When a file
owner is changed over Windows, no permissions in the ACL are changed.
ignore
Ignores the chown and chgrp operations if file has an existing ACL, which
prevents an NFS client from making changes to the owner or group.
Note
Over NFS, the chown or chgrp operation changes the permissions and user or
group that has ownership. For example, a file owned by user Joe with rwx------
(700) permissions indicates rwx permissions for the owner, but no permissions for
anyone else. If you run the chown command to change ownership of the file to
user Bob, the owner permissions are still rwx but they now represent the
permissions for Bob, rather than for Joe, who lost all of his permissions. This
setting does not affect UNIX chown or chgrp operations performed on files with
UNIX permissions, and it does not affect Windows chown or chgrp operations,
which do not change any permissions.
implement this policy setting to give users the right to perform chmod operations
that change permissions, or the right to perform chown operations that take
ownership, but do not give ownership away. The following values are valid:
unix
Allows only the file owner to change the mode or owner of the file, which
enable chmod and chown access checks to operate with UNIX-like behavior.
windows
Allow the file owner and users with WRITE_DAC and WRITE_OWNER
permissions to change the mode or owner of the file, which enables chmod
and chown access checks to operate with Windows-like behavior.
full_control
Treats rwx permissions as full control and generates an ACE that provides
the maximum Windows permissions for a user or a group by adding the
change permissions right, the take ownership right, and the delete right.
parent
Specifies that the group owner be inherited from the file's parent folder.
creator
Specifies that the group owner be inherited from the file creator's primary
group.
remove
Removes ACLs from files over UNIX file sharing (NFS) and locally on the
cluster through the chmod (007) command. If you enable this setting, be
sure to run the chmod command on the file immediately after using chmod
(007) to clear an ACL. In most cases, you do not want to leave 007
permissions on the file.
owner_only
Approximates owner mode bits using only the ACE with the owner ID. This
causes the owner permissions to appear more accurate, in that you see only
the permissions for a particular owner and not the more permissive set. This
may cause access-denied problems for UNIX clients, however.
group_only
Approximates group mode bits using only the ACE with the owner ID. This
causes the group permissions to appear more accurate, in that you see only
the permissions for a particular group and not the more permissive set. This
may cause access-denied problems for UNIX clients, however.
none
Does not modify synthetic ACLs and mode bit approximations, which
prevents modifications to synthetic ACL generation and allows “deny” ACEs
to be generated when necessary.
CAUTION
remove
Removes deny ACEs when generating synthetic ACLs. This setting can cause
ACLs to be more permissive than the equivalent mode bits.
owner_and_write
Allows owners as well as users with write access to modify utimes to client-
specific times, which is less restrictive.
deny_smb_nfs
Denies permission to modify files with DOS read-only attribute through both
NFS and SMB.
777
Specifies to always display 777 if an ACL exists. If the approximated NFS
permissions are less permissive than those in the ACL, you may want to use
this setting so the NFS client does not stop at the access check before
performing its operation. Use this setting when a third-party application may
be blocked if the ACL does not provide the proper access.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Options
--send-ntlmv2 {yes | no}
Specifies whether to send only NTLMv2 responses to an SMB client. The default
value is no. Valid values are yes, no. The default value is no.
--revert-send-ntlmv2
Reverts the --send-ntlmv2 setting to the system default value.
--space-replacement <character>
For clients that have difficulty parsing spaces in user and group names, specifies a
substitute character. Be careful to choose a character that is not in use.
--revert-space-replacement
--workgroup <string>
Specifies the NetBIOS workgroup. The default value is WORKGROUP.
--revert-workgroup
Reverts the --workgroup setting to the system default value.
--user-object-cache-size <size>
Specifies the maximum size (in bytes) of the security object cache in the
authentication service.
--revert-user-object-cache-size
Reverts the --user-object-cache-size setting to the system default value.
--on-disk-identity <string>
Controls the preferred identity to store on disk. If OneFS is unable to convert an
identity to the preferred format, it is stored as is. This setting does not affect
identities that are already stored on disk.
The accepted values are listed below.
native
Allows OneFS to determine the identity to store on disk. This is the
recommended setting.
unix
Always stores incoming UNIX identifiers (UIDs and GIDs) on disk.
sid
Stores incoming Windows security identifiers (SIDs) on disk unless the SID
was generated from a UNIX identifier. If the SID was generated from a UNIX
identifier, OneFS converts it back to the UNIX identifier and stores it on disk.
Note
To prevent permission errors after changing the on-disk identity, run the Repair
Permissions job with the convert mode specified.
--revert-on-disk-identity
Sets the --on-disk-identity setting to the system default value.
--rpc-block-time <integer>
Specifies the length of time, in milliseconds, before an ID mapper request
becomes asynchronous.
--revert-rpc-block-time
Sets the --rpc-block-time setting to the system default value.
--rpc-max-requests <integer>
Specifies the maximum number of simultaneous ID mapper requests allowed. The
default value is 64.
--revert-rpc-max-requests
Sets the --rpc-max-requests setting to the system default value.
--unknown-gid <integer>
Specifies the GID to use for the unknown (anonymous) group.
--revert-unknown-gid
Sets the --unknown-gid setting to the system default value.
--unknown-uid <integer>
Specifies the UID to use for the unknown (anonymous) user.
--revert-unknown-uid
Sets the --unknown-uid setting to the system default value.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Examples
To view the current authentication settings on the cluster, run the following
command:
Send NTLMv2: No
Space Replacement:
Workgroup: WORKGROUP
Provider Hostname Lookup: disabled
Alloc Retries: 5
Cache Cred Lifetime: 15m
Cache ID Lifetime: 15m
On Disk Identity: native
RPC Block Time: 5s
RPC Max Requests: 16
RPC Timeout: 30s
System GID Threshold: 80
System UID Threshold: 80
GID Range Enabled: Yes
GID Range Min: 1000000
GID Range Max: 2000000
UID Range Enabled: Yes
UID Range Min: 1000000
UID Range Max: 2000000
Options
--always-send-preauth <boolean>
Specifies whether to send preauth.
--revert-always-send-preauth
Sets the value of --always-send-preauth to the system default.
--default-realm <string>
Specifies the default Kerberos realm name.
--dns-lookup-kdc <boolean>
Allows DNS to find Key Distribution Centers (KDCs).
--revert-dns-lookup-kdc
Sets the value of --dns-lookup-kdc to the system default.
--dns-lookup-realm <boolean>
Allows DNS to find the Kerberos realm names.
--revert-dns-lookup-realm
Sets the value of --dns-lookup-realm to the system default.
Options
If no option is specified, the kernel mapping database is displayed.
--gid-range-enabled {yes | no}
Enables automatic allocation of GIDs by the ID mapping service. This setting is
enabled by default.
--revert-gid-range-enabled
Sets the value of --gid-range-enabled to the system default.
--gid-range-min <integer>
Specifies the lower value in the range of GIDs that are available for allocation. The
default value is 1000000.
--revert-gid-range-min
Sets the value of --gid-range-min to the system default.
--gid-range-max <integer>
Specifies the upper value of the range of GIDs that are available for allocation.
The default value is 2000000.
--revert-gid-range-max
Sets the value of --gid-range-min to the system default.
--uid-range-min <integer>
Specifies the lower value in the range of UIDs that are available for allocation. The
default value is 1000000.
--revert-uid-range-min
--uid-range-max <integer>
Specifies the upper value in the range of UIDs that are available for allocation.
The default value is 2000000.
--revert-uid-range-max
Sets the value of --uid-range-max to the system default.
--zone <string>
Specifies the access zone in which to modify ID mapping settings. If no access
zone is specified, settings in the default System zone will be modified.
Options
--zone <string>
Displays mapping settings from the specified access zone. If no access zone is
specified, displays mappings from the default System zone.
Options
--zone<string>
Specifies an access zone by name.
--groupnet<string>
Specifies a groupnet by name.
--limit [ -l | <integer>]
Specifies the number of providers to display.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the user name.
--gecos <string>
Specifies the values for the following Gecos field entries in the user's password
file:
Full Name:
Office Location:
Office Phone:
Home Phone:
Other information:
--home-directory <path>
Specifies the path to the user's home directory.
--password <string>
Sets the user's password to the specified value. This option cannot be used with
the --set-password option.
--primary-group <name>
Specifies the user's primary group by name.
--primary-group-gid <integer>
Specifies the user's primary group by GID.
--primary-group-sid <string>
Specifies the user's primary group by SID.
--shell <path>
Specifies the path to the UNIX login shell.
--uid <integer>
Overrides automatic allocation of the UNIX user identifier (UID) with the specified
value. Setting this option is not recommended.
--zone <string>
Specifies the access zone in which to create the user.
--provider <string>
Specifies a local authentication provider in the specified access zone.
--set-password
Sets the password interactively. This option cannot be used with the --
password option.
{--verbose | -v}
Displays the results of running the command.
{--force | -f}
Suppresses command-line prompts and messages.
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--zone <string>
Specifies the name of the access zone that contains the user.
--provider <string>
Specifies the name of the authentication provider that contains the user.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Options
There are no options for this command.
Examples
To flush all cached user information, run the following command:
Note
Syntax
Options
--domain <string>
Displays only the users in the specified provider domain.
--zone <string>
Specifies the access zone whose users you want to list. The default access zone
is System.
--provider <string>
Displays only the users in the specified authentication provider. The syntax for
specifying providers is <provider-type>:<provider-name>, being certain to use the
colon separator; for example, isi auth users list --provider="lsa-
ldap-provider:Unix LDAP".
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
{--verbose | -v}
Displays more detailed information.
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--email <string>
--gecos <string>
Specifies the values for the following Gecos field entries in the user's password
file:
Full Name:
Office Location:
Office Phone:
Home Phone:
Other information:
--home-directory <path>
Specifies the path to the user's home directory.
--password <string>
Sets the user's password to the specified value. This option cannot be used with
the --set-password option.
--primary-group <name>
Specifies the user's primary group by name.
--primary-group-gid <integer>
Specifies the user's primary group by GID.
--primary-group-sid <string>
Specifies the user's primary group by SID.
--shell <path>
Specifies the path to the UNIX login shell.
--new-uid <integer>
Specifies a new UID for the user. Setting this option is not recommended.
--zone <string>
Specifies the name of the access zone that contains the user.
--add-group <name>
Specifies the name of a group to add the user to. Repeat this option to specify
multiple list items.
--add-gid <integer>
Specifies the GID of a group to add the user to. Repeat this option to specify
multiple list items.
--remove-group <name>
Specifies the name of a group to remove the user from. Repeat this option to
specify multiple list items.
--remove-gid <integer>
Specifies the GID of a group to remove the user from. Repeat this option to
specify multiple list items.
--provider <string>
Specifies an authentication provider of the format <type>:<instance>. Valid
provider types are ads, ldap, nis, file, and local. For example, an LDAP
provider named auth1 can be specified as ldap:auth1.
--set-password
Sets the password interactively. This option cannot be used with the --
password option.
{--verbose | -v}
Displays the results of running the command.
{--force | -f}
Suppresses command-line prompts and messages.
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--cached
Returns only cached information.
--show-groups
Displays groups that include the user as a member.
--resolve-names
Resolves the names of all related groups and related identities.
--zone <string>
Specifies the name of the access zone that contains the user.
--provider <string>
Specifies the name of the authentication provider that contains the user in the
format <type>:<instance>. Valid values for type are ads, ldap, nis, file, and
local. For example an LDAP provider named auth1 can be specified as
ldap:auth1, or an Active Directory provider can be specified as
ads:YORK.east.com.
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the node you want to view. If omitted, battery status for the local node
is displayed.
Options
<id>
The certificate identifier.
{--force | -f}
Skips the confirmation prompt for this command.
{--verbose | -v}
Displays more detailed information.
Option
<certificate-path>
The local path to the TLS certificate file, in PEM format. The certificate file is
copied into the system certificate store and can be removed after import. This
must be an absolute path within the OneFS file system.
<certificate-key-path>
The local path to the TLS certificate key file, in PEM format. The certificate key
file is copied into the system certificate store, and should be removed after
import for security reasons.
--description <string>
A description field provided for administrative convenience, in which you can
enter a comment about the certificate.
--default
Defines the name of a certificate to use to connect to a TLS enabled service over
a SmartConnect zone, if no other server certificate matches the fully qualified
domain name of that SmartConnect zone.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l}
The number of certificate servers to display.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<id>
The certificate identifier.
--default
Defines the name of a certificate to use to connect to a TLS enabled service over
a SmartConnect zone, if no other server certificate matches the fully qualified
domain name of that SmartConnect zone.
--description <string>
A description field provided for administrative convenience, in which you can
enter a comment about the certificate.
{--verbose | -v}
Displays more detailed information.
Options
<id>
The certificate identifier.
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cloud account.
--expiration-date <timestamp>
The date and time at which write access to cloud data ends on this cluster. The
timestamp format is MMDDYY:hh:mm. For example, 022016:12:00 specifies an
expiration date and time of February 20, 2016 at 12:00 PM.
--verbose
Displays more detailed information.
Examples
The following example adds cloud write access to a cluster by specifying the cluster
GUID and an expiration date:
OneFS displays a message indicating the cloud accounts and file pool policies to which
the secondary cluster will have access, and requires confirmation. Type yes, and press
ENTER to complete the process.
Options
--limit<integer>
Limits the number of eligible clusters displayed in the list.
--sort
Sort the list of eligible clusters according to the specified category. The following
values are valid:
name
guid
synced_from
state
accounts
policies
--format
Outputs the list of eligible clusters in the specified format. The following values
are valid:
table
json
csv
list
--descending
Outputs the list of eligible clusters in descending order according to the specified
sort option.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cloud account.
--expiration-date <timestamp>
The date and time at which write access to cloud data ends on this cluster. The
timestamp format is MMDDYY:hh:mm. For example, 022016:12:00 specifies an
expiration date and time of February 20, 2016 at 12:00 PM.
--verbose
Displays more detailed information.
Examples
The following example adds cloud write access to a cluster by specifying the cluster
GUID and an expiration date:
OneFS displays a message indicating the cloud accounts and file pool policies to which
the secondary cluster will have access, and requires confirmation. Type yes, and press
ENTER to complete the process.
Options
--limit<integer>
Limits the number of eligible clusters displayed in the list.
--sort
Sort the list of eligible clusters according to the specified category. The following
values are valid:
name
guid
synced_from
state
accounts
policies
--format
Outputs the list of eligible clusters in the specified format. The following values
are valid:
table
json
csv
list
--descending
Outputs the list of eligible clusters in descending order according to the specified
sort option.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
[--add-cluster-access <string>]
[--clear-cluster-access ]
[--cluster-access <string>]
[--list available clusters]
[--remove-cluster-access <string>]
[{--verbose | -v}]
[{--help | -h}]
Options
--add-cluster-access
Specify the GUID of the cluster to whose data you want to permit access on the
current cluster. The GUID you provide must be available in the list shown by
running isi cloud settings access
--list-available-clusters
Lists the GUIDs for clusters that have been synched or backed up on this cluster.
You can make the cloud data copied from any of these clusters available on this
cluster.
Note
Be sure not to access cloud data from multiple clusters, or data corruption may
result.
--clear-cluster-access
Clears access from this cluster to cloud data from all clusters added earlier.
--cluster-access
Specifies the GUIDs of the cluster to whose data you want to permit access on
the current cluster. Provide a single GUID or multiple GUIDs in a comma-
separated list. The list of GUIDs you provides overwrites any GUIDs provided
earlier. Run isi cloud settings access --list-available-clusters
for a list GUIDs for clusters that have Synched or backed up on the current
cluster.
--remove-cluster-access
Specify the GUID of the cluster to which access will be removed.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help text.
Examples
This command adds access to the cluster with GUID
ab9dd991-261e-11e3-8224-0800200c9a66. To be accessible, data from this cluster
must exist on this system.
This command gives access to two clusters. The cluster GUIDs are provided in a
comma-separated list. You can find the GUIDs of all available clusters by running isi
cloud settings access --list-available clusters.
This command lists all clusters that have been synched or backed up on this cluster.
Access for any of these clusters can be added by running isi cloud settings
access --add-cluster.
This command removes access to a cluster for which access was added earlier.
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster from
which you want to remove cloud write access.
--force
Execute the command without requiring confirmation.
--verbose
Displays more detailed information.
Examples
The following example removes cloud write access from a cluster identified by a
specified GUID:
OneFS displays a message indicating the cloud accounts and file pool policies to which
the cluster will no longer have access, and requires confirmation. Type yes, and press
ENTER to complete the process.
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster.
Options
<name>
<type>
The type of cloud storage account: one of isilon, azure, s3, virtustream,
or ecs.
<uri>
The cloud account URI. This URI must match that provided to the cloud vendor.
<account-username>
The username for the cloud account. This name must be identical to the user
name provided to the cloud vendor.
<key>
The cloud account access key or password. This information is provided by the
cloud vendor.
--account-id <string>
This is a required Amazon S3-only setting. The account ID number provided by
Amazon when you first establish an account with the vendor.
--telemetry-bucket <string>
This is a required Amazon S3-only setting. The telemetry bucket name that you
specified when you first established an account with the vendor.
--storage-region <string>
This is a required Amazon S3-only setting. The storage region that you specified
when you first established an account with the vendor. For example, us-west-1.
--proxy <string>
The network proxy through which CloudPools traffic to and from a public cloud
provider should be redirected. The specified network proxy must already have
been created with the isi cloud proxies create command.
--force
Execute the command without requiring confirmation.
--verbose
Displays more detailed information.
Examples
The following example creates a Microsoft Azure cloud account:
Options
<id>
The name of the cloud account. You can use the isi cloud accounts list command
to display the names of cloud accounts.
--acknowledge <string>
Enables the account deletion to proceed. This parameter is required. You must
include a text string with the paramater, such as yes, proceed, or other string.
--verbose
Displays more detailed information.
Example
The following example deletes a Microsoft Azure cloud account:
When you run the command, OneFS displays the following message and requires
confirmation:
**********************************************************************
WARNING: Deleting an account is extremely dangerous.
Continuing with this operation will result in a permanent loss of
data.
Type 'confirm delete data' to proceed. Press enter to cancel:
Options
--limit<integer>
Limits the number of cloud accounts displayed in the list.
--sort
Sort the list of cloud accounts according to the specified category. The following
values are valid:
id
name
type
account_username
uri
state
bucket
--format
Outputs the list of cloud accounts in the specified format. The following values
are valid:
table
json
csv
list
--descending
Outputs the list of cloud accounts in descending order according to the specified
sort option.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Options
<id>
The ID of the cloud account. In this case, the ID is the same as the cloud account
name.
--name <string>
The name of the cloud account. In this case, the name is the same as the ID.
--account-username <string>
The username for the cloud account. This name must be identical to the user
name provided to the cloud vendor.
--key <string>
The cloud account access key or password. This information is provided by the
cloud vendor.
--uri <string>
The cloud account URI. This URI must match that provided to the cloud vendor.
--account-id <string>
This is a required Amazon S3-only setting. The account ID number provided by
Amazon when you first establish an account with the vendor.
--telemetry-bucket <string>
This is a required Amazon S3-only setting. The telemetry bucket name that you
specified when you first established an account with the vendor.
--storage-region <string>
This is a required Amazon S3-only setting. The storage region that you specified
when you first established an account with the vendor. For example, us-west-1.
--proxy <string>
The network proxy through which CloudPools traffic to and from a public cloud
provider should be redirected. The specified network proxy must already have
been created with the isi cloud proxies create command.
--clear-proxy
Removes the network proxy through which CloudPools traffic to and from a
public cloud provider had been redirected. When you remove a proxy, CloudPools
traffic would flow directly to the cloud provider.
--skip-account-check {yes | no}
If set to yes, CloudPools skips the validation step to determine that the cloud
storage account is accessible.
--verbose
Displays more detailed information.
Example
The following example modifies a Microsoft Azure cloud account:
Options
<name>
Specifies the name of the cloud account to view. You can use the isi cloud
accounts list command to display a list of the names of available cloud
accounts.
Example
The following example displays the details of an Amazon S3 cloud account named
my_S3:
Options
<files>
Specifies the files to archive or recall. Specify --files for each additional file to
process. Alternatively, you can specify a file matching pattern such as /ifs/
data/archive/images/*.jpg.
--policy <string>
Specifies the file pool policy to appy to the specified files. If you specify one or
more files to be archived and do not specify a policy, OneFS will compare the files
with each configured file pool policy.
--verbose
Displays more detailed information.
Examples
The following example archives multiple files to the cloud according to a specific file
pool policy:
The following example archives an entire directory to the cloud. The operation must
match an existing file pool policy to be successful.
Options
<id>
The ID for the cloud job. Run isi cloud jobs list to see a list of all manual
and system jobs and their associated IDs.
--verbose
Displays more detailed information.
Example
This following example cancels a CloudPools job with the ID of 21.
Options
<type> <string>
Specifies the type of job. Valid entries are archive and recall.
<files> ...<dict>
Specifies one or more file names to which the job applies. Multiple file names
must be separated by commas.
The predicate specifies an attribute to filter by (for example, the size of a file).
The following predicates are valid:
--size<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--file-type <value>
Selects only the specified file-system object type.
The following values are valid:
f
Specifies regular files
d
Specifies directories
l
Specifies soft links
--link_count <integer>
Matches files with a given number of links. Works with integer value and
accepts operators
<value>
Specifies the value of the custom attribute.
Selects files that were modified during the specified time interval.
The operator specifies which files are selected in relationship to the attribute (for
example, all files smaller than the given size). Specify operators in the following
form:
--operator <value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
The link specifies how the criterion relates to the one that follows it (for example,
the file is selected only if it meets both criteria). The following links are valid:
--and
Selects files that meet the criteria of the options that come before and after
this value.
--or
Selects files that meet either the criterion of the option that comes before
this value or the criterion of the option that follows this value.
{--verbose | -v}
--begin-filter {<predicate> <operator> <link>}... --end-filter
Specifies the file-matching criteria that determines the files to which the
archive operation applies. A file matching criterion consists of a predicate, an
operator, and a link. The predicate specifies an attribute to filter by (for
example, the size of a file). The following predicates are valid:
--size<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--file-type <value>
Selects only the specified file-system object type.
The following values are valid:
f
Specifies regular files
d
Specifies directories
l
Specifies soft links
--link_count <integer>
Matches files with a given number of links. Works with integer value and
accepts operators
<value>
Specifies the value of the custom attribute.
The operator specifies which files are selected in relationship to the attribute
(for example, all files smaller than the given size). Specify operators in the
following form:
--operator <value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
The link specifies how the criterion relates to the one that follows it (for
example, the file is selected only if it meets both criteria). The following links
are valid:
--and
Selects files that meet the criteria of the options that come before and
after this value.
--or
Selects files that meet either the criterion of the option that comes
before this value or the criterion of the option that follows this value.
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help text.
{--help | -h}
Displays help text.
Example 1 Example
Options
<job-id>
The ID of the job. To find the list of job IDs in CloudPools, run the isi cloud
jobs list command.
--limit <integer>
Display no more than the specified number of items.
--descending
Sort and present data in descending order.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following example displays a list of files associated with a specific cloud job:
Options
--limit <integer>
Display no more than the specified number of items.
--descending
Sort and present data in descending order.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Options
id
The ID of the cloud job to pause. Use the isi cloud jobs list command to
view the IDs of all cloud jobs. Although possible, we recommend that you not
pause any of the CloudPools system jobs that run in the background and are
critical for proper operation. These include cache-writeback, cache-invalidation,
local-garbage-collection, and cloud-garbage-collection.
--verbose
Displays more detailed information.
Example
The following example pauses a cloud job with ID 19.
Options
<id>
The ID for the cloud job to resume. Use the isi cloud jobs list command
to view a list of jobs and their associated IDs.
--verbose
Displays more detailed information.
Example
The following command resumes a paused job with an ID of 26:
Options
<id>
Specify the ID of the cloud job. Use the isi cloud jobs list command to
view all jobs and their associated IDs.
Example
The following command views the details of a job with the ID of 27:
Options
<name>
The name of the CloudPool.
<type>
The type of account, one of isilon, azure, s3, ecs, or virtustream.
<account>
The name of the cloud storage account to which the CloudPool connects. The
cloud storage account is required and must match the CloudPool type. Only one
cloud storage account can be specified.
--description <string>
A description of the CloudPool.
--vendor <string>
The name of the vendor hosting the cloud storage account.
--verbose
Displays more detailed information.
Example
This following command creates a CloudPool containing a Microsoft Azure cloud
storage account:
Options
<id>
The name of the CloudPool. You can use the isi cloud pools list command to list
existing CloudPools and their associated IDs.
--force
Deletes the account without asking for confirmation.
--verbose
Displays more detailed information.
Example 2 Example
When you press ENTER to run the command, OneFS asks for confirmation. Type yes,
then press ENTER.
Options
--limit <integer>
Displays no more than the specified number of items.
--descending
Sorts and presents data in descending order.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
[--add-accounts <string>]
[--clear-accounts]
[--remove-accounts <string>]
[--description <string>]
[--vendor <string>]
[--verbose]
Options
<id>
The ID of the CloudPool. Run isi cloud pools list to view the IDs of all
CloudPools.
--name <string>
Specify a new name for the CloudPool.
--account <string>
Specify the name of the cloud account to add to the CloudPool. Only one account
per CloudPool is allowed.
--add-account <string>
Specify the name of a cloud account to add to the CloudPool. Only one account
per CloudPool is allowed.
--remove-accounts <string>
Specify the name of the cloud account to remove from the CloudPool. You can
only remove an account if you are adding a different account in the same
command.
--description
Specify the name of the cloud account to remove from the CloudPool. You can
only remove an account if you are adding a different account in the same
command.
---vendor <string>
The name of the vendor hosting the cloud pool accounts.
--verbose
Displays more detailed information.
Examples
The following command adds a vendor name and description to an existing CloudPool:
The following command removes one cloud account from the CloudPool, and adds
another cloud account:
Options
<id>
The ID of the cloud pool. Run the isi cloud pool list command to view all
CloudPools and their associated IDs.
Example
The following command displays information about a CloudPool named
my_azure_pool.
Options
<name>
The name of the network proxy. This can be any alphanumeric string, but should
be a simple, recognizable name.
<host>
The DNS name or IP address of the proxy server. For example,
myproxy1.example.com or 192.168.107.107.
<type>
The proxy protocol type, one of socks_4, socks_5, or http.
<port>
The port number to communicate with the proxy server. The correct port number
depends on the port opened up on the proxy server for communication with
CloudPools.
--username <string>
The user name to authenticate with the SOCKS v5 or HTTP proxy server. Note
that SOCKS v4 does not support authentication.
--password <string>
The password to authenticate with the SOCKS v5 or HTTP proxy server.
--verbose
Displays more detailed information.
Examples
The following example creates a network proxy to use with CloudPools:
Options
<name>
The name of the network proxy. You can use the isi cloud proxies list
command to display the names of proxies.
--force
Enables the proxy deletion to proceed without confirmation.
--verbose
Displays more detailed information.
Example
The following example deletes a network proxy named myproxy1:
When you run the command, OneFS displays the following message and requires
confirmation:
To proceed, type yes, and press ENTER. If the proxy is attached to a cloud storage
account, OneFS displays the following message:
Options
--limit<integer>
Limits the number of network proxies displayed in the list.
--sort
Sort the list of cloud proxies according to the specified category. The following
values are valid:
id
name
host
type
port
--format
Outputs the list of network proxies in the specified format. The following values
are valid:
table
json
csv
list
--descending
Outputs the list of network proxies in descending order according to the specified
sort option.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following example creates a network proxy to use with CloudPools:
Options
<name>
The current name of the network proxy.
--name <string>
The new name of the network proxy. This can be any alphanumeric string, but
should be a simple, recognizable name.
--host <string>
The DNS name or IP address of the proxy server. For example,
myproxy1.example.com or 192.168.107.107.
--type
The network proxy protocol , one of socks_4, socks_5, or http.
--port
The port number to communicate with the proxy server. The correct port number
depends on the port opened up on the proxy server for communication with
CloudPools.
--username <string>
The user name to authenticate with the SOCKS v5 or HTTP proxy server. Note
that SOCKS v4 does not support authentication.
--clear-username
Clear the user name that was previously specified for proxy server authentication.
--password <string>
The password to authenticate with the SOCKS v5 or HTTP proxy server.
--clear-password
Clear the password that was previously specified for proxy server authentication.
--verbose
Displays more detailed information.
Examples
The following example modifies a network proxy in CloudPools:
Options
<name>
Specifies the name of the network proxy to view. You can use the isi cloud
proxies list command to display a list of the available proxies.
Example
The following example displays the details of a network proxy named myproxy1:
Options
<files>
Specifies the files to recall. Specify --files for each additional file name.
Examples
The following example recalls all files from the cloud for a directory and its
subdirectories:
The command starts a cloud job. If you use the --verbose parameter, OneFS reports
the job number, as in the following example:
You can use the isi cloud jobs view command with the job number to see
information about the job.
Note
When you use the isi cloud recall command to recall a file from cloud storage,
the full file is restored to its original directory, and the associated SmartLink file is
overwritten. If the file pool policy that originally archived the file to the cloud is still in
effect, the next time the SmartPools job runs, the recalled file is archived to the cloud
again. If you do not want the recalled file to be re-archived, you can move the file to a
different directory that would not be affected by the file pool policy, or you can
modify or delete the policy.
Options
--account <string>
Specifies the name of the cloud storage account whose COI you intend to
restore. By restoring the COI, you enable OneFS to not only read data from the
cloud, but also to write data to the cloud.
--expiration-date <timestamp>
Specifies the expiration date for orphaned cloud data objects.
--verbose
Displays more detailed information about the operation.
Example
The following example restores the COI for a cloud storage account:
Options
--default-accessibility {cached | no-cache}
Specifies whether, when a SmartLink file is accessed, cloud data is incrementally
downloaded (cached) as needed, or fully downloaded (not cached).
--default-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed
by a unit of time is accepted. For example, a setting of 9H would specify a nine-
hour duration. Similarly, a setting of 2D would specify a two-day duration.
--default-data-retention <duration>
Specifies the minimum amount of time that cloud objects associated with a
SmartLink file will be retained in the cloud after the SmartLink file is deleted from
the cluster. A number followed by a unit of time is accepted. For example, a
setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D would
specify a two-day duration.
--default-full-backup-retention <duration>
Specifies the length of time that OneFS retains cloud data referenced by a
SmartLink file that has been backed up by a full NDMP backup and is
subsequently deleted. A number followed by a unit of time is accepted. For
example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of
2D would specify a two-day duration.
--default-incremental-backup-retention <duration>
Specifies the length of time that OneFS retains cloud data referenced by a
SmartLink file that has been backed up by an incremental NDMP backup, or
replicated by a SyncIQ operation, and is subsequently deleted. A number followed
by a unit of time is accepted. For example, a setting of 5Y would specify a five-
year duration.
--default-writeback-frequency <duration>
Specifies the minimum amount of time to wait before OneFS updates cloud data
with local changes. A number followed by a unit of time is accepted. For example,
a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
Example
The following examples modifies several of the default CloudPools settings:
Option
--verbose
Displays more detailed information.
Options
There are no options for this command.
isi config
Opens a new prompt where node and cluster settings can be altered.
The command-line prompt changes to indicate that you are in the isi config
subsystem. While you are in the isi config subsystem, other OneFS commands are
unavailable and only isi config commands are valid.
Syntax
isi config
Note
l The following commands are not recognized unless you are currently at the isi
config command prompt.
l Changes are not applied until you run the commit command.
l Some commands require you to restart the cluster.
Commands
changes
Displays a list of changes to the configuration that have not been committed.
commit
Commits configuration settings and then exits isi config.
date <time-and-date>
Displays or sets the current date and time on the cluster.
<time-and-date>
Sets cluster time to the time specified.
Specify <time-and-date> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y
Specifies years
M
Specifies months
W
Specifies weeks
D
Specifies days
h
Specifies hours
s
Specifies seconds
<ip-range>
Specifies the range of IP addresses that can no longer be assigned to nodes.
Specify in the form <lowest-ip>-<highest-ip>.
CAUTION
list
Displays the list of supported character sets.
exit
Exits the isi config subsystem.
help
Displays a list of all isi config commands. For information about specific
commands, the syntax is help [<command>].
<interface-name>
Specifies the name of the interface as int-a or int-b.
<lowest-ip>-<highest-ip>
Specifies the range of IP addresses that can be assigned to nodes.
ipset
Obsolete. Use lnnset to renumber cluster nodes. The IP address cannot be set
manually.
joinmode [<mode>]
Displays the setting for how nodes are added to the current cluster. Options
<mode> specifies the cluster add node setting as one of the following values.
manual
Configures the cluster so that joins can be initiated by either the node or the
cluster.
secure
Configures the cluster so that joins can be initiated by only the cluster.
<new lnn>
Specifies the new LNN that is replacing the old LNN value for that node.
Note
The new LNN must not be currently assigned to another node. Users logged
in to the shell or web administration interface of a node whose LNN is
changed must log in again to view the new LNN.
<old-ip-range>
Specifies the range of IP addresses that can no longer be assigned to nodes.
If unspecified, all existing IP ranges are removed before the new IP range is
added. Specify in the form of <lowest-ip>-<highest-ip>.
<new-ip-range>
Specifies the range of IP addresses that can be assigned to nodes. Specify in
the form of <lowest-ip>-<highest-ip>.
-n <netmask>
Specifies a new netmask for the interface.
Note
If more than one node is given a new IP address, the cluster reboots when the
change is committed. If only one node is given a new IP address, only that node is
rebooted.
mtu [<value>]
Displays the size of the maximum transmission unit (MTU) that the cluster uses
for internal network communications when run with no arguments. Sets a new
size of the MTU value, when specified. This command is for the internal network
only.
Note
This command is not valid for clusters with an InfiniBand back end.
<value>
Specifies the new size of the MTU value. Any value is valid, but not all values
may be compatible with your network. The most common settings are 1500
for standard frames and 9000 for jumbo frames.
name [<new_name>]
Displays the names currently assigned to clusters when run with no arguments.
Assigns new names to clusters, as specified.
<new name>
Specifies a new name for the cluster.
<ip-mask>
Specifies the new IP mask for the interface.
quit
Exits the isi config subsystem.
Note
If run on an unconfigured node, this command does not accept any arguments.
remove
Deprecated. Instead, run the isi devices -a smartfail command.
Note
If run on an unconfigured node, this command does not accept any arguments.
status [advanced]
Displays current information on the status of the cluster. To display additional
information, including device health, specify advanced.
Hawaii
Japan
Advanced. Opens a prompt with more time zone options.
version
Displays information about the current OneFS version.
wizard
Activates a wizard on unconfigured nodes and reactivates the wizard if you exit it
during the initial node configuration process. The wizard prompts you through the
node-configuration steps.
This chapter contains documentation of the OneFS CLI commands isi dedupe
reports list through isi license view.
199
OneFS isi commands D through L
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as
the total amount of storage space consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of deduplication reports, run the following command:
Options
<job-id>
Displays the deduplication report for the deduplication job of the specified ID.
Examples
The following command displays a deduplication job:
Time: 2013-10-14T09:39:22
Job ID: 52
Job Type: Dedupe
Reports
Time : 2013-10-14T09:39:22
Results :
Dedupe job report:{
Start time = 2013-Oct-14:09:33:34
End time = 2013-Oct-14:09:39:22
Iteration count = 1
Scanned blocks = 1716
Sampled blocks = 78
Deduped blocks = 1425
Dedupe percent = 83.042
Created dedupe requests = 65
Successful dedupe requests = 65
Failed dedupe requests = 0
Skipped files = 0
Index entries = 38
Index lookup attempts = 38
Index lookup hits = 0
}
Elapsed time: 347 seconds
Aborts: 0
Errors: 0
Scanned files: 6
Directories: 2
2 paths:
/ifs/data/dir2,
/ifs/data/dir1
CPU usage: max 29% (dev 2), min 0% (dev 1),
avg 6%
Virtual memory size: max 128388K (dev 1), min 106628K
(dev 1), avg 107617K
Resident memory size: max 27396K (dev 1), min 9980K (dev
2), avg 11585K
Read: 2160 ops, 124437504 bytes (118.7M)
Write: 30570 ops, 222851584 bytes (212.5M)
Options
--paths <path>
Deduplicates files located under the specified root directories.
--clear-paths
Stops deduplication for all previously specified root directories. If you run the isi
dedupe settings modify command with this option, you must run the
command again with either --paths or --add-path to resume deduplication.
--add-paths <path>
Deduplicates files located under the specified root directory in addition to
directories that are already being deduplicated.
--remove-paths <path>
Stops deduplicating the specified root directory.
--assess-paths <path>
Assesses how much space will be saved if files located under the specified root
directories are deduplicated.
--clear-assess-paths
Stops assessing how much space will be saved if previously specified root
directories are deduplicated. If you run the isi dedupe settings modify
command with this option, you must run the command again with either --paths
or --add-path to resume deduplication.
--add-assess-paths <path>
Assesses how much space will be saved if the specified root directories are
deduplicated in addition to directories that are already being assessed.
--remove-assess-paths <path>
Stops assessing how much space will be saved if the specified root directories are
deduplicated.
{--verbose | -v}
Examples
The following command starts deduplicating /ifs/data/active and /ifs/data/
media:
Options
There are no options for this command.
Options
There are no options for this command.
Examples
To view information about deduplication space savings, run the following command:
Note
You can add available nodes to a cluster by running the command isi devices
node add.
Syntax
Options
{<bay> | all}
Specifies the bay number that contains the drive to be added to the node. You
can specify all to scan the entire node.
--node-lnn <integer>
Specifies the node number to scan for new drives. If omitted, the local node will
be scanned.
{--force | -f}
Adds the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--automatic-replacement-recognition {yes | no}
Changes the ARR status for a cluster or specific node. A value of yes will enable
ARR, a value of no will disable ARR.
Specifies the node for which you want to enable or disable ARR. You may specify
all nodes. If omitted, all nodes will be modified.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn {all | <integer>}
Specifies the node you want to view. You may specify all nodes. If omitted, ARR
status for the local node is displayed.
Options
{<bay> | all}
Specifies the bay number that contains the drive to be added to the node. You
can specify all to scan the entire node.
--node-lnn <integer>
Specifies the node number to scan for new drives. If omitted, the local node will
be scanned.
{--force | -f}
Adds the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn {all | <integer>}
Specifies the node number of the drives you would like to display firmware
information for. You may specify all nodes. If omitted, only the drive firmware
information for the local node will be displayed.
{ --summary | -s}
Displays a summary of drive firmware counts by model and revision.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
{<bay> | all}
Specifies the bay number that contains the drive to be updated. You can specify
all to update every drive in the node.
--node-lnn <integer>
Specifies the node number on which to update drives. If omitted, drives will be
updated in the local node.
{--force | -f}
Updates the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that is running the firmware
update you want to view. If omitted, firmware update status for the local node will
be displayed.
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to view.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to view. If omitted, the drive in the local node will be displayed.
Options
<bay>
Specifies the bay number that contains the drive to be formatted.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to format. If omitted, the specified drive in the local node will be formatted.
--purpose <string>
Specifies the purpose to assign to the new drive. You can view a list of the
possible drive purposes by running isi devices drive purposelist. If
omitted, OneFS will automatically assign the drive purpose.
{--force | -f}
Formats the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Note
You can display nodes that are available to join the cluster by running the command
isi devices node list.
Syntax
Options
--node-lnn {all | <integer>}
Specifies the node number of the drives you would like to display. You may
specify all nodes. If omitted, only the drives in the local node will be displayed.
{ --override | -V}
Displays legacy bay numbers instead of grid values.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<serial-number>
Specifies the serial number of the node you want to add to the cluster.
{--force | -f}
Adds the node to the cluster without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to smartfail. If
omitted, the local node will be smartfailed.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to
discontinue smartfailing. If omitted, the local node will discontinue smartfailing.
{--force | -f}
Discontinues smartfailing the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to assign.
--purpose <string>
Specifies the purpose to assign to the drive. You can view a list of the possible
drive purposes by running isi devices drive purposelist.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to assign. If omitted, the specified drive in the local node will be assigned.
{--force | -f}
Formats the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to view the
purpose list for. If omitted, the purpose list of the local node will display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
Note
You can smartfail a node by running the command isi devices node
smartfail.
Syntax
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to
smartfail.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to smartfail. If omitted, the specified drive in the local node will be
smartfailed.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Note
You can discontinue the smartfail process on a node by running the command isi
devices node stopfail.
Syntax
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to
discontinue smartfailing.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to discontinue smartfailing. If omitted, the specified drive in the local node
will be discontinue smartfailing.
{--force | -f}
Discontinues smartfailing the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to
suspend.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to suspend. If omitted, the specified drive in the local node will be
suspended.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to view.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you
want to view. If omitted, the drive in the local node will be displayed.
Options
--upload {enable | disable}
Enables the upload of gathered logs
--http-upload-host <host>
Specifies the HTTP site for upload.
--http-upload-path <path>
Specifies the HTTP upload directory.
--http-upload-proxy <host>
Specifies an HTTP proxy server.
--http-upload-proxy-port <port>
Specifies the HTTP proxy server port.
--ftp-upload-host <host>
Specifies the FTP site for upload.
--ftp-upload-path <path>
Specifies the FTP upload directory.
--ftp-upload-proxy <host>
Specifies an FTP proxy server.
--ftp-upload-proxy-port <port>
Specifies the FTP proxy server port.
--ftp-upload-user <username>
Specifies the FTP site username. The default user is anonymous.
--ftp-upload-pass <password>
Specifies the FTP site password.
--set-ftp-upload-pass <password>
Sets the FTP site password.
{--verbose | -v}
Displays more detailed information.
Options
This command has no options.
[--ftp-upload-pass <password>]
[--set-ftp-upload-pass]
Options
--upload {enable | disable}
Enables the upload of gathered logs
--http-upload-host <host>
Specifies the HTTP site for upload.
--http-upload-path <path>
Specifies the HTTP upload directory.
--http-upload-proxy <host>
Specifies an HTTP proxy server.
--http-upload-proxy-port <port>
Specifies the HTTP proxy server port.
--ftp-upload-host <host>
Specifies the FTP site for upload.
--ftp-upload-path <path>
Specifies the FTP upload directory.
--ftp-upload-proxy <host>
Specifies an FTP proxy server.
--ftp-upload-proxy-port <port>
Specifies the FTP proxy server port.
--ftp-upload-user <username>
Specifies the FTP site username. The default user is anonymous.
--ftp-upload-pass <password>
Specifies the FTP site password.
--set-ftp-upload-pass <password>
Sets the FTP site password.
Options
This command has no options.
Options
This command has no options.
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes.
The default value is three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format
<integer>{Y|M|W|D|H|m|s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is
64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number
(LNN). Multiple values can be specified in a comma-separated list, for example,
--nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified
in a comma-separated list. The default value is all.
--ports <port>
Specifies TCP or UDP ports to report statistics on. Multiple ports can be
specified in a comma-separated list. The default value is all.
Options
This command has no options.
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes.
The default value is three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format
<integer>{Y|M|W|D|H|m|s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is
64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number
(LNN). Multiple values can be specified in a comma-separated list, for example,
--nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified
in a comma-separated list. The default value is all.
--ports <port>
Specifies TCP or UDP ports to report statistics on. Multiple ports can be
specified in a comma-separated list. The default value is all.
Options
This command has no options.
Options
This command has no options.
Options
--mail-relay <string>
Sets the SMTP relay address.
--smtp-port <integer>
Sets the SMTP port. The default is 25.
--mail-sender <string>
Sets the originator email address.
mail-subject <string>
Set the prefix string for the email subject.
--user-template <string>
Specifies the path to access a custom email template.
--clear-user-template
Clears the path specified to access a custom email template.
{--verbose | -v}
Displays more detailed information.
Example
To view the currently-configured email settings, run the following command:
Mail Relay: -
SMTP Port: 25
Mail Sender: -
Mail Subject: -
Use SMTP Auth: No
SMTP Auth Username: -
Use Encryption: No
Batch Mode: none
User Template: -
SMTP Auth Password Set: False
Options
<name>
Specifies the alert name.
<condition>
Specifies the condition under which alert is sent.
Condition values are case sensitive. The following values are valid:
NEW
Reports on event group occurrences that have never been reported on
before.
NEW_EVENTS
Reports on event group occurrences that are new since the event group was
last reported on.
ONGOING
Provides periodic reports on event group occurrences that have not been
resolved.
SEVERITY_INCREASE
Reports on event group occurrences whose severity has increased since the
event group was last reported on.
SEVERITY_DECREASE
Reports on event group occurrences whose severity has decreased since the
event group was last reported on.
RESOLVED
Reports on event group occurrences that have been resolved since the event
group was last reported on.
--category <string>...
Specifies the name of one or more event group categories to alert on.
--eventgroup <string>...
Specifies the name of one or more event groups to alert on.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the
NEW_EVENTS alert condition.
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--description <string>
Specifies a description of the alert.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the alert you want to delete.
{--force | -f}
Deletes the alert without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
{--channel | -c} <string>...
Displays alerts for the specified channel only.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the alert you want to modify.
--eventgroup <string>...
Specifies the name of one or more event groups to alert on.
--clear-eventgroup
Clears the value for an event group to alert on.
--add-eventgroup <string>...
Adds the name of one or more event groups to alert on.
--remove-eventgroup <string>...
Removes the name of one or more event groups to alert on.
--category <string>...
Specifies the name of one or more event group categories to alert on.
--clear-category
Clears the value for an event group category to alert on.
--add-category <string>...
Adds the name of one or more event group categories to alert on.
--remove-category <string>...
Removes the name of one or more event group categories to alert on.
--add-channel <string>...
Adds the name of one or more channels to deliver the alert over.
--remove-channel <string>...
Removes the name of one or more channels to deliver the alert over.
SEVERITY_DECREASE
Reports on event group occurrences whose severity has decreased since the
event group was last reported on.
RESOLVED
Reports on event group occurrences that have been resolved since the event
group was last reported on.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the
NEW_EVENTS alert condition.
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
{--verbose | -v}
Displays more detailed information.
Options
<id>
Options
<name>
Specifies the channel name.
<type>
Specifies the mechanism by which alerts are sent.
Type values are case sensitive. The following values are valid:
smtp
Alerts are sent as emails through an SMTP server.
snmp
Alerts are sent through SNMP.
connectemc
Alerts are sent through ConnectEMC.
--allowed-nodes <integer>...
Specifies one or more nodes that are allowed to send alerts through the channel.
If you do not specify any allowed nodes, all nodes in the cluster will be allowed to
send alerts. The value of <integer> is the node number you want to allow.
--excluded-nodes <integer>...
Specifies one or more nodes that are not allowed to send alerts through the
channel. The value of <integer> is the node number you want to exclude.
--address <string>...
For SMTP channels only. Specifies one or more email addresses you want to
receive alerts on this channel. The value of <string> is an email address.
--send-as <string>
For SMTP channels only. Specifies the email address you want to send alerts
from on this channel. The value of <string> is an email address.
--subject <string>
For SMTP channels only. Specifies the subject line for emails sent on this
channel.
--smtp-host <string>
For SMTP channels only. Specifies the SMTP relay host.
--smtp-port <integer>
For SMTP channels only. Specifies the SMTP relay port.
--smtp-username <string>
For SMTP channels only. Specifies the username for SMTP authentication.
--smtp-password <string>
For SMTP channels only. Specifies the password for SMTP authentication.
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--host <string>
For SNMP channels only. Specifies the host name or address
--community <string>
For SNMP channels only. Specifies the community string.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the name of the channel you want to delete.
{--force | -f}
Deletes the channel without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Sets the maximum number of channels to display.
{--descending | -d}
Sorts the data in descending order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
[--community <string>]
[--verbose]
Options
<name>
Specifies the name of the channel you want to modify.
<type>
Specifies the mechanism by which alerts are sent.
Type values are case sensitive. The following values are valid:
smtp
Alerts are sent as emails through an SMTP server.
snmp
Alerts are sent through SNMP.
connectemc
Alerts are sent through ConnectEMC.
--allowed-nodes <integer>...
Specifies one or more nodes that are allowed to send alerts through the channel.
If you do not specify any allowed nodes, all nodes in the cluster will be allowed to
send alerts. The value of <integer> is the node number you want to allow.
--clear-allowed-nodes
Clears all values for allowed nodes.
--add-allowed-nodes <integer>...
Adds one or more nodes to the allowed nodes list. The value of <integer> is the
node number you want to allow.
--remove-allowed-nodes <integer>...
Removes one or more nodes from the allowed nodes list. The value of
<integer> is the node number you want to remove.
--excluded-nodes <integer>...
Specifies one or more nodes that are not allowed to send alerts through the
channel. The value of <integer> is the node number you want to exclude.
--clear-excluded-nodes
Clears all values for excluded nodes.
--add-excluded-nodes <integer>...
Adds one or more nodes to the excluded nodes list. The value of <integer> is
the node number you want to exclude.
--remove-excluded-nodes <integer>...
Removes one or more nodes from the excluded nodes list. The value of
<integer> is the node number you want to remove.
--address <string>...
For SMTP channels only. Specifies one or more email addresses you want to
receive alerts on this channel. The value of <string> is an email address.
--clear-address
For SMTP channels only. Clears all values for email addresses.
--add-address <string>...
For SMTP channels only. Specifies one or more email addresses you want to add
to the alert distribution list for this channel. The value of <string> is an email
address.
--remove-address <string>...
For SMTP channels only. Specifies one or more email addresses you want to
remove from the alert distribution list for this channel. The value of <string> is
an email address.
--send-as <string>
For SMTP channels only. Specifies the email address you want to send alerts
from on this channel. The value of <string> is an email address.
--subject <string>
For SMTP channels only. Specifies the subject line for emails sent on this
channel.
--smtp-host <string>
For SMTP channels only. Specifies the SMTP relay host.
--smtp-port <integer>
For SMTP channels only. Specifies the SMTP relay port.
--smtp-username <string>
For SMTP channels only. Specifies the username for SMTP authentication.
--smtp-password <string>
For SMTP channels only. Specifies the password for SMTP authentication.
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--host <string>
For SNMP channels only. Specifies the host name or address
--community <string>
For SNMP channels only. Specifies the community string.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the name of the channel you want to view.
Options
--eventgroup-id <name>
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the instance ID of the event you want to view.
Options
--ignore {true | false}
Specifies whether all event groups have a status of ignored.
{--verbose | -v}
Displays more detailed information.
Options
{--begin | -b} <timestamp>
Filters the list to only show event groups that were created after the specified
date and time.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
Filters the list to only show event groups that were created before the specified
date and time.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
--events <integer>
Filters the list to only show event groups with the specified number of events
recorded against the event group.
--cause <string>
Filters the list to only show event groups with the specified cause.
{--descending | -d}
Sorts the data in descending order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID number of the event group you want to modify.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID number of the event group you want to view.
Options
{--retention-days | -r} <integer>
Retention of resolved event group data in days.
--maintenance-start <timestamp>
Sets the start date and time of a maintenance window.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
--clear-maintenance-start
Clears the value for the start date and time of a maintenance window.
Y
Specifies years
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--heartbeat-interval <string>
Sets the interval between heartbeat events.
The following <time> values are valid:
l daily
l weekly
l monthly
{--verbose | -v}
Displays more detailed information.
Options
<message>
{--verbose | -v}
Displays more detailed information.
Options
--format {table | json | csv | list}
Displays Fibre Channel port settings in table, JSON, CSV, or list format.
{--no-header | -a}]
Does not display headers in table or CSV formats.
Examples
The following command displays all ports on node 5:
Options
--wwnn <string>
Specifies the world-wide node name (WWNN) of the port as a string of 16
hexadecimal numerals.
--wwpn <string>
Specifies the world-wide port name (WWPN) of the port as a string of 16
hexadecimal numerals.
--rate {auto | 1 | 2 | 4 | 8}
Specifies the rate that OneFS will attempt to send data through the port. The
following rates are valid:
auto
OneFS automatically negotiates with the DMA to determine the rate. This is
the recommended setting.
1
Attempts to send data through the port at a speed of 1 Gb per second.
2
Attempts to send data through the port at a speed of 2 Gb per second.
4
Attempts to send data through the port at a speed of 4 Gb per second.
8
Attempts to send data through the port at a speed of 8 Gb per second.
Options
--port <port>
A Fibre Channel port ID in the format <lnn>.<fc port>.
Options
--file-filtering-enabled {yes | no}
Enables or disables file filtering in the access zone. File filtering is disabled by
default.
--revert-file-filtering-enabled
Sets the value of --file-filtering-enabled to the system default value.
--file-filter-extensions <string>...
Specifies a list of file types by their extensions. Each extension should start with a
"." such as .txt. You can specify multiple extensions in a comma-separated list
or you run --file-filter-extensions for each extension.
--clear-file-filter-extensions
Deletes the entire list of file filter extensions.
--add-file-filter-extensions <string>
Adds one or more file filter extensions to the list. Each extension should start with
a "." such as .txt. You can specify multiple extensions in a comma-separated list
or you run --add-file-filter-extensions for each extension.
--remove-file-filter-extensions <string>
Removes one or more file filter extensions from the list. Each extension should
start with a "." such as .txt. You can specify multiple extensions in a comma-
separated list or you run --remove-file-filter-extensions for each
extension.
--revert-file-filter-extensions
--revert-file-filter-type
Sets the value of --revert-file-filter-type to the system default value.
--zone <string>
Specifies the access zone to which the settings apply. If you do not specifiy a
zone, the settings are applied to the System zone.
{--verbose | -v}
Displays more detailed information.
Options
--zone
Specifies the name of the access zone. If you do not specifiy an access zone, the
system will display the file filtering settings of the System zone.
Options
--path<path>
Specifies the path to the file to be processed. This parameter is required.
--dont-restripe
Changes the per-file policies without restriping the file.
--nop
Calculates the specified settings without actually applying them. This option is
best used with –-verbose or --stats.
--stats
Displays statistics on the files processed.
--quiet
Suppresses warning messages.
--recurse
Specifies recursion through directories.
--verbose
Displays the configuration settings to be applied. We recommend using verbose
mode. Otherwise the command would not display any screen output except for
error messages.
Examples
These examples show the results of running isi filepool apply in verbose
mode. In the examples, the output shows the results of comparing the path specified
with each file pool policy. The recurse option is set so that all files in the /ifs/
data/projects path are matched against all file pool policies. The first policy listed
is always the system default policy. In this example, the second match is to the file
pool policy Technical Data.
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
'Technical Data':
{'Policy Number': 0,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':0, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 0,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
This example shows the result of using the --nop option to calculate the results that
would be produced by applying the file pool policy.
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
{'Policy Number': -1,
'Files matched': {'head':0, 'snapshot': 0},
Options
--data-access-pattern <string>
Specifies the preferred data access pattern, one of random, streaming, or
concurrent.
--set-requested-protection<string>
Specifies the requested protection for files that match this filepool policy (for
example, +2:1).
--data-storage-target<string>
Specifies the node pool or tier to which the policy moves files on the local cluster.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid
Writes all associated file data and metadata to HDDs only.
metadata
Writes both file data and metadata to HDDs. This is the default setting. An
extra mirror of the file metadata is written to SSDs, if SSDs are available. The
SSD mirror is in addition to the number required to satisfy the requested
protection. Enabling global namespace acceleration (GNA) makes read
acceleration available to files in node pools that do not contain SSDs.
metadata-write
Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to
five times more SSD storage than the Metadata setting. Enabling GNA does
not affect read/write acceleration.
data
Uses SSD node pools for both data and metadata, regardless of whether
global namespace acceleration is enabled. This SSD strategy does not result
in the creation of additional mirrors beyond the normal requested protection
but requires significantly more storage space compared with the other SSD
strategy options.
--snapshot-storage-target <integer>
The ID of the node pool or tier chosen for storage of snapshots.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata,
metadata-write, data, avoid. The default is metadata.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where
cloud data is to be archived.
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed
by a unit of time is accepted. For example, a setting of 9H would specify a nine-
hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-data-retention <duration>
Specifies the minimum amount of time that archived data will be retained in the
cloud after a SmartLink file is deleted from the cluster. A number followed by a
unit of time is accepted. For example, a setting of 9H would specify a nine-hour
duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-full-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of a full backup. A number followed by a unit of time is accepted. For
example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of
2D would specify a two-day duration.
--cloud-incremental-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of an incremental backup. A number followed by a unit of time is
accepted. For example, a setting of 9H would specify a nine-hour duration.
Similarly, a setting of 2D would specify a two-day duration.
--cloud-writeback-frequency <duration>
Specifies the minimum amount of time to wait before OneFS updates cloud data
with local changes. A number followed by a unit of time is accepted. For example,
a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
--verbose
Displays more detailed information.
Example
The command shown in the following example modifies the default file pool policy in
several ways. The command sets the requested-protection-level to +2:1,
sets the data-storage-target to anywhere (the system default), and changes
the data--ssd-strategy to metadata-write.
Apply Order: -
File Matching Pattern: -
Set Requested Protection: default
Data Access Pattern: concurrency
Enable Coalescer: True
Data Storage Target: anywhere
Data SSD Strategy: metadata
Snapshot Storage Target: anywhere
Snapshot SSD Strategy: metadata
Cloud Pool: -
Cloud Compression Enabled: -
Cloud Encryption Enabled: -
Cloud Data Retention: -
Cloud Incremental Backup Retention: -
Cloud Full Backup Retention: -
Cloud Accessibility: -
Cloud Read Ahead: -
Cloud Cache Expiration: -
Cloud Writeback Frequency: -
Cloud Archive Snapshot Files: -
[--cloud-incremental-backup-retention <duration>]
[--cloud-read-ahead <string>]
[--cloud-writeback-frequency <duration>]
[--cloud-archive-snapshot-files {yes | no}]
[{--verbose | -v}]
Options
<name>
Specifies the name of the file pool policy to create.
--path=<pathname>
Selects files relative to the specified pathname.
--file-type= <value>
Selects only the specified file-system object type.
The following values are valid:
file
Specifies regular files.
directory
Specifies directories.
other
Specifies links.
--birth-time=<timestamp>
Selects files that were created relative to the specified date and time.
Timestamp arguments are formed as YYYY-MM-DDTHH:MM:SS. For example,
2013-09-01T08:00:00 specifies a timestamp of September 1, 2013 at 8:00
A.M. You can use --operator= with an argument of gt to mean after the
timestamp or lt to mean before the timestamp.
--changed-time=<timestamp>
Selects files that were modified relative to the specified date and time.
--metadata-changed-time=<timestamp>
Selects files whose metadata was modified relative to the specified date and
time.
--accessed-time=<timestamp>
Selects files that were accessed at the specified time interval.
--custom-attribute=<value>
Selects files based on a custom attribute.
You can use the operator= option to specify a qualifier for the file-matching
criterion. Specify operators in the following form:
--operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
--or
Connects two file-matching criteria where files must match one or the other
criteria.
--description <string>
--apply-order <integer>
Specifies the order index for execution of this policy.
--data-access-pattern <string>
Data access pattern random, streaming or concurrent.
--set-requested-protection <string>
Specifies a protection level for files that match this filepool policy (e.g., +3, +2:3,
8x).
--data-storage-target <string>
The name of the node pool or tier to which the policy moves files on the local
cluster. If you do not specify a data storage target, the default is anywhere.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid
Writes all associated file data and metadata to HDDs only.
metadata
Writes both file data and metadata to HDDs. This is the default setting. An
extra mirror of the file metadata is written to SSDs, if SSDs are available. The
SSD mirror is in addition to the number required to satisfy the requested
protection. Enabling GNA makes read acceleration available to files in node
pools that do not contain SSDs.
metadata-write
Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to
five times more SSD storage than the Metadata setting. Enabling GNA does
not affect read/write acceleration.
data
Uses SSD node pools for both data and metadata, regardless of whether
global namespace acceleration is enabled. This SSD strategy does not result
in the creation of additional mirrors beyond the normal requested protection
but requires significantly increases storage requirements compared with the
other SSD strategy options.
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots. If you do not
specify a snapshot storage target, the default is anywhere.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata,
metadata-write, data, avoid. The default is metadata.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where
cloud data is to be archived.
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed
by a unit of time is accepted. For example, a setting of 9H would specify a nine-
hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-data-retention <duration>
Specifies the minimum amount of time that archived data will be retained in the
cloud after a SmartLink file is deleted from the cluster. A number followed by a
unit of time is accepted. For example, a setting of 9H would specify a nine-hour
duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-full-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of a full backup. A number followed by a unit of time is accepted. For
example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of
2D would specify a two-day duration.
--cloud-incremental-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of an incremental backup. A number followed by a unit of time is
accepted. For example, a setting of 9H would specify a nine-hour duration.
Similarly, a setting of 2D would specify a two-day duration.
--cloud-writeback-frequency <duration>
Specifies the minimum amount of time to wait before OneFS updates cloud data
with local changes. A number followed by a unit of time is accepted. For example,
a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
--verbose
Displays more detailed information.
Examples
The following example creates a file pool policy that moves all files in directory /ifs/
data/chemical/arco/finance to the local storage target named Archive_2.
The following example matches older files that have not been accessed or modified
later than specified dates, and moves the files to an archival tier of storage.
Options
<name>
Specifies the name of the file pool policy to be deleted.
--force
Deletes the file pool policy without asking for confirmation.
--verbose
Displays more detailed information.
Example
The following command deletes a file pool policy named ARCHIVE_OLD. The --force
option circumvents the requirement to confirm the deletion.
Options
--limit <integer>
Specifies a limit to the number of policies that are displayed.
--format
Output the list of file pool policies in a variety of formats. The following options
are valid: table , json , csv , and list .
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following example lists custom file pool policies in .csv format and outputs the list
to a file in the OneFS file system.
Options
<name>
Specifies the name of the file pool policy to create.
--path=<pathname>
Selects files relative to the specified pathname.
--file-type= <value>
Selects only the specified file-system object type.
The following values are valid:
file
Specifies regular files.
directory
Specifies directories.
other
Specifies links.
--birth-time=<timestamp>
Selects files that were created relative to the specified date and time.
Timestamp arguments are formed as YYYY-MM-DDTHH:MM:SS. For example,
2013-09-01T08:00:00 specifies a timestamp of September 1, 2013 at 8:00
A.M. You can use --operator= with an argument of gt to mean after the
timestamp or lt to mean before the timestamp.
--changed-time=<timestamp>
Selects files that were modified relative to the specified date and time.
--metadata-changed-time=<timestamp>
Selects files whose metadata was modified relative to the specified date and
time.
--accessed-time=<timestamp>
Selects files that were accessed at the specified time interval.
--custom-attribute=<value>
Selects files based on a custom attribute.
You can use the operator= option to specify a qualifier for the file-matching
criterion. Specify operators in the following form:
--operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
--and
Connects two file-matching criteria where files must match both criteria.
--or
Connects two file-matching criteria where files must match one or the other
criteria.
--description <string>
Specifies a description of the filepool policy
--apply-order <integer>
Specifies the order index for execution of this policy.
--data-access-pattern <string>
Data access pattern random, streaming or concurrent.
--set-requested-protection <string>
Specifies a protection level for files that match this filepool policy (for example,
+3, +2:3, 8x).
--data-storage-target <string>
The name of the node pool or tier to which the policy moves files on the local
cluster.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid
Writes all associated file data and metadata to HDDs only.
metadata
Writes both file data and metadata to HDDs. This is the default setting. An
extra mirror of the file metadata is written to SSDs, if SSDs are available. The
SSD mirror is in addition to the number required to satisfy the requested
protection. Enabling GNA makes read acceleration available to files in node
pools that do not contain SSDs.
metadata-write
Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to
five times more SSD storage than the Metadata setting. Enabling GNA does
not affect read/write acceleration.
data
Uses SSD node pools for both data and metadata, regardless of whether
global namespace acceleration is enabled. This SSD strategy does not result
in the creation of additional mirrors beyond the normal requested protection
but requires significantly increases storage requirements compared with the
other SSD strategy options.
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata,
metadata-write, data, avoid. The default is metadata.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where
cloud data is to be archived.
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed
by a unit of time is accepted. For example, a setting of 9H would specify a nine-
hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-data-retention <duration>
Specifies the minimum amount of time that archived data will be retained in the
cloud after a SmartLink file is deleted from the cluster. A number followed by a
unit of time is accepted. For example, a setting of 9H would specify a nine-hour
duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-full-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of a full backup. A number followed by a unit of time is accepted. For
example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of
2D would specify a two-day duration.
--cloud-incremental-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the
creation of an incremental backup. A number followed by a unit of time is
accepted. For example, a setting of 9H would specify a nine-hour duration.
Similarly, a setting of 2D would specify a two-day duration.
--cloud-writeback-frequency <duration>
Specifies the minimum amount of time to wait before OneFS updates cloud data
with local changes. A number followed by a unit of time is accepted. For example,
a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D
would specify a two-day duration.
--verbose
Display more detailed information.
Examples
The following example modifies a file pool policy to move matched files to a different
local storage target named Archive_4. The next time the SmartPools job runs,
matched files would be moved to the new storage target.
The following example matches older files that have not been accessed or modified
later than specified dates, and moves the files to an archival tier of storage.
Syntax
Options
<name>
Specifies the name of the file pool policy to view. Run the isi filepool
policies list command to list the names of all custom file pool policies.
Example
The following example displays details about a file pool policy named my_policy:
Output from the command would look similar to the following display:
Name: my_policy
Description: Archive older files to the cloud
State: OK
State Details:
Apply Order: 1
File Matching Pattern: Path == data/old_files (begins
with) AND Name == *.*
Set Requested Protection: -
Options
--limit <integer>
Specifies the number of templates to display.
--sort <string>
Sorts data by the field specified.
--descending <integer>
Sorts data in descending order.
--format
Displays file pool templates in the specified format. The following values are valid:
table
json
csv
list
--no-header
Displays table and CSV output without headers.
--no-footer
--verbose
Displays more detailed information.
Options
<name>
The name of the template to view.
isi_for_array
Runs commands on multiple nodes in an array, either in parallel or in serial.
When options conflict, the one specified last takes precedence.
Note
The -k, -u, -p, and -q options are valid only for SSH transport.
Syntax
isi_for_array
[--array-name <array>]
[--array-file <filename>]
[--directory <directory>]
[--diskless]
[--ignore-errors]
[--known-hosts-file <filename>]
[--user <user>]
[--nodes <nodes>]
[--password <password>]
[--pre-command <command>]
[--query-password]
[--quiet]
[--serial]
[--storage]
[--transport <transport-type>]
[--throttle <setting>]
[--exclude-nodes <nodes>]
[--exclude-down-nodes]
Options
{--array-name | -a} <array>
Uses <array>.
{--diskless | -D}
Runs commands from diskless nodes.
{--ignore | -I}
Suppresses the printing of error messages for nodes that return non-zero exit
status. Returns the maximum exit status from all nodes.
{--query-password | -q}
Prompts the user for a password.
{--quiet | -Q}
Suppresses printing of the host prefix for each output line.
{--serial | -s}
Runs commands in serial instead of parallel.
{--storage | -S}
Run commands from storage nodes.
isi_for_array 265
OneFS isi commands D through L
{--exclude-down-nodes | -X}
Excludes offline nodes from the command. This command is limited to cluster
local use only.
Example
In SmartLock compliance mode, to run isi_for_array for a command that requires
root privileges, you must specify sudo twice. For example, the following command
runs isi statistics client list on each node in a compliance cluster.
[--revert-connect-timeout]
[--data-timeout <duration>]
[--revert-data-timeout]
[--denied-user-list <string>...]
[--clear-denied-user-list]
[--add-denied-user-list <string>...]
[--remove-denied-user-list <string>...]
[--revert-denied-user-list]
[--dirlist-localtime {yes | no}]
[--revert-dirlist-localtime]
[--dirlist-names {numeric | textual | hide}]
[--revert-dirlist-names]
[--file-create-perm <integer-octal>]
[--revert-file-create-perm]
[--limit-anon-passwords {yes | no}]
[--revert-limit-anon-passwords]
[--local-root-path <path>]
[--revert-local-root-path]
[--local-umask <integer-octal>]
[--revert-local-umask]
[--server-to-server {yes | no}]
[--revert-server-to-server]
[--session-support {yes | no}]
[--revert-session-support]
[--session-timeout <duration>]
[--revert-session-timeout
[--user-config-dir <path>]
[--revert-user-config-dir]
[--service {yes | no}]
Options
--accept-timeout <duration>
Specifies the time, in seconds, that a remote client has to establish a PASV style
data connection before timeout. All integers between 30 and 600 are valid values.
The default value is 60.
--revert-accept-timeout
Sets the value to the system default for --accept-timeout.
--revert-allow-anon-access
Sets the value to the system default for --allow-anon-access.
--revert-allow-anon-upload
Sets the value to the system default for --allow-anon-upload.
--revert-allow-dirlists
Sets the value to the system default for --allow-dirlists.
--revert-allow-downloads
Sets the value to the system default for --allow-downloads.
--revert-allow-local-access
Sets the value to the system default for --allow-local-access.
--revert-allow-writes
Sets the value to the system default for --allow-writes.
--anon-chown-username <string>
Gives ownership of anonymously uploaded files to the specified user. The value
must be a local username. The default value is root.
--revert-anon-chown-username
Sets the value to the system default for --anon-chown-username.
--anon-password-list <string>...
Displays the list of anonymous user passwords.
--clear-anon-password-list
--add-anon-password-list <string>...
Adds items to list of passwords for anonymous users. Specify --add-anon-
password-list for each additional password to add.
--remove-anon-password-list <string>...
Removes items from list of passwords for anonymous users. Specify --remove-
anon-password-list for each additional password to remove.
--revert-anon-password-list
Sets the value to the system default for --anon-password-list.
--anon-root-path <path>
Displays and specifies the root path for anonymous users, which is a directory
in /ifs that the Very Secure FTP Daemon (VSFTPD) will try to change to after
an anonymous login. Valid paths are in /ifs. The default value is /ifs/home/
ftp.
--revert-anon-root-path
Sets the value to the system default for --anon-root-path.
--anon-umask <integer-octal>
Specifies the umask for file creation by anonymous users. Valid values are octal
umask numbers. The default value is 077.
Note
The value must contain the 0 prefix; otherwise it will be interpreted as a base 10
integer.
--revert-anon-umask
Sets the value to the system default for --anon-umask.
--chroot-exception-list <string>
Displays the list of local user chroot exceptions.
--clear-chroot-exception-list
Clears the list of local user chroot exceptions.
--add-chroot-exception-list <string>
Adds users to the chroot exception list.
--remove-chroot-exception-list <string>
Removes users from the chroot exception list.
--revert-chroot-exception-list
Sets the value to the system default for --chroot-exception-list.
--connect-timeout <duration>
Specifies the timeout in seconds for a remote client to respond to a PORT style
data connection. Valid durations are integers between 30 and 600. The default
value is 60 (one minute).
--revert-connect-timeout
Sets the value to the system default for --connect-timeout.
--data-timeout <duration>
Specifies the maximum time (in seconds) data transfers are allowed to stall with
no progress before the remote client is removed. Valid durations are integers
between 30 and 600. The default value is 300 (five minutes).
--revert-data-timeout
Sets the value to the system default for --data-timeout.
--denied-user-list <string>
Displays the list of denied users.
--clear-denied-user-list
Clears the list of denied users.
--add-denied-user-list <string>
Add users to the list of denied users.
--remove-denied-user-list <string>
Removes users from the list of denied users.
--revert-denied-user-list
Sets the value to the system default for --denied-user-list (empty).
--revert-dirlist-localtime
Sets the value to the system default for --dirlist-localtime.
textual
Names are shown in text format in the user and group fields of directory
listings.
hide
All user and group information in directory listings is displayed as ftp. This is
the default setting.
--revert-dirlist-names
Sets the value to the system default for --dirlist-names.
--file-create-perm <integer-octal>
Specifies the permissions with which uploaded files are created. Valid values are
octal permission numbers. The default value is 0666.
Note
--revert-file-create-perm
Sets the value to the system default for --file-create-perm.
--local-root-path <path>
Specifies the initial directory in /ifs for a local login. Valid paths are in /ifs.
The default path is the local user home directory.
--revert-local-root-path
Sets the value to the system default for --local-root-path.
--local-umask <integer-octal>
Species the umask for file creation by local users. Valid values are octal umask
numbers. The default value is 077.
Note
The value must contain the 0 prefix; otherwise it will be interpreted as a base 10
integer.
--revert-local-umask
Sets the value to the system default for --local-umask.
--revert-server-to-server
Sets the value to the system default for --server-to-server.
--session-timeout <duration>
Specifies the maximum time (in seconds) that a remote client may spend
between FTP commands before the remote client is kicked off. Valid values are
integers between 30 and 600. The default value is 300 (five minutes).
--revert-session-timeout
Sets the value to the system default for --session-timeout.
--user-config-dir <path>
Specifies the directory where user-specific configurations that override global
configurations can be found. The default value is the local user home directory.
--revert-user-config-dir
Sets the value to the system default for --user-config-dir.
Options
There are no options for this command.
Example
The following is an example of the output generated by this command:
Accept Timeout: 1m
Allow Anon Access: No
Allow Anon Upload: Yes
Allow Dirlists: Yes
Allow Downloads: Yes
Allow Local Access: Yes
Allow Writes: Yes
Always Chdir Homedir: Yes
Anon Chown Username: root
Anon Password List: -
Anon Root Path: /ifs/home/ftp
Anon Umask: 0077
Ascii Mode: off
Chroot Exception List: -
isi_gather_info
Collects and uploads the most recent cluster log information to EMC Secure Remote
Services (ESRS).
Multiple instances of -i, -f, -s, -S, and -1 are allowed.
gather_expr and analysis_expr can be quoted.
The default temporary directory is /ifs/data/Isilon_Support/ (change with -L
or -T).
Syntax
isi_gather_info
[-h]
[-v]
[-u <user>]
[-p <password>]
[-i]
[--incremental]
[-l]
[-f <filename>]
[-n <nodes>]
[--local-only]
[--skip-node-check]
[-s gather-script]
[-S gather-expr]
[-1 gather-expr]
[-a analysis-script]
[-A analysis-expr]
[-t <tarfile>]
[-x exclude_tool]
[-I]
[-L]
[-T <temp-dir>]
[--tardir <dir>]
[--symlinkdir <dir>]
[--varlog_recent]
[--varlog_all]
[--nologs]
[--group <name>]
[--clean-cores]
[--clean-all]
[--no-dumps]
[--dumps]
[--no-cores]
isi_gather_info 273
OneFS isi commands D through L
[--cores]
[--upgrade-archive]
[--debug]
[--verbose]
[--noconfig]
[--save-only]
[--save]
[--upload]
[--noupload]
[--re-upload <filename>]
[--verify-upload]
[--http]
[--nohttp]
[--http-host <host>]
[--http-path <dir>]
[--http-proxy <host>]
[--http-proxy-port <port>]
[--ftp]
[--noftp]
[--ftp-user <user>]
[--ftp-pass <password>]
[--ftp-host <host>]
[--ftp-path <dir>]
[--ftp-port <alt-port>]
[--ftp-proxy <host>]
[--ftp-proxy-port <port>]
[--ftp-mode <mode>]
[--esrs]
[--email]
[--noemail]
[--email-addresses]
[--email-from]
[--email-subject]
[--email-body]
[--skip-size-check]
Options
-h
Prints this message and exits.
-v
Prints version info and exits.
-u <user>
Specifies the login as <user> instead of as the default root user.
-p <password>
Uses <password>.
-i
Includes only the listed utility. See also the -l option for a list of utilities to
include. The special value all may be used to include every known utility.
--incremental
Gathers only those logs that changed since last log upload.
-l
Lists utilities and groups that can be included. See -i and --group.
-f <filename>
Gathers <filename> from each node. The value must be an absolute path.
-n <nodes>
Gathers information from only the specified nodes. Nodes must be a list or range
of LNNs, for example, 1,4-10,12,14. If no nodes are specified, the whole array
is used. Note that nodes are automatically excluded if they are down.
--local-only
Gathers information only from only the local node. Run this option when gathering
files from the /ifs filesystem.
--skip-node-check
Skips the check for node availability.
-s gather-script
Runs <gather-script> on every node.
-S gather-expr
Runs <gather-expr> on every node.
-1 gather-expr
Runs <gather-expr> on the local node.
-a analysis-script
Runs <analysis-script> on results.
-A analysis-expr
Runs <analysis-expr> on every node.
-t <tarfile>
Saves all results to the specified <tarfile> rather than to the default tar file.
-x exclude_tool
Excludes the specified tool or tools from being gathered from each node. Multiple
tools can be listed as comma-separated values.
-I
Saves results to /ifs. This is the default setting.
-L
Save all results to local storage /var/crash/support/.
-T <temp-dir>
Saves all results to <temp-dir> instead of the default directory. -T overrides -L
and -l.
--tardir <dir>
isi_gather_info 275
OneFS isi commands D through L
--symlinkdir <dir>
Creates a symlink to the final package in the specified directory.
--varlog_recent
Gathers all logs in /var/log, with the exception of the compressed and rotated
old logs. The default setting is all logs.
--varlog_all
Gathers all logs in /var/log, including compressed and rotated old logs. This is
the default setting.
--nologs
Does not gather the required minimum number of logs.
--group <name>
Adds a specific group of utilities to the tar file.
--clean-cores
Deletes cores from /var/crash after successful compression of the package.
--clean-dumps
Deletes dumps from /var/crash after successful compression of the package.
--clean-all
Deletes cores and dumps from /var/crash after successful compression of the
package.
--no-dumps
Does not gather hang dumps for the package.
--dumps
Adds cores to the package.
--no-cores
Does not gather cores for the package.
--cores
Adds dumps to the package.
--upgrade-archive
Adds the upgrade archive to the package.
--debug
Displays debugging messages.
--verbose
Displays more detailed information.
--noconfig
Uses built-in default values and bypasses the configuration file.
--save-only
--save
Saves the CLI-specified configuration to file and runs it.
--upload
Uploads logs to Isilon Technical Support automatically. This is the default setting.
--noupload
Specifies no automatic upload to Isilon Technical Support.
--re-upload <filename>
Re-uploads the specified <filename>.
--verify-upload
Creates a tar file and uploads to test connectivity.
--http
Attempts HTTP upload. This is the default setting.
--nohttp
Specifies no HTTP upload attempt.
--http-host <host>
Specifies an alternate HTTP site for upload.
--http-path <dir>
Specifies an alternate HTTP upload directory.
--http-proxy <host>
Specifies the proxy server to use.
--http-proxy-port <port>
Specifies the proxy port to use.
--ftp
Attempts FTP upload. This setting is the default value.
--noftp
Specifies no FTP upload attempt.
--ftp-user <user>
Specifies an alternate user for FTP (default: anonymous).
--ftp-pass <password>
Specifies an alternate password for FTP.
--ftp-host <host>
Specifies an alternate FTP site for upload.
isi_gather_info 277
OneFS isi commands D through L
--ftp-path DIR
Specifies an alternate FTP upload directory.
--ftp-port <alt-port>
Specifies an alternate FTP port for upload.
--ftp-proxy <host>
Specifies the proxy server to use.
--ftp-proxy-port <port>
Specifies the proxy port to use.
--ftp-mode <mode>
Specifies the mode of FTP file transfer. The following values are valid: both,
active, passive. The default value is both.
--esrs
Attempts ESRS upload.
--email
Attempts SMTP upload. If set, SMTP is tried first.
--noemail
Specifies no SMTP upload attempt. This is the default value.
--email-addresses
Specifies email addresses as comma-separated strings.
--email-from
Specifies the sender's email address.
--email-subject
Specifies an alternative email subject.
--email-body
Specifies alternative email text shown on head of body.
--skip-size-check
Does not check the size of the gathered file.
isi get
Displays information about a set of files, including the requested protection, current
actual protection, and whether write-coalescing is enabled.
Requested protection appears in one of three colors: green, yellow, or red. Green
indicates full protection. Yellow indicates degraded protection under a mirroring
policy. Red indicates a loss of one or more data blocks under a parity policy.
Syntax
isi get {{[-a] [-d] [-g] [-s] [{-D | -DD | -DDC}] [-R] <path>}
| {[-g] [-s] [{-D | -DD | -DDC}] [-R] -L <lin>}}
Options
-a
Displays the hidden "." and ".." entries of each directory.
-d
Displays the attributes of a directory instead of the contents.
-g
Displays detailed information, including snapshot governance lists.
-s
Displays the protection status using words instead of colors.
-D
Displays more detailed information.
-DD
Includes information about protection groups and security descriptor owners and
groups.
-DDC
Includes cyclic redundancy check (CRC) information.
-R
Displays information about the subdirectories and files of the specified
directories.
<path>
Displays information about the specified file or directory.
Specify as a file or directory path.
-L <lin>
Displays information about the specified file or directory.
Specify as a file or directory LIN.
Examples
The following command displays information on ifs/home/ and all of its
subdirectories:
/ifs/home/admin:
default 4+2/2 concurrency on .zshrc
/ifs/home/ftp:
default 4x/2 concurrency on incoming/
default 4x/2 concurrency on pub/
/ifs/home/ftp/incoming:
/ifs/home/ftp/pub:
/ifs/home/newUser1:
default 4+2/2 concurrency on .cshrc
default 4+2/2 concurrency on .login
default 4+2/2 concurrency on .login_conf
default 4+2/2 concurrency on .mail_aliases
default 4+2/2 concurrency on .mailrc
default 4+2/2 concurrency on .profile
default 4+2/2 concurrency on .rhosts
default 4+2/2 concurrency on .shrc
default 4+2/2 concurrency on .zshrc
/ifs/home/newUser2:
default 4+2/2 concurrency on .cshrc
default 4+2/2 concurrency on .login
default 4+2/2 concurrency on .login_conf
default 4+2/2 concurrency on .mail_aliases
default 4+2/2 concurrency on .mailrc
default 4+2/2 concurrency on .profile
default 4+2/2 concurrency on .rhosts
default 4+2/2 concurrency on .shrc
default 4+2/2 concurrency on .zshrc
Options
<profile>
Specifies the hardening profile that will be applied to the Isilon cluster. Currently,
OneFS supports only the DISA (Defense Information Systems Agency) STIG
(Security Technology Implementation Guide) profile for security hardening on the
cluster.
{--verbose | -v}
Displays more detailed information.
Options
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Suppresses command-line prompts and messages to revert hardening.
Options
There are no options for this command.
Options
--generation-interval <string>
The interval between successive FSImages.
--help <string>
Display help for this command.
{--verbose | -v}
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--zone <string>
The access zone to which the HDFS settings apply.
{--verbose | -v}
Display more detailed information.
{--force | -f}
Do not prompt for confirmation.
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--enabled {yes | no}
Enables or disables the HDFS FSImage service. Allow access to FSImage and
start FSImage generation. The HDFS FSImage service is disabled by default. This
service should only be enabled on a Hadoop-enabled Access Zone that will use
Cloudera Navigator.
--help <string>
Display help for this command.
{--verbose | -v}
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--enabled {yes | no}
Allows access to FSImage and starts FSImage generation. The HDFS FSImage
service is disabled by default. This service should only be enabled on a Hadoop-
enabled access zone that will use Cloudera Navigator.
--help <string>
Display help for this command.
--maximum-delay <string>
The maximum duration until an edit event is reported in INotify.
--retention <string>
The minimum duration edits will be retained.
{--verbose | -v}
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--zone <string>
The access zone to which the HDFS settings apply.
{--verbose | -v}
Display more detailed information.
{--force | -f}
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Options
--set {always | error | warning | info | verbose | debug | trace |
default}
Sets the default logging level for the HDFS service on the cluster. The default
value is default.
--verbose | -v
Displays more detailed information.
Options
There are no options for this command.
Options
<proxyuser-name>
Specifies the user name of a user currently configured on the cluster to be
designated as a proxy user.
--zone <zone-name>
Specifies the access zone the user authenticates through.
--add-group <group-name>...
Adds the group specified by name to the list of proxy user members. The proxy
user can impersonate any user in the group. The users in the group must
authenticate to the same access zone as the proxy user. You can specify multiple
group names in a comma-separated list.
--add-gid <group-identifier>...
Adds the group by specified by UNIX GID to the list of proxy user members. The
proxy user can impersonate any user in the group. The users in the group must
authenticate to the same access zone as the proxy user. You can specify multiple
UNIX GIDs in a comma-separated list.
--add-user <user-name>...
Adds the user specified by name to the list of members the proxy user can
impersonate. The user must authenticate to the same access zone as the proxy
user. You can specify multiple user names in a comma-separated list.
--add-uid <user-identifier>...
Adds the user specified by UNIX UID to the list of members the proxy user can
impersonate. The user must authenticate to the same access zone as the proxy
user. You can specify multiple UNIX UIDs in a comma-separated list.
--add-sid <security-identifier>...
Adds the user, group of users, machine or account specified by Windows SID to
the list of proxy user members. The object must authenticate to the same access
zone as the proxy user. You can specify multiple Windows SIDs in a comma-
separated list.
--add-wellknown <well-known-name>...
Adds the well-known user specified by name to the list of members the proxy user
can impersonate. The well-known user must authenticate to the same access
zone as the proxy user. You can specify multiple well-known user names in a
comma-separated list.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command designates hadoop-user23 in zone1 as a new proxy user:
The following command designates hadoop-user23 in zone1 as a new proxy user and
adds the group of users named hadoop-users to the list of members that the proxy
user can impersonate:
The following command designates hadoop-user23 in zone1 as a new proxy user and
adds UID 2155 to the list of members that the proxy user can impersonate:
Options
<proxyuser-name>
Specifies the user name of the proxy user to be deleted.
--zone <zone-name>
Specifies the access zone that the proxy user authenticates through.
{ --force | -f}
Deletes the specified proxy user without requesting confirmation.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command deletes hadoop-user23 in zone1 from the list of proxy users:
Options
--zone <zone-name>
Specifies the name of the access zone.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of all proxy users that are configured in zone1:
Name
-------------
hadoop-user23
hadoop-user25
hadoop-user28
-------------
Total: 3
Options
<proxyuser-name>
Specifies the name of the proxy user.
--zone <zone-name>
Specifies the access zone the proxy user authenticates through.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command displays a detailed list of the users and groups that are
members of proxy user hadoop-user23 in zone1:
Type: user
Name: krb_user_005
ID: UID:1004
----------------------------------------------------------------------
----------
Type: group
Name: krb_users
ID: SID:S-1-22-2-1003
----------------------------------------------------------------------
----------
Type: wellknown
Name: LOCAL
ID: SID:S-1-2-0
Options
<proxyuser-name>
Specifies the user name of the proxy user to be modified.
--zone <zone-name>
Specifies the access zone that the proxy user authenticates through.
--add-group <group-name>...
Adds the group specified by name to the list of proxy user members. The proxy
user can impersonate any user in the group. The users in the group must
authenticate to the same access zone as the proxy user. You can specify multiple
group names in a comma-separated list.
--add-gid <group-identifier>...
Adds the group specified by UNIX GID to the list of proxy user members. The
proxy user can impersonate any user in the group. The users in the group must
authenticate to the same access zone as the proxy user. You can specify multiple
UNIX GIDs in a comma-separated list.
--add-user <user-name>...
Adds the user specified by name to the list of members the proxy user can
impersonate. The user must authenticate to the same access zone as the proxy
user. You can specify multiple user names in a comma-separated list.
--add-uid <user-identifier>...
Adds the user specified by UNIX UID to the list of members the proxy user can
impersonate. The user must authenticate to the same access zone as the proxy
user. You can specify multiple UNIX UIDs in a comma-separated list.
--add-sid <security-identifier>...
Adds the user, group of users, machine or account specified by Windows SID to
the list of proxy user members. The object must authenticate to the same access
zone as the proxy user. You can specify multiple Windows SIDs in a comma-
separated list.
--add-wellknown <well-known-name>...
Adds the well-known user specified by name to the list of members the proxy user
can impersonate. The well-known user must authenticate to the same access
zone as the proxy user. You can specify multiple well-known user names in a
comma-separated list.
--remove-group <group-name>...
Removes the group specified by name from the list of proxy user members so
that the proxy user can no longer impersonate any user in the group. You can
specify multiple group names in a comma-separated list.
--remove-gid <group-identifier>...
Removes the group specified by UNIX GID from the list of proxy user members so
that the proxy user can no longer impersonate any user in the group. You can
specify multiple UNIX GIDs in a comma-separated list.
--remove-user <user-name>...
Removes the user specified by name from the list of members the proxy user can
impersonate. You can specify multiple user names in a comma-separated list.
--remove-uid <user-identifier>...
Removes the user specified by UNIX UID from the list of members the proxy user
can impersonate. You can specify multiple UNIX UIDs in a comma-separated list.
--remove-sid <security-identifier>...
Removes the user, group of users, machine or account specified by Windows SID
from the list of proxy user members. You can specify multiple Windows SIDs in a
comma-separated list.
--remove-wellknown <well-known-name>...
Removes the well-known user specified by name from the list of members the
proxy user can impersonate. You can specify multiple well-known user names in a
comma-separated list.
{--verbose | -v}
Displays more detailed information.
Examples
The following command adds the well-known local user to, and removes the user
whose UID is 2155 from, the list of members for proxy user hadoop-user23 in zone1:
Options
<proxyuser-name>
Specifies the user name of the proxy user.
--zone <zone-name>
Specifies the access zone the proxy user authenticates through.
Examples
The following command displays the configuration details for the hadoop-user23 proxy
user in zone1:
Name: hadoop-user23
Members: krb_users
LOCAL
krb_user_004
Options
<rack-name>
Specifies the name of the virtual HDFS rack. The rack name must begin with a
forward slash—for example, /example-name.
--client-ip-ranges <low-ip-address>-<high-ip-address>...
Specifies IP address ranges of external Hadoop compute clients assigned to the
virtual rack.
--ip-pools <subnet>:<pool>...
--zone <string>
Specifies the access zone that will contain the virtual rack.
{--verbose | -v}
Displays more detailed information.
Options
<rack-name>
Deletes the specified virtual HDFS rack. Each rack name begins with a forward
slash—for example, /example-name.
--zone <string>
Specifies the access zone that contains the virtual rack you want to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Options
--zone <string>
Specifies the access zone. The system displays all virtual racks in the specified
zone.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<rack-name>
Specifies the virtual HDFS rack to be modified. Each rack name begins with a
forward slash—for example /example-name.
--name <rack-name>
Assigns a new name to the specified virtual rack. The rack name must begin with
a forward slash—for example /example-name.
--client-ip-ranges <low-ip-address>-<high-ip-address>...
Specifies IP address ranges of external Hadoop compute clients assigned to the
virtual rack. The value assigned through this option overwrites any existing IP
address ranges. You can add a new range through the --add-client-ip-
ranges option.
--add-client-ip-ranges <low-ip-address>-<high-ip-address>...
Adds a specified IP address range of external Hadoop compute clients to the
virtual rack.
--remove-client-ip-ranges <low-ip-address>-<high-ip-address>...
Removes a specified IP address range of external Hadoop compute clients from
the virtual rack. You can only remove an entire range; you cannot delete a subset
of a range.
--clear-client-ip-ranges
Removes all IP address ranges of external Hadoop compute clients from the
virtual rack.
--ip-pools <subnet>:<pool>...
Assigns pools of Isilon node IP addresses to the virtual rack. The value assigned
through this option overwrites any existing IP address pools. You can add a new
pool through the --add-ip-pools option.
--add-ip-pools <subnet>:<pool>...
Adds a specified pool of Isilon cluster IP addresses to the virtual rack.
--remove-ip-pools <subnet>:<pool>...
Removes a specified pool of Isilon cluster IP addresses from the virtual rack.
--clear-ip-pools
Removes all pools of Isilon cluster IP addresses from the virtual rack.
--zone <string>
Specifies the access zone that contains the virtual rack you want to modify.
{--verbose | -v}
Displays more detailed information.
Options
<rack-name>
Specifies the name of the virtual HDFS rack to view. Each rack name begins with
a forward slash—for example, /example-name.
--zone <string>
Specifies the access zone that contains the virtual rack you want to view.
[--zone <string>]
[--verbose]
Options
--enabled <boolean>
Enable the HDFS Ranger plug-in.
--policy-manager-url <string>
The scheme, host name, and port of the Apache Ranger server (for example,
http://ranger.com:6080).
--repository-name <string>
The HDFS repository name hosted on the Apache Ranger server.
--zone <string>
The access zone containing the HDFS repository.
{--verbose | -v}
Display more detailed information.
Options
--zone <string>
The access zone containing the HDFS repository.
[--zone <string>]
[--verbose]
Options
--service {yes | no}
Enables or disables the HDFS service in the specified access zone. The HDFS
service is enabled by default.
--default-block-size <size>
The block size (in bytes) reported by the HDFS service. K, M, and G; for example,
64M, 512K, 1G, are valid suffixes. The default value is 128 MB.
--root-directory <path>
Root path that contains HDFS data in the access zone that can be accessed by
Hadoop compute client connections. The root directory must be within the access
zone base directory.
--ambari-server <string>
The Ambari server that receives communication from an Ambari agent. The value
must be a resolvable hostname, FQDN, IPv4 or IPv6 address.
--ambari-namenode <string>
A point of contact in the access zone that Hadoop services managed through the
Ambari interface should connect through. The value must be a resolvable IPv4
address or a SmartConnect zone name.
--ambari-metrics-collector <string>
The host name for the metrics collector. The value must be a resolvable
hostname, FQDN, IPv4 or IPv6 address.
--odp-version <string>
The version of the Open Data Platform (ODP) stack repository, including build
number if one exists, installed by the Ambari server. This is required to support
ODP upgrades on other systems that are part of the Hadoop cluster.
--zone <string>
The access zone to which the HDFS settings apply.
{--verbose | -v}
Options
--zone <string>
Specifies the access zone. The system will display the HDFS settings for the
specified zone.
Options
--access control {yes | no}
Enables access control authentication, which allows the Apache web server to
perform access checks. Access control authentication requires at least one type
of authentication to be enabled.
Note
All DAV clients must go through a single node. DAV compliance is not met if you
go through SmartConnect, or through two or more node IP addresses.
--server-root <path>
Specifies the root document directory. This must be a valid directory path
within /ifs.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Example
The following example shows the output generated by this command:
Access Control: No
Basic Authentication: No
Dav: No
Enable Access Log: Yes
Integrated Authentication: No
Server Root: /ifs
Service: redirect
[--verbose]
Options
--job-type <string>
Displays all events of all instances of a specific job type (for example,
SmartPools).
--job-id <integer>
Displays all events of a specific job instance.
--begin <timestamp>
Specifies the beginning of the time period for which job events should be listed.
For example: --begin "2013-09-17T00:00". This means that job events
beginning at the first moment of September 17, 2013 should be listed.
--end <timestamp>
Specifies the end of the time period for job events to be listed. For example, --
end "2013-09-17T23:59" means that job events right up to the last minute of
September 17, 2013 should be listed.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information about job events.
Examples
The following command lists all FSAnalyze events that happened in the month of
September.
Time Message
-----------------------------------------------------
2013-09-16T22:00:21 FSAnalyze[7] Waiting
2013-09-16T22:00:23 FSAnalyze[7] Running
2013-09-16T22:00:25 FSAnalyze[7] Phase 1: begin scan
2013-09-16T22:01:45 FSAnalyze[7] Phase 1: end scan
2013-09-16T22:01:46 FSAnalyze[7] Phase 2: begin merge
2013-09-16T22:02:30 FSAnalyze[7] Phase 2: end merge
2013-09-16T22:02:31 FSAnalyze[7] Succeeded
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
-----------------------------------------------------
Total: 14
The following command lists all the job events that happened on a specific day.
Time Message
------------------------------------------------------------------
2013-09-17T22:00:04 SmartPools[8] Waiting
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:06 SmartPools[8] Running
2013-09-17T22:00:07 SmartPools[8] Phase 1: begin lin policy update
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:01 SmartPools[8] Phase 1: end lin policy update
2013-09-17T22:01:03 SmartPools[8] Phase 2: begin sin policy update
2013-09-17T22:01:06 SmartPools[8] Phase 2: end sin policy update
2013-09-17T22:01:09 SmartPools[8] Succeeded
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
------------------------------------------------------------------
Total: 14
Options
<job>
Specifies the job to cancel. You can specify the job by job ID or job type. Specify a
job type only if one instance of that job type is active.
Examples
The following command cancels an active MultiScan job.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
--state {running | paused_user | paused_priority | paused_policy |
paused_system}
--descending
Sorts the output in descending order of activation time.
{--no-header}
Displays table and CSV output without headers.
{--no-footer}
Displays table output without footers.
{--verbose}
Displays more detailed information about active jobs.
Examples
The following example lists jobs that have been manually paused.
The following example outputs a CSV-formatted list of jobs to a file in the /ifs/data
path.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<job>
Specifies the job ID or job type to modify. If you specify job type (for example,
FlexProtect), only one instance of that type can be active.
Examples
The following command changes the impact policy of an active MultiScan job. This
command example, which specifies the job type, works only when a single instance of
MultiScan is active.
If more than one instance of a job type is active, you can specify the job ID number
instead of job type. The following command changes the priority of an active job with
an ID of 7.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<job>
Specifies the job to pause. You can specify the job by job type or job ID. If you use
job type, only one instance of the job type can be active.
Examples
The following command pauses an active AutoBalance job.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<job>
Specifies the job to resume. You can specify the job by job type or job ID. If you
use the job type parameter, only one instance of this job type can be in the Job
Engine queue.
Examples
The following command resumes a paused AutoBalance job.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<type>
Specifies the type of job to add to the job queue (for example, MediaScan).
{--priority} <integer>
Sets the priority level for the specified job, with 1 being the highest priority and 10
being the lowest.
{--policy} <string>
Sets the impact policy for the specified job.
{--no-dup}
Disallows duplicate jobs. If an instance of the specified job is already in the queue,
the new job does not start.
--paths <path>
Specifies the path of the job, which must be within /ifs. This option is valid only
for the TreeDelete and PermissionRepair jobs.
--delete
Valid for the DomainMark job only. Deletes the domain mark.
--root <path>
Valid for the DomainMark job only. Specifies the root path location for the
DomainMark job.
--template <path>
Valid for the PermissionRepair job only. Specifies the pathname of a template file
to use as a model for the PermissionRepair job. Must be within the /ifs path.
--zone <string>
Valid for the PermissionRepair job only. Specifies the access zone for
PermissionRepair.
--snapid <integer>
Valid for the SnapRevert job only. Specifies a snapshot ID for the SnapRevert job.
{--verbose | -v}
Displays more detailed information.
Examples
The following command starts an AutoBalance job.
The following command starts a MultiScan job with a priority of 8 and a high impact
policy.
The following command starts a TreeDelete job with a priority of 10 and a low impact
policy that deletes the /ifs/data/old directory.
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<job>
Specifies the job to view. You can specify the job by job type or job ID. If you
specify a job type, only one instance of this job can be active.
Examples
The following command displays information about an AutoBalance job with a job ID of
15.
ID: 15
Type: AutoBalance
State: Paused by user
Impact: Low
Policy: LOW
Pri: 4
Phase: 1/5
Start Time: 2013-09-19T09:08:28
Running Time: 24s
Participants: 1, 2, 3
Progress: Drives: 6 done, 0 in progress; last updated 3:0;
Processed 4624 LINs and 918669 KB; 0 ECCs and 0 errors
Waiting on job ID: -
Description:
In all instructions that include the isi job jobs command, you can omit the jobs
entry.
Options
<name>
Specifies a name for the new impact policy. The following names are reserved and
cannot be used: LOW, MEDIUM, HIGH, and OFF_HOURS.
--description <string>
Describes the job policy.
--begin <interval_time>
Specifies the beginning time, on a 24-hour clock, of the period during which a job
can run. For example: --begin "Friday 20:00".
--end <interval_time>
Specifies the ending time, on a 24-hour clock, of the period during which a job
can run. For example: --end "Sunday 11:59".
Examples
The following command creates a new impact policy named HIGH-WKEND.
The following command creates a more complex impact policy named HI-MED-
WKEND. This policy includes multiple impact levels and time intervals. At the end of
the specified intervals, a job running with this policy would automatically return to
LOW impact.
Options
<id>
Specifies the name of the impact policy to delete. If you are unsure of the name,
you can use the isi job policies list command.
--force
Forces deletion of the impact policy without the system asking for confirmation.
Examples
The following command deletes a custom impact policy named HIGH-MED.
When you press ENTER, OneFS displays a confirmation message: Are you sure
you want to delete the policy HIGH-MED? (yes/[no]):
Type yes, and then press ENTER.
The following command deletes a custom impact policy named HIGH-WKEND without
the confirmation message being displayed.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of available impact policies.
ID Description
------------------------------------------------------
HIGH Isilon template: high impact at all times
LOW Isilon template: low impact at all times
MEDIUM Isilon template: medium impact at all times
OFF_HOURS Isilon template: paused M-F 9-5, low-impact
at other times
HI-MED High to medium to low
HI-WKEND High impact when run on weekends
MED-WKEND Medium impact when run on weekends
------------------------------------------------------
Total: 7
The system displays verbose output in a list format as shown in the following partial
example:
ID: HIGH
Description: Isilon template: high impact at all times
System: True
Impact Intervals
Impact : High
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
ID: LOW
Description: Isilon template: low impact at all times
System: True
Impact Intervals
Impact : Low
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
Options
<ID>
Specifies the name of the policy to modify.
--description <string>
Specifies a description for the policy. Replaces an older description if one was in
place.
--begin <interval_time>
Specifies the beginning time, on a 24-hour clock, of the period during which a job
can run. For example: --begin "Friday 20:00".
--end <interval_time>
Specifies the ending time, on a 24-hour clock, of the period during which a job
can run. For example: --end "Sunday 11:59".
--reset-intervals
Clears all job policy intervals and restores the defaults.
Examples
The following command clears the custom intervals from a custom policy named
MY_POLICY as the first step to adding new intervals.
Options
<id> <string>
Specifies the job policy to display by policy ID.
Examples
The following command displays the details for the default job policy, HIGH.
ID: HIGH
Description: Isilon template: high impact at all times
System: True
Impact Intervals
Impact : High
Begin : Sunday 00:00
End : Sunday 00:00
Options
--job-type <string>
Displays reports for all instances of the specified job type.
--job-id <integer>
Displays the report for a job with the specified job ID. If a job has multiple phases,
Job Engines displays a report for each phase of the specified job ID.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Examples
The following command displays reports for all MultiScan jobs within a specified time
period.
Options
<id>
Specifies the job ID for the reports you want to view.
Examples
The following command requests reports for an FSAnalyze job with an ID of 7.
The system displays output similar to the following example. Note that when a job has
more than one phase, a report for each phase is provided.
Virtual memory size: max 111772K (dev 1), min 104444K (dev 2),
avg 109423K
Resident memory size: max 14348K (dev 1), min 9804K (dev 3),
avg 12706K
Read: 9 ops, 73728 bytes (0.1M)
Write: 3035 ops, 24517120 bytes (23.4M)
Options
--job-id <integer>
Displays statistics for a specific job ID.
--devid <integer>
Displays statistics for a specific node (device) in the cluster.
{--verbose | -v}
Displays more detailed statistics for an active job or jobs.
Examples
The following command requests statistics for an AutoBalance job with an ID of 6.
The system displays output similar to the following example. In the example, PID is the
process ID, and CPU indicates CPU utilization by the job. Also indicated are how many
worker threads exist for the job on each node and what the sleep-to-work (STW) ratio
is for each thread. The statistics represent how the system throttles the job based on
impact policies.
Job ID: 6
Phase: 2
Nodes
Node : 1
PID : 17006
CPU : 0.00% (0.00% min, 7.91% max, 4.50% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.08M (10.01M min, 10.11M max, 10.09M avg)
I/O
Read : 4141 ops, 45.33M
Write : 5035 ops, 35.28M
Workers : 2 (0.60 STW avg.)
Node : 2
PID : 16352
CPU : 13.96% (1.95% min, 13.96% max, 9.61% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.01M (9.90M min, 10.01M max, 10.00M avg)
I/O
Read : 3925 ops, 43.39M
Write : 4890 ops, 34.13M
Workers : 2 (0.60 STW avg.)
Node : 3
PID : 15929
CPU : 0.98% (0.98% min, 12.89% max, 6.82% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.57M avg)
Physical : 9.86M (9.84M min, 9.94M max, 9.92M avg)
I/O
Read : 3354 ops, 36.77M
Write : 772 ops, 2.12M
Workers : 2 (0.60 STW avg.)
Options
{--verbose | -v}
Displays more detailed job status information, including information about the
cluster and nodes.
Examples
The following command provides basic job status.
The system displays additional output that includes cluster and node information.
Options
--all
Displays all job types available in the Job Engine.
--descending
In conjunction with --sort option, specifies that output be sorted descending
order. By default, output is sorted in ascending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information about a specific job type or all job types.
Examples
The following command provides detailed information about job types.
ID: AVScan
Description: Perform an antivirus scan on all files.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: None
Priority: 6
-------------------------------------------------------------------
ID: AutoBalance
Description: Balance free space in a cluster. AutoBalance is most
efficient in clusters that contain only HDDs.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: Restripe
Priority: 4
-------------------------------------------------------------------
ID: AutoBalanceLin
Description: Balance free space in a cluster. AutoBalanceLin is
most efficient if file system metadata is stored on
SSDs.
Enabled: Yes
Policy: LOW
Schedule:
Options
<id>
Specifies the job type to modify.
--enabled <boolean>
Specifies whether the job type is enabled or disabled.
--policy<string>
Sets the policy for the specified job type.
--schedule <string>
Sets a recurring date pattern to run the specified job type.
--priority<integer>
Sets the priority level for the specified job type. Job types have a priority value
between 1 and 10, with 1 being the highest priority and 10 being the lowest.
--clear-schedule
Clears any schedule associated with the specified job type.
--force
Forces the modification without a confirmation message.
Examples
The following command adds a recurring schedule to the MultiScan command.
When you run this command, the system prompts you to confirm the change. Type
yes or no, and then press ENTER.
Options
<id>
Specifies the job type to view.
Examples
The following command displays the parameters of the job type MultiScan.
ID: MultiScan
Description: Perform the work of the AutoBalance and Collect jobs
simultaneously.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: Restripe, Mark
Priority: 4
Options
--path <string>
The location of the license file on the cluster.
--evaluation <string>
The name of a license to activate for a limited evaluation period. Repeat this
option for every license you want to activate for evaluation.
{--verbose | -v}
Displays more detailed information.
[--include <module>
[--exclude <module>
[--only <module>
[--action {license_list_only | generate_activation}]
[--file <path>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--include <module>
Adds a software module license to the activation file. Specify --include for
each license you want to include in the activation file.
--exclude <module>
Removes a software module license from the activation file. Specify --exclude
for each license you want to remove from the activation file.
--only <module>
Adds a software module license to the activation file. Specify --only for each
license you want to include in the activation file.
--file <path>
Sets the location on the cluster where you want to save the new activation file.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
The number of licenses to display.
--sort {name | module | licensed_node_count | licensed_for | status |
expiration}
Sort data by the specified field.
{--descending | -d}
Sort data in descending order.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Product name for the license to view.
Example
To view the license information for SmartQuotas, run the following command:
Name: SmartQuotas
Status: Evaluation
Expiration: 2016-10-04T14:08:26
This chapter contains documentation of the OneFS CLI commands isi ndmp
contexts delete through isi remotesupport connectemc view.
329
OneFS isi commands N through R
Options
--id <id>
The context ID string.
{--force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Options
{--type | -t} {bre | backup | restore}
Displays entries for the specified level: backup restartable extension (BRE),
backup, or restore.
Options
--id <id>
The context ID string.
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Deletes a dumpdate entry for a backup of the specified level for the given
directory. If this option is not specified, deletes all dumpdate entries for the given
directory.
Examples
The following command deletes the dumpdate entry for a level 0 backup of /ifs/
data/media:
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Displays dumpdate entries for a backup of the specified level for the given
directory path.
{--limit | -l}<integer>
The number of NDMP dumpdates to display.
{--descending | -d}
Sorts data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view NDMP dumpdate entries, run the following command:
Options
--session <session>
The NDMP session identifier. The session ID consists of the logical node number
(LNN) followed by a decimal point and then the process ID (PID), such as
<lnn>.<pid>.
--level
Stops an NDMP session for a specified level.
--path
Stops an NDMP session that is running at a specified path.
{--force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Example
The following command ends an NDMP session with the session ID 4.36339:
Options
{--node | -n} <integer>
Displays only sessions for the specified node.
{--consolidate | -c}
Consolidates sessions of a multi-stream context.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{verbose | -v}
Displays more detailed information.
Options
--session <session>
The NDMP session identifier. The session ID consists of the logical node number
(LNN) followed by a decimal point and then the process ID (PID), such as
<lnn>.<pid>.
--probe
Displays probe information about the NDMP session.
Options
--diag-level <integer>
The diagnostics level for NDMP.
--protocol-version <integer>
The NDMP protocol version (3 or 4).
Options
--format {list | json}
Displays NDMP diagnostic settings information in list or JSON format.
Options
{--service | -s} {true | false}
Enables or disables the NDMP service.
--bre-max-num-contexts <integer>
Sets the maximum number of restartable backup contexts. The system maximum
limit is 1024, and the default is 64. Set this option to zero (0) to disable
restartable backups.
--msb-context-retention-duration <integer>
Sets the duration of multi-stream backup context retention. Express durations in
YMWDHms integer format. The default duration is 5m (five minutes).
--msr-context-retention-duration <integer>
Sets the duration of multi-stream restore context retention. Express durations in
YMWDHms integer format. The default duration is 10m (ten minutes).
Options
--format {list | json}
Displays NDMP global settings in list or JSON format.
Example
The following is an example of the output generated by this command:
Service: True
Port: 10000
Dma: emc
Bre Max Num Contexts: 64
Msb Context Retention Duration: 300
Msr Context Retention Duration: 600
Options
--scope <scope>
Specifies the scope of the preferred IP setting. The scope determines the
conditions under which the IPs listed under the data-subnets will be preferred
during a three-way NDMP backup or restore operation. The scope can either be
the subnet that is receiving the incoming NDMP request or it can be a cluster in
case of a cluster-wide preference. There can be upto one preference setting for
each subnet scope and one for the cluster scope.
--data-subnets <subnets>
Specifies a comma-separated list of flexnet subnet names where the IPs in the
subnets are preferred for outgoing data (during a backup) or incoming data
(during a restore). The list of IPs are rearranged according to the order of
subnets listed under data-subnets. If an IP is in the listed data-subnets, that IP
is placed at the top of the list. A subnet in the data-subnets has no effect if none
of the IPs in the list belong to the subnet. The preferences will be applied only
under the condition specified by the scope parameter. The scope and data-
subnets values can be set to the same subnet. In this case, the same subnet is
used for the NDMP outgoing data even as the incoming data comes in on that
subnet. For example, if the scope is groupnet0.subnet0, the data-subnets
value is 10gnet.subnet0,globalnet0.subnet0, and the NDMP data for a
backup operation comes in over groupnet0.subnet0, the IP of
10gnet.subnet0 is placed at the top of the list, However, if that IP is not
available, then the IP of globalnet0.subnet0 is placed at the top of the list.
The subnet names must always be separated by commas.
--verbose | -v
Display additional details.
Option
--scope <scope>
Scope of the preferred IP setting. You can set the preferred IP to have a cluster-
wide scope by specifying a value for the cluster or you can select a OneFS-
configured subnet, for example, groupnet0.mysubnet1.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Options
--limit | -l <integer>
The number of NDMP preferred IP settings to display.
--format (table | json | csv | list)
Display the NDMP preferred IP settings in a tabular, JSON, CSV, or list format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--verbose | -v
Display additional details.
Options
--scope <scope>
Scope of the NDMP preferred IP setting. You can set the preferred IP to have a
cluster-wide scope by specifying a value for the cluster or you can select a
OneFS-configured subnet, for example, groupnet0.mysubnet1.
--data-subnets <subnet>
--add-data-subnets <subnet>
Add a network subnet. Specify --add-data-subnets for each network subnet
that you want to add. The subnet names must be separated by commas.
--remove-data-subnets <subnet>
Remove a network subnet. Specify --remove-data-subnets for each network
subnet that you want to remove. The subnet names must be separated by
commas.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Options
--scope <scope>
Scope of the NDMP preferred IP setting. You can set the preferred IP to have a
cluster-wide scope by specifying cluster as the value o r you can select a
OneFS-configured subnet, for example, groupnet0.mysubnet1.
For a list of available environment variables, see the NDMP environment variables
section in the version-appropriate OneFS Backup and Recovery Guide.
Options
--path <path>
Applies the default NDMP environment variable value to the specified path. The
directory path must be within /ifs.
--name <name>
Specifies the NDMP environment variable to define.
--value <value>
Specifies the value to be applied to the NDMP environment variable.
Examples
The following command enables snapshot-based incremental backups to be performed
for /ifs/data/media by default:
Options
For a list of available environment variables, see the NDMP environment variables
section in the version-appropriate OneFS Backup and Recovery Guide.
<path>
Applies the default NDMP-environment-variable value to the specified path. This
must be a valid directory path within /ifs.
<name>
The name of the variable to be deleted. If you do not specify a variable name, all
environment variables are deleted for the specified path.
If this option is not specified, deletes default values for all the NDMP environment
variables for the given directory.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
Examples
The following command removes all default NDMP settings for /ifs/data/media:
The following command removes the default file-history setting for backing up /ifs/
data/media:
Options
--path <path>
Applies the default NDMP-environment-variable value to the specified path.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Options
For a list of available environment variables, see the NDMP environment variables
section in the version-appropriate OneFS Backup and Recovery Guide.
<path>
<name>
Specifies the NDMP environment variable to be defined.
<value>
Specifies the value to be applied to the NDMP environment variable.
Options
--name <name>
The name of the user.
--password <string>
The password for the new NDMP user. If you do not specify a password, the new
user will be prompted to enter a password, and will be prompted to confirm the
password by entering it again. This command fails if the specified user already
exists.
Examples
The following command creates an NDMP user account with username ndmp_user
and password 1234:
Options
--name <name>
The name of the NDMP user to delete.
{--force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Example
This is an example of the output created by this command:
Name
----------
ndmp_nick
ndmp_lisa
ndmp_jason
----------
Total: 3
Options
--name <name>
The name of NDMP user you are modifying.
Output
--name <name>
The name of the NDMP user.
Example
The following is an example of the output created by this command, for an NDMP user
named ndmp_lisa, and with JSON format specified:
Options
{ --verbose | -v}
Displays more detailed information.
[--revert-dns-timeout]
[--eager-refresh <integer>]
[--revert-eager-refresh]
[--testping-delta <integer>]
[--revert-testping-delta]
[--ttl-max-noerror <integer>]
[--revert-ttl-max-noerror]
[--ttl-min-noerror <integer>]
[--revert-ttl-min-noerror]
[--ttl-max-nxdomain <integer>]
[--revert-ttl-max-nxdomain]
[--ttl-min-nxdomain <integer>]
[--revert-ttl-min-nxdomain]
[--ttl-max-other <integer>]
[--revert-ttl-max-other]
[--ttl-min-other <integer>]
[--revert-ttl-min-other]
[--ttl-max-servfail <integer>]
[--revert-ttl-max-servfail]
[--ttl-min-servfail <integer>]
[--revert-ttl-min-servfail]
[--verbose]
Options
--cache-entry-limit <integer>
Specifies the maximum number of entries that the DNS cache can contain. The
limit must be a value between 1024 and 1048576. The default value is 65536
entries.
--revert-cache-entry-limit
Sets the value of --cache-entry-limit to the default system value.
--cluster-timeout <integer>
Specifies the timeout limit, in seconds, for calls made to other nodes in the
cluster. The limit must be a value between 0 and 60. The default value is 5.
--revert-cluster-timeout
Sets the value of --cluster-timeout to the default system value.
--dns-timeout <integer>
Specifies the timeout limit, in seconds, for calls made to the DNS resolver. The
limit must be a value between 0 and 60. The default value is 5.
--revert-dns-timeout
Sets the value of --dns-timeout to the default system value.
--eager-refresh <integer>
Specifies the lead time, in seconds, to refresh cache entries that are nearing
expiration. The lead time must be a value between 0 and 30. The default value is
0.
--revert-eager-refresh
Sets the value of --eager-refresh to the default system value.
--testping-delta <integer>
Specifies the delta, in seconds, for checking the cbind cluster health. The delta
must be a value between 0 and 60. The default value is 30.
--revert-testping-delta
Sets the value of --testping-delta to the default system value.
--ttl-max-noerror <integer>
Specifies the upper time-to-live boundary, in seconds, on cache hits. The
boundary must be a value between 0 and 3600. The default value is 3600.
--revert-ttl-max-noerror
Sets the value of --ttl-max-noerror to the default system value.
--ttl-min-noerror <integer>
Specifies the lower time-to-live boundary, in seconds, on cache hits. The
boundary must be a value between 0 and 3600. The default value is 30.
--revert-ttl-min-noerror
Sets the value of --ttl-min-noerror to the default system value.
--ttl-max-nxdomain <integer>
Specifies the upper time-to-live boundary, in seconds, for nxdomain failures. The
boundary must be a value between 0 and 3600. The default value is 3600
--revert-ttl-max-nxdomain
Sets the value of --ttl-max-nxdomain to the default system value.
--ttl-min-nxdomain <integer>
Specifies the lower time-to-live boundary, in seconds, for nxdomain failures. The
boundary must be a value between 0 and 3600. The default value is 15.
--revert-ttl-min-nxdomain
Sets the value of --ttl-min-nxdomain to the default system value.
--ttl-max-other <integer>
Specifies the upper time-to-live boundary, in seconds, for non-nxdomain failures.
The boundary must be a value between 0 and 3600. The default value is 60.
--revert-ttl-max-other
Sets the value of --ttl-max-other to the default system value.
--ttl-min-other <integer>
Specifies the lower time-to-live boundary, in seconds, for non-nxdomain failures.
The boundary must be a value between 0 and 3600. The default value is 0.
--revert-ttl-min-other
Sets the value of --ttl-min-other to the default system value.
--ttl-max-servfail <integer>
Specifies the upper time-to-live boundary, in seconds, for DNS server failures.
The boundary must be a value between 0 and 3600. The default value is 3600.
--revert-ttl-max-servfail
Sets the value of --ttl-max-servfail to the default system value.
--ttl-min-servfail <integer>
Specifies the lower time-to-live boundary, in seconds, for DNS server failures.
The boundary must be a value between 0 and 3600. The default value is 300.
--revert-ttl-min-servfail
Sets the value of --ttl-min-servfail to the default system value.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Options
--sbr {true | false}
Enables or disables source-based routing on the cluster. Source-based routing is
disabled by default.
--revert-sbr
Sets the value of --sbr to the default system value.
--sc-rebalance-delay <integer>
Specifies a period of time (in seconds) that should pass after a qualifying event
before an automatic rebalance is performed. The default value is 0 seconds.
--revert-sc-rebalance-delay
Sets the value of --sc-rebalance-delay to the default system value.
--tcp-ports <integer>
Sets a list of recognized client TCP ports. 65535 is the maximum supported port
number. You can specify multiple TCP ports separated by commas, or specify this
option for each additional TCP port.
--clear-tcp-ports
Removes all client TCP ports.
--add-tcp-ports <integer>
Adds one or more recognized client TCP ports, separated by commas, to the
existing list. 65535 is the maximum supported port number.
--remove-tcp-ports <integer>
Removes one or more recognized client TCP ports, separated by commas.
--revert-tcp-ports
Sets the value of --tcp-ports to the default system value.
{ --verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Options
<id>
--description <string>
Specifies an optional description of the groupnet. The description cannot exceed
128 bytes.
Note
Do not begin suffixes with a leading dot; leading dots are automatically added.
--dns-options <string>
Sets the DNS resolver option. The only valid value for this option is rotate.
{--verbose | -v}
Displays more detailed information.
Options
< id>
Specifies the ID of the groupnet to be deleted.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
{ --limit | -l} <integer>
Displays no more than the specified number.
{ --descending | -d}
Displays output in reverse order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the groupnet to be modified.
--description <string>
Specifies an optional description of the groupnet. This option overwrites the
existing description. The description cannot exceed 128 bytes.
--clear-description
Clears the current description.
Note
Do not begin suffixes with a leading dot; leading dots are automatically added.
--clear-dns-search
Removes the current list of DNS search suffixes.
--dns-options <string>
Sets the DNS resolver option. The only valid value for this option is rotate.
--clear-dns-options
Removes the current list of DNS resolver options.
--add-dns-options <string>
Adds one or more DNS resolver options to the current list.
--remove-dns-options <string>
Removes one or more DNS resolver options from the current list.
--name <string>
Specifies a new name for the groupnet. The ID can be up to 32 alphanumeric
characters long and can include underscores or hyphens, but cannot include
spaces or other punctuation. The name cannot exceed 32 characters.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the groupnet to be viewed.
Options
If no options are specified, the command displays a list of all network interfaces on the
cluster.
--nodes <lnn>
Lists interfaces only from the specified nodes. Specify nodes by Logical Node
Number. Separate multiple nodes by commas.
--show-inactive
Includes inactive interfaces in the output.
{ --descending | -d}
Displays output in reverse order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command lists network interfaces on node 1:
Options
<id>
Specifies the ID of the new pool that you want to create. The pool must be added
to an existing groupnet and subnet. The ID can be up to 32 alphanumeric
characters long and can include underscores or hyphens, but cannot include
spaces or other punctuation. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0. The pool name must be unique in the subnet.
--access-zone <zone-name>
Associates an access zone with the pool. Clients will be allowed to connect to the
specified access zone only through IP addresses in the pool. The access zone
must belong to the same groupnet as the IP address pool.
static
Assigns each network interface in the IP address pool a single, permanent IP
address from the pool. Depending on the number of IP addresses available,
some IP addresses might go unused. The static option is the default setting.
dynamic
Specifies that all pool IP addresses must be assigned to a network interface
at all times. Enables multiple IP addresses to be assigned to an interface. If a
network interface becomes unavailable, this option helps to ensure that the
assigned IP address are redistributed to another interface.
Note
--description <string>
Specifies an optional description of the IP address pool. The description cannot
exceed 128 bytes.
--ifaces <node-interface-range>...
Specifies which network interfaces should be members of the IP address pool.
Specify network interfaces in the following format:
<node>:<interface>
To specify a range of nodes, separate the lower and upper node IDs with a dash
(-). To specify multiple network interfaces, separate each interface with a
comma. The following example adds the interfaces from nodes 1, 2 and 3:
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
Note
If you attempt to add an interface that has already been added as part of an
aggregated interface, you will receive an error message.
--ranges <ip-address-range>...
Specifies one or more IP address ranges for the pool. IP addresses within these
ranges are assigned to the network interfaces that are members of the pool.
Specify the IP address range in the following format:
<low-ip-address>-<high-ip-address>
--rebalance-policy{manual | auto}
Specifies when to redistribute pool IP addresses if a network interface that was
previously unavailable becomes available.
manual
Requires that connection rebalancing be performed manually after network
interface failback.
To manually rebalance all IP addresses in a specific pool, run the following
command:
To manually rebalance all IP addresses across the cluster, run the following
command:
auto
Causes connections to be rebalanced automatically after network interface
failback. This is the default value.
--sc-auto-unsuspend-delay <integer>
Specifies the time delay (in seconds) before a node that is automatically
unsuspended resumes SmartConnect DNS query responses for the node. During
certain cluster operations such as rolling upgrades, general node splits, or node
reboots, a node is automatically suspended and then unsuspended by the system.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are
returned in response to DNS queries to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple
aliases can be specified in a comma-separated list.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS
requests for the SmartConnect zone.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in
seconds). DNS responses are only valid for the time specified. The default value is
0 seconds.
--static-routes <route>
Designates an IP addresses as a static route and specifies the destination
gateway. If a client connects through a static route IP address, outgoing client
traffic is routed through the specified gateway. Multiple routes can be specified in
a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR)
notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Forces commands without warnings.
Examples
The following command creates a new IP address pool called pool1 under
groupnet0.subnet0 and assigns IP addresses 198.51.100.10-198.51.100.20 to ext-1
network on nodes 1, 2, and 3. The SmartConnect zone name of this pool is
storage.company.com, but it accepts the alias of storage.company:
The following command creates a new IP address pool called pool1 under
groupnet0.subnet0 and assigns IP addresses 198.51.100.10-198.51.100.20 to the pool.
The command also includes aggregated interfaces from nodes 1-3 and specifies FEC
as the aggregation mode:
The following command creates a new IP address pool called pool1 under
groupnet0.subnet0, assigns IP addresses 198.51.100.10-198.51.100.20 to the pool, and
specifies that connection rebalancing must be performed manually:
Options
<id>...
Specifies the ID of the IP address pool to be deleted. Specify the pool ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
Options
If no options are specified, the command displays a list of all IP address pool on the
cluster.
--subnet-id <string>...
Displays IP address pools only from the specified subnet ID. Specify the subnet ID
in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0.
--groupnet <string>...
Displays IP address pools only from the specified groupnet name.
--subnet <string>...
Displays IP address pools only subnets with the specified name.
{ --descending | -d}
Displays output in reverse order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the IP address pool that you want to modify. Specify the ID in
the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0. The pool name must be unique in the subnet.
--access-zone <zone-name>
Associates an access zone with the pool. Clients will be allowed to connect to the
specified access zone only through IP addresses in the pool. The access zone
must belong to the same groupnet as the IP address pool.
--revert-access-zone
Sets the value of --access-zone to the system default value.
--revert-aggregation-mode
Sets the value of --aggregation-mode to the system default value.
dynamic
Specifies that all pool IP addresses must be assigned to a network interface
at all times. Enables multiple IP addresses to be assigned to an interface. If a
network interface becomes unavailable, this option helps to ensure that the
assigned IP address are redistributed to another interface.
Note
--revert-alloc-method
Sets the value of --alloc-method to the system default value.
--description <string>
Specifies an optional description of the IP address pool. This option overwrites
the existing description. The description cannot exceed 128 bytes.
--clear-description
Clears the description of the IP address pool.
--ifaces <node-interface-range>...
Adds network interfaces to the IP address pool. Specify network interfaces in the
following format:
<node>:<interface>
To specify a range of nodes, separate the lower and upper node IDs with a dash
(-). To specify multiple network interfaces, separate each interface with a
comma. The following example adds the interfaces from nodes 1, 2 and 3:
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
--clear-ifaces
Removes all network interfaces from the IP address pool.
--add-ifaces <node-interface-range>...
Adds one or more network interfaces to the IP address pool.
--remove-ifaces <node-interface-range>...
Removes one or more network interfaces from the IP address pool.
--name <string>
Specifies a new name for the IP address pool. The name can be up to 32
alphanumeric characters long and can include underscores or hyphens, but
cannot include spaces or other punctuation. The new pool name must be unique in
the subnet.
--ranges <ip-address-range>...
Specifies one or more IP address ranges for the pool. IP addresses within these
ranges are assigned to the network interfaces that are members of the pool.
<low-ip-address>-<high-ip-address>
This option overwrites the existing list of IP address ranges. Use the --add-
ranges and --remove-ranges options to modify the existing list.
--clear-ranges
Removes all IP address ranges from the pool.
--add-ranges
Adds one or more IP address ranges to the pool.
--remove-ranges
Removes one or more IP address ranges from the pool.
--rebalance-policy{manual | auto}
Specifies when to redistribute pool IP addresses if a network interface that was
previously unavailable becomes available.
manual
Requires that connection rebalancing be performed manually after network
interface failback.
To manually rebalance all IP addresses in a specific pool, run the following
command:
To manually rebalance all IP addresses across the cluster, run the following
command:
auto
Causes connections to be rebalanced automatically after network interface
failback. This is the default value.
--revert-rebalance-policy
Sets the value of --rebalance-policy to the system default value.
--sc-auto-unsuspend-delay <integer>
Specifies the time delay (in seconds) before a node that is automatically
unsuspended resumes SmartConnect DNS query responses for the node. During
certain cluster operations such as rolling upgrades, general node splits, or node
reboots, a node is automatically suspended and then unsuspended by the system.
--revert-sc-auto-unsuspend-delay
Sets the value of --sc-auto-unsuspend-delay to the system default value.
Specifies how incoming DNS requests for client connections are balanced across
IP addresses.
The following values are valid:
roundrobin
Rotates connections through nodes equally. This value is the default policy.
conn_count
Assigns connections to the node that has the fewest number of connections.
throughput
Assigns connections to the node with the least throughput.
cpu_usage
Assigns connections to the node with the lowest CPU usage.
--revert-sc-connect-policy
Sets the value of --sc-connect-policy to the system default value.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are
returned in response to DNS queries to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>...
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple
aliases can be specified in a comma-separated list. This option overwrites the
existing list of SmartConnect DNS zone aliases. Use the --add-sc-dns-zone-
aliases and --remove-sc-dns-zone-aliases options to modify the
existing list.
--clear-sc-dns-zone-aliases
Removes all SmartConnect DNS zone aliases from the pool.
--add-sc-dns-zone-aliases <domain-name>...
Adds one or more SmartConnect DNS zone aliases to the pool.
--remove-sc-dns-zone-aliases <domain-name>...
Removes one or more SmartConnect DNS zone aliases from the pool.
cpu_usage
Assigns IP addresses to the node with lowest CPU usage.
--revert-failover-policy
Sets the value of --sc-failover-policy to the system default value.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS
requests for the SmartConnect zone.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in
seconds). DNS responses are only valid for the time specified. The default value is
0 seconds.
--static-routes <route>...
Designates an IP addresses as a static route and specifies the destination
gateway. If a client connects through a static route IP address, outgoing client
traffic is routed through the specified gateway. Multiple routes can be specified in
a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR)
notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
This option overwrites the existing list of static routes. Use the --add-static-
routes and --remove-static-routes options to modify the existing list.
--clear-static-routes
Removes all static routes from the pool.
--add-static-routes <route>...
Adds one or more static routes to the pool.
--remove-static-routes <route>...
Removes one or more static routes from the pool.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Forces commands without warnings.
Options
<id>...
Specifies the name of the IP address pool to be rebalanced. Specify the pool
name in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query
responses should be resumed. Specify the pool name in the following format:
<groupnet_id>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS
query responses should be resumed.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query
responses should be suspended. Specify the pool name in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters—for example, groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS
query responses should be suspended.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the IP address pool to be viewed. Specify the pool ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0.
Options
<id>
Specifies the ID and location of the new provisioning rule. New network interfaces
that meet the rule criteria will be assigned to the IP address pool that contains the
rule. Valid IDs include the groupnet, subnet, pool, and rule name. The rule name
must be unique throughout the given IP address pool. Specify the rule ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0:rule3. The rule name must be unique in the pool.
<iface>
Specifies the network interface name the rule applies to. To view a list of
interfaces on your system, run the isi network interfaces list
command.
--description <string>
Specifies an optional description of the provisioning rule. The description cannot
exceed 128 bytes.
{--verbose | -v}
Options
<id>...
Specifies the ID of the provisioning rule to be deleted. Specify the rule ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0:rule3.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
If no options are specified, the command displays a list of all provisioning rules on the
cluster.
--pool-id <string>
Displays provisioning rules only from the specified pool ID. Specify the pool ID in
the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0:rule3.
--groupnet <string>
Displays provisioning rules only from the specified groupnet name.
--subnet <string>
Displays provisioning rules only from subnets with the specified name.
--pool <string>
Displays provisioning rules only from IP address pools with the specified name.
{ --descending | -d}
Displays output in reverse order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following example displays a list of provisioning rules on a node:
The system displays the list of rules in output similar to the following example:
Options
<id>
Specifies the ID of the provisioning rule to be modified. Specify the rule ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0:rule3.
--description <string>
Specifies an optional description of the provisioning rule. This option overwrites
the existing description. The description cannot exceed 128 bytes.
--clear-description
Clears the description of the provisioning rule.
--iface <node_interface>
Specifies the network interface name the rule applies to. This option overwrites
the existing interface name.
--name <string>
Specifies a new name for the rule. The new rule name must be unique in the pool.
--revert-node-type
Sets the value of --node-type to the system default value.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the provisioning rule to be viewed. Specify the rule ID in the
following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1:pool0:rule3.
Options
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Specifies the ID of the new subnet that you want to create. The subnet must be
added to an existing groupnet. The ID can be up to 32 alphanumeric characters
long and can include underscores or hyphens, but cannot include spaces or other
punctuation. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1. The subnet name must be unique in the groupnet.
<addr-family> {ipv4 | ipv6}
Specifies IP address format to be applied to the subnet. All subnet settings and IP
address pools added to the subnet must use the specified address format. You
cannot modify the address family once the subnet has been created.
<prefixlen>
Sets the prefix length of the subnet. Specify a prefix length appropriate for the
selected address family.
--description <string>
Specifies an optional description of the subnet. The description cannot exceed
128 bytes.
--dsr-addrs <ip_address>...
Sets one or more Direct Server Return addresses for the subnet. If an external
hardware load balancer that uses DSR addresses is used, this parameter is
required.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
Note
--gateway-priority <integer>
Specifies the gateway priority for the subnet. Valid values start at 1. A lower value
has a higher priority—for example, a gateway with priority 3 is given priority over
a gateway with priority 7. When a new gateway is configured on the system, it is
given a default priority of the current lowest priority plus 10 to ensure it does not
take priority over existing gateways until you modify the priority level.
--mtu <integer>
Sets the maximum transmission unit (MTU) of the subnet. Common values are
1500 and 9000.
Note
Using a larger frame size for network traffic permits more efficient
communication on the external network between clients and cluster nodes. For
example, if a subnet is connected through a 10 GbE interface, we recommend
that you set the MTU to 9000. To benefit from using jumbo frames, all devices in
the network path must be configured to use jumbo frames.
--sc-service-addr <ip_address>
Specifies the IP address on which the SmartConnect module listens for domain
name server (DNS) requests on this subnet.
--vlan-id <integer>
Specifies the VLAN ID for all interfaces in the subnet.
{--verbose | -v}
Displays more detailed information.
Options
<id>...
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
If no options are specified, the command displays a list of all subnets on the cluster.
--groupnet-id <string>
Displays subnets only from the specified groupnet ID.
--groupnet <string>
Displays subnets only from the specified groupnet ID.
{ --descending | -d}
Displays output in reverse order.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of all subnets:
Options
<id>
Specifies the ID of the subnet that you want to modify. The ID can be up to 32
alphanumeric characters long and can include underscores or hyphens, but
cannot include spaces or other punctuation. Specify the subnet ID in the following
format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1.
--description <string>
Specifies an optional description of the subnet. This option overwrites the
existing description. The description cannot exceed 128 bytes.
--clear-description
Clears the description of the subnet.
--dsr-addrs <ip_address>...
Sets one or more Direct Server Return addresses for the subnet. If an external
hardware load balancer that uses DSR addresses is used, this parameter is
required.
--clear-dsr-addrs
Removes all DSR addresses from the subnet.
--add-dsr-addrs <ip_address>...
Adds one or more Direct Server Return addresses to the subnet.
--remove-dsr-addrs <ip_address>...
Removes one or more Direct Server Return addresses from the subnet.
--revert-dsr-addrs
Sets the value of --dsr-addrs to the system default value.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
Note
--gateway-priority <integer>
Specifies the gateway priority for the subnet. Valid values start at 1. A lower value
has a higher priority—for example, a gateway with priority 3 is given priority over
a gateway with priority 7. When a new gateway is configured on the system, it is
given a default priority of the current lowest priority plus 10 to ensure it does not
take priority over existing gateways until you modify the priority level.
--mtu <integer>
Sets the maximum transmission unit (MTU) of the subnet. Common values are
1500 and 9000.
Note
Using a larger frame size for network traffic permits more efficient
communication on the external network between clients and cluster nodes. For
example, if a subnet is connected through a 10 GbE interface, we recommend
that you set the MTU to 9000. To benefit from using jumbo frames, all devices in
the network path must be configured to use jumbo frames.
--revert-mtu
Sets the value of --mtu to the system default value.
--prefixlen <integer>
Sets the prefix length of the subnet. Specify a prefix length appropriate for the
selected address family. This option overwrites the existing prefix length.
--name <string>
Specifies a new name for the subnet. The new subnet name must be unique in the
groupnet.
--sc-service-addr <ip_address>
Specifies the address on which SmartConnect listens for DNS requests on this
subnet. This option overwrites the existing SmartConnect service address.
--vlan-id <integer>
Specifies the VLAN ID or tag for all interfaces on this subnet. This option
overwrites the existing VLAN ID.
{--verbose | -v}
Displays more detailed information.
{--force | -f }
Suppresses any prompts or warnings messages that would otherwise appear
before or during the subnet modification operation.
Options
<id>
Specifies the ID of the subnet to be viewed. Specify the subnet ID in the following
format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are
also acceptable as delimiters between component names—for example,
groupnet0:subnet1.
Options
<name>
The name of the alias. Alias names must be formed as Unix root directory with a
single forward slash followed by the name. For example, /home.
<path>
The OneFS directory pathname the alias links to. The pathname must be an
absolute path below the access zone root. For example, /ifs/data/ugroup1/
home.
--zone
The access zone in which the alias is active.
{--force | -f}
Forces creation of the alias without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following command creates an alias in a zone named ugroup1:
Options
<name>
The name of the alias to be deleted.
--zone <string>
The access zone in which the alias is active.
{--force | -f}
Forces the alias to be deleted without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following command deletes an alias from a zone named ugroup1.
Options
--check
For the current zone, displays a list of aliases and their health status.
--zone <string>
The access zone in which the alias is active.
{--descending | -d}
Specifies to sort the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Example
The following command displays a table of the aliases in a zone named ugroup1
including their health status.
Options
<alias>
The current name of the alias, for example, /home.
--zone <string>
The access zone in which the alias is currently active.
--new-zone <string>
The new access zone in which the alias is to be active.
--name <string>
A new name for the alias.
--path <path>
The new OneFS directory pathname the alias should link to. The pathname must
be an absolute path below the access zone root. For example, /ifs/data/
ugroup2/home.
{--force | -f}
Forces modification of the alias without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following command modifies the zone, name, and path of an existing alias:
isi nfs aliases modify /home --name /users --zone ugroup1 --new-
zone ugroup2
--path /ifs/data/ugroup2/users
Options
<name>
The name of the alias.
--zone <string>
The access zone in which the alias is active.
--check
Include the health status of the alias.
Example
The following command displays a table of information, including the health status, of
an alias named /projects in the current zone.
Options
{--limit | -l} <integer>
Displays no more than the specified number of NFS exports.
--zone <string>
Specifies the access zone in which the export was created.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--ignore-unresolvale-hosts
Does not present an error condition on unresolvable hosts when creating or
modifying an export.
--ignore-bad-paths
Does not present an error condition on bad paths when creating or modifying an
export.
--ignore-bad-auth
Ignores bad authentication for mapping options when creating or modifying an
export.
{--verbose | -v}
Displays more detailed information.
Examples
The following command checks the exports in a zone namedZone-1:
If the check finds no problems, it returns an empty table. If, however, the check finds
a problem, it returns a display similar to the following:
ID Message
---------------------------------------
3 '/ifs/data/project' does not exist
---------------------------------------
Total: 1
Note
To view the default NFS export settings that will be applied when creating an export,
run the isi nfs settings export view command.
Syntax
Options
<paths> ...
Required. Specifies the path to be exported, starting at /ifs. This option can be
repeated to specify multiple paths.
--block-size <size>
Specifies the block size, in bytes.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed
by a case-sensitive unit of measure: b for bytes; K for KB; M for MB; or G for GB.
If no unit is specified, bytes are used by default. The maximum value is
4294967295b. The initial default value is 128K.
--link-max <integer>
The reported maximum number of links to a file.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger
than the specified value, an error is returned.
--name-max-size <integer>
The reported maximum length of characters in a filename.
Note
This setting is provided for backward compatibility with older NFS clients, and
should not be enabled unless necessary.
--zone <string>
Access zone in which the export should apply. The default zone is system.
--clients <client>
Specifies a client to be allowed access through this export. Specify clients as an
IPv4 or IPv6 address, hostname, netgroup, or CIDR range. You can add multiple
clients by repeating this option.
Note
This option replaces the entire list of clients. To add or remove a client from the
list, specify --add-clients or --remove-clients.
--description <string>
The description for this NFS export.
--root-clients <client>
Allows the root user of the specified client to execute operations as the root user
of the cluster. This option overrides the --map-all and --map-root option for
the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range.
You can specify multiple clients in a comma-separated list.
--read-write-clients <client>
Grants read/write privileges to the specified client for this export. This option
overrides the --read-only option for the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range.
You can specify multiple clients in a comma-separated list.
--read-only-clients <client>
Makes the specified client read-only for this export. This option overrides the --
read-only option for the specified client.
--encoding <string>
Specifies the character encoding of clients connecting through this NFS export.
Valid values and their corresponding character encodings are provided in the
following table. These values are taken from the node's /etc/encodings.xml
file, and are not case sensitive.
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
krb5
Kerberos V5 authentication.
krb5i
Kerberos V5 authentication with integrity.
krb5p
Kerberos V5 authentication with privacy.
--map-all <identity>
Specifies the default identity that operations by any user will execute as. If this
option is not set to root, you can allow the root user of a specific client to
execute operations as the root user of the cluster by including the client in the --
root-clients list.
--map-root <identity>
Map incoming root users to a specific user and/or group ID.
--map-non-root <identity>
Map non-root users to a specific user and/or group ID.
--map-failure <identity>
Map users to a specific user and/or group ID after a failed auth attempt.
--read-transfer-max-size <size>
Specifies the maximum read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 1M.
--read-transfer-multiple <integer>
Specifies the suggested multiple read size to report to NFSv3 and NFSv4 clients.
Valid values are 0–4294967295. The initial default value is 512.
--read-transfer-size <size>
Specifies the preferred read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b, or lower if the --read-
transfer-max-size is set to a lesser value. The initial default value is 128K.
--time-delta <float>
Specifies server time granularity, in seconds.
--write-filesync-reply {filesync}
Applies to NFSv3 and NFSv4 only. Specifies an alternate filesync reply method.
The only valid value is filesync (does not respond differently).
--write-transfer-max-size <size>
Specifies the preferred maximum write transfer size to report to NFSv3 and
NFSv4 clients. Valid values are a number followed by a case-sensitive unit of
measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes
are used by default. The maximum value is 4294967295b. The initial default
value is 1M.
--write-transfer-multiple <integer>
Specifies the suggested write transfer multiplier to report to NFSv3 and NFSv4
clients. Valid values are 0–4294967295. The initial default value is 512.
--write-transfer-size <size>
Specifies the preferred write transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b, or lower if the --write-
transfer-max-size is set to a lesser value. The initial default value is 512K.
--ignore-unresolvale-hosts
Does not present an error condition on unresolvable hosts when creating or
modifying an export.
--ignore-bad-paths
Does not present an error condition on bad paths when creating or modifying an
export.
--ignore-bad-auth
Ignores bad authentication for mapping options when creating or modifying an
export.
--ignore-conflicts
Ignores conflicts between the new or modified exports and the existing
configuration.
{--force | -f}
If set to no (default), a confirmation prompt displays when the command runs. If
set to yes, the command executes without prompting for confirmation.
{--verbose | -v}
Displays more detailed information.
Examples
The following command creates an NFS export for a particular zone and set of clients:
The following command creates an NFS export with multiple directory paths and a
custom security type (Kerberos 5):
Options
<id>
Specifies the ID of the NFS export to delete. You can use the isi nfs
exports list command to view a list of exports and their IDs in the current
zone.
--zone <string>
Specifies the access zone in which the export was created. The default is the
current zone.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Options
--zone <string>
Specifies the name of the access zone in which the export was created.
--sort <field>
Specifies the field to sort by. Valid values are as follows:
l id
l zone
l paths
l description
l clients
l root_clients
l read_only_clients
l read_write_clients
l unresolved_clients
l all_dirs
l block_size
l can_set_time
l commit_asynchronous
l directory_transfer_size
l encoding
l map_lookup_uid
l map_retry
l map_all
l map_root
l map_full
l max_file_size
l read_only
l readdirplus
l return_32bit_file_ids
l read_transfer_max_size
l read_transfer_multiple
l read_transfer_size
l security_flavors
l setattr_asynchronous
l symlinks
l time_delta
l write_datasync_action
l write_datasync_reply
l write_filesync_action
l write_filesync_reply
l write_unstable_action
l write_unstable_reply
l write_transfer_max_size
l write_transfer_multiple
l write_transfer_size
--descending
Specifies to sort the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command lists NFS exports, by default in the current zone:
Note
You can run the isi nfs settings export view command to see the full list of
default settings for exports.
Syntax
[--clients <string>]
[--clear-clients]
[--add-clients <string>]
[--remove-clients <string>]
[--root-clients <string>]
[--clear-root-clients]
[--add-root-clients <string>]
[--remove-root-clients <string>]
[--read-write-clients <string>]
[--clear-read-write-clients]
[--add-read-write-clients <string>]
[--remove-read-write-clients <string>]
[--read-only-clients <string>]
[--clear-read-only-clients]
[--add-read-only-clients <string>]
[--remove-read-only-clients <string>]
[--all-dirs {yes | no}]
[--revert-all-dirs]
[--encoding <string>]
[--revert-encoding]
[--security-flavors {unix | krb5 | krb5i | krb5p}]
[--revert-security-flavors]
[--clear-security-flavors]
[--add-security-flavors {unix | krb5 | krb5i | krb5p}]
[--remove-security-flavors <string>]
[--snapshot <snapshot>]
[--revert-snapshot]
[--map-lookup-uid {yes | no}]
[--revert-map-lookup-uid]
[--map-retry {yes | no}]
[--revert-map-retry]
[--map-root-enabled {yes | no}]
[--revert-map-root-enabled]
[--map-non-root-enabled {yes | no}]
[--revert-map-non-root-enabled]
[--map-failure-enabled {yes | no}]
[--revert-map-failure-enabled]
[--map-all <identity>]
[--revert-map-all]
[--map-root <identity>]
[--revert-map-root]
[--map-non-root <identity>]
[--revert-map-non-root]
[--map-failure <identity>]
[--revert-map-failure]
[--map-full {yes | no}]
[--revert-map-full]
[--commit-asynchronous {yes | no}]
[--revert-commit-asynchronous]
[--read-only {yes | no}]
[--revert-read-only]
[--readdirplus {yes | no}]
[--revert-readdirplus]
[--read-transfer-max-size <size>]
[--revert-read-transfer-max-size]
[--read-transfer-multiple <integer>]
[--revert-read-transfer-multiple]
[--read-transfer-size <size>]
[--revert-read-transfer-size]
[--setattr-asynchronous {yes | no}]
[--revert-setattr-asynchronous]
[--time-delta <time delta>]
[--revert-time-delta]
[--write-datasync-action {datasync | filesync |unstable}]
[--revert-write-datasync-action]
[--write-datasync-reply {datasync | filesync}]
[--revert-write-datasync-reply]
[--write-filesync-action {datasync | filesync |unstable}]
[--revert-write-filesync-action]
[--write-filesync-reply filesync]
[--write-unstable-action {datasync | filesync |unstable}]
[--revert-write-unstable-action]
[--write-unstable-reply {datasync | filesync |unstable}]
[--revert-write-unstable-reply]
[--write-transfer-max-size <size>]
[--revert-write-transfer-max-size]
[--write-transfer-multiple <integer>]
[--revert-write-transfer-multiple]
[--write-transfer-size <size>]
[--revert-write-transfer-size]
[--zone <string>]
[--ignore-unresolvable-hosts]
[--ignore-bad-paths]
[--ignore-bad-auth]
[--ignore-conflicts]
[--force]
[--verbose]
Options
<id>
The export ID number. You can use the isi nfs exports list command to
view all the exports and their ID numbers in the current access zone.
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--revert-can-set-time
Restores the setting to the system default.
--revert-case-insensitive
Restores the setting to the system default.
--revert-case-preserving
Restores the setting to the system default.
--revert-chown-restricted
Restores the setting to the system default.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed
by a case-sensitive unit of measure: b for bytes; K for KB; M for MB; or G for GB.
If no unit is specified, bytes are used by default. The maximum value is
4294967295b. The initial default value is 128K.
--revert-directory-transfer-size
Restores the setting to the system default.
--link-max <integer>
The reported maximum number of links to a file.
--revert-link-max
Restores the setting to the system default.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger
than the specified value, an error is returned.
--revert-max-file-size
Restores the setting to the system default.
--name-max-size <integer>
The reported maximum length of characters in a filename.
--revert-name-max-size
Restores the setting to the system default.
--revert-no-truncate
Restores the setting to the system default.
Note
This setting is provided for backward compatibility with older NFS clients, and
should not be enabled unless necessary.
--revert-return-32bit-file-ids
Restores the setting to the system default.
--revert-symlinks
Restores the setting to the system default.
--new-zone <string>
Specifies a new access zone in which the export should apply. The default zone is
system.
--description <string>
The description for this NFS export.
--clients <string>
Specifies a client to be allowed access through this export. Specify clients as an
IPv4 or IPv6 address, hostname, netgroup, or CIDR range. You can add multiple
clients by repeating this option.
--clear-clients
Clear the full list of clients originally allowed access through this export.
--add-clients <string>
Specifies a client to be added to the list of clients with access through this
export. Specify clients to be added as an IPv4 or IPv6 address, hostname,
netgroup, or CIDR range. You can add multiple clients by repeating this option.
--remove-clients <string>
Specifies a client to be removed from the list of clients with access through this
export. Specify clients to be removed as an IPv4 or IPv6 address, hostname,
netgroup, or CIDR range. You can remove multiple clients by repeating this
option.
--root-clients <string>
Allows the root user of the specified client to execute operations as the root user
of the cluster. This option overrides the --map-all and --map-root option for
the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range.
You can specify multiple clients in a comma-separated list.
--clear-root-clients
Clear the full list of root clients originally allowed access through this export.
--add-root-clients <string>
Specifies a root client to be added to the list of root clients with access through
this export. Specify root clients to be added as an IPv4 or IPv6 address,
hostname, netgroup, or CIDR range. You can add multiple root clients by
repeating this option.
--remove-root-clients <string>
Specifies a root client to be removed from the list of root clients with access
through this export. Specify root clients to be removed as an IPv4 or IPv6
address, hostname, netgroup, or CIDR range. You can remove multiple root
clients by repeating this option.
--read-write-clients <string>
Grants read/write privileges to the specified client for this export. This option
overrides the --read-only option for the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range.
You can specify multiple clients in a comma-separated list.
--clear-read-write-clients
Clear the full list of read-write clients originally allowed access through this
export.
--add-read-write-clients <string>
Specifies a read-write client to be added to the list of read-write clients with
access through this export. Specify read-write clients to be added as an IPv4 or
IPv6 address, hostname, netgroup, or CIDR range. You can add multiple read-
write clients by repeating this option.
--remove-read-write-clients <string>
Specifies a read-write client to be removed from the list of read-write clients with
access through this export. Specify read-write clients to be removed as an IPv4
or IPv6 address, hostname, netgroup, or CIDR range. You can remove multiple
read-write clients by repeating this option.
--read-only-clients <string>
Makes the specified client read-only for this export. This option overrides the --
read-only option for the specified client.
Specify clients as an IPv4 or IPv6 address, hostname, netgroup, or CIDR range.
You can specify multiple clients in a comma-separated list.
--clear-read-only-clients
Clear the full list of read-only clients originally allowed access through this export.
--add-read-only-clients <string>
Specifies a read-only client to be added to the list of read-only clients with access
through this export. Specify read-only clients to be added as an IPv4 or IPv6
address, hostname, netgroup, or CIDR range. You can add multiple read-only
clients by repeating this option.
--remove-read-only-clients <string>
Specifies a read-only client to be removed from the list of read-only clients with
access through this export. Specify read-only clients to be removed as an IPv4 or
IPv6 address, hostname, netgroup, or CIDR range. You can remove multiple read-
only clients by repeating this option.
--revert-all-dirs
Restores the setting to the system default.
--encoding <string>
Specifies the character encoding of clients connecting through this NFS export.
Valid values and their corresponding character encodings are provided in the
following table. These values are taken from the node's /etc/encodings.xml
file, and are not case sensitive.
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
--revert-encoding
Restores the setting to the system default.
krb5i
Kerberos V5 authentication with integrity.
krb5p
Kerberos V5 authentication with privacy.
--revert-security-flavors
Restores the setting to the system default.
--clear-security-flavors
Clears the value for supported security flavors.
--revert-map-lookup-uid
Restores the setting to the system default.
--revert-map-retry
Restores the setting to the system default.
--map-all <identity>
Specifies the default identity that operations by any user will execute as. If this
option is not set to root, you can allow the root user of a specific client to
execute operations as the root user of the cluster by including the client in the --
root-clients list.
--revert-map-all
Restores the setting to the system default.
--map-root <identity>
Map incoming root users to a specific user and/or group ID.
--revert-map-root
Restores the setting to the system default.
--map-non-root <identity>
Map non-root users to a specific user and/or group ID.
--revert-map-non-root
Restores the setting to the system default.
--map-failure <identity>
Map users to a specific user and/or group ID after a failed auth attempt.
--revert-map-failure
Restores the setting to the system default.
--revert-map-full
Restores the --map-full setting to the system default, yes.
--revert-commit-asynchronous
Restores the setting to the system default.
--revert-read-only
Restores the setting to the system default.
--revert-readdirplus
Restores the setting to the system default.
--read-transfer-max-size <size>
Specifies the maximum read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 1M.
--revert-read-transfer-max-size
Restores the setting to the system default.
--read-transfer-multiple <integer>
Specifies the suggested multiple read size to report to NFSv3 and NFSv4 clients.
Valid values are 0-4294967295. The initial default value is 512.
--revert-read-transfer-multiple
Restores the setting to the system default.
--read-transfer-size <size>
Specifies the preferred read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b, or lower if the --read-
transfer-max-size is set to a lesser value. The initial default value is 128K.
--revert-read-transfer-size
Restores the setting to the system default.
--revert-setattr-asynchronous
Restores the setting to the system default.
--time-delta <float>
Specifies server time granularity, in seconds.
--revert-time-delta
Restores the setting to the system default.
--revert-write-datasync-action
Restores the setting to the system default.
--write-datasync-reply {datasync | filesync}
Applies to NFSv3 and NFSv4 only. Specifies an alternate datasync reply method.
The following values are valid:
l datasync
l filesync
The default value is datasync (does not respond differently).
--revert-write-datasync-reply
Restores the setting to the system default.
--revert-write-filesync-action
Restores the setting to the system default.
--write-filesync-reply {filesync}
Applies to NFSv3 and NFSv4 only. Specifies an alternate filesync reply method.
The only valid value is filesync (does not respond differently).
--revert-write-unstable-action
Restores the setting to the system default.
--revert-write-unstable-reply
Restores the setting to the system default.
--write-transfer-max-size <size>
Specifies the preferred maximum write transfer size to report to NFSv3 and
NFSv4 clients. Valid values are a number followed by a case-sensitive unit of
measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes
are used by default. The maximum value is 4294967295b. The initial default
value is 1M.
--revert-write-transfer-max-size
Restores the setting to the system default.
--write-transfer-multiple <integer>
Specifies the suggested write transfer multiplier to report to NFSv3 and NFSv4
clients. Valid values are 0-4294967295. The initial default value is 512.
--revert-write-transfer-multiple
Restores the setting to the system default.
--write-transfer-size <size>
Specifies the preferred write transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b, or lower if the --write-
transfer-max-size is set to a lesser value. The initial default value is 512K.
--revert-write-transfer-size
Restores the setting to the system default.
--zone
Access zone in which the export was originally created.
--ignore-unresolvale-hosts
Does not present an error condition on unresolvable hosts when creating or
modifying an export.
--ignore-bad-paths
Does not present an error condition on bad paths when creating or modifying an
export.
--ignore-bad-auth
Ignores bad authentication for mapping options when creating or modifying an
export.
--ignore-conflicts
Ignores conflicts between the new or modified exports and the existing
configuration.
{--force | -f}
If set to no (default), a confirmation prompt displays when the command runs. If
set to yes, the command executes without prompting for confirmation.
{--verbose | -v}
Displays more detailed information.
Options
--zone
The access zone for the exports you are reloading.
Options
<id>
Specifies the ID of the NFS export to display. If you do not know the ID, use the
isi nfs exports list command to view a list of exports and their
associated IDs.
--zone <string>
Specifies the name of the access zone in which the export was created.
Options
<level>
Valid logging levels are:
Log level Description
always Specifies that all NFS events are logged in NFS log files.
error Specifies that only NFS error conditions are logged in NFS log files.
warning Specifies that only NFS warning conditions are logged in NFS log files.
info Specifies that only NFS information conditions are logged in NFS log files.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Options
--host <string>
The IPv4 or IPv6 address of the node to check. The default is the localhost IP
address.
{--verbose | -v}
Displays more detailed information.
Options
--host <string>
The IPv4 or IPv6 address of the node to flush. If you do not specify a node, all
nodes are flushed (default).
{verbose | -v}
Displays more detailed information.
Options
Note
{verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of NFS nlm locks.
{--descending | -d}
Specifies to sort the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a detailed list of all current NLM locks, run the following command:
In the following sample output, there are currently three locks: one on /ifs/home/
test1/file.txt and two on /ifs/home/test2/file.txt.
Options
{--limit | -l}<integer>
Displays no more than the specified number of NLM locks.
--descending
Specifies to sort the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a detailed list of clients waiting to lock a currently-
locked file:
Example 3 Options
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
The number of NFS NLM sessions to display.
{--descending | -d}
Specifies to sort the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
To view a list of active NLM sessions, run the following command:
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
Options
<hostname>
The name of the client that initiated the session.
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Note
You can view the currently configured default NFS export settings by running the isi
nfs settings export view command.
Syntax
[--revert-security-flavors]
[--clear-security-flavors]
[--add-security-flavors {unix|krb5|krb5i|krb5p}]
[--remove-security-flavors <string>]
[--snapshot <snapshot>]
[--revert-snapshot]
[--map-lookup-uid {yes|no}]
[--revert-map-lookup-uid]
[--map-retry {yes|no}]
[--revert-map-retry]
[--map-root-enabled {yes|no}]
[--revert-map-root-enabled]
[--map-non-root-enabled {yes|no}]
[--revert-map-non-root-enabled]
[--map-failure-enabled {yes|no}]
[--revert-map-failure-enabled]
[--map-all <identity>]
[--revert-map-all]
[--map-root <identity>]
[--revert-map-root]
[--map-non-root <identity>]
[--revert-map-non-root]
[--map-failure <identity>]
[--revert-map-failure]
[--map-full {yes|no}]
[--revert-map-full]
[--commit-asynchronous {yes|no}]
[--revert-commit-asynchronous]
[--read-only {yes|no}]
[--revert-read-only]
[--readdirplus {yes|no}]
[--revert-readdirplus]
[--read-transfer-max-size <size>]
[--revert-read-transfer-max-size]
[--read-transfer-multiple <integer>]
[--revert-read-transfer-multiple]
[--read-transfer-size <size>]
[--revert-read-transfer-size]
[--setattr-asynchronous {yes|no}]
[--revert-setattr-asynchronous]
[--time-delta <integer>]
[--revert-time-delta]
[--write-datasync-action {datasync|filesync|unstable}]
[--revert-write-datasync-action]
[--write-datasync-reply {datasync|filesync}]
[--revert-write-datasync-reply]
[--write-filesync-action {datasync|filesync|unstable}]
[--revert-write-filesync-action]
[--write-filesync-reply filesync]
[--write-unstable-action {datasync|filesync|unstable}]
[--revert-write-unstable-action]
[--write-unstable-reply {datasync|filesync|unstable}]
[--revert-write-unstable-reply]
[--write-transfer-max-size <size>]
[--revert-write-transfer-max-size]
[--write-transfer-multiple <integer>]
[--revert-write-transfer-multiple]
[--write-transfer-size <size>]
[--revert-write-transfer-size]
[--zone <string>]
[--force]
[--verbose]
Options
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--can-set-time {yes|no}
If set to yes, enables the export to set time. The default setting is no.
--revert-can-set-time
Restores the setting to the system default.
--case-insensitive {yes|no}
If set to yes, the server will report that it ignores case for file names. The default
setting is no.
--revert-case-insensitive
Restores the setting to the system default.
--case-preserving {yes|no}
If set to yes, the server will report that it always preserves case for file names.
The default setting is no.
--revert-case-preserving
Restores the setting to the system default.
--chown-restricted {yes|no}
If set to yes, the server will report that only the superuser can change file
ownership. The default setting is no.
--revert-chown-restricted
Restores the setting to the system default.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed
by a case-sensitive unit of measure: b for bytes; K for KB; M for MB; or G for GB.
If no unit is specified, bytes are used by default. The maximum value is
4294967295b. The initial default value is 128K.
--revert-directory-transfer-size
Restores the setting to the system default.
--link-max <integer>
The reported maximum number of links to a file.
--revert-link-max
Restores the setting to the system default.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger
than the specified value, an error is returned.
--revert-max-file-size
Restores the setting to the system default.
--name-max-size <integer>
The reported maximum length of characters in a filename.
--revert-name-max-size
--no-truncate {yes|no}
If set to yes, too-long file names will result in an error rather than be truncated.
--revert-no-truncate
Restores the setting to the system default.
--return-32bit-file-ids {yes|no}
Applies to NFSv3 and later. If set to yes, limits the size of file identifiers returned
from readdir to 32-bit values. The default value is no.
Note
This setting is provided for backward compatibility with older NFS clients, and
should not be enabled unless necessary.
--revert-return-32bit-file-ids
Restores the setting to the system default.
--symlinks {yes|no}
If set to yes, advertises support for symlinks. The default setting is no.
--revert-symlinks
Restores the setting to the system default.
--new-zone <string>
Specifies a new access zone in which the export should apply. The default zone is
system.
--all-dirs {yes|yesno}
If set to yes, this export will cover all directories. The default setting is no.
--revert-all-dirs
Restores the setting to the system default.
--encoding <string>
Specifies the character encoding of clients connecting through this NFS export.
Valid values and their corresponding character encodings are provided in the
following table. These values are taken from the node's /etc/encodings.xml
file, and are not case sensitive.
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
Value Encoding
iso-8859-1 ISO-8859-1 (Latin-1)
--revert-encoding
Restores the setting to the system default.
--revert-security-flavors
Restores the setting to the system default.
--snapshot {<snapshot>|<snapshot-alias>}
Specifies the ID of a snapshot or snapshot alias to export. If you specify this
option, directories will be exported in the state captured in either the specified
snapshot or the snapshot referenced by the specified snapshot alias. If the
snapshot does not capture the exported path, the export will be inaccessible to
users.
If you specify a snapshot alias, and the alias is later modified to reference a new
snapshot, the new snapshot will be automatically applied to the export.
Because snapshots are read-only, clients will not be able to modify data through
the export unless you specify the ID of a snapshot alias that references the live
version of the file system.
Specify <snapshot> or <snapshot-alias> as the ID or name of a snapshot or
snapshot alias.
--revert-snapshot
Restores the setting to the system default.
--map-lookup-uid {yes|no}
If set to yes, incoming UNIX user identifiers (UIDs) will be looked up locally. The
default setting is no.
--revert-map-lookup-uid
Restores the setting to the system default.
--map-retry {yes|no}
If set to yes, the system will retry failed user-mapping lookups. The default
setting is no.
--revert-map-retry
Restores the setting to the system default.
--map-root-enabled {yes|no}
Enable/disable mapping incoming root users to a specific account.
--revert-map-root-enabled
Restores the setting to the system default.
--map-non-root-enabled {yes|no}
Enable/disable mapping incoming non-root users to a specific account.
--revert-map-non-root-enabled
Restores the setting to the system default.
--map-failure-enabled {yes|no}
Enable/disable mapping users to a specific account after failing an auth lookup.
--revert-map-failure-enabled
Restores the setting to the system default.
--map-all <identity>
Specifies the default identity that operations by any user will run as. If this option
is not set to root, you can allow the root user of a specific client to run
operations as the root user of the cluster by including the client in the --root-
clients list.
--revert-map-all
Restores the setting to the system default.
--map-root <identity>
Map incoming root users to a specific user and/or group ID.
--revert-map-root
Restores the setting to the system default.
--map-non-root <identity>
Map non-root users to a specific user and/or group ID.
--revert-map-non-root
Restores the setting to the system default.
--map-failure <identity>
Map users to a specific user and/or group ID after a failed auth attempt.
--revert-map-failure
Restores the setting to the system default.
--map-full {yes|no}
Determines how user mapping is accomplished if a user is specified in an export
option such as --map-root or --map-all. When enabled, a user mapping
queries the OneFS user database and retrieves users from the applicable
authentication subsystem, such as local authentication or Active Directory. When
disabled, only local authentication is queried.
The default setting is yes.
--revert-map-full
Restores the --map-full setting to the system default, yes.
--commit-asynchronous {yes|no}
If set to yes, enables commit data operations to be performed asynchronously.
The default setting is no
--revert-commit-asynchronous
Restores the setting to the system default.
--read-only {yes|no}
Determines the default privileges for all clients accessing the export.
If set to yes, you can grant read/write privileges to a specific client by including
the client in the --read-write-clients list.
If set to no, you can make a specific client read-only by including the client in the
--read-only-clients list. The default setting is no.
--revert-read-only
Restores the setting to the system default.
--readdirplus {yes|no}
Applies to NFSv3 only. If set to yes, enables processing of readdir-plus requests.
The default setting is no.
--revert-readdirplus
Restores the setting to the system default.
--read-transfer-max-size <size>
Specifies the maximum read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 512K.
--revert-read-transfer-max-size
Restores the setting to the system default.
--read-transfer-multiple <integer>
Specifies the suggested multiple read size to report to NFSv3 and NFSv4 clients.
Valid values are 0-4294967295. The initial default value is 512.
--revert-read-transfer-multiple
Restores the setting to the system default.
--read-transfer-size <size>
Specifies the preferred read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 128K.
--revert-read-transfer-size
Restores the setting to the system default.
--setattr-asynchronous {yes|no}
If set to yes, performs set-attributes operations asynchronously. The default
setting is no.
--revert-setattr-asynchronous
Restores the setting to the system default.
--time-delta <integer>
Specifies server time granularity, in seconds.
--revert-time-delta
Restores the setting to the system default.
--write-datasync-action {datasync|filesync|unstable}
Applies to NFSv3 and NFSv4 only. Specifies an alternate datasync write method.
The following values are valid:
l datasync
l filesync
l unstable
The default value is datasync, which performs the request as specified.
--revert-write-datasync-action
Restores the setting to the system default.
--write-datasync-reply {datasync|filesync}
Applies to NFSv3 and NFSv4 only. Specifies an alternate datasync reply method.
The following values are valid:
l datasync
l filesync
The default value is datasync (does not respond differently).
--revert-write-datasync-reply
Restores the setting to the system default.
--write-filesync-action {datasync|filesync|unstable}
Applies to NFSv3 and NFSv4 only. Specifies an alternate filesync write method.
The following values are valid:
l datasync
l filesync
l unstable
The default value is filesync, which performs the request as specified.
--revert-write-filesync-action
Restores the setting to the system default.
--write-filesync-reply {filesync}
Applies to NFSv3 and NFSv4 only. Specifies an alternate filesync reply method.
The only valid value is filesync (does not respond differently).
--write-unstable-action {datasync|filesync|unstable}
Specifies an alternate unstable-write method. The following values are valid:
l datasync
l filesync
l unstable
The default value is unstable, which performs the request as specified.
--revert-write-unstable-action
Restores the setting to the system default.
--write-unstable-reply {datasync|filesync|unstable}
Specifies an alternate unstable-reply method. The following values are valid:
l datasync
l filesync
l unstable
The default value is unstable (does not respond differently).
--revert-write-unstable-reply
Restores the setting to the system default.
--write-transfer-max-size <size>
Specifies the preferred read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 512K.
--revert-write-transfer-max-size
Restores the setting to the system default.
--write-transfer-multiple <integer>
Specifies the suggested write transfer multiplier to report to NFSv3 and NFSv4
clients. Valid values are 0–4294967295. The initial default value is 512.
--revert-write-transfer-multiple
Restores the setting to the system default.
--write-transfer-size <size>
Specifies the preferred read transfer size to report to NFSv3 and NFSv4 clients.
Valid values are a number followed by a case-sensitive unit of measure: b for
bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by
default. The maximum value is 4294967295b. The initial default value is 512K.
--revert-write-transfer-size
Restores the setting to the system default.
--zone
Access zone in which the export was originally created.
--force
If set to no (default), a confirmation prompt displays when the command runs. If
set to yes, the command runs without prompting for confirmation.
--verbose
Displays more detailed information.
Options
--zone <string>
Specifies the access zone in which the default settings apply.
Example
To view the currently-configured default export settings, run the following command:
Enabled: False
User: nobody
Primary Group: -
Secondary Groups: -
Map Failure
Enabled: False
User: nobody
Primary Group: -
Secondary Groups: -
Map Full: Yes
Max File Size: 8192.00000P
Name Max Size: 255
No Truncate: No
Read Only: No
Readdirplus: Yes
Return 32Bit File Ids: No
Read Transfer Max Size: 1.00M
Read Transfer Multiple: 512
Read Transfer Size: 128.0K
Security Type: unix
Setattr Asynchronous: No
Snapshot: -
Symlinks: Yes
Time Delta: 1.0 ns
Write Datasync Action: datasync
Write Datasync Reply: datasync
Write Filesync Action: filesync
Write Filesync Reply: filesync
Write Unstable Action: unstable
Write Unstable Reply: unstable
Write Transfer Max Size: 1.00M
Write Transfer Multiple: 512
Write Transfer Size: 512.0K
Options
--lock-protection <integer>
Specifies the number of nodes failures that can happen before a lock might be
lost.
{--force
Options
There are no options for this command.
Example
The following is an example of the report generated by this command.
Options
--nfsv4-domain <string>
Specifies the NFSv4 domain name.
--revert-nfsv4-domain
Returns the --nfsv4-domain setting to the system default ( localhost).
--zone <string>
Specifies the access zone.
{--verbose | -v}
Displays more detailed information.
Example
The following command specifies that the NFS server would accept UIDs/GIDs in
place of user names:
Options
--zone <string>
Specifies the access zone for which you want to view NFSv4-related settings.
Example
The following command specifies that you want to examine NFSv4-related settings for
an access zone named Zone1:
isi_phone_home
Modify the settings for the isi_phone_home feature, which gathers specific node- and
cluster-related information to send to Isilon Technical Support on a weekly basis. This
feature is enabled by default if you have EMC Secure Remote Services (ESRS)
enabled.
Syntax
isi_phone_home
[--enable]
[--disable]
[--logging-level {debug | info | warning | error | critical}]
[--list-file <string>]
[--script-file <string>]
[--create-package]
[--send-data]
[--delete-data]
Options
Note
We recommend that you run only the --enable or --disable options from the
OneFS command-line interface. All others are run automatically when the tool is
enabled, and are provided here for reference in case Isilon Technical Support asks you
for a specific type of information.
{--enable | -e}
Enables isi_phone_home, providing that ESRS is configured and enabled. If
you enabled ESRS when configuring the Isilon cluster, this feature is
automatically enabled.
{--disable | -d}
Disables isi_phone_home.
Receives the name of a Python script file to be run against the cluster. These
script files are located in /usr/local/isi_phone_home/script.
{--create-package | -c}
Groups all the files in the /ifs/data/Isilon_Support/phone_home/data
directory into a gzip file that is copied to /ifs/data/Isilon_Support/
phone_home/pkg.
{--send-data | -s}
Scans /ifs/data/Isilon_Support/phone_home/pkg and uploads any
unsent gzip files to Isilon Technical Support through ESRS.
{--delete-data | -t}
Deletes all gzip files older than 30 days from the /ifs/data/
Isilon_Support/phone_home/pkg directory.
Options
<path>
Specifies an absolute path within the /ifs file system.
CAUTION
You should not create quotas of any type on the /ifs directory. A root-level
quota may result in significant performance degradation.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--hard-threshold <size>
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit. Size is a capacity value formatted
as<integer>[{b | K | M | G | T | P}].
--advisory-threshold <size>
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests. Size is a capacity value formatted
as<integer>[{b | K | M | G | T | P}].
--soft-threshold <size>
Specifies the soft threshold, which allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
Size is a capacity value formatted as<integer>[{b | K | M | G | T | P}].
--soft-grace <duration>
Specifies the soft threshold grace period, which is the amount of time to wait
before disk write requests are denied.
Specify <duration> in the following format:
<integer><units>
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Options
<path>
Specifies an absolute path within the /ifs file system.
default-user
Specifies a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Specifies a master quota that creates a linked quota for every group that
owns data in the directory.
--all
Deletes all quotas. Flag may not be specified with <type> or <path>.
--uid <id>
Deletes a quota by the specified numeric user identifier (UID).
--user <name>
--gid <id>
Deletes a quota by the specified numeric group identifier (GID).
--group <name>
Deletes a quota associated with the group identified by name.
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Deletes a quota associated with the wellknown persona.
--recurse-path-parents
Searches parent paths for quotas.
--recurse-path-children
Searches child paths for quotas.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Options
--user <name>
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
<type>
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--path
Specifies quotas on the specified path.
--recurse-path-parents
Specifies parent paths for quotas.
--recurse-path-children
Specifies child paths for quotas.
--zone <zone>
Specifies quotas in the specified zone.
--limit <integer>
Specifies the number of quotas to display.
--format
Displays quotas in the specified format. The following values are valid:
l table
l json
l csv
l list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, or --sid option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, or --sid option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota that you want to
modify. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--hard-threshold <size>
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit. Size is a capacity value formatted
as<integer>[{b | K | M | G | T | P}].
--clear-hard-threshold
Clears an absolute limit for disk usage.
--advisory-threshold <size>
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests. Size is a capacity value formatted
as<integer>[{b | K | M | G | T | P}].
--clear-advisory-threshold
Clears the advisory threshold.
--soft-threshold <size>
Specifies the soft threshold, which allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
Size is a capacity value formatted as<integer>[{b | K | M | G | T | P}].
--clear-soft-threshold
Clears the soft threshold.
--soft-grace <duration>
Specifies the soft threshold grace period, which is the amount of time to wait
before disk write requests are denied.
Specify <duration> in the following format:
<integer><units>
--zone <string>
The zone used by the quota. Use this parameter only to resolve personas used by
the quota.
{--verbose | -v}
Displays more detailed information.
Note
Use the isi quota quotas notifications disable command to disable all
notifications for a quota.
Syntax
Options
<path>
Specifies an absolute path within the /ifs file system.
<type>
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
{--force | -f}
Skips the confirmation prompt.
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
--action-email-address <address>
Specifies the email address of user to be notified.
{--verbose | -v}
Displays more detailed information.
Options
--path <path>
Deletes quota notifications set on an absolute path within the /ifs file system.
--type
Deletes a quota notification by specified type. The following values are valid:
directory
Specifies a quota for all data in the directory, regardless of owner.
user
Specifies a quota for one specific user. Requires specification of the --
user, --uid, --sid, or --wellknown option.
group
Specifies a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Specifies a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Specifies a master quota that creates a linked quota for every group that
owns data in the directory.
--threshold
Deletes a quota notification by specified threshold. The following values are valid:
hard
Specifies an absolute limit for disk usage.
soft
Specifies the soft threshold.
advisory
Specifies the advisory threshold..
--condition
Deletes a quote notification by the specified condition on which to send a
notification. The following values are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--user <name>
Deletes a quota notification by the specified user name.
--group <name>
Deletes a quota notification by the specified group name.
--gid <id>
Deletes a quota notification by the specified numeric group identifier (GID).
--uid <id>
Deletes a quota notification by the specified numeric user identifier (UID).
--sid <sid>
Deletes a quota notification by the specified security identifier (SID) for selecting
the quota. For example, S-1-5-21-13.
--wellknown <name>
Deletes a quota notification by the specified well-known user, group, machine, or
account name.
{--verbose | -v}
Displays more detailed information.
CAUTION
When you disable all quota notifications, system notification behavior is disabled
also. Use the --clear options to remove specific quota notification rules and fall
back to the system default.
Syntax
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Disables quotas of the specified type. Argument must be specified with the --
path option. The following values are valid:
directory
Specifies a quota for all data in the directory, regardless of owner.
user
Specifies a quota for one specific user. Requires specification of -user, --
uid, --sid, or --wellknown option.
group
Specifies a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Specifies a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Specifies a master quota that creates a linked quota for every group that
owns data in the directory.
--user <name>
Disables a quota associated with the user identified by name.
--gid <id>
--uid <id>
Disables a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting a quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--format
Displays quota notification rules in the specified format. The following values are
valid:
table
json
csv
list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of --group,
--gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--schedule <name>
Specifies the date pattern at which recurring notifications are made.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
s
Specifies seconds
--clear-holdoff
Clears the value for the --holdoff duration.
--action-email-address <address>
Specifies the email address of user to be notified.
{--verbose | -v}
Displays more detailed information.
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory
Creates a quota for all data in the directory, regardless of owner.
user
Creates a quota for one specific user. Requires specification of the --user,
--uid, --sid, or --wellknown option.
group
Creates a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Creates a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Creates a master quota that creates a linked quota for every group that owns
data in the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies quotas of the specified type. Argument must be specified with the --
path option. The following values are valid:
directory
Specifies a quota for all data in the directory, regardless of owner.
user
Specifies a quota for one specific user. Requires specification of -user, --
uid, --sid, or --wellknown option.
group
Specifies a quota for one specific group. Requires specification of the --
group, --gid, --sid, or --wellknown option.
default-user
Specifies a master quota that creates a linked quota for every user who has
data in the directory.
default-group
Specifies a master quota that creates a linked quota for every group that
owns data in the directory.
--user <name>
Specifies a quota associated with the user identified by name.
--group <name>
Specifies a quota associated with the group identified by name.
--gid <id>
Specifies a quota by the numeric group identifier (GID).
--uid <id>
Specifies a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--zone <zone>
Specifies an access zone.
Options
{--verbose | -v}
Displays more detailed information.
Options
--time <string>
Specifies the timestamp of the report.
Specify <time-and-date> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
M
Specifies months
W
Specifies weeks
D
Specifies days
h
Specifies hours
s
Specifies seconds
--generated
Specifies the method used to generate the report. The following values are valid:
live
scheduled
manual
--type
Specifies a report type. The following values are valid:
summary
detail
{--verbose | -v}
Displays more detailed information.
Options
--limit <integer>
Specifies the number of quotas to display.
--format
Displays quotas in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
The fully-qualified domain name for the destination domain you are mapping to.
{--verbose | -v}
Displays more detailed information.
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
--all
Deletes all mapping rules.
{--verbose | -v}
Displays more detailed information.
{force | -f}
Forces the deletion without displaying a confirmation prompt.
Options
{--limit | -l} <integer>
The number of quota mapping settings to display.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
The fully-qualified domain name for the destination domain you are mapping to.
{--verbose | -v}
Displays more detailed information.
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
Options
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold. Applies to
only soft thresholds within the soft-grace period.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer> <units>
--action-email-address <address>
Specifies the email address of user to be notified.
--email-template <path>
Specifies the path in /ifs to the email template.
{--verbose | -v}
Options
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold. Applies to
only soft thresholds within the soft-grace period.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
{--verbose | -v}
Options
{--limit | -l} <integer>
Specifies the number of quota notification rules to display.
--format
Displays quotas in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Displays more detailed information.
[--email-template <path>]
[--clear-email-template]
[--verbose
Options
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold. Applies to
only soft thresholds within the soft-grace period.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
--holdoff <duration>
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
--clear-holdoff
--action-email-address <address>
Specifies the email address of user to be notified.
{--verbose | -v}
Displays more detailed information.
--clear-email-template
Clears the setting for the path to the email template.
Options
--threshold
Specifies the threshold type. The following values are valid:
hard
Sets an absolute limit for disk usage. Attempts to write to disk are generally
denied if the request violates the quota limit.
soft
Specifies the soft threshold. Allows writes to disk above the threshold until
the soft grace period expires. Attempts to write to disk are denied thereafter.
advisory
Sets the advisory threshold. For notification purposes only. Does not enforce
limitations on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values
are valid:
denied
Specifies a notification when a hard threshold or soft threshold outside of its
soft grace period causes a disk write operation to be denied.
exceeded
Specifies a notification when disk usage exceeds the threshold. Applies to
only soft thresholds within the soft-grace period.
violated
Specifies a notification when disk usage exceeds a quota threshold but none
of the other conditions apply.
expired
Specifies a notification when disk usage exceeds the soft threshold and the
soft-grace period has expired.
Options
--schedule <schedule>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
--revert-schedule
Sets the --schedule value to system default.
--scheduled-dir <dir>
Specifies the location where scheduled quota reports are stored.
--revert-scheduled-dir
Sets the --scheduled-dir value to system default.
--scheduled-retain <integer>
Specifies the maximum number of scheduled reports to keep.
--revert-scheduled-retain
Sets the --scheduled-retain value to system default.
--live-dir <dir>
Specifies the location where live quota reports are stored.
--revert-live-dir
Sets the --live-dir value to system default.
--live-retain <integer>
Specifies the maximum number of live quota reports to keep.
--revert-live-retain
Sets the --live-retain value to system default.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Options
--enabled {yes|no}
Specifies whether support ESRS is enabled on the Isilon cluster.
--primary-esrs-gateway <string>
Specifies the primary ESRS gateway server. The gateway server acts as the
single point of entry and exit for IP-based remote support activities and
monitoring notifications. You can specify the gateway as an IPv4 address or the
gateway name.
--secondary-esrs-gateway <string>
Specifies an optional secondary ESRS gateway server that acts as a failover
server. You can specify the gateway as an IPv4 address or the gateway name.
--use-smtp-failover {yes|no}
Specifies whether to send event notifications to a failover SMTP address upon
ESRS transmission failure. The SMTP email address is specified through the isi
email settings modify command.
--email-customer-on-failure {yes|no}
Specifies whether to send an alert to a customer email address upon failure of
other notification methods. The customer email address is specified through the
isi_promptesrs -e command.
--gateway-access-pools <string>...
Specifies the IP address pools on the Isilon cluster that will handle remote support
connections through the ESRS gateway.
The IP address pools must belong to a subnet under groupnet0, which is the
default system groupnet.
Note
We recommend that you designate pools with static IP addresses that are
dedicated to remote connections through ESRS.
--clear-gateway-access-pools
Deletes the list of IP address pools that handle remote support connections.
--add-gateway-access-pools <string>...
Adds one or more IP address pools to the list of pools that will handle remote
support connections through the ESRS gateway.
--remove-gateway-access-pools <string>...
Deletes one or more IP address pools from the list of pools that will handle remote
support connections through the ESRS gateway.
Examples
The following command enables ESRS, specifies an IPv4 address as the primary
gateway, directs OneFS to email the customer if all transmission methods fail, and
removes an IP address pool from the list of pools that handle gateway connections:
Options
This command has no options.
473
OneFS isi commands S through Z
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
--enabled <boolean>
Enables or disables a node's service LED.
--node-lnn <integer>
Specifies the node on which you want to modify the service light status. If
omitted, the local node will be used.
{--verbose | -v}
Displays more detailed information.
Options
--node-lnn <integer>
Specifies the node you want to view. If omitted, service LED status for the local
node is displayed.
isi services
Displays a list of available services. The -l and -a options can be used separately or
together.
Syntax
isi services
[-l | -a]
[<service> [{enable | disable}]]
Options
-l
Lists all available services and the current status of each. This is the default value
for this command.
- a
Lists all services, including hidden services, and the current status of each.
Examples
The following example shows the command to enable a specified hidden service.
isi set
Works similar to chmod, providing a mechanism to adjust OneFS-specific file
attributes, such as the requested protection, or to explicitly restripe files. Files can be
specified by path or LIN.
Syntax
isi set
[-f -F -L -n -v -r -R]
[-p <policy>]
[-w <width>]
[-c {on | off}]
[-g <restripe_goal>]
[-e <encoding>]
[-d <@r drives>]
[-a {<default> | <streaming> | <random> | <custom{1..5}> |
<disabled>}]
[-l {<concurrency> | <streaming> | <random>}]
[--diskpool {<id> | <name>}]
[-A {on | off}]
[-P {on | off}]
[{--strategy | -s} {<avoid> | <metadata> | <metadata-write> |
<data>]
[<file> {<path> | <lin>}]
Options
-f
Suppresses warnings on failures to change a file.
-F
Includes the /ifs/.ifsvar directory content and any of its subdirectories.
Without -F, the /ifs/.ifsvar directory content and any of its subdirectories
are skipped. This setting allows the specification of potentially dangerous,
unsupported protection policies.
-L
Specifies file arguments by LIN instead of path.
-n
Displays the list of files that would be changed without taking any action.
-v
Displays each file as it is reached.
-r
Runs a restripe.
-R
Sets protection recursively on files.
-p <policy>
Specifies protection policies in the following forms:
+M
Where M is the number of node failures that can be tolerated without loss of
data. +M must be a number from, where numbers 1 through 4 are valid.
+D:M
Where D indicates the number of drive failures and M indicates number of
node failures that can be tolerated without loss of data. D must be a number
from 1 through 4 and M must be any value that divides into D evenly. For
example, +2:2 and +4:2 are valid, but +1:2 and +3:2 are not.
Nx
Where N is the number of independent mirrored copies of the data that will
be stored. N must be a number, with 1 through 8 being valid choices.
-w <width>
Specifies the number of nodes across which a file is striped. Typically, w = N + M,
but width can also mean the total of the number of nodes that are used.
You can set a maximum width policy of 32, but the actual protection is still subject
to the limitations on N and M.
-c {on | off}
Specifies whether write-coalescing is turned on.
-g <restripe goal>
Specifies the restripe goal. The following values are valid:
repair
reprotect
rebalance
retune
-e <encoding>
Specifies the encoding of the filename. The following values are valid:
EUC-JP
EUC-JP-MS
EUC-KR
ISO-8859-1
ISO-8859-10
ISO-8859-13
ISO-8859-14
ISO-8859-15
ISO-8859-160
ISO-8859-2
ISO-8859-3
ISO-8859-4
ISO-8859-5
ISO-8859-6
ISO-8859-7
ISO-8859-8
ISO-8859-9
UTF-8
UTF-8-MAC
Windows-1252
Windows-949
Windows-SJIS
-d <@r drives>
Specifies the minimum number of drives that the file is spread across.
-a <value>
Specifies the file access pattern optimization setting. The following values are
valid:
default
streaming
random
custom1
custom2
custom3
custom4
custom5
disabled
-l <value>
Specifies the file layout optimization setting. This is equivalent to setting both the
-a and -d flags.
concurrency
streaming
random
-A {on | off}
Specifies whether file access and protections settings should be managed
manually.
-P {on | off}
Specifies whether the file inherits values from the applicable file pool policy.
metadata
Writes both file data and metadata to HDDs. One mirror of the metadata for
the file is on SSD storage if possible, but the strategy for data is to avoid
SSD storage.
metadata-write
Writes file data to HDDs and metadata to SSDs, when available. All copies of
metadata for the file are on SSD storage if possible, and the strategy for data
is to avoid SSD storage.
data
Uses SSD node pools for both data and metadata. Both the metadata for the
file and user data, one copy if using mirrored protection and all blocks if FEC,
are on SSD storage if possible.
Options
<level>
The logging level for the new filter. Valid logging levels are:
l always
l error
l warning
l info
l verbose
l debug
l trace
Options
<id>
Deletes a specific SMB log filter, by ID.
<level>
Deletes all SMB log filters at a specified level. The following levels are valid:
l always
l error
l warning
l info
l verbose
l debug
l trace
--all
Deletes all SMB log-level filters.
{--force | -f}
Skips the delete confirmation prompt.
{verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays the specified number of SMB log-level filters.
{--no-header | -a}
Does not display headers in comma-separated or table format.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<id>
The ID of the SMB log-level filter to view.
l verbose
l debug
l trace
Options
<level>
Specifies a log level to set for the SMB service. The following levels are valid:
l always
l error
l warning
l info
l verbose
l debug
l trace
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Note
To view a list of open files, run the isi smb openfiles list command.
Syntax
Options
<id>
Specifies the ID of the open file to close.
{--force | -f}
Suppresses command-line prompts and messages.
Examples
The following command closes a file with an ID of 32:
Options
{--limit | -l} <integer>
Displays no more than the specified number of smb openfiles.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Note
Any open files are automatically closed before an SMB session is deleted.
Syntax
Options
<computer-name>
Required. Specifies the computer name. If a --user, --uid, or --sid option is
not specified, the system deletes all SMB sessions associated with this computer.
--user <string>
Specifies the name of the user. Deletes only those SMB sessions to the computer
that are associated with the specified user.
--uid <id>
Specifies a numeric user identifier. Deletes only those SMB sessions to the
computer that are associated with the specified user identifier.
--sid <sid>
Specifies a security identifier. Deletes only those SMB sessions to the computer
that are associated with the security identifier.
{--force | -f}
Specifies that the command execute without prompting for confirmation.
Examples
The following command deletes all SMB sessions associated with a computer named
computer1:
The following command deletes all SMB sessions associated with a computer named
computer1 and a user named user1:
Note
Any open files are automatically closed before an SMB session is deleted.
Syntax
Options
<user>
Required. Specifies the user name. If the --computer-name option is omitted,
the system deletes all SMB sessions associated with this user.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Examples
The following command deletes all SMB sessions associated with a user called user1:
The following command deletes all SMB sessions associated with a user called user1
and a computer called computer1:
Options
{--limit | -l} <integer>
Specifies the maximum number of SMB sessions to list.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
[--onefs-cpu-multiplier <integer>]
[--revert-onefs-cpu-multiplier]
[--onefs-num-workers <integer>]
[--revert-onefs-num-workers]
[--reject-unencrypted-access {yes | no}]
[--revert-reject-unencrypted-access]
[--require-security-signatures {yes | no}]
[--revert-require-security-signatures]
[--server-side-copy {yes | no}]
[--revert-server-side-copy]
[--server-string <string>]
[--revert-server-string]
[--support-multichannel {yes | no}]
[--revert-support-multichannel]
[--support-netbios {yes | no}]
[--revert-support-netbios]
[--support-smb2 {yes | no}]
[--revert-support-smb2]
[--support-smb3-encryption {yes | no}]
[--revert-support-smb3-encryption]
[--verbose]
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--revert-dot-snap-accessible-child
Sets the value to the system default for --dot-snap-accessible-child.
--revert-dot-snap-accessible-root
Sets the value to the system default for --dot-snap-accessible-root.
--revert-dot-snap-visible-child
Sets the value to the system default for --dot-snap-visible-child.
--revert-dot-snap-visible-root
Sets the value to the system default for --dot-snap-visible-root.
--guest-user <integer>
Specifies the fully qualified user to use for guest access.
--revert-guest-user
Sets the value to the system default for --guest-user.
--onefs-cpu-multiplier <integer>
Specifies the number of OneFS worker threads to configure based on the number
of CPUs. Valid numbers are 1-4.
--revert-onefs-cpu-multiplier
Sets the value to the system default for --onefs-cpu-multiplier.
--onefs-num-workers <integer>
Specifies the number of OneFS worker threads that are allowed to be configured.
Valid numbers are 0-1024. If set to 0, the number of SRV workers will equal the
value specified by --onefs-cpu-multiplier times the number of CPUs.
--revert-onefs-num-workers
Sets the value to the system default for --onefs-num-workers.
--revert-require-security-signatures
Sets the value to the system default for --require-security-signatures.
--revert-server-side-copy
Sets the value to the system default for --server-side-copy.
--server-string <string>
--revert-support-smb2
Sets the value to the system default for --support-smb2.
--revert-support-smb3-encryption
Sets the value to the system default for --support-smb3-encryption.
Options
There are no options for this command.
[--revert-allow-delete-readonly]
[--allow-execute-always {yes | no}]
[--revert-allow-execute-always]
[--ca-timeout <integer>]
[--revert-ca-timeout]
[--strict-ca-lockout {yes | no}]
[--revert-strict-ca-lockout]
[--ca-write-integrity {none | write-read-coherent | full}]
[--revert-ca-write-integrity]
[--change-notify {all | norecurse | none}]
[--revert-change-notify]
[--create-permissions {"default acl" | "inherit mode bits" | "use
create mask and mode"}]
[--revert-create-permissions]
[--directory-create-mask <integer>]
[--revert-directory-create-mask]
[--directory-create-mode <integer>]
[--revert-directory-create-mode]
[--file-create-mask <integer>]
[--revert-file-create-mask]
[--file-create-mode <integer>]
[--revert-file-create-mode]
[--file-filtering-enabled {yes | no}]
[--revert-file-filtering-enabled]
[--file-filter-extensions <string>]
[--clear-file-filter-extensions]
[--add-file-filter-extensions <string>]
[--remove-file-filter-extensions <string>]
[--revert-file-filter-extensions]
[--file-filter-type {deny | allow}
[--revert-file-filter-type]
[--hide-dot-files {yes | no}]
[--revert-hide-dot-files]
[--host-acl <host-acl>]
[--revert-host-acl]
[--clear-host-acl]
[--add-host-acl <string>]
[--remove-host-acl <string>]
[--impersonate-guest {always | "bad user" | never}]
[--revert-impersonate-guest]
[--impersonate-user <string>]
[--revert-impersonate-user]
[--mangle-byte-start <integer>]
[--revert-mangle-byte-start]
[--mangle-map <mangle-map>]
[--revert-mangle-map]
[--clear-mangle-map]
[--add-mangle-map <string>]
[--remove-mangle-map <string>]
[--ntfs-acl-support {yes | no}]
[--revert-ntfs-acl-support]
[--oplocks {yes | no}]\
[--revert-oplocks]
[--support-smb3-encryption {yes | no}]
[--revert-support-smb3-encryption]
[--strict-flush {yes | no}]
[--revert-strict-flush]
[--strict-locking {yes | no}]
[--revert-strict-locking]
[--zone <string>]
Options
--access-based-enumeration {yes | no}
Specifies whether access-based enumeration is enabled.
--revert-access-based-enumeration
--ca-timeout <integer>
The amount of time, in seconds, a persistent handle is retained after a client is
disconnected or a server fails. The default is 120 seconds.
--revert-ca-timeout
Sets the value to the system default for --ca-timeout.
--revert-strict-ca-lockout
Sets the value to the system default for --strict-ca-lockout.
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--revert-change-notify
Sets the value to the system default for --change-notify.
--directory-create-mask <integer>
Defines which mask bits are applied when a directory is created.
--revert-directory-create-mask
Sets the value to the system default for --directory-create-mask.
--directory-create-mode <integer>
Defines which mode bits are applied when a directory is created.
--revert-directory-create-mode
Sets the value to the system default for --directory-create-mode.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--file-create-mode <integer>
Defines which mode bits are applied when a file is created.
--revert-file-create-mode
Sets the value to the system default for --file-create-mode.
--revert-file-filtering-enabled
Sets the value for the system default of --file-filtering-enabled.
--revert-file-filter-type
--file-filter-extensions <string>
Specifies the list of file types to deny or allow writes to the share, depending on
the setting of --file-filter-type. File types may be specified in a list of
comma separated values.
--clear-file-filter-extensions
Clears the list of file filtering extensions for the share.
--add-file-filter-extensions <string>
Adds entries to the list of file filter extensions. Repeat for each file extension to
add.
--remove-file-filter-extensions <string>
Removes entries to the list of file filter extensions. Repeat for each file extension
to remove.
--revert-file-filter-extensions
Sets the value for the system default of --file-filter-extensions.
--host-acl <string>
Specifies which hosts are allowed access. Specify --host-acl for each
additional host ACL clause. This will replace any existing ACL.
--revert-host-acl
Sets the value to the system default for --host-acl.
--clear-host-acl <string>
Clears the value for an ACL expressing which hosts are allowed access.
--add-host-acl <string>
Adds an ACE to the already-existing host ACL. Specify --add-host-acl for
each additional host ACL clause to be added.
--remove-host-acl <string>
Removes an ACE from the already-existing host ACL. Specify --remove-host-
acl for each additional host ACL clause to be removed.
--revert-impersonate-guest
Sets the value to the system default for --impersonate-guest.
--impersonate-user <string>
Allows all file access to be performed as a specific user. This must be a fully
qualified user name.
--revert-impersonate-user
Sets the value to the system default for --impersonate-user.
--mangle-byte-start <string>
Specifies the wchar_t starting point for automatic invalid byte mangling.
--revert-mangle-byte-start
Sets the value to the system default for --mangle-byte-start.
--mangle-map <string>
Maps characters that are valid in OneFS but are not valid in SMB names.
--revert-mangle-map
Sets the value to the system default for --mangle-map.
--clear-mangle-map <string>
Clears the values for character mangle map.
--add-mangle-map <string>
Adds a character mangle map. Specify --add-mangle-map for each additional
Add character mangle map.
--remove-mangle-map <string>
Removes a character mangle map. Specify --remove-mangle-map for each
additional Remove character mangle map.
--revert-support-smb3-encryption
Sets the value to the system default for --support-smb3-encryption.
--revert-strict-locking
Sets the value to the system default for --strict-locking.
--zone <string>
Specifies the name of the access zone.
Options
--zone <string>
Specifies the name of the access zone. Displays only the settings for shares in the
specified zone.
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--revert-require-security-signatures
Sets the value to the system default for --require-security-signatures.
--revert-server-side-copy
Sets the value to the system default for --server-side-copy.
--revert-support-smb2
Sets the value to the system default for --support-smb2.
--zone <string>
Access zone.
Options
--zone <string>
The name of the access zone for which you are viewing SMB settings.
Options
<name>
Required. Specifies the name for the new SMB share.
<path>
Required. Specifies the full path of the SMB share to create, beginning at /ifs.
--zone <string>
Specifies the access zone the new SMB share is assigned to. If no access zone is
specified, the new SMB share is assigned to the default System zone.
--create-path
Creates the SMB-share path if one doesn't exist.
--host-acl <string>
Specifies the ACL that defines host access. Specify --host-acl for each
additional host ACL clause.
--description <string>
Specifies a description for the SMB share.
--directory-create-mask <integer>
Creates home directories automatically.
--directory-create-mask <integer>
Defines which mask bits are applied when a directory is created.
Allows guest access to the share. The acceptable values are always, "bad
user", and never.
--ca-timeout <integer>
The amount of time, in seconds, a persistent handle is retained after a client is
disconnected or a server fails. The default is 120 seconds.
--mangle-byte-start <string>
Specifies the wchar_t starting point for automatic invalid byte mangling.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
--mangle-map <string>
Maps characters that are valid in OneFS but are not valid in SMB names.
--impersonate-user <string>
Allows all file access to be performed as a specific user. This value must be a fully
qualified user name.
--directory-create-mode <integer>
Defines which mode bits are applied when a directory is created.
--file-create-mode <integer>
Defines which mode bits are applied when a file is created.
--file-filter-extensions <string>
Specifies the list of file extensions to deny or allow writes to the share, depending
on the setting of --file-filter-type. File types may be specified in a list of
comma separated values.
Options
<share>
Specifies the name of the SMB share to delete.
--zone <string>
Specifies the access zone the SMB share is assigned to. If no access zone is
specified, the system deletes the SMB share with the specified name assigned to
the default System zone, if found.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Examples
The following command deletes a share named "test-smb" in the "example-zone"
access zone without displaying a warning prompt:
Options
--zone <string>
Specifies the access zone. Displays all SMB shares in the specified zone. If no
access zone is specified, the system displays all SMB shares in the default
System zone.
{--descending | -d}
Sorts the data in descending order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--verbose | -v
Displays more detailed information.
Options
<share>
Required. Specifies the name of the SMB share to modify.
--name <name>
Specifies the name for the SMB share.
--path <path>
Specifies a new path for the SMB share, starting in /ifs.
--zone <string>
Specifies the access zone that the SMB share is assigned to. If no access zone is
specified, the system modifies the SMB share with the specified name assigned
to the default System zone, if found.
--new-zone <string>
Specifies the new access zone that SMB share will be reassigned to.
--host-acl <host-acl>
An ACL expressing which hosts are allowed access. Specify --host-acl for
each additional host ACL clause.
--revert-host-acl
Sets the value to the system default for --host-acl.
--clear-host-acl
Clears the value of an ACL that expresses which hosts are allowed access.
--add-host-acl <string>
Adds an ACL expressing which hosts are allowed access. Specify --add-host-
acl for each additional host ACL clause to add.
--remove-host-acl <string>
Removes an ACL expressing which hosts are allowed access. Specify --remove-
host-acl for each additional host ACL clause to remove.
--description <string>
The description for this SMB share.
--directory-create-mask <integer>
Specifies the directory create mask bits.
--revert-directory-create-mask
Sets the value to the system default for --directory-create-mask.
--ca-timeout <integer>
The amount of time, in seconds, a persistent handle is retained after a client is
disconnected or a server fails. The default is 120 seconds.
--revert-ca-timeout
Sets the value to the system default for --ca-timeout.
persistent handles, but discards them if any client other than the original opener
attempts to open the file. This option is only relevant if --continuously-
available was set to yes when the share was created. The default is yes.
--revert-strict-ca-lockout
Sets the value to the system default for --strict-ca-lockout.
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--mangle-byte-start <interger>
Specifies the wchar_t starting point for automatic byte mangling.
--revert-mangle-byte-start
Sets the value to the system default for --mangle-byte-start.
--file-create-mask <integer>
Specifies the file create mask bits.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--mangle-map <mangle-map>
The character mangle map. Specify --mangle-map for each additional character
mangle map.
--revert-mangle-map
Sets the value to the system default for --mangle-map.
--clear-mangle-map
--add-mangle-map <string>
Adds a character mangle map. Specify --add-mangle-map for each additional
Add character mangle map.
--remove-mangle-map <string>
Removes a character mangle map. Specify --remove-mangle-map for each
additional Remove character mangle map.
--impersonate-user <string>
The user account to be used as a guest account.
--revert-impersonate-user
Sets the value to the system default for --impersonate-user.
--directory-create-mode <integer>
Specifies the directory create mode bits.
--revert-directory-create-mode
Sets the value for the system default of --directory-create-mode.
--file-create-mode <integer>
Specifies the file create mode bits.
--revert-file-create-mode
Sets the value for the system default of --file-create-mode.
--revert-file-filtering-enabled
--revert-file-filter-type
Sets the value for the system default of --file-filter-type.
--file-filter-extensions <string>
Specifies the list of file types to deny or allow writes to the share, depending on
the setting of --file-filter-type. File types may be specified in a list of
comma separated values.
--clear-file-filter-extensions
Clears the list of file filtering extensions for the share.
--add-file-filter-extensions <string>
Adds entries to the list of file filter extensions. Repeat for each file extension to
add.
--remove-file-filter-extensions <string>
Removes entries to the list of file filter extensions. Repeat for each file extension
to remove.
--revert-file-filter-extensions
Sets the value for the system default of --file-filter-extensions.
{--verbose | -v}
Displays more detailed information.
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Options
<share>
Required. Specifies the SMB share name.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
{--force | -f}
Specifies that you want the command to execute without prompting for
confirmation.
{--verbose | -v}
Displays more detailed information.
Options
<share>
Specifies the name of the SMB share to display.
--zone <zone>
Specifies the access zone to display.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <integer>
Specifies a numeric group identifier.
--uid <integer>
Specifies a numeric user identifier.
--sid <string>
Specifies a security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
Options
<share>
Specifies the name of the SMB share to view.
--zone <string>
Specifies the access zone that the SMB share is assigned to. If no access zone is
specified, the system displays the SMB share with the specified name assigned to
the default System zone, if found.
Options
<name>
Specifies the a name for the alias.
<target>
Assigns the alias to the specified snapshot or to the live version of the file system.
Specify as a snapshot ID or name. To target the live version of the file system,
specify LIVE.
{--verbose | -v}
Displays more detailed information.
Options
<alias>
Deletes the snapshot alias of the specified name.
Specify as a snapshot-alias name or ID.
--all
Deletes all snapshot aliases.
{--force | -f}
Runs the command without prompting you to confirm that you want to delete the
snapshot alias.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
id
Sorts output by the ID of the snapshot alias.
name
Sorts output by the name of the snapshot alias.
target_id
Sorts output by the ID of the snapshot that the snapshot alias is assigned to.
target_name
Sorts output by the name of the snapshot that the snapshot alias is assigned
to.
created
Sorts output by the date the snapshot alias was created.
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<alias>
Modifies the specified snapshot alias.
Specify as a snapshot-alias name or ID.
--name <name>
Specifies a new name for the snapshot alias.
--target <snapshot>
Reassigns the snapshot alias to the specified snapshot or the live version of the
file system.
Specify as a snapshot ID or name. To target the live version of the file system,
specify LIVE.
{--verbose | -v}
Displays more detailed information.
Options
<alias>
Displays detailed information about the specified snapshot alias.
Specify as a snapshot-alias name or ID.
Note
It is recommended that you do not create snapshot locks and do not use this
command. If the maximum number of locks on a snapshot is reached, some
applications, such as SyncIQ, might not function properly.
Syntax
Options
<snapshot>
Specifies the name of the snapshot to apply this lock to.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
CAUTION
It is recommended that you do not delete snapshot locks and do not run this
command. Deleting a snapshot lock that was created by OneFS might result in
data loss.
Syntax
Options
<snapshot>
Deletes a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot lock.
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
Options
<snapshot>
Displays all locks belonging to the specified snapshot.
Specify as a snapshot name.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
id
Sorts output by the ID of a snapshot lock.
comment
Sorts output alphabetically by the description of a snapshot lock.
expires
Sorts output by the length of time that a lock endures on the cluster before
being automatically deleted.
count
Sorts output by the number of times that a lock is held.
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
CAUTION
It is recommended that you do not modify the expiration date of snapshot locks
and do not run this command. Modifying the expiration date of a snapshot lock
that was created by OneFS might result in data loss.
Syntax
Options
<snapshot>
Modifies a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
H
Specifies hours
--clear-expires
Removes the duration period for the snapshot lock. If specified, the snapshot lock
will exist on the cluster indefinitely.
{--verbose | -v}
Displays a message confirming that the snapshot lock was modified.
Examples
The following command causes a snapshot lock applied to Wednesday_Backup to
expire in three weeks:
Options
<snapshot>
Specifies the snapshot to view locks for.
Specify as a snapshot name or ID.
<id>
Displays the specified lock.
Specify as a snapshot lock ID.
Options
<name>
Specifies a name for the snapshot schedule.
<path>
Specifies the path of the directory to include in the snapshots.
<pattern>
Specifies a naming pattern for snapshots created according to the schedule.
<schedule>
Specifies how often snapshots are created.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
--alias <alias>
Specifies an alias for the latest snapshot generated based on the schedule. The
alias enables you to quickly locate the most recent snapshot that was generated
according to the schedule.
Specify as any string.
Specifies how long snapshots generated according to the schedule are stored on
the cluster before OneFS automatically deletes them.
Specify in the following format:
<integer><units>
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
{--verbose | -v}
Displays a message confirming that the snapshot schedule was created.
Options
<schedule-name>
Deletes the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
<all>
Deletes all snapshot schedules.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot schedule.
{--verbose | -v}
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
id
Sorts output by the ID of a snapshot schedule.
name
Sorts output alphabetically by the name of a snapshot schedule.
path
Sorts output by the absolute path of the directory contained by snapshots
created according to a schedule.
pattern
Sorts output alphabetically by the snapshot naming pattern assigned to
snapshots generated according to a schedule.
schedule
Sorts output alphabetically by the schedule. For example, "Every week"
precedes "Yearly on January 3rd"
duration
Sorts output by the length of time that snapshots created according to the
schedule endure on the cluster before being automatically deleted.
alias
Sorts output alphabetically by the name of the alias assigned to the most
recent snapshot generated according to the schedule.
next_run
Sorts output by the next time that a snapshot will be created according to
the schedule.
next_snapshot
Sorts output alphabetically by the name of the snapshot that is scheduled to
be created next.
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<schedule-name>
Modifies the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
--name <name>
Specifies a new name for the schedule.
Specify as any string.
--path <path>
Specifies a new directory path for this snapshot schedule. If specified, snapshots
generated by the schedule will contain only this directory path.
Specify as a directory path.
--pattern <naming-pattern>
Specifies a pattern by which snapshots created according to the schedule are
named.
--schedule <schedule>
Specifies how often snapshots are created.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
<integer><units>
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
--clear-duration
Removes the duration period for snapshots created according to the schedule. If
specified, generated snapshots will exist on the cluster indefinitely.
{--verbose | -v}
Displays a message confirming that the snapshot schedule was modified.
Options
{--begin | -b} <timestamp>
Displays only snapshots that are scheduled to be generated after the specified
date.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are
scheduled to be generated after the current time.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are
scheduled to be generated before 30 days after the begin time.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-
separated value (CSV), or list format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<schedule-name>
Displays information about the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
Options
--service {enable | disable}
Determines whether snapshots can be generated.
Note
--reserve <integer>
Specifies the percentage of the file system to reserve for snapshot usage.
Specify as a positive integer between 1 and 100.
Note
This option limits only the amount of space available to applications other than
SnapshotIQ. It does not limit the amount of space that snapshots are allowed to
occupy. Snapshots can occupy more than the specified percentage of system
storage space.
{--verbose | -v}
Displays a message confirming which snapshot settings were modified.
Options
There are no options for this command.
Options
<path>
Specifies the path of the directory to include in this snapshot.
--name <name>
Specifies a name for the snapshot.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><units>
Specifies an alias for this snapshot. A snapshot alias is an alternate name for a
snapshot.
Specify as any string.
{--verbose | -v}
Displays a message confirming that the snapshot was created.
Options
--all
Deletes all snapshots.
--snapshot <snapshot>
Deletes the specified snapshot.
Specify as a snapshot name or ID.
--schedule <schedule>
Deletes all snapshots created according to the specified schedule.
Specify as a snapshot schedule name or ID.
--type <type>
Deletes all snapshots of the specified type.
The following types are valid:
alias
Deletes all snapshot aliases.
real
Deletes all snapshots.
{--force | -f}
Does not prompt you to confirm that you want to delete the snapshot.
{--verbose | -v}
Displays a message confirming that the snapshot was deleted.
Examples
The following command deletes newSnap1:
Options
--state <state>
Displays only snapshots and snapshot aliases that exist in the specified state.
The following states are valid:
all
Displays all snapshots and snapshot aliases that are currently occupying
space on the cluster.
active
Displays only snapshots and snapshot aliases that have not been deleted.
deleting
Displays only snapshots that have been deleted but are still occupying space
on the cluster. The space occupied by deleted snapshots will be freed the
next time the snapshot delete job is run.
--sort <attribute>
Sorts command output by the specified attribute.
The following attributes are valid:
id
Sorts output by the ID of a snapshot.
name
Sorts output alphabetically by the name of a snapshot.
path
Sorts output by the absolute path of the directory contained in a snapshot.
has_locks
Sorts output by whether any snapshot locks have been applied to a snapshot.
schedule
If a snapshot was generated according to a schedule, sorts output
alphabetically by the name of the snapshot schedule.
target_id
If a snapshot is an alias, sorts output by the snapshot ID of the target
snapshot instead of the snapshot ID of the alias.
target_name
If a snapshot is an alias, sorts output by the name of the target snapshot
instead of the name of the alias.
created
Sorts output by the time that a snapshot was created.
expires
Sorts output by the time at which a snapshot is scheduled to be
automatically deleted.
size
Sorts output by the amount of disk space taken up by a snapshot.
shadow_bytes
Sorts output based on the amount of data that a snapshot references from
shadow stores. Snapshots reference shadow store data if a file contained in a
snapshot is cloned or a snapshot is taken of a cloned file.
pct_reserve
Sorts output by the percentage of the snapshot reserve that a snapshot
occupies.
pct_filesystem
Sorts output by the percent of the file system that a snapshot occupies.
state
Sorts output based on the state of snapshots.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as
the total amount of storage space consumed by snapshots.
{--verbose | -v}
Options
<snapshot>
Modifies the specified snapshot or snapshot alias.
Specify as the name or ID of a snapshot or snapshot alias.
--name <name>
Specifies a new name for the snapshot or snapshot alias.
Specify as any string.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
--clear-expires
Removes the expiration date from the snapshot, allowing the snapshot to exist on
the cluster indefinitely.
You cannot modify the expiration date of a snapshot alias.
{--verbose | -v}
Displays a message confirming that the snapshot or snapshot alias was modified.
Options
<snapshot>
Displays information about the specified snapshot.
Specify as a snapshot name or ID.
Options
--service {yes | no}
--system-location <string>
The location of the SNMP system.
--revert-system-location
Sets --system-location to the system default.
--system-contact <string>
A valid email address for the system owner.
--revert-system-contact
Sets --system-contact to the system default.
--set-snmp-v3-password
Specify --snmp-v3-password interactively.
Example
To view the currently-configured SNMP settings, run the following command:
Options
--numeric
If text identifiers of local hosts, remote clients, or users are in the list of columns
to display (the default setting is for them to be displayed), display the unresolved
numeric equivalent of these columns.
--local-addresses <string>
Specifies local IP addresses for which statistics will be reported.
--local-names <string>
Specifies local host names for which statistics will be reported.
--remote-addresses <string>
Specifies remote IP addresses for which statistics will be reported.
--remote-names <string>
Specifies remote client names for which statistics will be reported.
--user-ids <string>
Specifies user ids for which statistics will be reported. The default setting is all
users.
--user-names <string>
Specifies user names for which statistics will be reported. The default setting is all
users.
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified
in a comma-separated list, for example --protocols http,papi. The
following values are valid:
l all
l external
l ftp
l hdfs
l http
l internal
l irp
l jobd
l lsass_in
l lsass_out
l nlm
l nfs3
l nfs4
l papi
l siq
l smb1
l smb2
--classes <string>
Specify which operation classes to report statistics on. The default setting is all
classes. The following values are valid:
other
File-system information for other uncategorized operations
write
File and stream writing
read
File and stream reading
namespace_read
Attribute stat and ACL reads; lookup directory reading
namespace_write
Renames; attribute setting; permission time and ACL writes
{--degraded | -d}
Causes the report to continue if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option
also disables the display of units within the data table.
{--interval | -i}<float>
Reports data at the interval specified in seconds.
Note
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
l Node
l {Proto | protocol}
l Class
l {UserId | user.id}
l {UserName | user.name}
l {LocalAddr | local_addr}
l {LocalName | local_name}
l {RemoteAddr | remote_addr}
l {RemoteName | remote_name}
--output <column>
Specifies which columns to display. The following values are valid:
{NumOps | num_operations}
Displays the number of times an operation has been performed.
{Ops | operation_rate}
Displays the rate at which an operation has been performed. Displayed in
operations per second.
{InMax | in_max}
Displays the maximum input (received) bytes for an operation.
{InMin | in_min}
Displays the minimum input (received) bytes for an operation.
In
Displays the rate of input for an operation since the last time isi
statistics collected the data. Displayed in bytes per second.
{InAvg | in_avg}
Displays the average input (received) bytes for an operation.
{OutMax | out_max}
Displays the maximum output (sent) bytes for an operation.
{OutMin | out_min}
Displays the minimum output (sent) bytes for an operation.
Out
Displays the rate of output for an operation since the last time isi
statistics collected the data. Displayed in bytes per second.
{OutAvg | out_avg}
Displays the average output (sent) bytes for an operation.
{TimeMax | time_max}
Displays the maximum elapsed time taken to complete an operation.
Displayed in microseconds.
{TimeMin | time_min}
Displays the minimum elapsed time taken to complete an operation.
Displayed in microseconds.
{TimeAvg | time_avg}
Displays the average elapsed time taken to complete an operation. Displayed
in microseconds.
Node
Displays the node on which the operation was performed.
{Proto | protocol}
Displays the protocol of the operation.
Class
Displays the class of the operation.
{UserID | user.id}
Displays the numeric UID of the user issuing the operation request.
{UserName | user.name}
Displays the resolved text name of the UserID. If resolution cannot be
performed, UNKNOWN is displayed.
{LocalAddr | local_addr}
Displays the local IP address of the user issuing the operation request.
{LocalName | local_name}
Displays the local host name of the user issuing the operation request.
{RemoteAddr | remote_addr}
Displays the remote IP address of the user issuing the operation request.
{RemoteName | remote_name}
Displays the remote client name of the user issuing the operation request.
--sort <column>
Specifies how rows are ordered. The following values are valid:
l {NumOps | num_operations}
l {Ops | operation_rate}
l {InMax | in_max}
l {InMin | in_min}
l In
l {InAvg | in_avg}
l {OutMax | out_max}
l {OutMin | out_min}
l Out
l {OutAvg | out_avg}
l {TimeMax | time_max}
l {TimeMin | time_min}
l {TimeAvg | time_avg}
l Node
l {Proto | protocol}
l Class
l {UserID | user.id}
l {UserName | user.name}
l {LocalAddr | local_addr}
l {LocalName | local_name}
l {RemoteAddr | remote_addr}
l {RemoteName | remote_name}
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
--type <string>
Specifies the drive types for which statistics will be reported. The default setting
is all drives. The following values are valid:
l sata
l sas
l ssd
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this
parameter also disables the display of units within the data table.
Note
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--output <column>
Specifies which columns to display. The following values are valid:
l {Timestamp | time}
l {Drive | drive_id}
l {Type | }
l {BytesIn | bytes_in}
l {SizeIn | xfer_size_in}
l {OpsOut | xfers_out}
l {BytesOut | bytes_out}
l {SizeOut | xfer_size_out}
l {TimeAvg | access_latency}
l {Slow | access_slow}
l {TimeInQ | iosched_latency}
l {Queued | iosched_queue}
l {Busy | used_bytes_percent}
l {Inodes | used_inodes}
--sort <column>
Specifies how the rows are ordered. The following values are valid:
l {Timestamp | time}
l {Drive | drive_id}
l {Type | }
l {BytesIn | bytes_in}
l {SizeIn | xfer_size_in}
l {OpsOut | xfers_out}
l {BytesOut | bytes_out}
l {SizeOut | xfer_size_out}
l {TimeAvg | access_latency}
l {Slow | access_slow}
l {TimeInQ | iosched_latency}
l {Queued | iosched_queue}
l {Busy | used_bytes_percent}
l {Inodes | used_inodes}
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
[--pathdepth <integer>]
[--maxpath <integer>]
[--classes <string>]
[--numeric]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit <integer>]
[--long]
[--totalby <column>]
[--output <column>]
[--sort <column>
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--events <string>
Specifies which event types for the specified information are reported. The
following values are valid:
blocked
Access to the LIN was blocked waiting for a resource to be released by
another operation. Class is other.
contended
A LIN is experiencing cross-node contention; it is being accessed
simultaneously through multiple nodes. Class is other.
deadlocked
The attempt to lock the LIN resulted in deadlock. Class is other.
getattr
A file or directory attribute has been read. Class is namespace_read.
link
The LIN has been linked into the file system; the LIN associated with this
event is the parent directory and not the linked LIN. Class is
namespace_write.
lock
The LIN is locked. Class is other.
lookup
A name is looked up in a directory; the LIN for the directory searched is the
one associated with the event. Class is namespace_read.
read
A read was performed. Class is read.
rename
A file or directory was renamed. The LIN associated with this event is the
directory where the rename took place for either the source directory or the
destination directory, if they differ. Class is namespace_write.
setattr
A file or directory attribute has been added, modified, or deleted. Class is
namespace_write.
unlink
A file or directory has been unlinked from the file system, the LIN associated
with this event is the parent directory of the removed item. Class is
namespace_write.
write
A write was performed. Class is write.
-pathdepth <integer>
Reduces paths to the specified depth.
--maxpath <integer>
Specifies the maximum path length to look up in the file system.
--classes <string>
Specifies which classes for the specified information will be reported. The default
setting is all classes. The following values are valid:
write
File and stream writing
read
File and stream reading
namespace_write
Renames; attribute setting; permission, time, and ACL writes
namespace_read
Attribute, stat, and ACL reads; lookup, directory reading
other
File-system information
--numeric
If text identifiers of local hosts, remote clients, or users are in the list of columns
to display (the default setting is for them to be displayed), display the unresolved
numeric equivalent of these columns.
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option
also disables the display of units within the data table.
Note
--limit <integer>
Displays only the specified number of entries after totaling and ordering.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
l Node
l {Event | event_name}
l {Class | class_name}
l LIN
l Path
--output <column>
Specifies the columns to display. The following values are valid:
{Ops | operation_rate}
Displays the rate at which an operation has been performed. Displayed in
operations per second.
Node
Displays the node on which the operation was performed.
{Event | event_name}
Displays the name of the event.
{ Class | class_name}
Displays the class of the operation.
LIN
Displays the LIN for the file or directory associated with the event.
Path
Displays the path associated with the event LIN.
--sort <column>
Specifies how rows are ordered. The following values are valid:
l {Ops | operation_rate}
l Node
l {Event | event_name}
l {Class | class_name}
l LIN
l Path
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l}<integer>
Limits the number of statistics to display.
Note
{--noheader | -a}
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified
in a comma-separated list, for example --protocols http,papi. The
following values are valid:
l nfs3
l smb1
l nlm
l ftp
l http
l siq
l smb2
l nfs4
l papi
l jobd
l irp
l lsass_in
l lsass_out
l hdfs
l console
l ssh
{--limit | -l}<integer>
Limits the number of statistics to display.
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
--classes <class>
Specifies which operation classes to report statistics on. The following values are
valid:
other
File-system information. Multiple values can be specified in a comma-
separated list.
write
File and stream writing
read
File and stream reading
create
File link node stream and directory creation
delete
File link node stream and directory deletion
namespace_read
Attribute stat and ACL reading; lookup directory reading
namespace_write
Renames; attribute setting; permission time and ACL writes
file_state
Open, close; locking: acquire, release, break, check; notification
session_state
Negotiation inquiry or manipulation of protocol connection or session state
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified
in a comma-separated list, for example --protocols http,papi. The
following values are valid:
l nfs3
l smb1
l nlm
l ftp
l http
l siq
l smb2
l nfs4
l papi
l jobd
l irp
l lsass_in
l lsass_out
l hdfs
l all
l internal
l external
--operations <operation>
Specifies the operations on which statistics are reported. To view a list of valid
values, run the isi statistics list operations command. Multiple
values can be specified in a comma-separated list.
--zero
Shows table entries with no values.
{--degraded | -d}
Causes the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option
also disables the display of units in the data table.
{--interval | -i} <float>
Reports data at the interval specified in seconds.
Note
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
l Node
l {Proto | protocol}
l Class
l {Op | operation}
--output <column>
Specifies which columns to display. The following values are valid:
{timestamp | time}
Displays the time at which the isi statistics tool last gathered data.
Displayed in POSIX time (number of seconds elapsed since January 1, 1970).
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
{NumOps | operation_count}
Displays the number of times an operation has been performed.
{Ops | operation_rate}
Displays the rate at which an operation has been performed. Displayed in
operations per second.
{InMax | in_max}
Displays the maximum input (received) bytes for an operation.
{InMin | in_min}
Displays the minimum input (received) bytes for an operation.
In
Displays the rate of input for an operation since the last time isi statistics
collected the data. Displayed in bytes per second.
{InAvg | in_avg}
Displays the average input (received) bytes for an operation.
{InStdDev | in_standard_dev}
Displays the standard deviation of the input (received) bytes for an
operation. Displayed in bytes.
{OutMax | out_max}
Displays the maximum output (sent) bytes for an operation.
{OutMin | out_min}
Displays the minimum ouput (sent) bytes for an operation.
Out
Displays the rate of ouput for an operation since the last time isi statistics
collected the data. Displayed in bytes per second.
{OutAvg | out_avg}
Displays the average ouput (sent) bytes for an operation.
{OutStdDev | out_standard_dev}
Displays the standard deviation of the output (sent) bytes for an operation.
Displayed in bytes.
{TimeMax | time_max}
Displays the maximum elapsed time taken to complete an operation.
Displayed in microseconds.
{TimeMin | time_min}
Displays the minimum elapsed time taken to complete an operation.
Displayed in microseconds.
{TimeAvg | time_avg}
Displays the average elapsed time taken to complete an operation. Displayed
in microseconds.
{TimeStdDev | time_standard_dev}
Displays the elapsed time taken to complete an operation as a standard
deviation from the mean elapsed time.
Node
Displays the node on which the operation was performed.
{Proto | protocol}
Displays the protocol of the operation.
Class
Displays the class of the operation.
{Op | operation}
Displays the name of the operation
--sort <column>
Specifies how rows are ordered. The following values are valid:
l Class
l In
l InAvg | in_avg}
l InMax | in_max}
l InMin | in_min}
l InStdDev | in_standard_dev}
l Node
l NumOps | operation_count}
l Op | operation}
l Ops | operation_rate}
l Out
l OutAvg | out_avg}
l OutMax | out_max}
l OutMin | out_min}
l OutStdDev | out_standard_dev}
l Proto | protocol}
l TimeAvg | time_avg}
l TimeMax | time_max}
l TimeMin | time_min}
l TimeStamp | time}
l TimeStdDev | time_standard_dev}
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified
in a comma-separated list, for example --protocols http,papi. The
following values are valid:
l nfs3
l smb1
l nlm
l ftp
l http
l siq
l smb2
l nfs4
l papi
l jobd
l irp
l lsass_in
l lsass_out
l hdfs
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
Note
Note
{--verbose | -v}
Displays more detailed information.
Options
--keys <string>...
Specifies which statistics should be reported for requested nodes, where the
value for <string> is a statistics key. Use the isi statistics list keys
command for a complete listing of statistics keys.
--substr
Matches the statistics for '.*<key>.*' for every key specified with --keys.
--raw
Outputs complex objects as hex.
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
Note
{--limit | -l}<integer>
Note
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Options
--keys <string>...
Specifies which statistics should be reported for requested nodes, where the
value for <string> is a statistics key. Use the isi statistics list keys
command for a complete listing of statistics keys.
--substr
Matches the statistics for '.*<key>.*' for every key specified with --keys.
--begin <time>
Specifies begin time in UNIX Epoch timestamp format.
--end <time>
Specifies end time in UNIX Epoch timestamp format.
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--memory-only
Retrieves only the statistics in memory, not those persisted to disk.
--raw
Outputs complex objects as hex.
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option
also disables the display of units within the data table.
Note
{--limit | -l}<integer>
Limits the number of statistics to display.
Note
{--noheader | -a}
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
isi status
Displays information about the current status of the nodes on the cluster.
Syntax
isi status
[--all-nodes | -a]
[--node | -n <integer>]
[--all-nodepools | -p]
[--nodepool | -l <string>]
[--quiet | -q]
[--verbose | -v]
Options
--all-nodes | -a
Display node-specific status for all nodes on a cluster.
--node | -n <integer>
Display node-specific status for the node specified by its logical node number
(LNN).
--all-nodepools | -p
Display node pool status for all node pools in the cluster.
--nodepool | -l <string>
Display node pool status for the specified node pool.
--quiet | -q
Display less detailed information.
--verbose | -v
Display more detailed information for the --nodepool or --all-nodepools
options.
[--verbose]
[--force]
Options
<class-1>
An existing node pool class, one of S200 or X400.
<class-2>
The node class that is compatible with the existing node pool, one of S210 or
X410. Note that S210 nodes are only compatible with S200 node pools, and X410
nodes are only compatible with X400 node pools.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Performs the action without asking for confirmation.
Examples
The following command creates a compatibility between S200 and S210 nodes
without asking for confirmation:
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool
compatibilities active list command to view the ID numbers of active
compatibilities.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Performs the action without asking for confirmation.
Example
The following command provides information about the results of deleting a
compatibility without actually performing the action:
Provided that a compatibility with the ID of 1 exists, OneFS displays information similar
to the following example:
Options
{--limit | -l} <integer>
Limits the number of compatibilities that are listed.
{--format | -f}
Lists active compatibilities in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
{--verbose | -v}
Displays more detailed information.
Example
The following command lists active compatibilities:
ID Class 1 Class 2
----------------------
1 S200 S210
2 X400 X410
----------------------
Total: 2
Options
<ID>
The ID number of the compatibility to view. You can use the isi storagepool
compatibilities active list command to display the ID numbers of
active compatibilities.
Example
The following command displays information about an active compatibility with ID
number 1:
ID: 1
Class 1: S200
Class 2: S210
Options
{--limit | -l} <integer>
Limits the number of available compatibilities that are listed.
{--format | -f}
Lists available compatibilities in the specified format. The following values are
valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
The following command lists available compatibilities:
Class 1 Class 2
-----------------
S200 S210
X400 X410
-----------------
Total: 2
Note
Syntax
Options
<class-1>
An existing node pool class, one of S200, X200, X400, or N400.
<class-2>
The node class that is compatible with the existing node pool, one of S210, X210,
X410, or N410. Note that S210, X210, X410, and NL410 nodes are compatible only
with similarly configured S200, X200, X400, and NL400 node pools, respectively.
Also note that, in CLI commands, NL400 and NL410 nodes are expressed as N400
and N410.
Examples
The following command creates a compatibility between S200 and S210 nodes
without asking for confirmation:
Note
Syntax
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool
compatibilities class active list command to view the ID numbers of
active compatibilities.
Example
The following command provides information about the results of deleting a
compatibility without actually performing the action:
Provided that a compatibility with the ID of 1 exists, OneFS displays information similar
to the following example:
Note
Syntax
Options
--limit<integer>
Limits the number of compatibilities that are listed.
--format
Lists active compatibilities in the specified format. The following values are valid:
l table
l json
l csv
l list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists active node class compatibilities:
ID Class 1 Class 2
----------------------
1 S200 S210
2 X200 X210
3 X400 X410
4 N400 N410
----------------------
Total: 4
Note
In CLI commands and output, NL400 and NL410 nodes are expressed as N400 and
N410, respectively.
Note
Syntax
Options
<ID>
The ID number of the compatibility to view. You can use the isi storagepool
compatibilities class active list command to display the ID numbers
of active node class compatibilities.
Example
The following command displays information about an active compatibility with ID
number 1:
ID: 1
Class 1: S200
Class 2: S210
Note
Syntax
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--limit<integer>
Limits the number of available compatibilities that are listed.
--format
Lists available compatibilities in the specified format. The following values are
valid:
l table
l json
l csv
l list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists available compatibilities:
Class 1 Class 2
-----------------
S200 S210
X400 X410
-----------------
Total: 2
Note
Syntax
Options
<class-1>
The node class that the SSD compatibility will be created for. For example, you
can create an SSD compatibility for S200 nodes that have larger-capacity SSDs
than the nodes in an existing S200 node pool. In this way, OneFS can
autoprovision the newer S200 nodes to the existing S200 node pool. You can use
the isi storagepool compatibilities ssd available list
command to display valid node class values. For example, S200.
--class-2 <string>
The second node class that will be made SSD-compatible with the first node
class. For example, you can create an SSD compatibility for S210 nodes that have
larger-capacity SSDs than the nodes in an existing S200 node pool. Because S210
nodes can be made compatible with S200 nodes, they can be autoprovisioned to
an S200 node pool. However, in this case, you also need to create a node class
compatibility between S200 and S210 nodes.
Examples
The following command creates an SSD class compatibility and SSD count
compatibility between S200 and S210 nodes:
OneFS displays an advisory message similar to the following, and requires you to
confirm the operation:
count and hdd configuration and compatible RAM into a single node
pool. This will require
all of these automatic node pools to have the same L3 setting,
requested protection, and
tier membership. Any file pool policies currently targeting any of
the merging node pools
will automatically be re-targeted towards the resultant merged pool.
If there exists
enough unprovisioned nodes belonging to this compatibility's node
class to form a node
pool, that node pool will be formed. This may potentially be very
costly from a
performance standpoint the next time the smartpools job runs. If this
is a concern,
please contact EMC Isilon Technical Support for more information.
Type yes, then press ENTER to continue. Type no, then press ENTER to cancel the
process.
Note
Syntax
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool
compatibilities ssd active list command to view the ID numbers of
active SSD compatibilities.
--id-2 <integer>
The ID number of the second SSD compatibility to delete. You can use the isi
storagepool compatibilities ssd active list command to view the
ID numbers of active SSD compatibilities. The --id-2 setting is optional, unless
the node pool with the SSD compatibility also has an associated node class
compatibility. In this case, the setting is required, and deleting the second SSD
compatibility will unprovision some of the nodes from the node pool.
Example
The following command provides information about the results of deleting an SSD
compatibility without actually performing the action:
Note
Syntax
Options
--limit<integer>
Limits the number of SSD compatibilities that are listed.
--format
Lists active SSD compatibilities in the specified format. The following values are
valid:
l table
l json
l csv
l list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists active SSD compatibilities:
ID Class
-----------
1 S200
2 S210
3 N400
4 N410
-----------
Total: 4
Note
In CLI commands and output, NL400 and NL410 nodes are expressed as N400 and
N410, respectively.
Note
Syntax
Options
<ID>
The ID number of the SSD compatibility to view. You can use the isi
storagepool compatibilities ssd active list command to display
the ID numbers of active SSD compatibilities.
Example
The following command displays information about an active compatibility with ID
number 1:
ID: 1
Class: S200
Note
Syntax
Options
--limit<integer>
Limits the number of SSD compatibilities that are listed.
--format
Lists active SSD compatibilities in the specified format. The following values are
valid:
l table
l json
l csv
l list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists available SSD compatibilities:
If available SSD compatibilities exist, command output similar to the following example
appears:
Class 1
-----------------
S200
S210
-----------------
Total: 2
Options
{--verbose | -v}
Displays more detailed information.
Options
--format
Displays node pools and tiers in the specified format. The following values are
valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the name for the node pool. Names must begin with a letter or an
underscore and may contain only letters, numbers, hyphens, underscores, or
periods.
{--verbose | -v}
Displays more detailed information.
Options
<name>
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would
otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Specifies the number of node pools to display.
--format
Displays tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<string>
Name of the node pool to be modified.
--protection-policy <string>
Requested protection for the node pool. Possible protection policy values are:
l +1n
l +2d:1n
l +2n
l +3d:1n
l +3d:1n1d
l +3n
l +4d:1n
l +4d:2n
l +4n
l Mirror values: 2x, 3x, 4x, 5x, 6x, 7x, 8x
OneFS calculates the optimal protection policy (referred to as suggested
protection). If the value you set is lower than the suggested protection, OneFS
displays an alert.
--lnns <integer>
Nodes for the manually managed node pool. Specify --lnns for each additional
node for the manually managed node pool.
--clear-lnns
Clear value for nodes for the manually managed node pool.
--add-lnns <integer>
Add nodes for the manually managed node pool. Specify --add-lnns for each
additional node to add.
--remove-lnns <integer>
Remove nodes for the manually managed node pool. Specify --remove-lnns
for each additional node to remove.
--tier <string>
Set parent for the node pool. Node pools can be grouped into a tier to service
particular file pools.
--clear-tier
Remove the specified node pool from its parent tier.
--set-name <string>
New name for the manually managed node pool.
Examples
The following command specifies that SSDs in a node pool named hq_datastore are to
be used as L3 cache:
The following command adds the node pool hq_datastore to an existing tier named
archive-1:
Options
<name>
Specifies the name of the storage pool.
{--verbose | -v}
Displays more detailed information.
Required Privileges
ISI_PRIV_SMARTPOOLS
Options
--automatically-manage-protection {all | files_at_default | none}
Specifies whether SmartPools manages files' protection settings.
--virtual-hot-spare-limit-drives <integer>
Specifies the maximum number of virtual drives.
--virtual-hot-spare-limit-percent <integer>
Limits the percentage of node resources that is allocated to virtual hot spare.
--spillover-target <string>
Specifies the target for spillover.
--no-spillover
Globally disables spillover.
--spillover-anywhere
Globally sets spillover to anywhere.
--verbose
Enables verbose messaging.
Examples
The following command specifies that SSDs on newly created node pools are to be
used as L3 cache:
The following command specifies that 20 percent of node resources can be used for
the virtual hot spare:
[--snapshot-disk-pool-policy-id <integer>]
[--spillover-target <string>| --no-spillover | --spillover-
anywhere]
[--ssd-l3-cache-default-enabled <boolean>
[{--verbose | -v}]
[{--help | -h}]
Required Privileges
ISI_PRIV_SMARTPOOLS
Options
--automatically-manage-protection {all | files_at_default | none}
Set whether SmartPools manages files' protection settings.
--protect-directories-one-level-higher<boolean>
Protect directories at one level higher.
--global-namespace-acceleration-enabled<boolean>
Enable or disable global namespace acceleration.
--virtual-hot-spare-deny-writes<boolean>
Deny new data writes.
--virtual-hot-spare-hide-spare<boolean>
Reduce the amount of available space.
--virtual-hot-spare-limit-drives<integer>
Specify the maximum number of virtual drives.
--virtual-hot-spare-limit-percent<integer>
Limit the percent of node resources allocated to virtual hot spare.
--spillover-target<string>
Specifies the target for spillover.
--no-spillover
Globally disables spillover.
--spillover-anywhere
Globally sets spillover to anywhere.
--ssd-l3-cache-default-enabled
Enable or disable SSDs on new node pools to serve as L3 cache.
Examples
The following command specifies that SSDs on newly created node pools are to be
used as L3 cache:
The following command specifies that 20 percent of node resources can be used for
virtual hot spare purposes:
Options
There are no options for this command.
Example
The following command displays the global SmartPools settings on your cluster:
Options
<name>
Specifies the name for the storage pool tier. Specify as any string.
--children <string>
Specifies a node pool to be added to the tier. For each node pool that you intend
to add, include a separate --children argument.
--verbose
Displays more detailed information.
Note
Names must begin with a letter or underscore and must contain only letters, numbers,
hyphens, underscores, or periods.
Example
The following command creates a tier and adds two node pools to the tier:
Options
{<name> | --all}
Specifies the tier to delete. The acceptable values are the name of the tier or all.
{--verbose | -v}
Displays more detailed information.
Options
--format
Displays tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<name>
Specifies the tier to be renamed.
{--verbose | -v}
Displays more detailed information.
Note
Names must begin with a letter or underscore and must contain only letters, numbers,
hyphens, underscores, or periods.
Options
<name>
Specifies the name of the tier.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Limits the number of unprovisioned nodes and drives to display.
--format
Displays the list of unprovisioned nodes and drives in the specified format. The
following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy-name>
Cancels a job that was created according to the specified replication policy.
Specify as a replication policy name or ID.
--all
Cancels all currently running replication jobs.
--verbose
Displays more detailed information.
Options
If no options are specified, displays information about replication jobs for all policies.
--state <state>
Displays only jobs in the specified state.
The following values are valid:
scheduled
Displays jobs that are scheduled to run.
running
Displays running jobs.
paused
Displays jobs that were paused by a user.
finished
Displays jobs that have completed successfully.
failed
Displays jobs that failed during the replication process.
canceled
Displays jobs that were cancelled by a user.
needs_attention
Displays jobs that require user intervention before they can continue.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy-name>
Pauses a job that was created according to the specified replication policy.
Specify as a replication policy name.
--all
Pauses all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Displays information about a replication job created according to the specified
replication policy.
Specify as a replication policy name or ID.
Options
<policy-name>
Resumes a paused job that was created by the specified policy.
Specify as a replication policy name.
--all
Resumes all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Options
<policy-name>
Starts a replication job for the specified replication policy.
--test
Creates a replication policy report that reflects the number of files and directories
that would be replicated if the specified policy was run. You can test only policies
that have not been run before.
--source-snapshot <snapshot>
Replicates data according to the specified SnapshotIQ snapshot. If specified, a
snapshot is not generated for the replication job. Replicating data according to
snapshots generated by the SyncIQ tool is not supported.
Specify as a snapshot name or ID. The source directory of the policy must be
contained in the specified snapshot. This option is valid only if the last replication
job completed successfully or if you are performing a full or differential
replication. If the last replication job completed successfully, the specified
snapshot must be more recent than the snapshot referenced by the last
replication job.
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Displays information about a running replication job created according to the
specified policy.
Specify as a replication policy name or ID.
Options
<name>
Specifies a name for the replication policy.
Specify as any string.
<action>
Specifies the type of replication policy.
The following types of replication policy are valid:
copy
Creates a copy policy that adds copies of all files from the source to the
target.
sync
Creates a synchronization policy that synchronizes data on the source
cluster to the target cluster and deletes all files on the target cluster that are
not present on the source cluster.
<source-root-path>
Specifies the directory on the local cluster that files are replicated from.
Specify as a full directory path.
<target-host>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
l The fully qualified domain name of any node in the target cluster.
l The host name of any node in the target cluster.
l The name of a SmartConnect zone in the target cluster.
l The IPv4 or IPv6 address of any node in the target cluster.
l localhost
This will replicate data to another directory on the local cluster.
Note
<target-path>
Specifies the directory on the target cluster that files are replicated to.
Specify as a full directory path.
--description <string>
Specifies a description of the replication policy.
--password <password>
Specifies a password to access the target cluster. If the target cluster requires a
password for authentication purposes, you must specify this parameter or --
set-password.
--set-password
Prompts you to specify a password for the target cluster after the command is
run. This can be useful if you do not want other users on the cluster to see the
password you specify. If the target cluster requires a password for authentication
purposes, you must specify this parameter or --password.
--file-type <value>
Selects only the specified file-system object type.
The following values are valid:
f
Specifies regular files
d
Specifies directories
l
Specifies soft links
--name <value>
Selects only files whose names match the specified string.
You can include the following wildcard characters:
l *
l [ ]
l ?
--posix-regex-name <value>
Selects only files whose names match the specified POSIX regular
expression. IEEE Std 1003.2 (POSIX.2) regular expressions are supported.
--user-id <id>
Selects files based on whether they are owned by the user of the specified
ID.
--user-name <name>
Selects files based on whether they are owned by the user of the specified
name.
--group-id <id>
Selects files based on whether they are owned by the group of the specified
ID.
--group-name <name>
Selects files based on whether they are owned by the group of the specified
name.
The operator specifies which files are selected in relationship to the attribute (for
example, all files smaller than the given size). Specify operators in the following
form:
--operator <value>
Value Description
eq Equal. This is the default value.
ne Not equal
lt Less than
gt Greater than
not Not
The link specifies how the criterion relates to the one that follows it (for example,
the file is selected only if it meets both criteria). The following links are valid:
--and
Selects files that meet the criteria of the options that come before and after
this value.
--or
Selects files that meet either the criterion of the option that comes before
this value or the criterion of the option that follows this value.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
changes have been made to the contents of the source directory, the policy will
not be run.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is
exceeded. For example, assume you set an RPO of 5 hours; a job starts at 1:00
PM and completes at 3:00 PM; a second job starts at 3:30 PM; if the second job
does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if
--schedule is set to <schedule>.
Note
This option is valid only if RPO alerts have been globally enabled through SyncIQ
settings. The events have an event ID of 400040020.
--job-delay <duration>
Specifies the amount of time after the source directory is modified that SyncIQ
waits before starting a replication job. If the --schedule of this replication
policy is set to when-source-modified, and the contents of the source
directory are modified, SyncIQ will wait the specified amount of time before
starting a replication job.
The default value is 0 seconds.
--snapshot-sync-pattern <pattern>
Specifies the naming pattern for snapshots to be synced. If the --schedule of
this replication policy is set to when-snapshot-taken, and a snapshot is taken
of the source directory, and the snapshot name matches the specified naming
pattern, SyncIQ will replicate the snapshot to the target cluster.
The default value is "*", which causes all snapshots of the source directory to be
replicated if the --schedule of the policy is set to when-snapshot-taken.
Note
In order to create identical snapshots on the target cluster, you must also specify
--target-snapshot-archive on.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
l fatal
l error
l notice
l info
l copy
l debug
l trace
The default value is info.
Note
This option has been deprecated and will not be recognized if configured.
--target-snapshot-pattern <naming-pattern>
Specifies the snapshot naming pattern for snapshots that are generated by
replication jobs on the target cluster.
The default naming pattern is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the
target cluster.
Specify in the following format:
<integer><units>
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on
the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
CAUTION
Specifying off could result in data loss. It is recommended that you consult
Isilon Technical Support before specifying off.
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on
the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source
cluster.
If this option is not specified, archival snapshots will exist indefinitely on the
source cluster.
<integer><units>
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically
deleted by SyncIQ.
Specify in the following format:
<integer><units>
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the
local cluster. If you specify this option, you must also specify --source-pool.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the
local cluster. If you specify this option, you must also specify --source-
subnet.
--priority {0 | 1}
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority.
Syntax
Options
<policy>
Deletes the specified replication policy.
--all
Deletes all replication policies.
--local-only
Does not break the target association on the target cluster. Not deleting a policy
association on the target cluster will cause the target directory to remain in a
read-only state.
Note
If SyncIQ is unable to communicate with the target cluster, you must specify this
option to successfully delete the policy.
{--force | -f}
Deletes the policy, even if an associated job is currently running. Also, does not
prompt you to confirm the deletion.
CAUTION
{--verbose | -v}
Displays a confirmation message.
Options
<policy>
Disables the specified replication policy. Specify as a replication policy name or a
replication policy ID.
--all
Disables all replication policies on the cluster.
--verbose
Displays more detailed information.
Options
<policy>
Enables the specified replication policy. Specify as a replication policy name or a
replication policy ID.
--all
Enables all replication policies on the cluster.
--verbose
Displays more detailed information.
Options
If no options are specified, displays a table of all replication policies.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
name
Sorts output by the name of the replication policy.
target_path
Sorts output by the path of the target directory.
action
Sorts output by the type of replication policy.
description
Sorts output by the policy description.
enabled
Sorts output by whether the policies are enabled or disabled.
target_host
Sorts output by the target cluster.
check_integrity
Sorts output by whether the policy is configured to perform a checksum on
each file data packet that is affected by a replication job.
source_root_path
Sorts output by the path of the source directory.
source_include_directories
Sorts output by directories that have been explicitly included in replication.
source_exclude_directories
Sorts output by directories that have been explicitly excluded in replication.
file_matching_pattern
Sorts output by the predicate that determines which files are replicated.
target_snapshot_archive
Sorts output by whether archival snapshots are generated on the target
cluster.
target_snapshot_pattern
Sorts output by the snapshot naming pattern for snapshots that are
generated by replication jobs on the target cluster.
target_snapshot_expiration
Sorts output by the expiration period for archival snapshots on the target
cluster.
target_detect_modifications
Sorts output by whether full or differential replications are performed for this
policy.
source_snapshot_archive
Sorts output by whether archival snapshots are retained on the source
cluster.
source_snapshot_pattern
Sorts output by the naming pattern for the most recent archival snapshot
generated on the source cluster.
source_snapshot_expiration
Sorts output by the expiration period for archival snapshots retained on the
source cluster.
schedule
Sorts output by the schedule of the policy.
log_level
Sorts output by the amount of data that is recorded in logs.
log_removed_files
Sorts output by whether OneFS retains a log of all files that are deleted when
the replication policy is run.
workers_per_node
Sorts output by the number of workers per node that are generated by
OneFS to perform each replication job for the policy.
report_max_age
Sorts output by how long replication reports are retained before they are
automatically deleted by OneFS
report_max_count
Sorts output by the maximum number of reports that are retained for the
replication policy.
force_interface
Sorts output by whether data is sent over only the default interface of the
subnet specified by the --source-network option of the isi sync
policies create or isi sync policies modify commands.
restrict_target_network
Sorts output by whether replication jobs are restricted to connecting to
nodes in a specified zone on the target cluster.
target_compare_initial_sync
Sorts output by whether full or differential replications are performed for the
policies.
last_success
Sorts output by the last time that a replication job completed successfully.
password_set
Sorts output by whether the policy specifies a password for the target
cluster.
source_network
Sorts output by the subnet on the local cluster that the replication policy is
restricted to.
source_interface
Sorts output by the pool on the local cluster that the replication policy is
restricted to.
{--descending | -d}
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Identifies the policy to modify, either by current policy ID or name.
--action <policy-type>
Specifies the type of replication policy.
The following types of replication policy are valid:
copy
Creates a copy policy that adds copies of all files from the source to the
target.
sync
Creates a synchronization policy that synchronizes data on the source
cluster to the target cluster and deletes all files on the target cluster that are
not present on the source cluster.
Note
--source-root-path <root-path>
Specifies the directory on the local cluster that files are replicated from.
--description <string>
Specifies a description of this replication policy.
--password <password>
Specifies a password to access the target cluster. If the target cluster requires a
password for authentication purposes, you must specify this parameter or --
set-password.
--set-password
Prompts you to specify a password for the target cluster after the command is
run. This can be useful if you do not want other users on the cluster to see the
password you specify. If the target cluster requires a password for authentication
purposes, you must specify this parameter or --password.
--clear-source-include-directories
Clears the list of included directories.
--add-source-include-directories <path>
Adds the specified directory to the list of included directories.
--remove-source-include-directories <path>
Removes the specified directory from the list of included directories.
--clear-source-exclude-directories
Clears the list of excluded directories.
--add-source-exclude-directories <path>
Adds the specified directory to the list of excluded directories.
--remove-source-exclude-directories <path>
Removes the specified directory from the list of excluded directories.
--file-type <value>
Selects only the specified file-system object type.
The following values are valid:
f
Specifies regular files
d
Specifies directories
l
Specifies soft links
--name <value>
Selects only files whose names match the specified string.
You can include the following wildcards:
l *
l [ ]
l ?
--posix-regex-name <value>
Selects only files whose names match the specified POSIX regular
expression. IEEE Std 1003.2 (POSIX.2) regular expressions are supported.
--user-id <id>
Selects files based on whether they are owned by the user of the specified
ID.
--user-name <name>
Selects files based on whether they are owned by the user of the specified
name.
--group-id <id>
Selects files based on whether they are owned by the group of the specified
ID.
--group-name <name>
Selects files based on whether they are owned by the group of the specified
name.
Operator Description
eq Equal. This is the default value.
ne Not equal
lt Less than
gt Greater than
not Not
You can use the following <link> values to combine and alter the options available
for predicates:
--and
Selects files that meet the criteria of the options that come before and after
this value.
--or
Selects files that meet either the criterion of the option that comes before
this value or the criterion of the option that follows this value.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can
specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day.
For example, both "saturday" and "sat" are valid.
To configure a policy to be run only manually, specify the following option:
--schedule ""
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is
exceeded. For example, assume you set an RPO of 5 hours; a job starts at 1:00
PM and completes at 3:00 PM; a second job starts at 3:30 PM; if the second job
does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if
--schedule is set to <schedule>.
Note
This option is valid only if RPO alerts have been globally enabled through SyncIQ
settings. The events have an event ID of 400040020.
--job-delay <duration>
Specifies the amount of time after the source directory is modified that SyncIQ
waits before starting a replication job. If the --schedule of this replication
policy is set to when-source-modified, and the contents of the source
directory are modified, SyncIQ will wait the specified amount of time before
starting a replication job.
The default value is 0 seconds.
--clear-job-delay
Clears the amount of time after the source directory is modified that SyncIQ
waits before starting a replication job.
--snapshot-sync-pattern <pattern>
Specifies the naming pattern for snapshots to be synced. If the --schedule of
this replication policy is set to when-snapshot-taken, and a snapshot is taken
of the source directory, and the snapshot name matches the specified naming
pattern, SyncIQ will replicate the snapshot to the target cluster.
The default value is "*", which causes all snapshots of the source directory to be
replicated if the --schedule of the policy is set to when-snapshot-taken.
Note
Because this setting cannot be modified after the policy is initially created, this
option cannot be specified with isi sync policies modify.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
l fatal
l error
l notice
l info
l copy
l debug
l trace
The default value is info.
Note
This option has been deprecated and will not be recognized if configured.
--target-snapshot-pattern <naming-pattern>
Specifies the snapshot naming pattern for snapshots that are generated by
replication jobs on the target cluster.
The default naming pattern is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the
target cluster.
Specify in the following format:
<integer><units>
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on
the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
CAUTION
Specifying off could result in data loss. It is recommended that you consult
Isilon Technical Support before specifying off.
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on
the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source
cluster.
If this option is not specified, archival snapshots will exist indefinitely on the
source cluster.
Specify in the following format:
<integer><units>
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically
deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y
Specifies years
M
Specifies months
W
Specifies weeks
D
Specifies days
H
Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the
local cluster.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the
local cluster.
--clear-source-network
Runs replication jobs on any nodes in the cluster, instead of restricting the jobs to
a specified subnet.
--priority {0 | 1}
Determines whether the policy has priority.
{--verbose | -v}
Displays a confirmation message.
{--force | -f}
Does not prompt you to confirm modifications.
Options
<policy>
Resets the specified replication policy.
Specify as a replication policy name or ID
--all
Resets all replication policies
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Resolves the specified replication policy.
Specify as a replication policy name or ID.
{--force | -f}
Suppresses command-line prompts and messages.
Options
<policy>
Displays information about the specified replication policy.
Specify as a replication policy name or ID.
Options
<policy-name>
Allows writes for the target directory of the specified replication policy.
Specify as a replication policy name, a replication policy ID, or the path of a target
directory.
--revert
Reverts an allow-writes operation on the local cluster only. This action does not
affect the source cluster of the replication policy.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
l fatal
l error
l notice
l info
l copy
l debug
l trace
The default value is info.
{--workers-per-node | -w}<integer>
Specifies the number of workers per node that are generated by SyncIQ to
perform the allow-writes job.
The default value is 3.
{--verbose | -v}
Displays more detailed information.
Options
<policy-name>
Targets the following replication policy.
Specify as a replication policy name or ID. The replication policy must be a
synchronization policy.
--verbose
Displays more detailed information.
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--policy-name <policy>
Displays only replication reports that were created for the specified policy.
--state <state>
Displays only replication reports whose jobs are in the specified state.
--reports-per-policy <integer>
Displays no more than the specified number of reports per policy. The default
value is 10.
bytes_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
duration
S orts output by how long the replication job ran.
errors
Sorts output by errors that the replication job encountered.
warnings
Sorts output by warnings that the replication job triggered.
{--descending | -d}
Displays output in reverse order.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication report.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the
replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
duration
Sorts output by how long the replication job ran.
errors
Sorts output by errors that the replication job encountered.
warnings
Sorts output by warnings that the replication job triggered.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Displays a sub report about the specified replication policy. Specify as a
replication policy name.
<job-id>
Displays a sub report about the specified replication job. Specify as a replication
job ID.
<subreport-id>
Displays the subreport of the specified ID.
Options
<policy>
Displays a replication report about the specified replication policy.
<job-id>
Displays a replication report about the job with the specified ID.
Options
<type>
Specifies the type of performance rule. The following values are valid:
file_count
Creates a performance rule that limits the number of files that can be sent by
replication jobs per second.
bandwidth
Creates a performance rule that limits the amount of bandwidth that
replication jobs are allowed to consume.
<interval>
Enforces the performance rule on the specified hours of the day. Specify in the
following format:
<hh>:<mm>-<hh>:<mm>
<days>
Enforces the performance rule on the specified days of the week.
You can include multiple days by specifying multiple values separated by commas.
You can also include a range of days by specifying two values separated by a
dash.
<limit>
Specifies the maximum number of files that can be sent or KBs that can be
consumed per second by replication jobs.
--description <string>
Specifies a description of this performance rule.
--verbose
Displays more detailed information.
Options
<id>
Deletes the performance rule of the specified ID.
--all
Deletes all performance rules.
--type <type>
Deletes all performance rules of the specified type. The following values are valid:
file_count
Deletes all performance rules that limit the number of files that can be sent
by replication jobs per second.
bandwidth
Deletes all performance rules that limit the amount of bandwidth that
replication jobs are allowed to consume.
--force
Does not prompt you to confirm that you want to delete the performance rule.
--verbose
Displays more detailed information.
Options
--type <type>
Displays only performance rules of the specified type. The following values are
valid:
file_count
Displays only performance rules that limit the number of files that can be
sent by replication jobs per second.
bandwidth
Displays only performance rules that limit the amount of bandwidth that
replication jobs are allowed to consume.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
{--verbose | -v}
Displays more detailed information.
Options
<id>
Modifies the replication performance rule of the specified ID.
<hh>:<mm>-<hh>:<mm>
You can include multiple days by specifying multiple values separated by commas.
You can also include a range of days by specifying two values separated by a
dash.
--limit <limit>
Specifies the maximum number of files that can be sent or KBs that can be
consumed per second by replication jobs.
--description <string>
Specifies a description of this performance rule.
{--verbose | -v}
Displays more detailed information.
Options
<id>
Displays information about the replication performance rule with the specified ID.
Options
If no options are specified, displays current default replication report settings.
--service {on | off | paused}
Determines the state of the SyncIQ tool.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the
local cluster.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the
local cluster.
Note
--report-max-age <duration>
Specifies the default amount of time that SyncIQ retains reports before
automatically deleting them.
Specify in the following format:
<integer><units>
--report-max-count <integer>
Specifies the default maximum number of reports to retain for a replication policy.
{--verbose | -v}
Displays more detailed information.
Options
There are no options for this command.
Note
Breaking a source and target association requires you to reset the replication policy
before you can run the policy again. Depending on the amount of data being
replicated, a full or differential replication can take a very long time to complete.
Syntax
Options
<policy>
Removes the association of the specified replication policy targeting this cluster.
Specify as a replication policy name, a replication policy ID, or the path of a target
directory.
--target-path <path>
Removes the association of the replication policy targeting the specified directory
path.
{--force | -f}
Forces the replication policy association to be removed, even if an associated job
is currently running.
CAUTION
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Cancels a replication job created according to the specified replication policy.
Specify as a replication policy name or ID.
--target-path <path>
Cancels a replication job targeting the specified directory.
--all
Cancels all running replication jobs targeting the local cluster.
--verbose
Displays more detailed information.
Options
If no options are specified, displays a table of all replication policies currently targeting
the local cluster.
--target-path <path>
Displays information about the replication policy targeting the specified directory.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
name
Sorts output by the name of the replication policy.
source_host
Sorts output by the name of the source cluster.
target_path
Sorts output by the path of the target directory.
last_job_status
Sorts output by the status of the last replication job created according to the
policy.
failover_failback_state
Sorts output by whether the target directory is read only.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
If no options are specified, displays basic information about all completed replication
jobs.
--state <state>
Displays information about only replication jobs in the specified state. The
following states are valid:
l scheduled
l running
l paused
l finished
l failed
l canceled
l needs_attention
l unknown
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication subreport.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the
replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
duration
Sorts output by how long the replication job ran.
errors
Sorts output by errors that the replication job encountered.
warnings
Sorts output by warnings that the replication job triggered.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication report.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the
replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target
cluster.
duration
Sorts output by how long the replication job ran.
errors
Sorts output by errors that the replication job encountered.
warnings
Sorts output by warnings that the replication job triggered.
{--descending | -d}
Displays output in reverse order.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Options
<policy>
Displays a sub report about the specified replication policy. Specify as a
replication policy name.
<job-id>
Displays a sub report about the specified replication job. Specify as a replication
job ID.
<subreport-id>
Displays the subreport with the specified ID.
Options
<policy>
Displays a replication report about the specified replication policy.
<job-id>
Displays a replication report about the job with the specified ID.
Options
<policy-name>
--target-path <path>
Displays information about the policy targeting the specified directory.
Options
--name <string>
The name of the NDMP tape or media change device.
--all
Disconnects the cluster from all devices.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
Example
The following command disconnects tape001 from the cluster:
Options
--node <lnn>
Displays only devices that are attached to the node of the specified logical node
number (LNN).
--tape
Displays only tape devices.
--activepath
Displays only the active paths of a device.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all NDMP devices, run the following command:
Options
--name <name>
The current device name.
--new-name <string>
The new device name.
--close-device
Forces the device state to closed if the device is currently open. If an NDMP
session unexpectedly stops, a tape or media changer device may be left in an
open state, which prevents the device from being opened again.
Options
<devname>
Modifies the name of the specified NDMP device.
<rename>
Specifies a new name for the given NDMP device.
Examples
The following example renames tape003 to tape005:
Options
If no options are specified, scans all nodes and ports.
--node <lnn>
Scans only the node of the specified logical node number (LNN).
--port <integer>
Scans only the specified port. If you specify --node, scans only the specified
port on the specified node. If you do not specify --node, scans the specified port
on all nodes.
--reconcile
Example
To scan the entire cluster for NDMP devices, and remove entries for devices and
paths that have become inaccessible, run the following command:
Options
<name>
The name of the tape or media changer device.
--activepath
Displays only the active paths of the device.
Options
<nodes>
List of comma-separated (1,3,7) or dash-separated (1-7) specified logical node
numbers (LNNs) to mark for upgrade.
--yes
Automatically answer yes at the prompt.
Options
--yes
Automatically answer yes at the prompt.
Options
--clear
Clear the upgrade after an archive is complete.
Options
<install-image-path>
The path of the upgrade install image. Must be within an /ifs or http://
source.
Options
--yes
Automatically answers yes at the upgrade commitment prompt.
Options
<action>
Specifies actions you can take against the firmware upgrade.
package
Lists all the nodes on the cluster and shows detailed firmware package
information on the given node.
devices
Lists all the nodes on the cluster and shows detailed status of the current
firmware for each node.
assess
Runs upgrade checks without starting a firmware upgrade.
view
Shows overview status of the current firmware upgrade activity.
start
Starts upgrade processes.
Note
All upgrade processes take a long time to run. The return status of a command
only relates to the issuing of the command itself, not the successful completion of
it.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command runs upgrade checks without starting the firmware upgrade.
Example
To view information about the cluster version you are upgrading from, run the
following command:
Minor: 0
Maintenance: 0
Bugfix: 0
Options
<action>
Specifies reporting actions you can take regarding node firmware updates.
devices
Reports devices on the nodes which are supported in the installed firmware
package.
package
Reports the contents of the installed firmware package.
progress
Reports, in list or view format, status information regarding the firmware
upgrade.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command displays the contents of the installed firmware package:
Example
To list upgrade status for all nodes on the cluster, run the following command:
Node LNN: 1
Node Upgrade State: committed
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: None
Node OS Version: 8.0.0.0
Node LNN: 2
Node Upgrade State: non-responsive
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: unknown
Node OS Version: N/A
Node LNN: 3
Node Upgrade State: committed
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: None
Node OS Version: 8.0.0.0
Options
<lnn>
The logical node number (LNN) of the node for which you want to view upgrade
status.
Example
To view the upgrade status for a node with the LNN 1, run the following command:
Node LNN: 1
Node Upgrade State: committed
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: None
Node OS Version: 8.0.0.0
Options
<nodes>
A list of comma-separated (1,3,7) or dash-separated (1-7) logical node numbers
to select. You can also use all to select all the cluster's nodes at any given time.
Options
--yes
Automatically answer yes to the confirmation prompt.
Options
There are no options for this command.
Options
<install-image-path>
The file path of the location of the upgrade install image. The file path must be
accessible in a /ifs directory or by an https:// URL.
--skip-optional
Skips the optional pre-upgrade checks.
--yes
Automatically answer yes to the confirmation prompt.
--simultaneous
--nodes <integer_range_list>
List of comma-separated (1,3,7) or dash-separated (1-7) logical node numbers
(LNNs) to select for upgrade.
Options
There are no options for this command.
Options
There are no options for this command.
Options
{--force | -f}
Skips the confirmation prompt for this command.
Options
<patch>
The file path location of the patch to install. This must be an absolute path within
the /ifs file system.
Options
--local
Lists patch information only on the local node.
{--no-header | -a}
Does not display headers in CSV or table formats.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Options
<patch>
The name or ID of the patch to uninstall.
{--override | -o}
Overrides the patch system validation, and forces the patch uninstallation.
{--force | -f}
Skips the confirmation prompt.
Options
<patch>
The name or ID of the patch to view.
--local
Shows patch information only for the local node.
isi version
Displays cluster version information.
Syntax
isi version
[--format {list | json}]
[--verbose
Options
--format {list | json}
Displays the cluster version information in list or JSON format.
{--verbose | -v}
Displays more detailed cluster version information.
isi_vol_copy
Migrates data from a NetApp storage device.
Syntax
Options
<src_filer>
Specifies the IP address or domain name of the NetApp storage device.
<src_dir>
Specifies the absolute path of the directory on the NetApp storage device to
migrate.
<dest_dir>
Specifies the absolute path of the directory on the cluster to migrate data to.
NDMP password of a user, run the ndmpd password command on the NetApp
storage device.
We recommend that you do not specify a password through this option. Instead,
specify only a username. If you specify a password as a part of the command, the
password will be visible to all the other users who are logged in to the cluster. If
you do not specify a password, and one is required, you will be prompted for the
password. If you enter a password at the prompt, the password will not be visible
to the other users on the cluster.
-sport <ndmp_src_port>
Specifies the NDMP port that OneFS will connect to on the NetApp storage
device. The default value is 0, which causes OneFS to connect to the default
NDMP port configured on the NetApp storage device.
-dport <ndmp_data_port>
Specifies the NDMP port on theIsilon cluster that OneFS will coordinate the data
migration through. The default value is ANY, which causes OneFS to connect
through any available port. You can also specify a fixed NDMP port on the Isilon
cluster when a firewall is configured between an Isilon cluster and a NetApp
storage device.
-full
Migrates all data from the source to the target directory.
-incr
Migrates only data that has been modified since the last migration was run.
Note
If you try to run the isi_vol_copy command with the -incr option without
running a full migration, a warning message appears and a full migration is
automatically run.
-dhost <dest_ip_addr>
Specifies the name or IP address of the interface on the Isilon cluster that OneFS
will coordinate the data migration through. This can be useful if the cluster has
multiple network interfaces and the majority of the data must be transferred
through a link other than the outgoing NDMP control interface.
-maxino <integer>
Specifies the maximum number of files that can be created on the NetApp
volume.
This option can be useful if the NDMP stream incorrectly reports the maximum
number of files, which can cause the migration to fail. Manually specifying the
correct maximum number of files prevents this issue.
-no_acl
Specifies that no Access Control List (ACL) must be assigned to a file.
-fullsave
Saves the entire dumpstream data including metadata and user data.
-nosave
Saves the dumpstream data that includes metadata but excludes user data.
-worm
Specifies that the WORM state of the files on the NetApp storage device must be
applied to the files after migrating to an Isilon cluster.
To access this option, the destination directory on the Isilon cluster must belong
to the SmartLock domain and must be a SmartLock Enterprise directory. The
access time of the file determines the retention period. You can apply the -worm
option even when the migration process is paused and restarted.
When migrating WORM files, keep in mind the following points:
l If a file in a WORM state is newly committed without any changes, or if the
retention period of an already committed WORM file is extended and then an
incremental migration process is run, the file is not included in that migration
process.
l After performing a full migration of a WORM file, if you delete the WORM file
through the privilege delete feature and recreate a new WORM file with the
same name, the incremental migration of that newly created file might fail.
l NetApp provides support to append a file which is already in a WORM state.
However, isi_vol_copy does not support the migration of such files to an
Isilon cluster.
isi_vol_copy
-list [migration-id] | [[-detail] [-state=<state>] [-
destination=<pathname>]]
-cleanup <migration-id> [-everything] [-noprompt]
-pause <migration-id>
-status <migration-id>
-sleep </path_to_sleep_schedule.config> <migration-id>
-get_config
-set_config <name>=<value>
Options
-list [migration-id] | [[-detail] [-state=<state>] [-destination=<pathname>]]
Displays details about the migration sessions that are currently running. The
details include the migration ID of each of the sessions, the state of migration, for
example, Completed, Running, or Restartable, and the destination folder on
the Isilon cluster that will hold the migrated files. This option enables you to view
the BRE contexts for NetApp migrations.
-pause <migration-id>
Pauses a migration session based on a specific migration ID.
isi_vol_copy 653
OneFS isi commands S through Z
-status <migration-id>
Displays the current migration status for a specific session based on the migration
ID by retrieving information from the NetApp storage device.
-set_config <name>=<value>
Sets the parameter name and value for the auto-cleanup process.
-get_config
Lists all the parameter names and values set for the auto-cleanup process.
isi_vol_copy_vnx
Migrates data from a Celerra or VNX storage device.
Syntax
isi_vol_copy_vnx
<src_filer>:<src_dir> <dest_dir>
[-sa user | user:<password>]]
[-sport <ndmp_src_port>]
[-dport <ndmp_data_port>]
{-full | -incr [-level_based]}
[-dhost <dest_ip_addr>]
[-no_acl
[-upgrade <src_filer>:<src_dir> <dest_dir>]
Options
<src_filer>
Specifies the IP address or domain name of the VNX.
<src_dir>
Specifies the absolute path of the directory on the Celerra or VNX storage device
that is being migrated to the cluster.
<dest_dir>
Specifies the absolute path of the directory that data is being migrated to.
-sa user | user:<password>]
Specifies the username and password of a user on the Celerra or VNX storage
device.
We recommend that you do not specify a password through this option. Instead
specify only a username. If you specify a password as part of the command, the
password will be visible to all other users logged in to the cluster. If you do not
specify a password and one is required, you will be prompted for the password. If
you enter a password at the prompt, the password will not be visible to other
users on the cluster.
-sport <ndmp_src_port>
Specifies the NDMP port that OneFS will connect to on the Celerra or VNX
storage device. The default value is 0, which causes OneFS to connect to the
default NDMP port configured on Celerra or VNX.
-dport <ndmp_data_port>
Specifies the NDMP port on the Isilon cluster that OneFS will coordinate the data
migration through. The default value is ANY, which causes OneFS to connect
through any available port.
-full
Migrates all data from the source to the target directory.
-incr
Migrates only data that has been modified since the last migration was run.
-level_based
Specifies to use the migration methods that are applicable for releases prior to
OneFS version 8.0.0 for data from previous releases that is yet to be cutover.
-dhost <dest_ip_addr>
Specifies the name or IP address of the interface on the Isilon cluster that OneFS
will coordinate the data migration through. This can be useful if the cluster has
multiple network interfaces and the majority of the data must be transferred
through a link other than the outgoing NDMP control interface.
-no_acl
Specifies that no Access Control List (ACL) must be assigned to a file.
isi_vol_copy_vnx
-list [migration-id] | [[-detail] [-state=<state>] [-
destination=<pathname>]]
-cleanup <migration-id> [-everything] [-noprompt]
-get_config
-set_config <name>=<value>
Options
-list [migration-id] | [[-detail] [-state=<state>] [-destination=<pathname>]]
Displays details about the migration sessions that are currently running. The
details include the migration ID of each of the sessions, the state of migration, for
example, Completed or Running, and the destination folder on the Isilon cluster
that will hold the migrated files.
isi_vol_copy_vnx 655
OneFS isi commands S through Z
-set_config <name>=<value>
Sets the parameter name and value for the auto-cleanup process.
-get_config
Lists all the parameter names and values set for the auto-cleanup process.
CAUTION
You can set the compliance clock only once. After the compliance clock has been
set, you cannot modify the compliance clock time.
Syntax
Options
There are no options for this command.
Options
There are no options for this command.
Syntax
Options
<path>
Designates the specified directory as a SmartLock directory. The specified
directory must be empty.
Specify as a directory path.
Options
<path>
Creates a SmartLock directory at the specified path.
Specify as a directory path.
{--compliance | -C}
Specifies the SmartLock directory as a SmartLock compliance directory. This
option is valid only on clusters running in SmartLock compliance mode.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
To specify no autocommit time period, specify none. The default value is none.
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
--disable-privileged-delete
Permanently prevents WORM committed files from being deleted from the
SmartLock directory.
Note
If you specify this option, you can never enable the privileged delete functionality
for the directory. If a file is then committed to a WORM state in the directory,
you will not be able to delete the file until the retention period has passed.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
{--mkdir | -M}
Creates the specified directory if it does not already exist.
{--force | -f}
Does not prompt you to confirm the creation of the SmartLock directory.
{--verbose | -v}
Displays more detailed information.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
id
Sorts output by the SmartLock directory ID.
path
Sorts output by the path of the SmartLock directory.
type
Sorts output based on whether the SmartLock directory is a compliance
directory.
lin
Sorts output by the inode number of the SmartLock directory.
autocommit_offset
Sorts output by the autocommit time period of the SmartLock directory.
override_date
Sorts output by the override retention date of the SmartLock directory.
privileged_delete
Sorts output based on whether the privileged delete functionality is enabled
for the SmartLock directory.
default_retention
Sorts output by the default retention period of the SmartLock directory.
min_retention
Sorts output by the minimum retention period of the SmartLock directory.
max_retention
Sorts output by the maximum retention period of the SmartLock directory.
total_modifies
Sorts output by the total number of times that the SmartLock directory has
been modified.
{--descending | -d}
Displays output in reverse order.
{--verbose | -v}
Displays more detailed information.
Options
<domain>
Modifies the specified SmartLock directory.
Specify as a directory path, ID, or LIN of a SmartLock directory.
{--compliance | -C}
Specifies the SmartLock directory as a SmartLock compliance directory. This
option is valid only on clusters running in SmartLock compliance mode.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
To specify no autocommit time period, specify none. The default value is none.
--clear-autocommit-offset
Removes the autocommit time period for the given SmartLock directory.
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
--clear-override-date
Removes the override retention date for the given SmartLock directory.
--disable-privileged-delete
Permanently prevents WORM committed files from being deleted from the
SmartLock directory.
Note
If you specify this option, you can never enable the privileged delete functionality
for the SmartLock directory. If a file is then committed to a WORM state in the
directory, you will not be able to delete the file until the retention period
expiration date has passed.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--clear-default-retention
Removes the default retention period for the given SmartLock directory.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--clear-min-retention
Removes the minimum retention period for the given SmartLock directory.
<integer><units>
W
Specifies weeks
D
Specifies days
H
Specifies hours
m
Specifies minutes
s
Specifies seconds
--clear-max-retention
Removes the maximum retention period for the given SmartLock directory.
{--force | -f}
Does not prompt you to confirm the creation of the SmartLock directory.
{--verbose | -v}
Displays more detailed information.
Options
<domain>
Displays information about the specified SmartLock directory.
Specify as a directory path, ID, or LIN of a SmartLock directory.
Options
<path>
Deletes the specified file. The file must exist in a SmartLock enterprise directory
with the privileged delete functionality enabled.
Specify as a file path.
--force
Does not prompt you to confirm that you want to delete the file.
--verbose
Displays more detailed information.
Options
<path>
Displays information about the specified file. The file must be committed to a
WORM state.
Specify as a file path.
--no-symlinks
If <path> refers to a file, and the given file is a symbolic link, displays WORM
information about the symbolic link. If this option is not specified, and the file is a
symbolic link, displays WORM information about the file that the symbolic link
refers to.
Options
<zone>
Specifies an access zone by name.
<user>
Specifies a user by name.
--uid <integer>
Specifies a user by UID.
--group <string>
Specifies a group by name.
--gid <integer>
Specifies a group by GID.
--sid <string>
Specifies an object by user or group SID.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
{--verbose | -v}
Returns a success or fail message after running the command.
Options
<zone>
--uid <integer>
Specifies a user by UID.
--group <string>
Specifies a group by name.
--gid <integer>
Specifies a group by GID.
--sid <string>
Specifies an object by user or group SID.
--wellknown <string>
Specifies an object by well-known SID.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Returns a success or fail message after running the command.
Options
<zone>
Specifies an access zone by name.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
{--verbose | -v}
Displays more detailed information.
Examples
To display a list of restricted users for the built-in System zone, run the following
command:
Options
<name>
Specifies the name of the access zone.
<path>
Specifies the base directory path for the zone.
--map-untrusted <workgroup>
Maps untrusted domains to the specified NetBIOS workgroup during
authentication.
--auth-providers <provider-type>:<provider-name>
Specifies one or more authentication providers, separated by commas, for
authentication to the access zone. Authentication providers are checked in the
order specified. You must specify the name of the authentication provider in the
following format: <provider-type>:<provider-name>.
--netbios-name <string>
Specifies the NetBIOS name.
--user-mapping-rules <string>
Specifies one or more user mapping rules, separated by commas, for the access
zone.
--home-directory-umask <integer>
--skeleton-directory <string>
Sets the skeleton directory for user home directories.
--cache-entry-expiry <duration>
Specifies duration of time to cache a user/group.
--create-path
Specifies that the value entered as the access zone path is to be created if it does
not already exist.
--force-overlap
Allows the base directory to overlap with the base directory of another access
zone.
--groupnet <string>
Specifies the groupnet referenced by the access zone.
{--verbose | -v}
Displays the results of running the command.
Options
<zone>
Specifies the name of the access zone to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all access zones in the cluster, run the following command:
Options
<zone>
Specifies the name of the access zone to modify.
--name <string>
Specifies a new name for the access zone. You cannot change the name of the
built-in System access zone.
--path <path>
Specifies the base directory path for the zone.
--map-untrusted <string>
Specifies the NetBIOS workgroup to map untrusted domains to during
authentication.
--auth-providers <provider-type>:<provider-name>
Specifies one or more authentication providers, separated by commas, for
authentication to the access zone. This option overwrites any existing entries in
the authentication providers list. To add or remove providers without affecting
the current entries, configure settings for --add-auth-providers or --
remove-auth-providers.
--clear-auth-providers
Removes all authentication providers from the access zone.
--add-auth-providers <provider-type>:<provider-name>
Adds one or more authentication providers, separated by commas, to the access
zone.
--remove-auth-providers <provider-type>:<provider-name>
Removes one or more authentication providers, separated by commas, from the
access zone.
--netbios-name <string>
Specifies the NetBIOS name.
--user-mapping-rules <string>
Specifies one or more user mapping rules, separated by commas, for the access
zon. This option overwrites all entries in the user mapping rules list. To add or
remove mapping rules without overwriting the current entries, configure settings
with --add-user-mapping-rules or --remove-user-mapping-rules.
--clear-user-mapping-rules
Removes all user mapping rules from the access zone.
--add-user-mapping-rules <string>
Adds one or more user mapping rules, separated by commas, to the access zone.
--remove-user-mapping-rules <string>
Removes one or more user mapping rules, separated by commas, from the access
zone.
--home-directory-umask <integer>
Specifies the permissions to set on auto-created user home directories.
--skeleton-directory <string>
Sets the skeleton directory for user home directories.
--cache-entry-expiry <duration>
Specifies duration of time to cache a user/group.
--cache-entry-expiry
Sets the value of --cache-entry-expiry to the system default.
--create-path
Specifies that the zone path is to be created if it doesn't already exist.
--force-overlap
Allows the base directory to overlap with the base directory of another access
zone.
{--verbose | -v}
Displays the results of running the command.
Options
<zone>
Specifies the name of the access zone to view.