OES 2015: Linux POSIX Volume Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

OES 2015: Linux POSIX Volume Administration Guide Open Enterprise Server 2015 SP1 Linux POSIX Volume Administration Guide June 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc. All Rights Reserved. Contents About This Guide 7 1 Overview of Linux POSIX File Systems 9 1.1 Btrfs . 9 1.2 Ext2 . 11 1.3 Ext3 . 11 1.4 ReiserFS . 13 1.5 XFS . 13 1.6 What’s Next . 14 2 What’s New or Changed for Linux POSIX Volumes 17 2.1 What’s New or Changed in Linux POSIX Volumes (OES 2015 SP1) . 17 3 Installing or Upgrading NSS Management Tools and Linux POSIX File Systems 19 3.1 NSS Management Tools . 19 3.2 Linux POSIX File Systems . 19 3.3 Clustered LVM . 19 4 Using NLVM and NSSMU in a Virtualized Environment 21 5 Planning for Linux POSIX Volumes 23 5.1 Root User . 23 5.2 Using RAID Devices for Linux POSIX Volumes . 23 5.3 Naming Conventions for Linux LVM Volume Group and Logical Volume Names . 24 5.3.1 NSSMU and NLVM Requirements for LVM Names . 24 5.3.2 LVM Requirements for LVM Names. 24 5.3.3 Novell Cluster Services Requirements for Clustered LVM Volume Names . 24 5.4 Naming Conventions for NCP Volume Names. 25 5.5 Linux LVM Volume Groups. 25 5.6 Linux LVM Volume Group Cluster Resources . 25 5.7 Using Antivirus Software with NCP Volumes . .25 6 Managing Linux Volumes with NSSMU 27 6.1 NSSMU Quick Reference for Linux Volumes. 28 6.2 Launching and Navigating NSSMU . 29 6.3 Viewing a List of Devices . 31 6.4 Viewing Device Details. 31 6.5 Initializing a Device . 33 6.6 Unsharing a Device . 35 6.7 Viewing a List of Linux Volumes. 35 6.8 Viewing Details for a Linux Volume . 36 6.9 Creating a Non-LVM Linux Volume . 38 6.10 Creating an LVM Logical Volume . 42 Contents 3 6.11 Creating a Shared LVM Volume with Novell Cluster Services . 46 6.12 Mounting a Linux Volume. 47 6.13 Dismounting a Linux Volume . 47 6.14 Renaming the Mount Point Path for a Linux Volume . 47 6.15 Renaming a Non-LVM Linux Volume . 49 6.16 Renaming an LVM Volume. 49 6.17 Deleting a Linux Volume . 50 7 Managing Linux Volumes with NLVM Commands 53 7.1 NLVM Commands Quick Reference for Linux Volumes. 54 7.2 Viewing a List of Devices . 56 7.3 Viewing Device Details. 57 7.4 Initializing a Device . 58 7.5 Unsharing a Device . 60 7.6 Viewing a List of Linux Volumes. 60 7.7 Creating a Non-LVM Linux Volume . 61 7.8 Creating an LVM Logical Volume . 62 7.9 Creating a Shared LVM Logical Volume with Novell Cluster Services . 64 7.10 Mounting Linux Volumes . 65 7.10.1 Using the nlvm linux mount Command . 65 7.10.2 Using the mount(8) and ncpcon mount Commands . 66 7.11 Dismounting Linux Volumes. 66 7.11.1 Using the nlvm linux unmount Command . 67 7.11.2 Using the umount(8) and ncpcon dismount Commands . 68 7.12 Rescanning for Storage Objects on Known Devices . 68 7.13 Deleting a Linux POSIX Volume . 69 7.13.1 Deleting a Linux POSIX Volume . 69 7.13.2 Deleting an LVM Volume Group and Logical Volume . 70 7.14 Additional Information . 71 8 Clustering LVM Volume Groups with Novell Cluster Services 73 8.1 Requirements for Creating LVM Cluster Resources . 73 8.1.1 Novell Cluster Services . 74 8.1.2 Linux Logical Volume Manager 2 (LVM2) . 74 8.1.3 Clustered Logical Volume Manager Daemon (CLVMD). 74 8.1.4 Resource IP Address. 74 8.1.5 Shared Storage.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • General Specs Copying Connectivity
    General Specs Part no. 27X0128 Packaged Size (mm - H x 24 x 178 x 191 mm W x D) Packaged Weight, kg 0.099 kg Copying Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectivity Network Type IEEE 802.11 b/g/n Wireless SISO 1x1 Connectors One USB port (Type B) for Configuration Network Protocol Support TCP/IP IPv6, TCP/IP IPv4, AppleTalk™, TCP, UDP Network Printing Methods LPR/LPD, Function may vary by printer or MFP., Direct IP (Port 9100), HTTP, Telnet, FTP, TFTP, Enhanced IP (Port 9400), ThinPrint .print integration, IPP 1.0, 1.1, 2.0 (Internet Printing Protocol) Network Management DHCP, APIPA (AutoIP), BOOTP, RARP, mDNS, IGMP, SLPv1, Bonjour, WINS, DDNS, SNMPv3, Function may Protocols vary by printer or MFP., SNMPv2c, Telnet, NTP, ICMP, DNS, ARP, HTTPs (SSL1 /TLS), Finger Network Security IPSec, SNMPv3, 802.1x Authentication: MD5, MSCHAPv2, LEAP, PEAP, TLS, TTLS Wireless Network WEP Encryption (64- and 128-bit key), 1x1 802.11i b/g/n 72Mbps, WPA2™ - Enterprise with Certificate Management, WPA2™ - Personal Supported Operating Systems Microsoft Windows Windows Server 2008 x64 running Terminal Services, Windows Server 2008 x64, Windows Server 2008 running Operating Systems Terminal Services, Windows 8.1, Windows Server 2008 R2 Supported running Terminal Services, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows 8 x64, Windows 7 x64, Windows Server 2012, Windows RT 8.1, Windows XP x64, Windows Server 2003 x64, Windows RT, Windows Server 2003, Windows Server 2012 R2, Windows XP, Windows Server 2003 x64 running
    [Show full text]
  • Windows 7 Bitlocker™ Drive Encryption Security Policy for FIPS 140-2 Validation
    Windows 7 BitLocker™ Security Policy Page 1 of 16 Windows 7 BitLocker™ Drive Encryption Security Policy For FIPS 140-2 Validation For Windows 7 Document version 1.0 08/31/2011 1. Table of Contents 1. TABLE OF CONTENTS ......................................................................................................................... 1 2. INTRODUCTION .................................................................................................................................. 2 2.1 List of Cryptographic Modules ........................................................................................................................... 2 2.2 Brief Module Description ................................................................................................................................... 3 2.3 Validated Platforms ........................................................................................................................................... 4 3. INTEGRITY CHAIN OF TRUST .......................................................................................................... 4 4. CRYPTOGRAPHIC BOUNDARIES ..................................................................................................... 5 4.1 Overall Cryptographic Boundary........................................................................................................................ 5 4.2 BitLocker™ Components Included in the Boundary .......................................................................................... 5 4.3 Other Windows
    [Show full text]
  • Micro Focus File Reporter 3.6 Installation Guide
    Micro Focus File Reporter 3.6 Installation Guide January 6, 2020 Legal Notices Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Condrey Corporation makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to make changes to any and all parts of the software at any time, without obligation to notify any person or entity of such revisions or changes. See the Software EULA for full license and warranty information with regard to the Software. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Condrey Corporation assumes no responsibility for your failure to obtain any necessary export approvals.
    [Show full text]
  • Partition - Partitioning a Hard Drive
    Partition - Partitioning a hard drive What is a partition? The partitioning of a hard drive occurs after the drive has been physically formatted but before it is logically formatted. It involves creating areas on the disk where data will not be mixed. It can be used, for example, to install differentoperating systems that do not use the same file system. There will therefore be at least as many partitions as there are operating systems using different file systems. If you are using just one operating system, a single partition the full size of the disk is sufficient, unless you want create several partitions so as to have, for example, several drives on which data are kept separate. There are three types of partitions: primary partitions, extended partitions andlogical drives. A disk may contain up to four primary partitions (only one of which can be active), or three primary partitions and one extended partition. In the extended partition, the user can create logical drives (i.e. "simulate" several smaller-sized hard drives). Let's look at an example where the disk contains one primary partition and one extended partition made up of three logical drives (later we will look at multiple primary partitions): For DOS systems (DOS, Windows 9x), only the primary partition is bootable, and is therefore the only one on which the operating system can be started. Partitioning is the process of writing the sectors that will make up the partition table (which contains information on the partition: size in sectors, position with respect to the primary partition, types of partitions present, operating systems installed,...).
    [Show full text]
  • Netbackup ™ Enterprise Server and Server 8.0 - 8.X.X OS Software Compatibility List Created on September 08, 2021
    Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List Created on September 08, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046611/en_US/nbu_80_scl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List 2021-09-08 Introduction This Software Compatibility List (SCL) document contains information for Veritas NetBackup 8.0 through 8.x.x. It covers NetBackup Server (which includes Enterprise Server and Server), Client, Bare Metal Restore (BMR), Clustered Master Server Compatibility and Storage Stacks, Deduplication, File System Compatibility, NetBackup OpsCenter, NetBackup Access Control (NBAC), SAN Media Server/SAN Client/FT Media Server, Virtual System Compatibility and NetBackup Self Service Support. It is divided into bookmarks on the left that can be expanded. IPV6 and Dual Stack environments are supported from NetBackup 8.1.1 onwards with few limitations, refer technote for additional information <http://www.veritas.com/docs/100041420> For information about certain NetBackup features, functionality, 3rd-party product integration, Veritas product integration, applications, databases, and OS platforms that Veritas intends to replace with newer and improved functionality, or in some cases, discontinue without replacement, please see the widget titled "NetBackup Future Platform and Feature Plans" at <https://sort.veritas.com/netbackup> Reference Article <https://www.veritas.com/docs/100040093> for links to all other NetBackup compatibility lists.
    [Show full text]
  • Windows 10 Volume Licensing Overview
    Edition & Licensing Details Windows 10 Desktop Editions Edition Benefits Delivery of Updates Deployment Options Path to buy Home • Familiar and personal experience • Windows Update • Current Branch • OEM • All-new browser great for doing things online • Retail/ESD Consumers & BYOD • New ways to get organized and be productive • Free upgrade1 • Up-to-date with latest security and features • Management for BYOD scenarios Pro • Management of devices and apps • Windows Update • Current Branch • OEM • Support for remote and mobile scenarios • Windows Update • Current Branch for Business • Retail/ESD Small, for Business lower mid-size • Cloud technologies for organizations • VL businesses • Update quality confidence with broad • WSUS • Free upgrade1 market validation Enterprise2 • Advanced security • Windows Update • Current Branch • VL • Full flexibility of OS deployment • Windows Update • Current Branch for Business Mid-size and large for Business enterprises • Advanced device and app management • Long Term Servicing Branch • Microsoft Desktop Optimization Pack (MDOP) • WSUS 1. For qualified Windows 7/8.1 devices 2. Some of these benefits require Software Assurance Windows 10 Pro in Volume Licensing Windows 10 Pro in Volume Licensing is sold only as an upgrade Standalone upgrade licenses are available through Open License and Select Plus/MPSA. Requires a qualified underlying operating system license Current Branch/Current Branch for Business Qualifying Operating Systems The following operating systems qualify for the Windows 10 Pro Upgrade
    [Show full text]
  • System Administration Storage Systems Agenda
    System Administration Storage Systems Agenda Storage Devices Partitioning LVM File Systems STORAGE DEVICES Single Disk RAID? RAID Redundant Array of Independent Disks Software vs. Hardware RAID 0, 1, 3, 5, 6 Software RAID Parity done by CPU FakeRAID Linux md LVM ZFS, btrfs ◦ Later Hardware RAID RAID controller card Dedicated hardware box Direct Attached Storage SAS interface Storage Area Network Fiber Channel iSCSI ATA-over-Ethernet Fiber Channel Network Attached Storage NFS CIFS (think Windows File Sharing) SAN vs. NAS PARTITIONING 1 File System / Disk? 2 TB maybe… 2TB x 12? 2TB x 128 then? Partitioning in Linux fdisk ◦ No support for GPT Parted ◦ GParted Fdisk Add Partition Delete Partition Save & Exit Parted Add Partition Change Units Delete Partition No need to save Any action you do is permanent Parted will try to update system partition table Script support parted can also take commands from command line: ◦ parted /dev/sda mkpart pri ext2 1Mib 10Gib Resize (Expand) 1. Edit partition table ◦ Delete and create with same start position 2. Reload partition table ◦ Reboot if needed 3. Expand filesystem Resize (Shrink) 1. Shrink filesystem ◦ Slightly smaller than final 2. Edit partition table ◦ Delete and create with same start position 3. Reload partition table ◦ Reboot if needed 4. Expand filesystem to fit partition No Partition Moving LOGICAL VOLUME MANAGER What is LVM? A system to manage storage devices Volume == Disk Why use LVM? Storage pooling Online resizing Resize any way Snapshots Concepts Physical Volume ◦ A disk or partition Volume Group ◦ A group of PVs Logical Volume ◦ A virtual disk/partition Physical Extent ◦ Data blocks of a PV Using a partition for LVM Best to have a partition table 1.
    [Show full text]
  • Change System Partition Drive Letter
    Change System Partition Drive Letter superfluouslyExogamous Isaiah while sublettingJohn remains atop. aerological Diagnostic and Skippy vatic. pockets chock. Raiding Conway pressured very HowTo Remove the heat Reserved water from Windows. You may unsubscribe at constant time. This is already been copied right place it to lvm and other partitions of the main interface and backup of. If to install device drivers, from drives whose letter needs to be changed, in CONFIG. How should change in drive like from C to common other letter. To beg an existing drive page on a stocking on a mate or convene a. All comments containing links and certain keywords will be moderated before publication. Now persist for available letter and were missing, footer and needs to make sure where applications or in. Does a systems? Against the operating system subsequently changing the quote letter. Shows garbage instead. I don't suggest changing the SRP's permissions on a production computer. Saved hours tearing out. They system partitions with these letters changed, change drive partitioning changes, and a systems may occur when windows on a single partition and you? In the Disk Management window frame can typically right-click to partition the interest cost Change Drive Letters and Paths click bounce and. Stellar Data Recovery Toolkit is an advanced software, trusted by tech. We can fill it might help. Also learn with. They contain partitions like Primary partitions and Logical drives which are typically. Windows for my external USB device like a tame drive or USB stick. Disk Management Console can also provides ability to express drive letters or paths.
    [Show full text]
  • Netinfo 2009-06-11 Netinfo 2009-06-11
    Netinfo 2009-06-11 Netinfo 2009-06-11 Microsoft släppte 2009-06-09 tio uppdateringar som täpper till 31 stycken säkerhetshål i bland annat Windows, Internet Explorer, Word, Excel, Windows Search. 18 av buggfixarna är märkta som kritiska och elva av dem är märkta som viktiga, uppdateringarna finns för både servrar och arbetsstationer. Säkerhetsuppdateringarna finns tillgängliga på Windows Update. Den viktigaste säkerhetsuppdateringen av de som släpptes är den för Internet Explorer 8. Netinfo 2009-06-11 Security Updates available for Adobe Reader and Acrobat Release date: June 9, 2009 Affected software versions Adobe Reader 9.1.1 and earlier versions Adobe Acrobat Standard, Pro, and Pro Extended 9.1.1 and earlier versions Severity rating Adobe categorizes this as a critical update and recommends that users apply the update for their product installations. These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Netinfo 2009-06-11 SystemRescueCd Description: SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your system and recovering your data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It contains a lot of system tools (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It is very easy to use: just boot the CDROM. The kernel supports most of the important file systems (ext2/ext3/ext4, reiserfs, reiser4, btrfs, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs).
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]