Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies
Total Page:16
File Type:pdf, Size:1020Kb
Front cover Implementing NFSv4 in the Enterprise: Planning and Migration Strategies Planning and implementation examples for AFS and DFS migrations NFSv3 to NFSv4 migration examples NFSv4 updates in AIX 5L Version 5.3 with 5300-03 Recommended Maintenance Package Gene Curylo Richard Joltes Trishali Nayar Bob Oesterlin Aniket Patel ibm.com/redbooks International Technical Support Organization Implementing NFSv4 in the Enterprise: Planning and Migration Strategies December 2005 SG24-6657-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (December 2005) This edition applies to Version 5, Release 3, of IBM AIX 5L (product number 5765-G03). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiv Acknowledgments . xv Become a published author . xvi Comments welcome. xvii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 Overview of enterprise file systems. 4 1.2 The migration landscape today . 5 1.3 Strategic and business context . 6 1.4 Why NFSv4? . 7 1.5 The rest of this book . 8 Chapter 2. Shared file system concepts and history. 11 2.1 Characteristics of enterprise file systems . 12 2.1.1 Replication . 12 2.1.2 Migration . 12 2.1.3 Federated namespace . 13 2.1.4 Caching . 13 2.2 Enterprise file system technologies. 13 2.2.1 Sun Network File System (NFS) . 13 2.2.2 Andrew File System (AFS) . 14 2.2.3 Distributed Computing Environment/Distributed File System . 15 2.3 General considerations when using enterprise file systems . 16 Part 2. NFSv4 on AIX 5L V5.3. 19 Chapter 3. NFSv4 implementation . 21 3.1 Implementation of the NFSv4 protocol in AIX 5L V5.3 . 22 3.2 NFSv4 features supported in the initial AIX 5L V5.3 release . 22 3.2.1 External namespace (exname) support . 23 3.2.2 FSIDs and file handles . 25 3.3 Features introduced in AIX 5L V5.3 RML03 . 26 3.3.1 Delegation . 27 © Copyright IBM Corp. 2005. All rights reserved. iii 3.3.2 Referral . 30 3.3.3 Replication . 36 3.4 List of NFSv4 features supported in AIX 5L V5.3 . 50 Chapter 4. Using NFSv4 with JFS2 or GPFS . 53 4.1 AIX 5L enhanced journaled file system (JFS2) . 54 4.1.1 Comparing JFS2 with JFS . 56 4.1.2 JFS2 advanced features . 57 4.1.3 Using JFS2 with NFSv4 . 59 4.1.4 JFS2 ACLs versus NFSv4 ACLs. 59 4.1.5 How do we implement inheritance NFSv4 ACLs? . 62 4.2 General Parallel File System (GPFS) . 63 4.2.1 Why GPFS? . 66 4.2.2 GPFS advantages. 67 4.2.3 When to consider GPFS . 70 4.2.4 Planning considerations for GPFS . 70 4.2.5 Using NFSv4 with GPFS. 70 4.2.6 NFSv4 export considerations for GPFS . 72 4.2.7 NFS usage of GPFS cache. 72 4.2.8 NFSv4 ACL administration . 72 4.2.9 NFS client with stale inode data . 79 4.3 Backup considerations . 79 Chapter 5. Using NFSv4 features. 81 5.1 Using the cache file system (CacheFS) . 82 5.1.1 CacheFS performance benefits . 82 5.1.2 CacheFS performance impacts. 83 5.1.3 Configuring CacheFS . 84 5.2 Managing LDAP automount maps . 85 5.3 Pseudo file system . 87 5.4 NFSv4 ACLs . 90 5.4.1 NFSv4 ACLs: ACL evaluation . 95 5.4.2 NFSv4 ACLs: Administration. 98 5.4.3 NFSv4 ACLs: ACL inheritance and umask . 103 5.4.4 NFSv4 ACLs: Permissions scenarios . 110 5.4.5 NFSv4 ACLs: ACL evaluation flowchart for NFSv4 . 112 5.4.6 NFSv4 ACLs: NFSv3 clients . 114 Part 3. Preparing to use NFSv4 . 115 Chapter 6. Building an NFSv4 environment . 119 6.1 Environment used for demonstration scenarios . 120 6.2 Infrastructure setup flow . 120 6.3 Network Time Protocol (NTP) configuration . 122 iv Implementing NFSv4 in the Enterprise: Planning and Migration Strategies 6.4 IBM Tivoli Directory Server V5.2 . 122 6.4.1 Preparing the system for IBM Tivoli Directory Server installation . 124 6.4.2 Installing IBM Tivoli Directory Server . 126 6.4.3 Configuring IBM Tivoli Directory Server . 127 6.4.4 Configuring Tivoli Directory Server to be a client of itself . 133 6.5 IBM Network Authentication Services (Kerberos V5) server installation. 134 6.5.1 Setting up the environment . 134 6.5.2 Configuring the NAS server . 134 6.6 IBM Tivoli Directory Server client configuration. 140 6.7 IBM Network Authentication Services client install and configuration . 141 6.7.1 Integrated login (single sign-on) . 141 6.7.2 Standard login . 143 6.7.3 Adding NAS users. 144 6.7.4 Migrating existing users into NAS . 147 6.7.5 Installation details . 149 6.8 Installing GPFS . 150 6.8.1 Preparing the GPFS nodes for installation . 151 6.8.2 Creating the GPFS directory . 151 6.8.3 Creating the GPFS installation table of contents file. 152 6.8.4 Installing GPFS through the network . 152 6.8.5 Verifying the GPFS installation . 153 6.9 Configuring GPFS ..