TrueNAS® 11.1-U7 User Guide Copyright iXsystems 2011-2019 CONTENTS Welcome ................................................... ...... 8 Typographic Conventions ................................................ 9 1 Introduction 10 1.1 Path and Name Lengths ............................................. 10 2 Initial Setup 12 2.1 Out-of-Band Management ............................................ 12 2.2 Console Setup Menu ............................................... 22 2.3 Accessing the Administrative GUI ........................................ 23 3 Account 26 3.1 Groups ................................................... .... 26 3.2 Users ................................................... ..... 28 4 System 33 4.1 Information ................................................... 33 4.2 General ................................................... .... 34 4.3 Boot ................................................... ...... 37 4.4 Advanced ................................................... ... 39 4.4.1 Autotune ................................................. 41 4.4.2 Self-Encrypting Drives .......................................... 42 4.5 Email ................................................... ..... 43 4.6 System Dataset .................................................. 44 4.7 Tunables ................................................... ... 45 4.8 Update ................................................... .... 48 4.8.1 Preparing for Updates .......................................... 48 4.8.2 Updates and Trains ........................................... 48 4.8.3 Checking for Updates .......................................... 49 4.8.4 Applying Updates ............................................. 49 4.8.5 Manual Updates ............................................. 49 4.8.6 Updating from the Shell ......................................... 50 4.8.7 Updating an HA System ......................................... 50 4.8.8 If Something Goes Wrong ........................................ 50 4.8.9 Upgrading a ZFS Pool .......................................... 50 4.9 Cloud Credentials ................................................. 51 4.10 Alert Services ................................................... 54 4.10.1 How it Works ............................................... 55 4.11 CAs ................................................... ...... 55 4.12 Certificates ................................................... .. 58 4.13 Support ................................................... .... 61 4.14 Proactive Support ................................................. 63 4.15 View Enclosure .................................................. 64 4.16 Failover ................................................... .... 65 3 5 Tasks 68 5.1 CloudSync ................................................... .. 68 5.1.1 Cloud Sync Example ........................................... 71 5.2 Cron Jobs ................................................... ... 73 5.3 Init/Shutdown Scripts ............................................... 75 5.4 Rsync Tasks ................................................... 76 5.4.1 Rsync Module Mode ........................................... 80 5.4.2 Rsync over SSH Mode .......................................... 80 5.5 S.M.A.R.T. Tests .................................................. 83 6 Network 86 6.1 Global Configuration ............................................... 86 6.2 Interfaces ................................................... .. 88 6.3 IPMI ................................................... ...... 92 6.4 Link Aggregations ................................................. 93 6.4.1 LACP, MPIO, NFS, and ESXi ....................................... 94 6.4.2 Creating a Link Aggregation ....................................... 94 6.5 Network Summary ................................................ 98 6.6 Static Routes ................................................... 98 6.7 VLANs ................................................... ..... 98 7 Storage 100 7.1 Swap Space ................................................... 100 7.2 Volumes ................................................... 100 7.2.1 Volume Manager .............................................101 7.2.1.1 Encryption ............................................103 7.2.1.2 Encryption Performance ....................................104 7.2.1.3 Manual Setup ..........................................104 7.2.1.4 Extending a ZFS Volume ....................................105 7.2.2 Change Permissions ...........................................106 7.2.3 Create Dataset ..............................................108 7.2.3.1 Compression ...........................................110 7.2.4 Create zvol ................................................111 7.2.5 Import Disk ................................................112 7.2.6 Import Volume ..............................................113 7.2.6.1 Importing an Encrypted Pool ..................................114 7.2.7 View Disks .................................................115 7.2.8 Volumes ..................................................116 7.2.8.1 Managing Encrypted Volumes .................................119 7.2.8.2 Additional Controls for Encrypted Volumes .........................119 7.2.9 View Multipaths ..............................................122 7.2.10 Replacing a Failed Drive .........................................122 7.2.10.1 Replacing an Encrypted Drive .................................124 7.2.10.2 Removing a Log or Cache Device ...............................124 7.2.11 Replacing Drives to Grow a ZFS Pool ..................................124 7.2.12 Adding Spares ..............................................125 7.3 Periodic Snapshot Tasks .............................................125 7.4 Replication Tasks .................................................127 7.4.1 Examples: Common Configuration ...................................127 7.4.1.1 Alpha (Source) ..........................................127 7.4.1.2 Beta (Destination) ........................................128 7.4.2 Example: TrueNAS® to TrueNAS® Semi-Automatic Setup ......................128 7.4.3 Example: TrueNAS® to TrueNAS® Dedicated User Replication ...................130 7.4.4 Example: TrueNAS® to TrueNAS® or Other Systems, Manual Setup ................131 7.4.4.1 Encryption Keys .........................................131 7.4.5 Replication Options ...........................................134 7.4.6 Replication Encryption ..........................................135 7.4.7 Limiting Replication Times ........................................135 7.4.8 Replication Topologies and Scenarios .................................135 7.4.8.1 Star Replication .........................................135 7.4.8.2 Tiered Replication ........................................136 7.4.8.3 N-way Replication ........................................136 7.4.8.4 Disaster Recovery ........................................136 7.4.9 Troubleshooting Replication ......................................136 7.4.9.1 SSH ................................................136 7.4.9.2 Compression ...........................................137 7.4.9.3 Manual Testing ..........................................137 7.5 Resilver Priority ..................................................137 7.6 Scrubs ................................................... 138 7.7 Snapshots ................................................... 141 7.7.1 Browsing a snapshot collection .....................................143 7.8 VMware-Snapshot .................................................143 8 Directory Services 145 8.1 Active Directory ..................................................145 8.1.1 Troubleshooting Tips ...........................................149 8.1.2 If the System Does not Join the Domain ................................149 8.2 LDAP ................................................... .150 8.3 NIS ................................................... .. ... .153 8.4 Kerberos Realms .................................................154 8.5 Kerberos Keytabs .................................................154 8.6 Kerberos Settings .................................................155 9 Sharing 157 9.1 Apple (AFP) Shares ................................................158 9.1.1 Creating AFP Guest Shares .......................................160 9.2 Unix (NFS) Shares .................................................161 9.2.1 Example Configuration .........................................165 9.2.2 Connecting to the Share .........................................165 9.2.2.1 From BSD or Linux ........................................165 9.2.2.2 From Microsoft .........................................166 9.2.2.3 From macOS ...........................................166 9.2.3 Troubleshooting NFS ...........................................167 9.3 WebDAV Shares ..................................................168 9.4 Windows (SMB) Shares ..............................................169 9.4.1 Configuring Unauthenticated Access ..................................174 9.4.2 Configuring Authenticated Access With Local Users .........................175 9.4.3 Configuring Shadow Copies .......................................178 9.5 Block (iSCSI) ................................................... 179 9.5.1 Target Global Configuration .......................................181 9.5.2 Portals ................................................... 182 9.5.3 Initiators ..................................................183
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages311 Page
-
File Size-