Truenas® 11.2-U6.1 User Guide Copyright Ixsystems 2011-2019 CONTENTS

Truenas® 11.2-U6.1 User Guide Copyright Ixsystems 2011-2019 CONTENTS

TrueNAS® 11.2-U6.1 User Guide Copyright iXsystems 2011-2019 CONTENTS Welcome ................................................... ...... 7 Typographic Conventions ................................................ 8 1 Introduction 9 1.1 Contacting iXsystems ............................................... 9 1.2 Path and Name Lengths ............................................. 9 2 Initial Setup 11 2.1 Console Setup Menu ............................................... 11 2.2 Accessing the Administrative GUI ........................................ 13 3 Account 16 3.1 Groups ................................................... .... 16 3.2 Users ................................................... ..... 19 4 System 23 4.1 Information ................................................... 23 4.2 General ................................................... .... 24 4.3 Boot ................................................... ...... 27 4.4 Advanced ................................................... ... 29 4.4.1 Autotune ................................................. 31 4.4.2 Self-Encrypting Drives .......................................... 31 4.4.2.1 Deploying SEDs ......................................... 32 4.4.2.2 Check SED Functionality .................................... 33 4.5 Email ................................................... ..... 34 4.6 System Dataset .................................................. 35 4.7 Tunables ................................................... ... 36 4.8 Cloud Credentials ................................................. 39 4.9 Update ................................................... .... 42 4.9.1 Preparing for Updates .......................................... 42 4.9.2 Updates and Trains ........................................... 42 4.9.3 Checking for Updates .......................................... 43 4.9.4 Applying Updates ............................................. 43 4.9.5 Manual Updates ............................................. 44 4.9.6 Updating from the Shell ......................................... 44 4.9.7 Updating an HA System ......................................... 44 4.9.8 If Something Goes Wrong ........................................ 44 4.9.9 Upgrading a ZFS Pool .......................................... 45 4.10 Alerts ................................................... ..... 46 4.11 Alert Services ................................................... 47 4.12 CAs ................................................... ...... 48 4.13 Certificates ................................................... .. 50 4.14 Support ................................................... .... 53 4.15 Proactive Support ................................................. 55 3 4.16 View Enclosure .................................................. 56 4.17 Failover ................................................... .... 57 5 Tasks 60 5.1 CloudSync ................................................... .. 60 5.1.1 Cloud Sync Example ........................................... 63 5.2 Cron Jobs ................................................... ... 65 5.3 Init/Shutdown Scripts ............................................... 67 5.4 Rsync Tasks ................................................... 68 5.4.1 Rsync Module Mode ........................................... 72 5.4.2 Rsync over SSH Mode .......................................... 72 5.5 S.M.A.R.T. Tests .................................................. 75 6 Network 78 6.1 Global Configuration ............................................... 78 6.2 Interfaces ................................................... .. 80 6.3 IPMI ................................................... ...... 84 6.4 Link Aggregations ................................................. 85 6.4.1 LACP, MPIO, NFS, and ESXi ....................................... 86 6.4.2 Creating a Link Aggregation ....................................... 86 6.5 Network Summary ................................................ 90 6.6 Static Routes ................................................... 90 6.7 VLANs ................................................... ..... 90 7 Storage 92 7.1 Swap Space ................................................... 92 7.2 Volumes ................................................... ... 92 7.2.1 Volume Manager ............................................. 93 7.2.1.1 Encryption ............................................ 95 7.2.1.2 Encryption Performance .................................... 96 7.2.1.3 Manual Setup .......................................... 96 7.2.1.4 Extending a ZFS Volume .................................... 97 7.2.2 Change Permissions ........................................... 98 7.2.3 Create Dataset ..............................................100 7.2.3.1 Compression ...........................................102 7.2.4 Create zvol ................................................103 7.2.5 Import Disk ................................................104 7.2.6 Import Volume ..............................................105 7.2.6.1 Importing an Encrypted Volume ................................106 7.2.7 View Disks .................................................107 7.2.8 Volumes ..................................................109 7.2.8.1 Managing Encrypted Volumes .................................112 7.2.8.2 Additional Controls for Encrypted Volumes .........................112 7.2.9 View Multipaths ..............................................115 7.2.10 Replacing a Failed Drive .........................................115 7.2.10.1 Replacing an Encrypted Drive .................................117 7.2.10.2 Removing a Log or Cache Device ...............................117 7.2.11 Replacing Drives to Grow a ZFS Pool ..................................117 7.2.12 Adding Spares ..............................................118 7.3 Periodic Snapshot Tasks .............................................118 7.4 Replication Tasks .................................................120 7.4.1 Examples: Common Configuration ...................................120 7.4.1.1 Alpha (Source) ..........................................120 7.4.1.2 Beta (Destination) ........................................121 7.4.2 Example: TrueNAS® to TrueNAS® Semi-Automatic Setup ......................121 7.4.3 Example: TrueNAS® to TrueNAS® Dedicated User Replication ...................123 7.4.4 Example: TrueNAS® to TrueNAS® or Other Systems, Manual Setup ................124 7.4.4.1 Encryption Keys .........................................124 7.4.5 Replication Options ...........................................128 7.4.6 Replication Encryption ..........................................129 7.4.7 Limiting Replication Times ........................................129 7.4.8 Replication Topologies and Scenarios .................................129 7.4.8.1 Star Replication .........................................129 7.4.8.2 Tiered Replication ........................................130 7.4.8.3 N-way Replication ........................................130 7.4.8.4 Disaster Recovery ........................................130 7.4.9 Troubleshooting Replication ......................................130 7.4.9.1 SSH ................................................130 7.4.9.2 Compression ...........................................131 7.4.9.3 Manual Testing ..........................................131 7.5 Resilver Priority ..................................................131 7.6 Scrubs ................................................... 132 7.7 Snapshots ................................................... 135 7.7.1 Browsing a snapshot collection .....................................137 7.8 VMware-Snapshot .................................................137 8 Directory Services 139 8.1 Active Directory ..................................................139 8.1.1 Troubleshooting Tips ...........................................144 8.1.2 If the System Does not Join the Domain ................................144 8.2 LDAP ................................................... .145 8.3 NIS ................................................... .. ... .148 8.4 Kerberos Realms .................................................149 8.5 Kerberos Keytabs .................................................149 8.6 Kerberos Settings .................................................150 9 Sharing 151 9.1 Apple (AFP) Shares ................................................152 9.1.1 Creating AFP Guest Shares .......................................154 9.2 Unix (NFS) Shares .................................................156 9.2.1 Example Configuration .........................................160 9.2.2 Connecting to the Share .........................................160 9.2.2.1 From BSD or Linux ........................................160 9.2.2.2 From Microsoft .........................................161 9.2.2.3 From macOS ...........................................161 9.2.3 Troubleshooting NFS ...........................................162 9.3 WebDAV Shares ..................................................163 9.4 Windows (SMB) Shares ..............................................164 9.4.1 Configuring Unauthenticated Access ..................................170 9.4.2 Configuring Authenticated Access With Local Users .........................171 9.4.3 User Quota Administration .......................................173 9.4.4 Configuring Shadow Copies .......................................173 9.5 Block (iSCSI) ..................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    261 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us