Single Node Administrator's Guide

Single Node Administrator's Guide

Hitachi Data Ingestor Single Node Administrator's Guide Product Version Getting Help Contents MK-90HDI039-21 © 2013- 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://support.hds.com/en_us/documents.html. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries. Archivas, Essential NAS Platform, HiCommand, Hi-Track, ShadowImage, Tagmaserve, Tagmasoft, Tagmasolve, Tagmastore, TrueCopy, Universal Star Network, and Universal Storage Platform are registered trademarks of Hitachi Data Systems Corporation. AIX, AS/400, DB2, Domino, DS8000, Enterprise Storage Server, ESCON, FICON, FlashCopy, IBM, Lotus, OS/390, RS6000, S/390, System z9, System z10, Tivoli, VM/ESA, z/OS, z9, zSeries, z/VM, z/VSE are registered trademarks and DS6000, MVS, and z10 are trademarks of International Business Machines Corporation. All other trademarks, service marks, and company names in this document or website are properties of their respective owners. Microsoft product screen shots are reprinted with permission from Microsoft Corporation. ii Hitachi Data Ingestor Single Node Administrator's Guide Contents Preface.................................................................................................. xi Intended audience....................................................................................................xii Product version........................................................................................................ xii Release notes...........................................................................................................xii Organization of HDI manuals.....................................................................................xii Abbreviation conventions......................................................................................... xiii Document conventions.............................................................................................xiv Convention for storage capacity values......................................................................xiv Accessing product documentation..............................................................................xv Getting help.............................................................................................................xv Comments............................................................................................................... xv 1 Logging on...........................................................................................1-1 Logging on to the system........................................................................................ 1-2 2 Managing system administrator accounts............................................... 2-1 Changing an account password................................................................................2-2 Changing account security settings.......................................................................... 2-2 3 Managing shared directories..................................................................3-1 Creating a shared directory......................................................................................3-2 Referencing other HDI data as read-only via the linked HCP...................................... 3-3 Changing the policy and schedule for migrating data to HCP......................................3-4 Setting conditions for preventing certain files from turning into stub files.................... 3-4 Expanding the capacity of a file system.................................................................... 3-5 Importing data from another file server....................................................................3-6 Importing data from another file server by using the CIFS protocol...................... 3-6 Importing data from another file server by using the NFS protocol..................... 3-11 4 Setting up the access environment from clients.......................................4-1 Setting up the access environment from CIFS clients.................................................4-2 Joining a node to an Active Directory domain..................................................... 4-2 Rejoining an Active Directory domain................................................................. 4-4 Joining a node to an NT domain........................................................................ 4-5 iii Hitachi Data Ingestor Single Node Administrator's Guide Configuring a workgroup...................................................................................4-7 Identifying users by user mapping........................................................................... 4-8 Collecting CIFS client access logs........................................................................... 4-10 Setting up the access environment from NFS clients................................................ 4-11 5 Showing previous data..........................................................................5-1 Showing previous data on HCP................................................................................ 5-2 6 Managing disk capacity......................................................................... 6-1 Increasing the number of disks................................................................................6-2 Adding internal hard disks to a node.................................................................. 6-2 Adding LUs to a running storage system.............................................................6-3 Changing the use of disks........................................................................................6-4 Deleting a volume group................................................................................... 6-4 Deleting LUs that are not being used by file systems from a volume group........... 6-4 7 Protecting user data..............................................................................7-1 Setting up virus scanning........................................................................................ 7-2 Backing up data to a tape device............................................................................. 7-2 Restoring data from a tape device............................................................................7-4 8 Backing up system configuration............................................................8-1 Manually backing up the system configuration.......................................................... 8-2 Regularly backing up system configuration............................................................... 8-2 9 Changing the network configuration.......................................................9-1 Changing the IP address of a node...........................................................................9-2 Changing the host name of a node...........................................................................9-3 Adding and deleting routing information...................................................................9-4 Adding routing information................................................................................9-4 Deleting routing information..............................................................................9-4 Changing the negotiation mode............................................................................... 9-5 Changing the negotiation mode (for a non-cascaded trunk port).......................... 9-5 Changing the negotiation mode (for a cascaded trunk port).................................9-6 Setting up redundant link configuration.................................................................... 9-7 Setting link aggregation.................................................................................... 9-7 Setting link alternation...................................................................................... 9-8 Combining link aggregation and link alternation (cascaded trunking).................... 9-9 Performing manual link alternation...................................................................9-10 Setting up a VLAN.................................................................................................9-10 10 Monitoring the system....................................................................... 10-1 Using SNMP..........................................................................................................10-2

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    458 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us