No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

OceanStor 9000 V300R006C00 File System Feature Guide 12

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring InfoLocker

Configuring InfoLocker

This section describes the procedure for configuring InfoLocker.

Configuration Procedure

This section describes how to configure InfoLocker.

Figure 7-5 shows the InfoLocker configuration procedure.
Figure 7-5  InfoLocker configuration procedure
Table 7-8 describes each InfoLocker configuration step.
Table 7-8  InfoLocker configuration procedure
No. Step Description
1 Set the WORM clock and the directory for storing logs. The WORM clock and the directory for storing WORM logs cannot be changed once being set.
2 Create a WORM root directory. Create a WORM root directory and set the directory path and the retention period.
3 (Optional) Make files enter the locked state. When files are locked, the files can be read but cannot be written.

Setting the WORM Clock and Log Directory

This section describes how to set the WORM clock and log directory.

Prerequisites

  • You have obtained the license.
  • The directory for storing WORM logs has been created.

Context

  • WORM clock

    To keep protection periods of directories or files unchanged even when the cluster time changes, when WORM properties are configured for a directory or file, the directory or file uses a WORM clock to perform timing. After a WORM clock is set, the system starts timing based on the clock, so that files are correctly protected even though the local clock time is changed.

    A WORM clock can only be set once, and cannot be modified after being set.

    The relationship between a WORM clock and cluster time is as follows:

    • If the cluster time is earlier than the WORM clock time, the WORM clock time moves forward 138 seconds more than the cluster time every hour.
    • If the cluster time is later than the WORM clock time, adjust the clock time to the cluster time.
    NOTE:
    If you change the cluster time, the WORM clock will be adjusted accordingly.
  • WORM log

    WORM logs record WORM operations based on time. Logs generated each month are recorded as a WORM file. The WORM file can be appended but cannot be modified or deleted to prevent it from being falsely deleted or tampered with.

Procedure

  1. Set the WORM clock.

    NOTE:
    The WORM clock cannot be changed once being set.

    1. Choose Settings > Cluster Settings > WORM Settings.
    2. Click Settings. Set the WORM clock.
    3. Then click OK to complete the settings.
  2. Set the directory for storing WORM logs.

    NOTE:
    The directory for storing WORM logs cannot be changed or deleted once being set. Do not write data into the directory.

    1. Click Settings. Set the directory for storing WORM logs.

      NOTE:
      • The directory for storing WORM logs is empty.
      • Retention period have not been set for the directory for storing WORM logs.

    2. Then click OK to complete the settings.

Creating a WORM Root Directory

This procedure will guide you to create a WORM root directory.

Prerequisites

  • A directory is available to be configured as a WORM root directory.
  • The directory has been shared.
  • The directory is empty.
  • The number of existing WORM root directories is below the upper limit of 128.

Context

When a directory is set as a WORM root directory, all subdirectories, new directories, and new files under this directory automatically obtain the WORM properties of the directory. The property parameters can be configured only when the WORM root directory is being configured and cannot be modified.

A WORM root directory does not support nesting. If WORM has been configured for a root directory, WORM can be configured for none of the subdirectories in the directory. All subdirectories, new directories, and new files under this directory automatically obtain the WORM properties of the directory.

Parameters
Table 7-9  Parameters for creating a WORM root directory
Parameter Description Value
Directory Name of the WORM root directory to be created.

You can enter the directory name or click Select to select an existing directory.

[Format]

/directory name

[Value]

/dir

Set Mode This parameter can be set to enterprise compliance mode or the regulatory compliance mode.
  • Enterprise compliance mode: The super administrator can delete the protected files.
  • Regulatory compliance mode: No one can delete the protected files.

This version supports the enterprise compliance mode only.

[Value]

Enterprise compliance mode

Set Retention

Period during which files can be read but cannot be deleted or modified.

  • Min. Retention: Lower limit of the retention period.
  • Max. Retention: Upper limit of the retention period.
  • Default Retention: If the user has not set the retention. If no atime is set: atime(time when a file expires) = mtime (time when a file's content is last changed) +Automatic lockout duration + Default protection period
  • Automatic Lockup: Interval for automatic locking. After you modify and close a file and leave the file unchanged until the automatic lockup period is reached, the file enters the Locked state.
[Value range]
  • Min Retention: 0 hours to 30 years or Indefinite. One year by default.
  • Max Retention: 1 hours to 70 years or Indefinite. 70 years by default.
  • Default Retention: The value of the Min. retention period to the Max. retention period. The value of the Min. retention period by default.
    NOTE:
    To set the default protection period to Indefinite, you must set the maximum protection period to Indefinite. Otherwise, the setting fails.
  • Automatic Lockup: One minute to 45 days. 2 hours by default.

Procedure

  1. Creating a WORM root directory.
    1. Choose Provisioning > InfoLocker.
    2. On InfoLocker, click Create.
    3. In the Create WORM dialog box, set parameters. Figure 7-6 shows the settings page.

      For details about the parameters, see Table 7-9.

      Figure 7-6  Create a WORM root directory

    4. Click OK to complete the creation.

(Optional) Making WORM Files Enter the Locked State

This section describes how to make WORM files enter the locked state.

Prerequisites

  • The client communicates properly with the front-end service network of the OceanStor 9000.
  • A WORM root directory has been created and shared.

Context

WORM files can enter the locked state automatically or manually. Files in the locked state are read-only.

  • Automatic submitting for protection: If operations, such as writing data and modifying WORM properties are not performed on files in WORM directories within the preset period of automatic submitting for protection, the files automatically enter the Locked state.

    The system starts a scanning task to analyze files in WORM directories. If the files are in the Not Locked or Appended state and mtime (time elapsed since the last modification) has exceeded the automatic lock time of the files, the system automatically disables the write permission for the files and the files enters the Locked state.

  • Manual submitting for protection: If the write permission of files in WORM directories are manually disabled or the files are set to read-only, the files enter the Locked state.

Procedure

  • Enter the locked state automatically.
    1. Access a WORM directory in shared mode.
    2. Create a file and do not access it within the automatic lockup period.
  • Enter the locked state manually.
    1. Access a WORM directory in shared mode.
    2. Remove the file write permission or set the file permission to read-only.

      • On a Linux client: Run chmod -w filename to remove the file write permission.
      • On a Windows client: right-click the file and select Read-only.

Follow-up Procedure

When files are locked, common users can read but cannot modify the files.

  • You can append data to empty files in the Append-only state, but you cannot delete the files. There are two scenarios for appending:
    • When the file size is smaller than 1 MB, you can continue to append data to the files or modify the file content.
    • When the file size is larger than 1 MB, you can continue to append data to the files. The 1 MB data that was written to the files the most recently can be modified and thus is not protected, but other data in the files is protected.
    After you complete the appending and disable the write permission on the files, the files enter the Locked state again.
  • To delete a locked file, contact the super administrator for help.

Translation
Download
Updated: 2019-06-27

Document ID: EDOC1000122519

Views: 78630

Downloads: 147

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next