Viewing the Properties of a WORM File System
This operation allows you to view the properties of a WORM file system.
Prerequisites
- A WORM file system has been created.
- You have the permission to view the properties of the WORM file system.
Procedure
- Choose
Provisioning >
File System.
- View the general properties of the WORM file system. Table 4-1 describes related parameters.Table 4-1 Basic file system information
Parameter
Description
Example Value
Name
Name of the file system.
FileSystem001
ID
ID of the file system.
1
Health Status
Health status of the file system.
Normal
Running Status
Running status of the file system.
Online
Type
Configuration type of the file system.
Thick file system
WORM
WORM mode of the file system.
Regulatory compliance
Total Capacity
Total capacity of the file system.
1.000GB
Available Capacity
Available capacity of the file system.
500.000MB
Owning Storage Pool
Owning storage pool of the file system.
StoragePool000
Owning Storage Pool ID
Owning storage pool ID of the file system.
[Example]
8
Owning Controller
Owning controller of the file system.
CTE0.A
vStore Name
Owning vStore of the file system.
vStore001
vStore ID
Owning vStore ID of the file system.
1
Clone
Whether the file system is a clone.
[Example]
No
SmartTier
Whether the SmartTier is enabled.
[Example]
No
Allocated Capacity
Allocated capacity (including the prefetch capacity) of the file system in the storage pool.
[Example]
80.000 GB
Read-write Status
Operation permission on the file system. The value can be:
- Inaccessible: The file system is inaccessible.
- Read-only: The file system can be accessed but cannot be modified.
- Read-write: The file system can be accessed and modified.
[Example]
Read-write
Used Capacity Ratio
Percentage of the used file system capacity in the total file system capacity.
[Example]
13%
Security Style
The security style defines the access control mechanism of the file system accessible through multiple protocols.
- Mixed
Applies to the scenario in which both CIFS and NFS users can access and control the file system. Either CIFS or NFS permissions are valid. The latest configured permissions prevail.
- Native
Applies to the scenario in which Windows NT ACLs control CIFS users' permissions and UNIX mode bits control NFS users' permissions. In this mode, Windows NT ACLs and UNIX mode bits will neither affect nor synchronize with each other.
- For CIFS share access, the system checks whether a Windows user has the access permission based on the Windows NT ACLs.
- For NFS share access, the system checks whether a UNIX user has the access permission based on the UNIX mode bits.
- NTFS
Applies to the scenario in which Windows NT ACLs control CIFS users' permissions.
- UNIX
Applies to the scenario in which UNIX mode bits, NFSv4 ACLs, or NFSv3 ACLs control NFS users' permissions.
[Example]
Mixed
Migration Status
Migration status of the file system.
[Example]
Migrating
- Click the More tab and select WORM to view the WORM properties of the file system. Table 4-2 describes related parameters.Table 4-2 WORM parameters
Parameter
Description
Example Value
Mode
Regulatory compliance: System administrators and common users cannot modify or delete files within the Retention. System administrators and common users can delete but cannot modify files after the Retention expires.
-
Overdue Time
Time when the file system expires.
--
Min. Retention
Minimum retention period supported by the WORM file system. The retention period of a file in the WORM file system cannot be smaller than the value of this parameter.
3 years
Max. Retention
Maximum retention period supported by the WORM file system. The retention period of a file in the WORM file system cannot be larger than the value of this parameter.
70 years
Default Retention
Default retention period supported by the WORM file system. The retention period of a file in the WORM file system is the default value of the parameter if you do not set a retention period for the file.
70 years
Automatic Lock
If this mode is enabled, a file automatically enters the protection state after a specific period of time (automatic lock period) since a change. This change can be a file data change or metadata change.
Enable
Lockout Wait Time (hours)
Protection period of modified files that enter the protection state. This parameter is valid only when Automatic Lock is enabled.
10
Automatically Delete
After the Retention expires, the system automatically deletes expired files.
Enable