SRV locator resource records on the cluster's DNS server for the _ldap and _kerberos services of the Active Directory (AD) domain .
The DNS server IP of the cluster is specified during installation. For assistance with verifying or changing DNS configuration, please contact VAST Data Support.
Client users should be defined on the Active Directory server with:
NFS UID, owning GID, GIDs (See Active Directory Requirements for Multiprotocol Permissions Management)
Matching SMB user SID, group memberships
For multiprotocol views, begin by joining the Active Directory server and configuring an LDAP connection to the same Active Directory server. For instructions, see Joining Active Directory.
After you have joined the Active Directory domain, add HOST SPN attributes to the cluster's machine account. The HOST SPN is needed so that the Kerberos protocol can access the cluster and perform authentication. It must be set up for any VIP pool from which you want client users to be able to access SMB shares.
Add two entries per DNS name to the SPN attributes with the values
HOST/<short DNS name> where <FQDN> is the FQDN and <short DNS name> is the short DNS name of the same FQDN. This is the FQDN that needs to be mapped to all of the IPs in one VIP pool on the DNS server (as described as part of the initial cluster configuration).
To set SPN in Active Directory:
Locate the machine account object that you just added for the cluster by joining the cluster to the Active Directory domain.
Open the machine account object's properties. This is usually done by right-clicking the object and selecting Properties.
In the properties, edit the servicePrincipalName attribute. This is usually found in the Attribute Editor tab where you can click the attribute to edit it in the Multi-valued String Editor.
Add one entry per DNS name with the value
HOST/<FQDN>where <FQDN > is the FQDN of the cluster and another entry with the value
HOST/<short DNS name>in which <short DNS name> is the short DNS name component of the FQDN.
For example, supposing you have configured your DNS server to map the cluster's VIPs to cluster.domain.com, then you will add two entries:
Click OK in the editor and the properties dialogs as needed to save the entries.
A view policy is a reusable set of configurations. Every view has a view policy, which can be the default view policy or another view policy that you add. Multiple views may use the same view policy. You can either modify the default view policy or create a new one.
In the VAST Web UI, click in the top left of the page to open the menu, select the Configuration page and then the View Policies tab.
Click the button to add a new view policy.
The Add Policy dialog opens with the General area expanded.
In the Name field, enter a unique name for the policy.
From the Security Flavor dropdown, choose a security flavor. The security flavor determines how file and directory permissions are controlled. For a full description of the security flavors, see File Permissions for Multiprotocol Views. In brief, the options are:
NFS. NFS clients can set permission mode bits on files and directories when creating new files and directories or modifying existing files and directories. Attempts by SMB clients to set file and directory permissions are ignored. Files and directories created by SMB clients receive a configurable set of initial permission bits (see step 9).
SMB. SMB clients can set permissions on files and directories. Attempts by NFS clients to set permission bits for files and directories are ignored. Files and directories created on NFS clients inherit permissions set on the parent directory by the SMB client.
Enable Use Auth Provider. This setting must be enabled for any view that will be exposed to SMB. If you set Security Flavor to SMB, this is enabled automatically. Otherwise, it's disabled by default and you need to enabled it.
Expand the NFS section. Here you can manage which hosts are allowed to access the view and the types of access you allow to different hosts.
Two wildcard entries initially appear in the Read/Write and Root Squash rows of the grid:
These wildcards represent all IPs of all hosts. This default configuration gives all hosts read/write access and root squashing.
Add and remove entries in the access type grid to allow the exact host access that you want.
Click the button for the access type you want to add hosts to.
The IPs and Netgroups list for the access type becomes editable.
Add hosts using any of the following expressions in a comma separated list (netgroups cannot be used for multiprotocol views):
A single IP.
A subnet indicated by CIDR notation. For example: 188.8.131.52/24.
A range of IPs indicated by an IP address with '*' as a wildcard in place of any of the 8-bit fields in the address. For example, 3.3.3.*, or 3.3.*.*.
The access types comprise these categories:
Controlling read and write operations:
Read / Write. Read/write access.
Read Only. Read only access.
Controlling squash policy:
No Squash. All operations are supported. Use this option if you trust the root user not to perform operations that will corrupt data.
Root Squash. The root user is mapped to nobody for all file and folder management operations on the export. This enables you to prevent the strongest super user from corrupting all user data on the VAST Cluster.
All Squash. All client users are mapped to nobody for all file and folder management operations on the export.
Controlling access to the trash folder:
Trash Access. This option does not appear here by default. It appears only if Enable trash folder access is enabled on the Settings page. Granting this permission gives hosts the ability to delete files by moving them into a trash folder, from which they are automatically deleted. Requires also No Squash. For more information, see Trash Folder (for Rapid Parallel File Deletion).
You can add hosts to any and all of the types, but within each category no more than one type will be applied to any given host. If a host is specified with multiple entries in mutually exclusive types, the conflict is resolved as follows:
An IP overrides a CIDR, and a CIDR overrides a wildcard expression.
If a conflict remains after the previous rule is applied, then:
Read Only overrides Read / Write.
All Squash overrides Root Squash.
Root Squash overrides No Squash.
Press the ENTER key on your keyboard.
The entries are added.
To remove an entry, click its removal button (the little 'x').
If you selected NFS as the security flavor, expand the SMB section and set the SMB file mode permission bits and the SMB directory mode permission bits. These permission bits are applied to files and directories created by SMB clients. You can set them either by checking/unchecking the permission boxes or by entering them in three digit numeric notation.
To learn more about permissions and how they are transposed between the protocols, see File Permissions for Multiprotocol Views.
Optionally expand the Advanced section and change the following settings:
Path Length Limit. Affects the maximum limit of file path component name length. Choose between:
Lowest Common Denominator (default). Imposes the lowest common denominator file length limit of all VAST Cluster-supported protocols, regardless of the specific protocol enabled on a specific view.
Native Protocol Limit. Imposes no limitation beyond that of the client protocol.
If you select this mode in a view policy and then in the future expose a view using this policy to a previously not exposed protocol, that view might contain files that won't be accessible by the newly added protocol, due to the limitations of that protocol.
Allowed Characters. Determines which characters are allowed in file names. Choose between:
Lowest Common Denominator (default). Allows only characters allowed by all VAST Cluster-supported protocols, regardless of the specific protocol enabled on a specific view. WIth this (default) option, the limitation on the length of a single component of the path is 255 characters.
Native Protocol Limit. Imposes no limitation beyond that of the client protocol.
Atime frequency. atime is a metadata attribute of NFS files that represents the last time the file was updated. atime is updated on read operations if the difference between the current time and the file's atime value is greater than the configured atime frequency. Consider that a very low value might have a performance impact if high numbers of files are being read.
Posix ACL. Enables full support of extended POSIX Access Control Lists (ACL). By default, VAST Cluster supports the traditional POSIX file system object permission mode bits, (minimal ACL mode) in which each file has three ACL entries defining the permissions for the owner, owning group, and others, respectively. To learn more about POSIX ACL, we recommend reading https://linux.die.net/man/5/acl.
setfaclLinux command is blocked if this option is not enabled.
The policy is created and added to the list.
In the VAST Web UI, click in the top left of the page to open the menu, select the Configuration page and then the Views tab.
Click the button to add a new view.
The Add View dialog appears.
In the Filesystem Path field, enter the full path from the top level of the storage system on the cluster to the location that you want to expose. The directory may exist already, such as if it was created by a client inside a mounted parent directory. It could also be a path to a new directory which you'll create now. (see step 8)
Open the Protocols dropdown, select both NFS and SMB to expose the view to both protocols.
In the SMB Share Name field, enter the name of the SMB share. This is required. The name cannot include the following characters: /\:|<>*?"
In the NFS Alias field, you can optionally specify an alias for the mount path of the NFS export. An alias must begin with a forward slash ("/") and must consist of only ASCII characters.
From the View Policy Name dropdown, select the view policy that is configured as described in the previous step. It might be the default policy or one you created for this purpose.
If the directory does not already exist in the file system, enable the Create Directory setting to create the directory.
The view is now created and can be accessed via NFS or SMB clients. You can see it displayed in the Views tab.
Use the view create command to create the view.