This article describes the steps needed to expose directories to SMB and NFS clients. To set up views that are exposed to SMB exclusively, see Enabling SMB Access. To set up views that are exposed to NFS exclusively, see Enabling NFS Access.
Active Directory server to join, with the DNS server of the VAST Cluster able to resolve the _ldap and _kerberos SRV records of the Active Directory (AD) domain.
The DNS server IP of the cluster is specified during installation. For assistance with verifying or changing DNS configuration, please contact VAST Data Support.
Client users should be defined on the Active Directory server with SMB user SID and group memberships. If the Active Directory server will also serve as a POSIX provider, POSIX attributes should be stored as follows: :
The UID of each user should be contained in the uidNumber attribute of the user account.
The user's leading or primary group GID should be contained in the gidNumber attribute of the user account.
Auxiliary or secondary group GID can be marked either as a memberUid entry in each group that contains the user or by a memberOf entry in the user entry for each group that contains the user.
For multiprotocol views, begin by joining the Active Directory server and configuring an LDAP connection to the same Active Directory server. For instructions, see Joining Active Directory (AD).
After you have joined the Active Directory domain, add HOST SPN attributes to the cluster's machine account. The HOST SPN is needed so that the Kerberos protocol can access the cluster and perform authentication. It must be set up for any VIP pool from which you want client users to be able to access SMB shares.
Add two entries per DNS name to the SPN attributes with the values
HOST/<short DNS name> where <FQDN> is the FQDN and <short DNS name> is the short DNS name of the same FQDN. This is the FQDN that needs to be mapped to all of the IPs in one VIP pool on the DNS server (as described as part of the initial cluster configuration).
To set SPN in Active Directory:
Locate the machine account object that you just added for the cluster by joining the cluster to the Active Directory domain.
Open the machine account object's properties. This is usually done by right-clicking the object and selecting Properties.
In the properties, edit the servicePrincipalName attribute. This is usually found in the Attribute Editor tab where you can click the attribute to edit it in the Multi-valued String Editor.
Add one entry per DNS name with the value
HOST/<FQDN>where <FQDN > is the FQDN of the cluster and another entry with the value
HOST/<short DNS name>in which <short DNS name> is the short DNS name component of the FQDN.
For example, supposing you have configured your DNS server to map the cluster's VIPs to cluster.domain.com, then you will add two entries:
Click OK in the editor and the properties dialogs as needed to save the entries.
A view policy is a reusable set of configurations. Every view has a view policy, which can be the default view policy or another view policy that you add. Multiple views may use the same view policy. You can either modify the default view policy or create a new one.
In the VAST Web UI, select Element Store from the left navigation menu and then select View Policies.
To add a new view policy, click Create Policy. To modify an existing view policy, click to open the Actions menu for the policy and select Edit.
The Add Policy or Update Policy dialog opens with the General area expanded.
In the Name field, enter a unique name for the policy.
From the Security Flavor dropdown, choose a security flavor. The security flavor determines how file and directory permissions are controlled. For a full description of the security flavors, see File and Directory Permissions in Multiprotocol Views. In brief, the options are:
NFS. NFS clients can set permission mode bits on files and directories when creating new files and directories or modifying existing files and directories. Attempts by SMB clients to set file and directory permissions are ignored. Files and directories created by SMB clients receive a configurable set of initial permission bits (see step 9).
SMB. SMB clients can set permissions on files and directories. Attempts by NFS clients to set permission bits for files and directories are ignored. Files and directories created on NFS clients inherit permissions set on the parent directory by the SMB client.
Mixed Last Wins. This flavor is designed to act as natively as possible to whichever protocol is used to create or modify a file or directory. It allows permissions to be set and modified from all clients. As far as possible, this flavor is designed such that whenever a user changes permissions via a given protocol, the permission change that is applied in vast permissions is as the user intended.
From the Group Membership Source dropdown, select Providers. This setting determines the source trusted for users' group memberships during the permission checking process. This must be set to Providers for multiprotocol views. The other options are supported only for views that are exposed exclusively to NFS.
Expand the NFS section. Here you can manage which NFS hosts are allowed to access the view and the types of access you allow to different hosts.
Two wildcard entries initially appear in the Read/Write and Root Squash rows of the grid:
These wildcards represent all IPs of all hosts. This default configuration gives all hosts read/write access and root squashing.
Add and remove entries in the access type grid to allow the exact host access that you want.
Click the +Add new IP button for the access type you want to add hosts to.
The IPs list for the access type becomes editable.
Add hosts using any of the following expressions in a comma separated list:
A single IP.
A netgroup key, which starts with '@'. This is supported for NIS netgroups if NIS is configured. For information about how to use netgroups, see Using NIS Netgroups to Authorize Host Access to NFS Exports for more information.
A subnet indicated by CIDR notation. For example: 126.96.36.199/24.
A range of IPs indicated by an IP address with '*' as a wildcard in place of any of the 8-bit fields in the address. For example, 3.3.3.*, or 3.3.*.*.
The access types comprise these categories:
Controlling read and write operations:
Read / Write. Read/write access.
Read Only. Read only access.
Controlling squash policy:
No Squash. All operations are supported. Use this option if you trust the root user not to perform operations that will corrupt data.
Root Squash. The root user is mapped to nobody for all file and folder management operations on the export. This enables you to prevent the strongest super user from corrupting all user data on the VAST Cluster.
All Squash. All client users are mapped to nobody for all file and folder management operations on the export.
Controlling access to the trash folder:
Trash Access. This option does not appear here by default. It appears only if Enable trash folder access is enabled on the Settings page. Granting this permission gives hosts the ability to delete files by moving them into a trash folder, from which they are automatically deleted. Requires also No Squash. For more information, see Trash Folder (for Rapid Parallel File Deletion).
You can add hosts to any and all of the types, but within each category no more than one type will be applied to any given host. If a host is specified with multiple entries in mutually exclusive types, the conflict is resolved as follows:
Click Add or press the ENTER key on your keyboard.
The entries are added.
To remove an entry, hover to the right of the entry until a removal button appears and click it:
If you selected NFS as the security flavor, expand the SMB section and set the SMB file mode permission bits and the SMB directory mode permission bits. When NFS security flavor is used, these permission bits are applied to files and directories created by SMB clients.
To learn more about permissions and how they are transposed between the protocols, see File and Directory Permissions in Multiprotocol Views.
Switch back to the General tab and (optionally) expand the Advanced section and change the following settings:
Path Length Limit. Affects the maximum limit of file path component name length. Choose between:
Lowest Common Denominator (default). Imposes the lowest common denominator file length limit of all VAST Cluster-supported protocols, regardless of the specific protocol enabled on a specific view.
Native Protocol Limit. Imposes no limitation beyond that of the client protocol.
If you select this mode in a view policy and then in the future expose a view using this policy to a previously not exposed protocol, that view might contain files that won't be accessible by the newly added protocol, due to the limitations of that protocol.
Allowed Characters. Determines which characters are allowed in file names. Choose between:
Lowest Common Denominator (default). Allows only characters allowed by all VAST Cluster-supported protocols, regardless of the specific protocol enabled on a specific view. WIth this (default) option, the limitation on the length of a single component of the path is 255 characters.
Native Protocol Limit. Imposes no limitation beyond that of the client protocol.
Atime Frequency. atime is a metadata attribute of NFS files that represents the last time the file was updated. atime is updated on read operations if the difference between the current time and the file's atime value is greater than the configured atime frequency. Consider that a very low value might have a performance impact if high numbers of files are being read.
Posix ACL. Enables full support of extended POSIX Access Control Lists (ACL). By default, VAST Cluster supports the traditional POSIX file system object permission mode bits, (minimal ACL mode) in which each file has three ACL entries defining the permissions for the owner, owning group, and others, respectively. To learn more about POSIX ACL, we recommend reading https://linux.die.net/man/5/acl.
setfaclLinux command is blocked if this option is not enabled.
The policy is created and added to the list.
In the VAST Web UI, select Element Store from the left navigation menu and then select Views.
Click Create View to add a new view.
The Add View dialog appears.
In the Path field, enter the full path from the top level of the storage system on the cluster to the location that you want to expose. The directory may exist already, such as if it was created by a client inside a mounted parent directory. It could also be a path to a new directory which you'll create now. (see step 8)
Open the Protocols dropdown, select both NFS and SMB to expose the view to both protocols.
In the SMB Share Name field, enter the name of the SMB share. This is required. The name cannot include the following characters: /\:|<>*?"
In the NFS Alias field, you can optionally specify an alias for the mount path of the NFS export. An alias must begin with a forward slash ("/") and must consist of only ASCII characters.
From the Policy Name dropdown, select the view policy that is configured as required for a multiprotocol view (see Configure a View Policy).
If the directory does not already exist in the file system, enable the Create Directory setting to create the directory.
The view is now created and can be accessed via NFS or SMB clients. You can see it displayed in the Views tab.
Use the view create command to create the view.