-
From the left navigation menu, select Element Store and then Views.
-
Click
to open the Actions menu for the view you want to edit and select Edit.
-
Change the view settings in the General tab as needed:
Field
Description
Path
The full path from the top level of the storage system on the cluster to the location exposed by the view.
Protocols
Change the combination of protocol(s) enabled for accessing the view. For supported combinations, see Controlling File and Directory Permissions Across Protocols.
SMB Share Name
Required for SMB shares.
If this is the first time you're exposing the view to SMB, enter a name for the SMB share. The name cannot include the following characters: /\:|<>*?"
If the view was already configured with an SMB share, you cannot modify the share name.
NFS Alias
Optional for NFSv3 exports. Enabled if NFS is selected in the Protocols field.
An alias for the mount path of an NFS export. An alias must begin with a forward slash ("/") and must consist of only ASCII characters.
S3 Bucket Name
The bucket name for S3 buckets.
If you select S3 Bucket in the Protocols dropdown, enter a name for the S3 Bucket.
Policy Name
Select a view policy. To see details of configured view policies, go to the View Policies tab. For more information about configuring view policies, see Creating View Policies.
QOS Policy
Select a QoS policy to associate the view with a QoS policy.
Create Directory
If the directory does not already exist in the file system, enable the Create Directory setting to create the directory.
-
If S3 Bucket or S3 Endpoint are enabled as protocols, select the S3 tab to modify S3 settings if needed:
-
For S3 Bucket:
-
S3 Bucket Owner. Specify a user to be the bucket owner.
S3 Bucket owner is required for S3 buckets.
-
Note
These features are not available if NFS, NFS4 and/or SMB are enabled in the Protocols dropdown.
-
S3 Versioning. Enable this setting if you want to enable object versioning on the bucket. Versioning cannot be disabled after the view is created.
Note
This setting must be enabled if object locking is enabled and therefore it is automatically enabled when you enable S3 Object Lock.
-
S3 Object Lock. Enable this setting if you want to enable object locking on the bucket. Object locking cannot be disabled after the view is created.
Note
S3 Versioning is required with object locking and is automatically enabled when you enable S3 Object Lock.
-
S3 Retention Period. This field is enabled only if object locking is enabled. It is optional and enables you to set a default retention period for objects in the bucket. If set, object versions that are placed in the bucket are automatically protected with a retention lock with the specified retention period, unless S3 Retention Mode is set to None. Otherwise, by default, each object version has no automatic protection but can be configured with a retention lock or legal hold. For more information, see S3 Object Locking Overview.
-
S3 Retention Mode. This field is enabled only if object locking is enabled. It is optional and enables you to set a default retention mode for objects in the bucket. For information about retention modes, see S3 Object Locking Overview.
Possible values:
-
None (default). Object versions that are placed in the bucket have no automatic protection but can be configured with a retention period or legal hold.
-
Governance. Object versions that are placed in the bucket are automatically protected with a retention lock with retention mode set to governance.
-
Compliance. Object versions that are placed in the bucket are automatically protected with a retention lock with retention mode set to compliance.
-
-
-
Anonymous Access. Enable this setting to allow anonymous S3 access to the bucket. If enabled, anonymous requests are granted provided that the object ACL grants access to the All Users group (in S3 Native security flavor) or the permission mode bits on the requested file and directory path grant access permission to "others" (in NFS security flavor).
-
-
For S3 Endpoint:
-
Bucket Creators (Users). List users here by user name. Any request to create an S3 bucket that is sent by S3 API by a user listed here will use the S3 Endpoint view that you are configuring.
Note
Users should not be specified as bucket creators in more than one S3 Endpoint view.
Naming a user as a bucket creator in two S3 Endpoint views will fail the creation of the view with an error.
-
Bucket Creators (Groups). List groups here by group name. Any request to create an S3 bucket that is sent by S3 API by a user who belongs to a group listed here will use the S3 Endpoint view that you are configuring.
Caution
Take extra care not to duplicate bucket creators through groups: If you specify a group as a bucket creator group in one view and you also specify a user who belongs to that group as a bucket creator user in another view, view creation will not fail. Yet, there is a conflict between the two configurations and the selection of a view for configuring the user's buckets is not predictable.
-
Anonymous Access. Enable this setting to allow anonymous S3 access to the bucket. If enabled, anonymous requests are granted provided that the object ACL grants access to the All Users group (in S3 Native security flavor) or the permission mode bits on the requested file and directory path grant access permission to "others" (in NFS security flavor).
-
-
-
If you selected SMB in the Protocols dropdown, you can optionally configure share-level ACL:
-
Move the Enable Share-level ACL slider to ON position. This setting enables share-level ACL on the view, which means that SMB requests to access the view will fail unless permission is granted to the requesting user by an ACE (see next step).
-
Under Search, enter details to query a user or group that you want to define an ACE for:
-
Click Add ACE. The grantee's type and name are entered into the ACL grid.
-
In Permission column of the ACL grid, select the permission type that you want to grant to the grantee.
-
Repeat steps b to d until you have created all the ACEs that you want to configure.
-
-
Click Update to save your changes.
Comments
0 comments
Article is closed for comments.