OES 2 SP3: Dynamic Storage Technology Administration Guide
- OES 2 SP3: Dynamic Storage Technology Administration Guide
- Overview of Dynamic Storage Technology
- Understanding Dynamic Storage Technology
- Benefits of Dynamic Storage Technology
- Shadowing Scenarios
- DST Policy Scenarios
- DST Components
- Management Tools
- What’s Next
- What’s New or Changed for Dynamic Storage Technology
- What’s New (May 2013 Patches)
- What’s New (April 2013 Patches)
- What’s New (January 2013 Patches)
- What’s New (July 2012 Patches)
- What’s New (May 2012 Patches)
- What’s New for OES 2 SP3
- What’s New for OES 2 SP2
- What’s New for OES 2 SP1
- What’s New for OES 2
- Installing Dynamic Storage Technology
- Installation Requirements for Dynamic Storage Technology
- Installing NCP Server and Dynamic Storage Technology
- Configuring Global Policies for DST
- Installing DST on Nodes in a Novell Cluster Services for Linux Cluster
- Using Dynamic Storage Technology in a Virtual Environment
- Planning for DST Shadow Volumes and Policies
- Planning to Create DST Shadow Volumes
- Providing a Merged View for Users
- Using DST Shadow Volumes
- Using NSS Volumes in DST Shadow Volumes
- Using NSS File System Trustees, Rights, and Attributes on DST Shadow Volumes
- Using NSS Encrypted Volumes in a DST Shadow Volume
- Using NSS Quotas on DST Shadow Volumes
- Using DST Shadow Volumes with Novell Cluster Services
- Using Novell Distributed File Services with DST Shadow Volumes
- Using Virus Checking Utilities with DST Shadow Volumes
- Using Backup Utilities with DST Shadow Volumes
- Management Tools for DST
- Dynamic Storage Technology Plug-In for Novell Remote Manager for Linux
- NCP Console (NCPCON) Commands
- Management Tools for NSS Volumes
- Management Tools for Clustering
- Managing Services for DST
- Restarting the Novell NCP/NSS IPC (ncp2nss) Daemon
- Restarting the Novell eDirectory (ndsd) Daemon
- Starting and Stopping ShadowFS
- Configuring DST Global Policies
- Replicating Branches of the Primary File Tree in the Secondary File Tree
- Shifting Files from the Secondary File Tree to the Primary File Tree
- Resolving Instances of Duplicate Files
- Loading ShadowFS
- Creating and Managing DST Shadow Volumes for NSS Volumes
- Understanding DST Shadow Volumes
- Creating a DST Shadow Volume with NSS Volumes
- Giving Users a Merged View of the Shadow Volume
- Configuring the NCP/NSS Bindings for an NSS Volume
- Copying a Trustee Database to the Primary NSS Volume
- Viewing a List of NCP Shares
- Mounting and Dismounting DST Shadow Volumes
- Viewing the Name and Path Information for a Shadow Volume
- Viewing Information about a Shadow Volume
- Auditing File Move Events for the Shadow Volume
- Backing Up DST Shadow Volumes
- Removing the Shadow Relationship for a Non-Clustered DST Shadow Volume
- Creating and Managing Policies for Shadow Volumes
- Understanding Shadow Volume Policy Options
- Creating a Shadow Volume Policy
- Modifying a Shadow Volume Policy
- Running a Policy On Demand
- Viewing DST Policies and Policy Status
- Viewing Information about the Files Moved During a Policy Run
- Stopping a Running Policy
- Deleting a Shadow Volume Policy
- Generating a File Inventory for DST Shadow Volumes
- Understanding the File Inventory for a Shadow Volume
- Accessing the Shadow Volume Inventory
- Viewing Statistics for the Shadow Volume
- Using Inventory Detail Reports to Move, Copy, or Delete Files on the Shadow Volume
- Generating a Custom Inventory Report
- Using ShadowFS to Provide a Merged View for Novell Samba Users
- Understanding ShadowFS
- Prerequisites for Using ShadowFS
- Preparing Your System for Using ShadowFS
- Installing ShadowFS and FUSE
- Setting Rights to ShadowFS Shares
- Creating a Samba Share
- Adding a User to Samba
- Connecting Users to the Share
- Testing Shadow Volume Policies
- Enabling or Disabling ShadowFS
- Starting and Stopping ShadowFS Manually
- Configuring Trustee Rights for Novell Samba Users
- Configuring DST Shadow Volume Pairs with Novell Cluster Services
- Planning for DST in a Cluster
- Planning for DST Shadow Volume Pairs and Policies in a Cluster
- Using the Clusters Plug-in for iManager 2.7.5 or Later
- Preparing the Nodes to Support DST in a Cluster Environment
- Configuring the DST Pool Cluster Resource with Two Cluster-Enabled Pools
- Configuring the DST Pool Cluster Resource with a Cluster-Enabled Pool and a Shared Pool
- Sample Scripts for a DST Pool Cluster Resource
- Configuring Shadow Volume Policies for the Clustered DST Volume Pair
- Removing the Shadow Relationship for a Clustered DST Volume Pair
- Troubleshooting for Dynamic Storage Technology
- My NCP server information is set to: LOCAL_CODE_PAGE CP437. Why is it not using UTF-8?
- A File is listed twice in a directory
- Users cannot see some files and directories
- Cross-protocol locking stops working
- Files that initially reside only on the secondary volume can end up as directories on the primary volume
- Security Considerations
- Client Access
- Linux-Enabled eDirectory Users
- Using File System Trustees and Rights
- Server-to-Server Access
- Hidden Directories and Files
- Shadow Volumes Audit Logs
- Shadow File System Audit Logs
- NCP Server Auditing and Log Files
- Using Secure Remote Connections
- Commands and Utilities for DST
- Using NCPCON for DST Commands
- DST Commands for NCPCON
- DST Commands for NCPCON for Use with Novell Cluster Services for Linux Clusters
- Configuring Global DST Policies by Using the SET Command
- DST Commands for /etc/opt/novell/ncpserv.conf
- DST Commands for /etc/opt/novell/shadowfs.conf
- DST EXCLUDE_VOLUME Command for /etc/opt/novell/ncp2nss.conf
- DST Shadow Volume Information in /etc/NCPVolumes
- DST ShadowFS Volume Information in /etc/mtab.shadowfs
- RPM Files for Dynamic Storage Technology
- Technology Preview: Creating and Managing DST Shadow Volumes with Remote Secondary NSS Volumes
- Understanding Remote Volume Support for the Technology Preview
- Requirements for Using a Remote Secondary NSS Volume
- Mounting a Remote NSS Volume with the Novell Client for Linux
- Copying a Remote Linux NSS Volume’s Trustee Database to the Primary NSS Volume
- Creating a Shadow Volume with a Remote Secondary NSS Volume
- Managing the Remote Secondary Connection
- Removing a Shadow Relationship with a Remote NSS Volume
- Technology Preview: Using DST Shadow Volumes with Remote Secondary NSS Volumes and Novell Cluster Services
- Planning for Using Shadow Volumes with Remote Secondary NSS Volumes in a Cluster
- Requirements for Using Remote NSS Secondary Volumes in DST Shadow Volume Cluster Resources
- Cluster Setup with Manual Login to the Remote Server
- Cluster Setup with a Scripted Login to the Remote Server
- Removing the Shadow Volume Relationship in a Cluster Resource with a Remote Secondary
- Documentation Updates
- September 6, 2013
- June 25, 2013
- May 2013 Scheduled Maintenance
- April 2013 Scheduled Maintenance
- January 2013 Scheduled Maintenance
- August 2012 Scheduled Maintenance
- June 30, 2012
- May 2012 Scheduled Maintenance
- April 12, 2012
- July 21, 2011
- June 2011
- April 2011
- January 31, 2010
- December 2010 (OES 2 SP3)
- June 16, 2010
- February 19, 2010
- November 9, 2009 (OES 2 SP2)
- March 3, 2009
- February 13, 2009
- January 13, 2009
- December 2008 (OES 2 SP1)
- May 30, 2008
- May 5, 2008
- January 7, 2008
- December 7, 2007
- November 16, 2007
- Legal Notices