OES 2018 SP1: Dynamic Storage Technology Administration Guide
- OES 2018 SP1: Dynamic Storage Technology Administration Guide
- Overview of Dynamic Storage Technology
- Understanding Dynamic Storage Technology
- Benefits of Dynamic Storage Technology
- Shadowing Scenarios
- DST Policy Scenarios
- DST Components
- Management Tools
- What’s Next
- What’s New or Changed in Dynamic Storage Technology
- What’s New or Changed in Dynamic Storage Technology (OES 2018 SP1)
- What’s New or Changed in Dynamic Storage Technology (OES 2018-Update 1-Patch)
- What’s New or Changed in Dynamic Storage Technology (OES 2018)
- Planning Your Dynamic Storage Technology Server Environment
- Open Enterprise Server 2018 SP1
- NCP Server and Dynamic Storage Technology
- Novell Storage Services
- Directory Services
- NCP File Access
- Novell CIFS File Access
- Novell Samba File Access with ShadowFS, FUSE, and LUM
- Supported Native Linux File Access Protocols with ShadowFS, FUSE, and LUM
- Novell AFP File Access (Not Supported)
- Linux User Management
- Novell Cluster Services for Linux
- OES Remote Manager for Linux
- iManager for Linux
- SFCB and CIMOM
- Other OES Services
- Installing Dynamic Storage Technology
- Installing DST on a New OES Server
- Installing DST on an Existing OES Server
- Using DST in a Virtual Environment
- Management Tools for DST
- Dynamic Storage Technology Plug-In for OES Remote Manager for Linux
- NCP Console (NCPCON) Commands
- Management Tools for NSS Volumes
- Management Tools for Clustering
- Configuring DST Global Policies
- Replicating Branches of the Primary File Tree in the Secondary File Tree
- Shifting Files from the Secondary File Tree to the Primary File Tree
- Resolving Instances of Duplicate Files
- Loading ShadowFS
- Managing Services for DST
- Restarting the Novell NCP/NSS IPC (ncp2nss) Daemon
- Restarting the eDirectory (ndsd) Daemon
- Starting and Stopping ShadowFS
- Planning for DST Shadow Volume Pairs and Policies
- Storage Requirements for DST Volume Pairs
- Data Access Requirements for a DST Shadow Volume Pair
- Guidelines for Working with DST Shadow Volume Pairs
- Using NSS Volumes in DST Shadow Volume Pairs
- Using Trustees, Trustee Rights, and File System Attributes on DST Shadow Volume Pairs
- Using NSS Encrypted Volumes in a DST Shadow Volume Pair
- Using NSS Quotas on DST Shadow Volume Pairs
- Using Opportunistic File Locking on DST Shadow Volume Pairs
- Using Novell Cluster Services with DST Shadow Volume Pairs
- Using Novell Distributed File Services with DST Shadow Volume Pairs
- Using Novell Storage Services Auditing Client Logger (VLOG) Utility with DST Shadow Volume Pairs
- Using Virus Checking Utilities with DST Shadow Volume Pairs
- Using Backup Utilities with DST Shadow Volume Pairs
- Creating and Managing DST Shadow Volumes for NSS Volumes
- Understanding DST Volume Pairs
- Creating a DST Shadow Volume with NSS Volumes
- Giving Users a Merged View of the Shadow Volume
- Replicating the Secondary File Tree Structure to the Primary Volume
- Configuring the NCP/NSS Bindings for an NSS Volume
- Viewing a List of NCP Shares
- Mounting and Dismounting DST Shadow Volumes
- Viewing the Name and Path Information for a Shadow Volume
- Viewing Information about a Shadow Volume
- Auditing File Move Events for the Shadow Volume
- Backing Up DST Shadow Volumes
- Removing the Shadow Relationship for a Non-Clustered DST Shadow Volume
- Creating and Managing Policies for Shadow Volumes
- Understanding Shadow Volume Policy Options
- Creating a Shadow Volume Policy
- Modifying a Shadow Volume Policy
- Running a Policy On Demand
- Viewing DST Policies and Policy Status
- Viewing Information about the Files Moved During a Policy Run
- Stopping a Running Policy
- Deleting a Shadow Volume Policy
- Managing Directory and User Space Quotas on DST Volumes
- Understanding DST Volume Quotas Management
- NCPCON Quotas Command
- Setting User Space Quotas on DST Volumes
- Setting Directory Quotas on DST Volumes
- Getting Quotas from an Old Secondary Volume to a New Primary Volume
- Viewing User and Directory Quotas for a DST Volume
- Using ShadowFS to Provide a Merged View for Novell Samba Users
- Understanding ShadowFS
- Prerequisites for Using ShadowFS
- Preparing Your System for Using ShadowFS
- Installing ShadowFS and FUSE
- Setting Rights to ShadowFS Shares
- Creating a Samba Share
- Adding a User to Samba
- Connecting Users to the Share
- Testing Shadow Volume Policies
- Enabling or Disabling ShadowFS
- Starting and Stopping ShadowFS Manually
- Configuring Trustee Rights for Novell Samba Users
- Generating a File Inventory for DST Shadow Volumes
- Understanding the File Inventory for a Shadow Volume
- Creating the Shadow Volume Inventory
- Viewing a Saved NCP Volume Report
- Viewing Statistics for the Shadow Volume
- Using Inventory Detail Reports to Move, Copy, or Delete Files on the Shadow Volume
- Generating a Custom Inventory Report
- Configuring DST Shadow Volume Pairs with Novell Cluster Services
- Planning for DST in a Cluster
- Planning for DST Shadow Volume Pairs and Policies in a Cluster
- Preparing the Nodes to Support DST in a Cluster Environment
- Configuring the DST Pool Cluster Resource with Two Cluster-Enabled Pools
- Configuring the DST Pool Cluster Resource with a Cluster-Enabled Pool and a Shared Pool
- Sample Scripts for a DST Pool Cluster Resource
- Configuring Shadow Volume Policies for the Clustered DST Volume Pair
- Renaming a Shared Pool in a DST Cluster Resource
- Renaming a Shared Volume in a DST Cluster Resource
- Removing the Shadow Relationship for a Clustered DST Volume Pair
- Upgrading a Cluster with DST Resources from OES 2 SP3 to OES 2015 or Later
- Troubleshooting for DST
- My NCP server information is set to: LOCAL_CODE_PAGE CP437. Why is it not using UTF-8?
- A File is listed twice in a directory
- Users cannot see some files and directories
- Cross-protocol locking stops working
- OES Remote Manager connection error when you are working on the DST Options page
- Unable to access files on the shadow volume in a DST volume pair
- Security Considerations
- Client Access
- Linux-Enabled eDirectory Users
- Using File System Trustees and Rights
- Server-to-Server Access
- Hidden Directories and Files
- Shadow Volumes Audit Logs
- Shadow File System Audit Logs
- NCP Server Auditing and Log Files
- Using Secure Remote Connections
- Commands and Utilities for Dynamic Storage Technology
- Using NCPCON Commands for DST
- NCPCON Commands for Managing DST
- NCPCON Commands for DST in a Novell Cluster Services Cluster
- Configuring Global DST Policies by Using the SET Command
- DST Commands for /etc/opt/novell/ncpserv.conf
- DST Commands for /etc/opt/novell/shadowfs.conf
- DST EXCLUDE_VOLUME Command for /etc/opt/novell/ncp2nss.conf
- DST Shadow Volume Information in /etc/NCPVolumes
- DST ShadowFS Volume Information in /etc/mtab.shadowfs
- Verifying and Syncing ACLs (Inherited Rights Filter (IRF) and Trustees) from DST Primary Volume to Shadow Volume
- Legal Notices