Storagenerd

A place to put my thoughts….

How to fix “warning: setlocale: LC_CTYPE: cannot change locale (UTF-8)”

If you are getting these kind of errors on your linux machine when you are trying to move from a directory to another:
warning: setlocale: LC_CTYPE: cannot change locale (UTF-8)

You should add the following line in your ~/.bash_profile
export LC_CTYPE=$LANG

The host System Stable Values do not match the current system configuration

Error while running any symcli command

From time to time you get a question where you think ‘what the heck?’. Somehow I got involved in a MSCE installation where everything that could go wrong did go wrong. One thing I noticed was really strange.

hostname# symaccess -sid 1234 list logins
The host System Stable Values do not match the current system configuration

This has been observed specifically with SE 8.0.2 and occurs because a system was cloned after SE was installed and used.
Only solution I found was  by resetting the lockbox password as follows:
hostname# symcfg -lockbox -password hostname@SELockbox1 reset -ssv

This works for both Windows and Linux.

EMC World 2015 – Day 3

Day 3. Again started with coffee, but this time together with EMC’s Educational Manager for our company (Thanks Sumi). We talked about a new Portal and the different options of education and certification. We will be planning some stuff in the future and hope we get that speed stuff going ;). The General session was pretty cool with some very interesting releases. ScaleIO will be free for non production and EMC will release ViPR to the opensource community. CoprHD (copperhead) will be the project name and a GitHub repository will be available from July 2015. Chad battles it out with Bill Moore of SDDS (new buy from EMC) and leaves the stage in a wheel chair (pretty funny). The Expo floor was mine again right after. I spoke to Dan Baskette (thanks Dan it was great to meet you) about Cloud Foundry and the integration with Pivotal HD. Right after I spoke to the guy behind Federated Business Data Lake, he explained me how the solution worked and what it was based on. Someone forgot to tell him Pivotal does not allow to use Pivotal Cloud Foundry to provision a Production Pivotal HD environment. Another nice example on how people don’t talk to each other in a large company. I made the introductions between him and the Pivotal team standing 30 feet away. Will this standpoint change on short term, Dan says no, and he should know. Let’s see how EMC solves that issue. Went on and spoke to some more people, discussed some issues but nothing really interesting. The day ended with the Customer Appreciation Event featuring two great bands Fall Out Boy and One Republic!

We left Thursday morning. Back home and back to work. All in all a great EMC World, met a lot of great people and learned some new stuff.

I would like to thank everyone who made this possible, and hopefully I will be back in the future.

 

EMC World 2015 – Day 2

Day 2, damn these are long days. My day started with a lot of coffee and a session about Cloud solutions. A session I almost walked out on as the amount of ‘Bla’ was enormous. The general session with Joe Tucci, Paul Maritz and Pat Gelsinger was interesting. Focus of EMC is really on all the Federation stuff. Paul talked about where they are going with Pivotal Labs, agile software development and Cloud Foundry. Pat spoke about software defined data center. In between Jonathan Martin brought the Morecambe Missile himself, John McGuiness, on to the stage. He made quite the entrance driving in on his motorcycle. They discussed EMC’s Math Behind the Morecambe Missile project to analyze what makes John so fast. After wrapping up, Jonathan decided to take a joy ride, exiting the stage in style! After the general session I decided to skip all other sessions for the day and go to the expo floor. Here I spoke to the Pivotal guys and Isilon in a quest to find out were they are both going with Pivotal on Isilon. To bad I had to here they do not speak to each other. Pivotal is innovating and Isilon is ‘well doing the Isilon way’ not. Support for Ambari (the manager most Big Data Lakes are currently using) is upgraded to 1.7 in version OneFS 7.2.0.2 which will be released on Wednesday. Upgrade to 2.0 (which is already available) is not in the planning. Issues with Hawq are still there and multiple authentication resources more than five will have to wait for OneFS 8.0 (Riptide), support for newer versions of HDFS will come in patches. I went on to the Federated Cloud Solutions booth to talk about EMC Hybrid Cloud (EHC). Spoke to Drew Dimmick about the work they did and the upcoming 3.0 release. They gave some demo’s of App service in EHC and found out this would be the way forward for us. Next I had some business meetings I can not talk about, but it was nice to to meet some of the guys in person. Steve, Paul, and Chris you know who you are, it was great seeing you. One other thing I need to mention is the Clean Water program EMC is running. Please have a look at their website https://www.charitywater.org/ . The rest of the day I walked around on the Expo floor, talking to the people on the floor and getting to grips with all the stuff going on.

EMC World 2015 – Day 1

EMC World 2015, Again a week full of new products, slogans and buzz words.

The day started with a complementary breakfast of my employer who is Platimum sponsor this year, thanks for that it was good to meet both colleges and EMC/VCE guys you normally only speak by mail or phone. Next up a session about devops, semingly something al lot of companies are considering but not implemented yet. Nothing new, short story about Pivotal CF and integration with dockers. The the big opening with everybody in the big hall. Some announcements are planned for later this week, coming back to that when it happends. What is new? VCE with vXRack, a vblock rack build with vSPEX Blue equipmet. Ultra scalable to multiple racks. So CPU RAM and disk in 2 U appliances working together as one. XtremeIO introduces 4.0 firmware and the 40TB brick. 320TB of flash in one rack. Damn that flash stuff is growing. Pat thought it was funny to rip it appart on stage and later they through a stack of dynamite in it. Was funny for a whole 30 seconds. Next up a presentation on adding new services in Enterprise Hybrid Cloud. Short introduction with an example of deploying WordPress as a service. And a guest presentation from Coca Cola (Big VCE customer). Good story, very interesting and nice to hear we are not the only people fighting this battle. Short story, using VRA as frontend portal to both Private and Public cloud to have a single entry to all services. Good point from my point of view. They build this environment without but found it was easier to migrate to EHC as this has NSX integrated. They found that automating traditional servcies like network and backup would lead to large issues and time lines. By implementing EHC this is forced as one platform and completly integrated. Next session is Data Protection on EHC. Presented by our friendly garden gnome (inside joke). ECS as software as additonal option to the Appliance. Cloudboost for Networker (moving data to cloud encrytped). Spanning backup for cloud providers (cloud providers do not deliver recovery!!!) Strangly nobody mentioned recovery is not included when you move to the cloud. Walked to “Madam Tussauds” for the VCE User Group meeting. Was a bit of a disapointment. Only a presentation in a back room. Information about the vXRack presented earlier today. It looks like a promising product. Easy to manage and to mention the best option; automated firmware upgrades. One page with RCM, download and upgrade. Looks cool and they are talking to extend this to vBlock. That would be a enormous improvement to the current system. Big data as explained by the founders of Hadoop and Cloudera was a nice session about how some of the names and products came to what they are today. There was a big interest and not enough seats. To finish this post, some stuff I heard but not witnessed:

DataDomain 9500 : the world’s fastest and most scalable protection storage

VNXe 3200 all flash : All Flash would be going on tour with U2 this summer!

VMAX3 : Major service release here

EMC VMAX Serial number – what & where

Always wanted to know what is behind the serial number of a VMAX Array? I recently found out that the serial number of the VMAX contains at least 2 parameters that can tell you more about the box. If I find more I will update this article. For starters how cool is it to say “Oh that’s a 40K” when you only read the serial? Here is a short list:

  • VMAX-40K – ****57*****
  • VMAX-20K – ****26*****
  • VMAX-10K(old) – ****59*****
  • VMAX-10K(new) – ****87*****
  • VMAX-SE – ****49*****

Next where was it build? Knowing EMC, somewhere in your region. But with only 3 manufacturing facilities building VMAX that would mean USA, Ireland and China. Anyone know where in China? The first 2 letters of the serial number shows the build factory. HK means Hopkinton (USA), CK means Cork (Ireland) and CN means somewhere in China. Now to find out the same for VNX and VPLEX, etc.

EMC Centera: How to create a replicated pool.

Creating a replicated pool and pea file.

After installing and configuring a EMC Centera there is basically only one thing left to do. Adding a application profile to be used by a Archiving application. As I could not find a straightforward 5 step howto, I’ll write one myself. This howto is based on my configuration and my way of working (it works for me). And no, I am not working for EMC.

Bare in mind 1 Centera is no Centera, only a replicated set of minimal 2 Centera’s is a real Centera. From here we have a Source and a Target, aka Primary and Secondary. I will create a set which contains a “pool”and a “profile”. you can also create a “retention class”, but that is a other story.

  1. create pool pool_cust_app_ota
    • Pool Mask: rdqeDcw- (if default enter)
    • Ouota Alert: 4 TB
    • Hard stop [infinite]: enter
    • Replicate Pool: yes
    • issue command: yes
  2. create profile prof_cust_app_ota
    • Enable: yes
    • Set Access: yes
    • Type: access
    • Homepool: pool_cust_app_ota (see above)
    • Grant Rights: rdqeDcw- (if default enter)
    • Metadata: no
    • Management: no
    • Profile Secret: generate
    • Issue command: yes
    • create PEA file: yes
    • file location: c:\temp\source.pea (example)
  3. export poolprofilesetup
    • complete: no
    • pool or profile: pool
    • all: no
    • pool to export: pool_cust_app_ota (see above)
    • file location: c:\temp\pool.export (example)
    • type passphrase (optional)
  4. import poolprofilesetup
    • file location: c:\temp\pool.export (example)
    • import pools: yes
    • import pool_cust_app_ota: yes
    • import profile: yes
    • import prof_cust_app_ota; yes
    • establish pea: yes
    • grant rights: yes
  5. set grants pool_cust_app_ota replication (source)
    • rights: -d—c–
    • issue command: yes
  6. set grants pool_cust_app_ota replication (target)
    • rights: -d—c–
    • issue command: yes
  7. update profile prof_cust_app_ota (target)
    • enable: yes
    • change access: no
    • change management: no
    • password: obfuscated
    • secret: unchanged
    • issue command: yes
    • establish pea: yes
    • file location: c:\temp\target.pea (example)
    • copy <key> -> </key> from target file into source pea file.
  8. Provide access ip, pool name and pea file to application admin.

From this point you have a working set of pool and profile. A knowledgeable application admin should be able to use the provided information to create a connection between application and Centera.

How to setup Access Zones for Multiple Active Directory Domains – Isilon 7

How to setup Access Zones for Multiple Active Directory Domains

The following text is strait from emc14004094. All credits go to EMC/Isilon. Just wanted to have it handy for my own reference.

OneFS 7 now has the ability to be provisioned and interact with more than one Active Directory Forest. This is done through the use of Access Zones which is integrated tightly with the Network configuration of the Cluster.

The first step to in setting up Access Zones is deciding if the Access Zones will be responding on the same Network Subnet or not.

Consider the following setup:
Domain: Contoso.com
DC: DC.Contoso.com
IP: 192.168.2.10
Subnet: 255.255.255.0

Domain: Isilon.com
DC: DC.Isilon.com
IP: 192.168.2.50
Subnet: 255.255.255.0

It is required to setup two Access Zones:
Zone: Contoso.com
Cluster IP Range: 192.168.2.11-192.168.2.15
SmartConnect IP: 192.168.2.16

Zone: Isilon.com
Cluster IP Range: 192.168.2.51-192.168.2.55
SmartConnect IP: 192.168.2.56

In this scenario, in order to setup Access Zones that have multiple pools in the same subnet, Smart Connect Advanced is required. Without Smart Connect Advanced, the Access Zones will need to be associated with Network Pools in different subnets that cannot overlap.

It is also important to note that the default “System” Access Zone will be associated with the default subnet (usually subnet0:pool0) when the system is initially setup. Removing “System” for subnet0:pool0 and not assigning “System” to another subnet (for Smart Connect Basic) or subnet:pool (for Smart Connect Advanced) will prevent login access to both SSH and WebUI for the cluster.

**NOTE: If you end up in a situation where you lose login access because the System Zone has no subnet:pool defined (possibly because it was deleted), the following will need to be done:

  1. Connect to the Console of one of the nodes on the cluster and login as root
  2. Run ifconfig and determine an IP that can be accessed and is flagged as in Zone 1 (these will be Smartconnect IPs)
    ISI70-1# ifconfig
    em0: flags=8843 metric 0 mtu 1500
    options=9b
    ether 00:0c:29:d0:68:b0
    inet 192.168.3.45 netmask 0xffffff00 broadcast 192.168.3.255 zone 1
    media: Ethernet autoselect (1000baseTX )
    status: active
    em1: flags=8843 metric 0 mtu 1500
    options=9b
    ether 00:0c:29:d0:68:ba
    inet 192.168.4.11 netmask 0xffffff00 broadcast 192.168.4.255 zone 6
    inet 192.168.5.51 netmask 0xffffff00 broadcast 192.168.5.255 zone 7
    inet 192.168.5.52 netmask 0xffffff00 broadcast 192.168.5.255 zone 7
    inet 192.168.5.53 netmask 0xffffff00 broadcast 192.168.5.255 zone 7
    inet 192.168.5.54 netmask 0xffffff00 broadcast 192.168.5.255 zone 7
    inet 192.168.5.55 netmask 0xffffff00 broadcast 192.168.5.255 zone 7
    inet 192.168.4.16 netmask 0xffffff00 broadcast 192.168.4.255 zone 1
    inet 192.168.5.56 netmask 0xffffff00 broadcast 192.168.5.255 zone 1

    media: Ethernet autoselect (1000baseTX )
    status: active
  3. The IPs associated with Zone 1 can be accessed through SSH or WebUI at which point, the network can be added back for the System Zone
  4. If there are no IPs associated with Zone 1, then a new subnet will need to be created through the CLI:
    ISI70-1# isi networks create subnet –name=subnet0 –netmask=255.255.255.0 –gateway=192.168.2.1
    Creating subnet ‘subnet0’: OK
    Saving: OKisi networks create pool –name=subnet0:pool0 –ifaces=1-3:ext-1 –ranges=192.168.2.120-122 –zone=System
    Creating pool ‘subnet0:pool0’: OK
    Saving: OK

The following will walk through setting up multiple Access Zones for a SmartConnect Basic configuration. The setup for Access Zones with SmartConnect Advanced is identical except for the networking section where you have multiple pools in the subnet and therefor define multiple ranges within the same subnet to use.

Setting up Multiple Access Zones on a cluster

Consider the following Cluster and Domain Configuration:

Isilon Cluster is setup as follows:
ISI70-1# isi networks list pools -v
subnet0:pool0 – Default ext-1 pool
In Subnet: subnet0
Allocation: Static
Ranges: 1
192.168.2.120-192.168.2.122
Pool Membership: 1
1:ext-1 (up)
Aggregation Mode: Link Aggregation Control Protocol (LACP)
Access Zone: System (1)
SmartConnect:
Suspended Nodes : None
Auto Unsuspend … 0
Zone : isi70.a.dom.com
Time to Live : 0
Service Subnet : subnet0
Connection Policy: Round Robin

ISI70-1# isi networks list subnets -v
subnet0 – Default ext-1 subnet
Address Family: IPv4
Netmask: 255.255.255.0
Subnet: 192.168.2.0
Gateway 192.168.2.1, Priority 1
MTU: 1500
SC Service Address: 192.168.2.119
VLAN Tagging: Disabled
VLAN ID: 0
DSR Addresses: 0
Pools: 1
pool0 – Default ext-1 pool

ISI70-1# isi networks list interfaces -v
Node: 1
Interface: ext-1
NIC Name: em1
Status: up
In: 9.0Kb/s
Out: 828b/s
Owners: 3
subnet0:pool0

IP Addrs: 3
192.168.2.120

The Domains are setup as follows:
Domain: Contoso.com
DC: DC.Contoso.com
DC IP: 192.168.4.10
DNS IP: 192.168.4.10
Subnet: 255.255.255.0

Domain: Isilon.com
DC: DC.Isilon.com
DC IP: 192.168.5.50
DNS IP: 192.168.5.50
Subnet: 255.255.255.0

It is required to setup two Access Zones:
Zone: Contoso.com
Cluster IP Range: 192.168.4.11-192.168.4.15
SmartConnect IP: 192.168.4.16

Zone: Isilon.com
Cluster IP Range: 192.168.5.51-192.168.5.55
SmartConnect IP: 192.168.5.56

The goal of this setup will be the following:

  1. Storage Admins will access the cluster through WebUI is SSH by connecting to 192.168.2.119
  2. Users from domain Contoso.com will access the cluster via SMB by connecting to 192.168.3.16
  3. Users from domain Isilon.com will access the cluster via SMB by connecting to 192.168.4.56

Setup and Configuration of the Access Zones

  1. List the current Zone Configuration:
    ISI70-1# isi zone zones list –verbose
    Name: System
    Cache Size: 4.77M
    Map Untrusted:
    SMB Shares: –
    Auth Providers: –
    Local Provider: Yes
    NetBIOS Name:
    All SMB Shares: Yes
    All Auth Providers: Yes
    User Mapping Rules: –
    Home Directory Umask: 0077
    Skeleton Directory: /usr/share/skel
    Zone ID: 1
  2. Modify the System Zone to remove All Auth Providers and SMB Shares:
    ISI70-1# isi zone zones modify System –all-auth-providers=No
    ISI70-1# isi zone zones modify System –all-smb-shares=No
  3. Verify the change to System:
    ISI70-1# isi zone zones list –verbose
    Name: System
    Cache Size: 4.77M
    Map Untrusted:
    SMB Shares: –
    Auth Providers: –
    Local Provider: Yes
    NetBIOS Name:
    All SMB Shares: No
    All Auth Providers: No
    User Mapping Rules: –
    Home Directory Umask: 0077
    Skeleton Directory: /usr/share/skel
    Zone ID: 1
  4. Add a new Subnet and Pool for the Contoso and Isilon Zones
    ISI70-1# isi networks create subnet –name=subnet4 –gateway=192.168.4.1 –netmask=255.255.255.0 –sc-service-addr=192.168.4.16
    Creating subnet ‘subnet4’: OK
    Saving: OKISI70-1# isi networks create pool –name=subnet4:pool0 –ranges=192.168.4.11-15 –sc-subnet=subnet4 –zone=isi70.contoso.com –ifaces=1-3:ext-1
    Creating pool ‘subnet4:pool0’: OK
    Saving:ISI70-1# isi networks create subnet –name=subnet5 –gateway=192.168.5.1 –netmask=255.255.255.0 –sc-service-addr=192.168.5.56
    Creating subnet ‘subnet5’: OK
    Saving: OK

    ISI70-1# isi networks create pool –name=subnet5:pool0 –ranges=192.168.5.51-55 –sc-subnet=subnet5 –zone=isi70.isilon.com –ifaces=1-3:ext-1
    Creating pool ‘subnet5:pool0’: OK
    Saving:

  5. Verify the new subnets and pools:
    ISI70-1# isi networks list subnet
    Name Subnet Gateway:Prio SC Service Pools
    ————— —————— —————— ————— —–
    subnet0 192.168.2.0/24 192.168.2.1:1 192.168.2.119 1
    subnet4 192.168.4.0/24 192.168.4.1:2 192.168.4.16 1
    subnet5 192.168.5.0/24 192.168.5.1:3 192.168.5.56 1ISI70-1# isi networks list pools
    Subnet Pool SmartConnect Zone Ranges Alloc
    ————— ————— ———————- ———————- ——-
    subnet0 pool0 isi70.a.dom.com 192.168.2.120-192.1… Static
    subnet4 pool0 isi70.contoso.com 192.168.4.11-192.16… Static
    subnet5 pool0 isi70.isilon.com 192.168.5.51-192.16… Static
  6. List the DNS Configuration:
    ISI70-1# isi networks
    Domain Name Server: N/A
    DNS Search List: N/A
    DNS Resolver Opti… N/A
    DNS Default Error: REFUSED
    DNS Caching: Enabled
    Client TCP ports: 2049, 445, 20, 21, 80
    Rebalance delay: 0Subnets: subnet0 – Default ext-1 subnet (192.168.2.0/24)
    subnet4 (192.168.4.0/24)
    subnet5 (192.168.5.0/24)
  7. Configure DNS for both domains (in our example the DNS Server for Contoso.com will be 192.168.4.10 and the DNS Server for Isilon.com will be 192.168.5.50)
    ISI70-1# isi networks –add-dns-search=contoso.com,isilon.com –add-dns-servers=192.168.4.10,192.168.5.50
    Adding domain name server 192.168.4.10: OK
    Adding domain name server 192.168.5.50: OK
    Adding DNS search suffix contoso.com: OK
    Adding DNS search suffix isilon.com: OKSaving:
  8. Join the domains
    ISI70-1# isi auth ads create –name=contoso.com –user=administrator –verbose
    password:
    Created Active Directory provider: contoso.COMISI70-1# isi auth ads create –name=isilon.com –user=administrator –verbose
    password:
    Created Active Directory provider: isilon.COM
  9. Verify the Domains
    ISI70-1# isi auth ads list
    Name Authentication Status DC Name Site
    —————————————————————-
    CONTOSO.COM Yes online – Default-First-Site-Name
    ISILON.COM Yes online – Default-First-Site-Name
    —————————————————————-
    Total: 2
  10. Create the Access Zones:
    ISI70-1# isi zone zones create –name=contoso.com –all-auth-providers=No –all-smb-shares=No –auth-providers=lsa-activedirectory-provider:contoso.com
    ISI70-1# isi zone zones create –name=isilon.com –all-auth-providers=No –all-smb-shares=No –auth-providers=lsa-activedirectory-provider:isilon.com
  11. List the Access Zones:
    ISI70-1# isi zone zones list -v
    Name: System
    Cache Size: 4.77M
    Map Untrusted:
    SMB Shares: –
    Auth Providers: –
    Local Provider: Yes
    NetBIOS Name:
    All SMB Shares: No
    All Auth Providers: No
    User Mapping Rules: –
    Home Directory Umask: 0077
    Skeleton Directory: /usr/share/skel
    Zone ID: 1
    ——————————————————————————–
    Name: contoso.com
    Cache Size: 4.77M
    Map Untrusted:
    SMB Shares: –
    Auth Providers: lsa-activedirectory-provider:CONTOSO.COM
    Local Provider: Yes
    NetBIOS Name:
    All SMB Shares: No
    All Auth Providers: No
    User Mapping Rules: –
    Home Directory Umask: 0077
    Skeleton Directory: /usr/share/skel
    Zone ID: 6
    ——————————————————————————–
    Name: isilon.com
    Cache Size: 4.77M
    Map Untrusted:
    SMB Shares: –
    Auth Providers: lsa-activedirectory-provider:ISILON.COM
    Local Provider: Yes
    NetBIOS Name:
    All SMB Shares: No
    All Auth Providers: No
    User Mapping Rules: –
    Home Directory Umask: 0077
    Skeleton Directory: /usr/share/skel
    Zone ID: 7
  12. Modify the Access Zone for the Subnets:
    ISI70-1# isi networks modify pool –name=subnet4:pool0 –access-zone=contoso.com
    Modifying pool ‘subnet4:pool0’:Saving:ISI70-1# isi networks modify pool –name=subnet5:pool0 –access-zone=domain.com
    Modifying pool ‘subnet5:pool0’:

    Saving: OK

  13. Verify the Access Zone Configuration:
    ISI70-1# isi networks list pools -v
    subnet0:pool0 – Default ext-1 pool
    In Subnet: subnet0
    Allocation: Static
    Ranges: 1
    192.168.2.120-192.168.2.122
    Pool Membership: 1
    1:ext-1 (up)
    Aggregation Mode: Link Aggregation Control Protocol (LACP)
    Access Zone: System (1)
    SmartConnect:
    Suspended Nodes : None
    Auto Unsuspend … 0
    Zone : isi70.a.dom.com
    Time to Live : 0
    Service Subnet : subnet0
    Connection Policy: Round Robinsubnet4:pool0
    In Subnet: subnet4
    Allocation: Static
    Ranges: 1
    192.168.4.11-192.168.4.15
    Pool Membership: 1
    1:ext-1 (up)
    Aggregation Mode: Link Aggregation Control Protocol (LACP)
    Access Zone: contoso.com (6)
    SmartConnect:
    Suspended Nodes : None
    Auto Unsuspend … 0
    Zone : isi70.contoso.com
    Time to Live : 0
    Service Subnet : subnet4
    Connection Policy: Round Robinsubnet5:pool0
    In Subnet: subnet5
    Allocation: Static
    Ranges: 1
    192.168.5.51-192.168.5.55
    Pool Membership: 1
    1:ext-1 (up)
    Aggregation Mode: Link Aggregation Control Protocol (LACP)
    Access Zone: isilon.com (7)
    SmartConnect:
    Suspended Nodes : None
    Auto Unsuspend … 0
    Zone : isi70.isilon.com
    Time to Live : 0
    Service Subnet : subnet5
    Connection Policy: Round Robin

  14. Create shares for each Access Zone:
    ISI70-1# isi smb shares create contoso –path=/ifs/data/contoso –create-path
    ISI70-1# isi smb shares create isilon –path=/ifs/data/isilon –create-path
  15. Modify the zones to add their respective share:
    ISI70-1# isi zone zones modify contoso.com –add-smb-shares=contoso
    ISI70-1# isi zone zones modify isilon.com –add-smb-shares=isilon

TimeFinder/Clone

TimeFinder 101

This post is a small TimeFinder Clone 101 doc. It will only contain some basic commands from were you can start using it. anything else or more advanced can of course be found in the manual.

Clone session using a device group

Below are the steps to create and delete a Clone copy session using a Device Group( DG ).

1 Create a Regular Device Group.

symdg create TestDg -type regular

2 Add the devices to device group.

Add the standard devices AAA( source ) and AAB( Target )to the DG. Assume this will add as DEV001 and DEV002.

symld -sid 1234 -g TestDg add dev AAA
symld -sid 1234 -g TestDg add dev AAB

3 Create Clone Session

symclone -g TestDg create DEV001 sym ld DEV002

The above command will create a clone session and also make the target device in NotReady( NR ) state.You can also add the -precopy option to start a background copy from source to target device, prior to the activation.

symclone -g TestDg create DEV001 sym ld DEV002 -precopy

4 Activate the session

symclone -g TestDg activate DEV001 sym ld DEV002

The above command will start the copy operation from sorce device to target.And also make the target device to Read/Write,thus accessable to the host.

5 Check the status of copy operation.

symclone -g TestDg query 

Once the the source device is fully copied from source to target , the state of the pair will change from ‘CopyInProg’ to ‘Copied’.

6 Break the session

symclone -g TestDg terminate DEV001 sym ld DEV002

This will terminate the clone copy session , deletes the pairing information from the storage array and removes any hold on target device.You have to ‘Terminate’ while the pair in ‘Copied’ state to get a fully valid data.

EMC Solution Enabler on Ubuntu 12.04LTS

As part of some test we sometimes need older versions of EMC Solutions Enabler. Instead of installing a windows server and all the tools needed I find it easier to do a quick install of Linux. As fan of Ubuntu I install the current 12.04lts version on a virtual machine (I should build a ova for it, but I am just lazy).

Just follow these ease steps and you’re up and running asap.

  • install a basic Ubuntu Server
  • apt-get update; apt-get dist-upgrade; reboot
  • apt-get rpm
  • download SE version you want
  • unpack with tar zxf
  • ./se74_install.sh -install -nodeps
  • echo “export PATH=$PATH:/usr/symcli/bin” >> .profile
  • Add a “RAW” device or edit netcnfg file to your needs
  • Done

I’ll do a quick netcnfg file post later this week.