To associate a namespace to a replication group, you only need to associate the namespace to any cluster in the replication group. After the namespace is associated, the system will automatically create a namespace with the same name in each of the other clusters.
If the object service uses IAM authentication, you cannot perform namespace association operations on DeviceManager. If you need to associate a namespace with a replication group, create a replication bucket by referring to Creating a Bucket in the Object Service API Reference of the corresponding version.
The Create Namespace page is displayed.
Table 1 describes the related parameters.
Parameter |
Description |
|---|---|
Account |
Account to which the new namespace belongs. |
Name |
Name of the new namespace.
NOTE:
The naming rules of a namespace are as follows:
To enable the object service for a namespace, the namespace name must meet the following rules. Otherwise, the bucket cannot be accessed in virtual hosting mode, and the domain name resolution will fail. In this case, the bucket can be accessed only in path mode.
|
Storage Pool |
Storage pool to which the new namespace belongs. |
Redundancy Ratio |
Redundancy ratio of the new namespace. It must be the same as that of the owning storage pool.
NOTE:
This parameter is available only for storage pools that use the EC redundancy policy. |
Security Style |
Select a security style based on service requirements. Possible options are:
NOTE:
In Mixed style (which supports NT ACLs), if you have configured an NT ACL for a file or directory on a Windows client and switched Mixed to UNIX, the NT ACL in Mixed style will become invalid. |
After the recycle bin function is enabled, temporary files generated by applications will also be moved to the recycle bin when deleting files.
Parameter |
Description |
|
|---|---|---|
Space Quota |
Hard Quota |
Space hard quota. If the quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than those of Soft Quota and Advisory Quota.
NOTE:
If the used file space reaches the hard quota, the system forbids writes. If you want the system to report an alarm before writes are forbidden, set a soft quota and an advisory quota. |
Soft Quota |
Space soft quota. If the quota is reached, the system reports an alarm but still allows writes. If the soft quota grace period elapses or hard quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than that of Advisory Quota and less than that of Hard Quota. |
|
Advisory Quota |
Space advisory quota. If the quota is reached, the system reports an alarm but still allows writes. [Value range] 1 KB to 256 PB The value must be less than those of Soft Quota and Hard Quota. |
|
File Quantity Quota |
Hard Quota (K) |
File quantity hard quota. If the quota is reached, the system reports an alarm and new files cannot be added. However, operations on existing files are not affected. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than those of Soft Quota (K) and Advisory Quota (K).
NOTE:
If the number of files reaches the hard quota, the system forbids file adding. If you want the system to report an alarm before files cannot be added, set a soft quota and an advisory quota. |
Soft Quota (K) |
File quantity soft quota. If the quota is reached, the system reports an alarm but new files can still be added. If the soft quota grace period elapses or hard quota is reached, new files cannot be added and an alarm is reported. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than that of Advisory Quota (K) and less than that of Hard Quota (K). |
|
Advisory Quota (K) |
File quantity advisory quota. If the quota is reached, the system reports an alarm but new files can still be added. [Value range] 1 to 100,000,000 The value must be less than those of Soft Quota (K) and Hard Quota (K). |
|
Grace Period |
Soft Quota Grace Period (Days) |
If the used file space or number of files reaches the soft quota, the system reports an alarm but still allows writes or new files can still be added within this period. If this period elapses, the system immediately forbids writes and new files cannot be added. In addition, an alarm is reported. [Value range] 1 to 4,294,967,294. If this parameter is not specified, the grace period is unlimited. In this case, if the used file space or number of files reaches the soft quota, the system reports an alarm but does not restrict users' writing data or adding new files.
NOTE:
This parameter can be set only when Soft Quota or Soft Quota (K) is set. |
The Configure NFS Share page is displayed.
The Configure CIFS Share page is displayed.
The Associate Zone page is displayed on the right.
The owner of the bucket (the account that creates the bucket) has full control of the bucket. Other users cannot access the bucket without authorization.
All users can read objects in the bucket, and only the owner of the bucket (the account that creates the bucket) has the write permission.
All users can read, write, and delete objects written by the owner of the bucket (the account that creates the bucket). Unauthorized users cannot read objects written by other accounts but can write or delete objects.
For data security, you are advised to select Private.
Enabling Automatic Update of Atime compromises system performance.
Protocol |
Case Sensitivity |
Function Restriction or Impact |
|---|---|---|
NFS/DPC |
Case-sensitive |
None. |
Case-insensitive |
None. |
|
CIFS |
Case-sensitive (not recommended) |
The storage system can only process file names carried in client requests in Case-sensitive mode. In addition, the storage system returns case-sensitive file names in its responses that need to carry file names to the client. If the client cannot correctly identify case-sensitive file names, the following circumstances may occur in some special scenarios:
CAUTION:
If the preceding scenarios have no impact on services or the impact is acceptable, before enabling the CIFS protocol, you are advised to choose the Case-sensitive mode, enable the recycle bin function of the namespace, and set a proper retention period to reduce the probability of data loss caused by abnormal client behaviors. |
Case-insensitive (recommended) |
None. |
|
Object/HDFS |
Case-sensitive (recommended) |
None. |
Case-insensitive (not recommended) |
The listing operation of the HDFS or object protocol returns results in case-insensitive lexicographical order, which is different from that of the standard protocol. |
|
|
CAUTION:
If interworking between the CIFS protocol and the HDFS or object protocol is required, you need evaluate the service impact of the functions that are unavailable in this scenario in advance and select a case sensitivity mode with the minimum impact. If you cannot evaluate the impact on services, contact technical support engineers. |
||
You can click Create to create a QoS policy.
Table 4 describes the related parameters.
Parameter |
Description |
|---|---|
Snapshot Directory Visibility |
Whether the directory of namespace snapshots is visible. If this parameter is set to Visible, the system displays the .snapshot directory in the namespace. |
Cross-Site DR |
This function is enabled by default. |
Replication Group |
Name of the replication group to which the namespace is to be bound. |
Data Encryption |
Whether to enable the data encryption function. After this function is enabled, the system generates a key to encrypt the data written to the namespace.
NOTE:
|
Encryption Algorithm |
After Data Encryption is enabled, you need to select an encryption algorithm. The value can be XTS-AES-128, XTS-AES-256, or XTS-SM4.
NOTE:
|
Synchronize |
After this function is enabled, data encryption will be enabled for the corresponding namespaces in remote clusters in the replication group and the selected encryption algorithm will be used. Ensure that data encryption has been enabled for the corresponding accounts in the remote clusters.
NOTE:
This parameter is available only when both Cross-Site DR and Data Encryption are enabled. It can be configured only during namespace creation and cannot be disabled after being enabled. This parameter is not displayed when the object service uses IAM authentication. |
Audit Log |
Whether to enable the audit log function of the namespace. After this function is enabled, the system logs operations of the namespace.
NOTE:
This function can be set only when the data pilot service is enabled for the storage pool. |
Record Type |
After the audit log function is enabled, set the operation type to be recorded in audit logs. Possible options are Create, Delete, and Rename. |
This function can be set only when the data pilot service is enabled for the storage pool.
When creating a namespace, if you associate the namespace with a replication group and disable WORM, WORM cannot be enabled after the namespace is created.
Table 5 describes the related parameters.
Parameter |
Description |
|---|---|
Max. Retention Period |
Maximum protection period supported by a specified namespace. |
Min. Retention Period |
Minimum protection period supported by a specified namespace. |
Default Retention Period |
Default protection period after a file enters the protection state. |
Auto Lock |
After this function is enabled, if a file is not modified within the default waiting time, the file automatically enters the locked state. |
Legal Hold File Modification |
Common users and privileged users cannot delete legal hold files within the retention period. After the function is enabled, the retention periods of the legal hold files can be modified. |
After Legal Hold File Modification is enabled, the retention periods of the legal hold files can be modified.