This section describes how to create a namespace for data storage.
The Create Namespace page is displayed.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Name |
Indicates the name of the namespace.
NOTE:
The naming rules of a namespace are as follows:
To enable the object service for a namespace, the namespace name must meet the following rules. Otherwise, the bucket cannot be accessed in virtual hosting mode, and the domain name resolution will fail. In this case, the bucket can be accessed only in path mode.
|
Storage Pool |
Indicates the storage pool to which the namespace belongs. |
Redundancy Ratio |
The redundancy ratio of the new namespace must be the same as that of the owning storage pool. |
Security Style |
Select a security style based on service requirements. Possible options are:
NOTE:
In Mixed style (which supports NT ACLs), if you have configured an NT ACL for a file or directory on a Windows client and switched Mixed to UNIX, the NT ACL in Mixed style will become invalid. |
Parameter |
Description |
|
|---|---|---|
Space Quota |
Hard Quota |
Indicates the space hard quota. If the quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than those of Soft Quota and Advisory Quota.
NOTE:
If the used file space reaches the hard quota, the system forbids writes. If you want the system to report an alarm before writes are forbidden, set a soft quota and an advisory quota. |
Soft Quota |
Indicates the space soft quota. If the quota is reached, the system reports an alarm but still allows writes. If the soft quota grace period elapses or hard quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than that of Advisory Quota and less than that of Hard Quota. |
|
Advisory Quota |
Indicates the space advisory quota. If the quota is reached, the system reports an alarm but still allows writes. [Value range] 1 KB to 256 PB The value must be less than those of Soft Quota and Hard Quota. |
|
File Quantity Quota |
Hard Quota (K) |
Indicates the file quantity hard quota. If the quota is reached, the system reports an alarm and new files cannot be added. However, operations on existing files are not affected. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than those of Soft Quota (K) and Advisory Quota (K).
NOTE:
If the number of files reaches the hard quota, the system forbids file adding. If you want the system to report an alarm before files cannot be added, set a soft quota and an advisory quota. |
Soft Quota (K) |
Indicates the file quantity soft quota. If the quota is reached, the system reports an alarm but new files can still be added. If the soft quota grace period elapses or hard quota is reached, new files cannot be added and an alarm is reported. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than that of Advisory Quota (K) and less than that of Hard Quota (K). |
|
Advisory Quota (K) |
Indicates the file quantity advisory quota. If the quota is reached, the system reports an alarm but new files can still be added. [Value range] 1 to 100,000,000 The value must be less than those of Soft Quota (K) and Hard Quota (K). |
|
Grace Period |
Soft Quota Grace Period (Days) |
If the used file space or number of files reaches the soft quota, the system reports an alarm but still allows writes or new files can still be added within this period. If this period elapses, the system immediately forbids writes and new files cannot be added. In addition, an alarm is reported.
NOTE:
This parameter is available only when Soft Quota or Soft Quota (K) is set. |
After the DPC function is enabled, the object service cannot set the maximum and minimum WORM retention periods at the prefix level in the converged interworking scenario.
The Configure NFS Share page is displayed.
The Configure CIFS Share page is displayed.
This step can be performed only when the HDFS service is enabled for a storage pool.
The Associate Zone page is displayed on the right.
This step can be performed only when the object service is enabled for a storage pool.
The owner of the bucket (the account that creates the bucket) has full control of the bucket. Other users cannot access the bucket without authorization.
All users can read objects in the bucket, and only the owner of the bucket (the account that creates the bucket) has the write permission.
All users can read, write, and delete objects written by the owner of the bucket (the account that creates the bucket). Unauthorized users cannot read objects written by other accounts but can write or delete objects.
For data security, you are advised to select Private.
Enabling Automatic Update of Atime compromises system performance.
You can click Create to create a QoS policy.
Table 3 describes related parameters.
Parameter |
Description |
|---|---|
Snapshot Directory Visibility |
Indicates whether the directory of namespace snapshots is visible. If this parameter is set to Visible, the system displays the .snapshot directory in the namespace. |
Data Encryption |
Indicates whether to enable the data encryption function. After this function is enabled, the system generates a key to encrypt the data written to the namespace.
NOTE:
|
Encryption Algorithm |
After Data Encryption is enabled, you need to select an encryption algorithm. The value can be XTS-AES-128 or XTS-AES-256. |
Recycle Bin |
Indicates whether to enable the recycle bin function of the namespace. After the recycle bin function is enabled, the system automatically generates the .recyclebininternal directory in the namespace or a dtree of the namespace when files are deleted from the namespace or dtree for the first time. Files are not deleted immediately. Instead, they are moved to the recycle bin and are deleted only after the retention period expires.
NOTE:
After the recycle bin function is enabled, temporary files generated by applications will also be moved to the recycle bin when deleting a file. |
Retention Period |
Set the retention period of deleted files of the namespace. If you select Fixed period, you need to set a specific retention period.
NOTE:
|
Audit Log |
Indicates whether to enable the audit log function of the namespace. After this function is enabled, the system logs operations of the namespace.
NOTE:
This function can be set only when the data pilot service is enabled for the storage pool. |
Record Type |
After the audit log function is enabled, set the operation type to be audit logged. Possible options are Create, Delete, and Rename. |
This function can be set only when the data pilot service is enabled for the storage pool.
Table 4 describes related parameters.
Parameter |
Description |
|---|---|
Max. Retention Period |
Specifies the maximum protection period supported by a namespace. |
Min. Retention Period |
Specifies the minimum protection period supported by a namespace. |
Default Retention Period |
Indicates the default protection period after a file enters the protection state. |
Auto Lock |
After this function is enabled, if a file is not modified within the default waiting time, the file automatically enters the locked state. |
Legal Hold File Modification |
Common users and privileged users cannot delete legal hold files within the retention period. After the function is enabled, the retention periods of the legal hold files can be modified. |
After Legal Hold File Modification is enabled, the retention periods of the legal hold files can be modified.