This section describes how to create a namespace for data storage.
The Create Namespace page is displayed.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Name |
Name of the new namespace.
NOTE:
The naming rules of a namespace are as follows:
To enable the object service for a namespace, the namespace name must meet the following rules. Otherwise, the bucket cannot be accessed in virtual hosting mode, and the domain name resolution will fail. In this case, the bucket can be accessed only in path mode.
|
Storage Pool |
Storage pool to which the new namespace belongs. |
Redundancy Ratio |
Redundancy ratio of the new namespace. It must be the same as that of the owning storage pool.
NOTE:
This parameter is available only for storage pools that use the EC redundancy policy. |
Security Style |
Select a security style based on service requirements. Possible options are:
NOTE:
In Mixed style (which supports NT ACLs), if you configure an NT ACL for a file or directory on a Windows client and switch Mixed to UNIX, the NT ACL in Mixed style will become invalid. |
Application Type |
The following preset application types are provided for typical applications: GENERAL and PACS.
NOTE:
|
After the recycle bin function is enabled, temporary files generated by applications will also be moved to the recycle bin during file deletion.
Parameter |
Description |
|---|---|
Retention Period |
Duration for retaining files in the recycle bin. If you select Fixed period, you need to set a specific retention period.
NOTE:
|
Recycle Bin Directory Visibility |
Whether the recycle bin directory is visible. If this parameter is set to Visible, the system displays the namespace and the .recyclebininternal directory in the dtree of the namespace. |
Recycle Bin Operation Permission |
Select a user who can operate files in the recycle bin. root: Only user root can operate files in the recycle bin. Common user: The system creates a directory for each user based on the user name and user ID. Users have the permission to operate files in their own directories. User root has the permission to operate all users' directories. |
Both the retention period of the recycle bin and the deletion policy of the namespace take effect on the data in the recycle bin. The data is deleted when either of the two policies is met.
Parameter |
Description |
|
|---|---|---|
Space Quota |
Hard Quota |
Space hard quota. If the quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than those of Soft Quota and Advisory Quota.
NOTE:
If the used file space reaches the hard quota, the system forbids writes. If you want the system to report an alarm before writes are forbidden, set a soft quota and an advisory quota. |
Soft Quota |
Space soft quota. If the quota is reached, the system reports an alarm but still allows writes. If the soft quota grace period elapses or hard quota is reached, the system immediately forbids writes and reports an alarm. [Value range] 1 KB to 256 PB The value must be greater than that of Advisory Quota and less than that of Hard Quota. |
|
Advisory Quota |
Space advisory quota. If the quota is reached, the system reports an alarm but still allows writes. [Value range] 1 KB to 256 PB The value must be less than those of Soft Quota and Hard Quota. |
|
File Quantity Quota |
Hard Quota (K) |
File quantity hard quota. If the quota is reached, the system reports an alarm and new files cannot be added. However, operations on existing files are not affected. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than those of Soft Quota (K) and Advisory Quota (K).
NOTE:
If the number of files reaches the hard quota, the system forbids file adding. If you want the system to report an alarm before files cannot be added, set a soft quota and an advisory quota. |
Soft Quota (K) |
File quantity soft quota. If the quota is reached, the system reports an alarm but new files can still be added. If the soft quota grace period elapses or hard quota is reached, new files cannot be added and an alarm is reported. The unit is thousands. [Value range] 1 to 100,000,000 The value must be greater than that of Advisory Quota (K) and less than that of Hard Quota (K). |
|
Advisory Quota (K) |
File quantity advisory quota. If the quota is reached, the system reports an alarm but new files can still be added. [Value range] 1 to 100,000,000 The value must be less than those of Soft Quota (K) and Hard Quota (K). |
|
Grace Period |
Soft Quota Grace Period (Days) |
If the used file space or number of files reaches the soft quota, the system generates an alarm but still allows users' writing data or adding new files within this period. If this period elapses, the system immediately forbids writes and new files cannot be added. In addition, an alarm is reported. [Value range] 1 to 4,294,967,294. If this parameter is not specified, the grace period is unlimited. In this case, if the used file space or number of files reaches the soft quota, the system reports an alarm but does not restrict users' writing data or adding new files.
NOTE:
This parameter can be set only when Soft Quota or Soft Quota (K) is set. |
The Configure NFS Share page is displayed.
The Configure CIFS Share page is displayed.
The Configure FTP Share page is displayed.
The Associate with Zone (HDFS) page is displayed on the right.
The owner of the bucket (the account that creates the bucket) has full control of the bucket. Other users cannot access the bucket without authorization.
All users can read objects in the bucket, and only the owner of the bucket (the account that creates the bucket) has the write permission.
All users can read, write, and delete objects written by the owner of the bucket (the account that creates the bucket). Unauthorized users cannot read objects written by other accounts but can write or delete objects.
For data security, you are advised to select Private.
Enabling Automatic Update of Atime compromises system performance.
Protocol |
Case Sensitivity |
Function Restriction or Impact |
|---|---|---|
NFS/FTP/DPC |
Case-sensitive |
None. |
Case-insensitive |
None. |
|
CIFS |
Case-sensitive (not recommended) |
The storage system can only process file names carried in client requests in Case-sensitive mode. In addition, the storage system returns case-sensitive file names in its responses that need to carry file names to the client. If the client cannot correctly identify case-sensitive file names, the following circumstances may occur in some special scenarios:
CAUTION:
If the preceding scenarios have no impact on services or the impact is acceptable, before enabling the CIFS protocol, you are advised to choose the Case-sensitive mode, enable the recycle bin function of the namespace, and set a proper retention period to reduce the probability of data loss caused by abnormal client behaviors. |
Case-insensitive (recommended) |
None. |
|
Object/HDFS |
Case-sensitive (recommended) |
None. |
Case-insensitive (not recommended) |
The listing operation of the HDFS or object protocol returns results in case-insensitive lexicographical order, which is different from that of the standard protocol. |
|
|
CAUTION:
If interworking between the CIFS protocol and the HDFS or object protocol is required, you need evaluate the service impact of the functions that are unavailable in this scenario in advance and select a case sensitivity mode with the minimum impact. If you cannot evaluate the impact on services, contact technical support engineers. |
||
Directory Space Display |
Current Directory |
File in Current Directory |
Subdirectory in Current Directory |
Subdirectory File |
|---|---|---|---|---|
Space occupied by a directory |
√ |
X |
X |
X |
Space occupied by all files in the current directory |
X |
√ |
X |
X |
Space occupied by all files in the current directory and its subdirectories |
X |
√ |
X |
√ |
√: The space size is displayed. X: The space size is not displayed. |
||||
You can click Create to create a QoS policy.
Table 6 describes related parameters.
Parameter |
Description |
|---|---|
Snapshot Directory Visibility |
Whether the directory of namespace snapshots is visible. If this parameter is set to Visible, the system displays the .snapshot directory in the namespace. |
Cross-Site DR |
Whether to enable the cross-site DR function. After this function is enabled, data in a bucket is replicated based on the primary/standby relationship in a replication group.
NOTE:
|
Replication Group |
Select the replication group to be bound to a namespace. The replication group cannot be changed after being bound.
NOTE:
Replication groups can be selected only after cross-site DR is enabled. If the required replication group does not exist, create one by following instructions provided in Creating a Replication Group. This parameter is not displayed when the object service uses IAM authentication. If you need to bind a replication group, create a replication bucket by referring to Object Service API Reference > Operations on Buckets" > Creating a Bucket in the Service Plane API Description for Object of the corresponding version. |
Data Encryption |
Whether to enable the data encryption function. After this function is enabled, the system generates a key to encrypt the data written to the namespace.
NOTE:
|
Encryption Algorithm |
After data encryption is enabled, you need to select an encryption algorithm. The value can be XTS-AES-128, XTS-AES-256, or XTS-SM4.
NOTE:
|
Synchronize |
After this function is enabled, data encryption will be enabled for the corresponding namespaces in remote clusters in the replication group and the selected encryption algorithm will be used. Ensure that data encryption has been enabled for the corresponding accounts in the remote clusters.
NOTE:
This parameter is available only when both Cross-Site DR and Data Encryption are enabled. It can be configured only during namespace creation and cannot be disabled after being enabled. This parameter is not displayed when the object service uses IAM authentication. |
This function can be set only when the data pilot service is enabled for the storage pool.
If the preceding conditions are not met, node or directory hotspots may occur, causing performance deterioration. In this case, you are advised not to enable this mode.
When creating a namespace, if you associate the namespace with a replication group and disable WORM, WORM cannot be enabled after the namespace is created.
After the policy mode is set to Compliance, it cannot be changed to Enterprise or None.
Table 7 describes related parameters.
Table 7 describes related parameters.
Parameter |
Description |
|---|---|
Max. Retention Period |
Maximum protection period supported by a specified namespace. |
Min. Retention Period |
Minimum protection period supported by a specified namespace. |
Default Retention Period |
Default protection period after a file enters the protection state. |
Auto Lock |
After this function is enabled, if a file is not modified within the default waiting time, the file automatically enters the locked state. |
Legal Hold File Modification |
Common users and privileged users cannot delete legal hold files within the retention period. After the function is enabled, the retention periods of the legal hold files can be modified. |
After Legal Hold File Modification is enabled, the retention periods of the legal hold files can be modified.
Parameter |
Description |
|---|---|
Hot Pool Compression |
Whether to enable hot pool compression. If this function is enabled, data written to the cold, warm, and hot storage pools is compressed. If this function is disabled, only data written to the warm and cold storage pools is compressed. |
Compression Algorithm |
Compression algorithms can be Capacity-oriented or Performance-oriented.
|