This section describes how to create a namespace for storing data.
After the function of allowing namespaces with the same name to be created is enabled, it cannot be disabled.
The following is an example of enabling this function:
admin:/>change space ops cmd=sameFsName args=set,1
DANGER: You are about to modify the sameFsName switch.
This operation will change the status of the sameFsName switch, which may affect services or data.
When the sameFsName switch is turned on, namespaces with the same name can be created under different accounts, and the DPC mounting mode changes.
If multiple namespaces with the same name exist, to mount the namespaces to the local directory of the DPC node, you need to specify an account name and run the following command:
mount -t dpc [-o options] account_name:/fsname /localdirectory.
Warning: The sameFsName switch cannot be disabled after being enabled.
Suggestion: Before performing this operation, confirm whether related module configurations need to be modified.
Have you read danger alert message carefully?(y/n)y
Are you sure you really want to perform the operation?(y/n)y
lsid : 0
ret : 0
info : lsid: 327725, ret = 0, set global SameFsNameSwitch: 1, type: 140
lsid: 327727, ret = 0, set global SameFsNameSwitch: 1, type: 140
lsid: 327726, ret = 0, set global SameFsNameSwitch: 1, type: 140The Create Namespace page is displayed.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Name |
Name of the new namespace.
NOTE:
The naming rules of a namespace are as follows:
To enable the object service for a namespace, the namespace name must meet the following rules. Otherwise, the bucket cannot be accessed in virtual hosting mode, and the domain name resolution will fail. In this case, the bucket can be accessed only in path mode.
|
Storage Pool |
Storage pool to which the new namespace belongs. |
Redundancy Ratio |
Redundancy ratio of the new namespace. It must be the same as that of the owning storage pool.
NOTE:
This parameter is available only for storage pools that use the EC redundancy policy. |
Security Style |
Security style to be selected based on service requirements. Possible options are:
NOTE:
|
Application Type |
Preset application type provided for typical applications. The value can be GENERAL or PACS.
NOTE:
|
After the recycle bin function is enabled, temporary files generated by applications will also be moved to the recycle bin during file deletion.
Parameter |
Description |
|---|---|
Retention Period |
Duration for retaining files in the recycle bin. If you select Fixed period, you need to set a specific retention period. [Value range] Minute: 1 to 4294967295. Hour: 1 to 71582788. Day: 1 to 2982616.
NOTE:
|
Recycle Bin Directory Visibility |
Whether the recycle bin directory is visible. If this parameter is set to Visible, the system displays the .recyclebininternal directory of the namespace and its dtrees. |
Recycle Bin Operation Permission |
Select a user who can operate files in the recycle bin. root: Only user root can operate files in the recycle bin. Common user: The system creates a directory for each user based on the user name and user ID. Users have the permission to operate files in their own directories. User root has the permission to operate all users' directories. |
Parameter |
Description |
|
|---|---|---|
Space Quota |
Hard Quota |
Once the space used by files reaches the hard quota, the system will immediately forbid data writing and report an alarm. [Value range] 1 KB to 256 PB The value must be greater than those of Soft Quota and Advisory Quota.
NOTE:
After the space used by files reaches the hard quota, the system will forbid data writing. If you want the system to report an alarm before forbidding data writing, set a soft quota or an advisory quota. |
Soft Quota |
If the space used by files reaches the soft quota, the system will report an alarm but still allow data writing. After the soft quota grace period elapses or the hard quota is reached, the system will immediately forbid data writing and report an alarm. [Value range] 1 KB to 256 PB The value must be greater than that of Advisory Quota and less than that of Hard Quota. |
|
Advisory Quota |
Once the space used by files reaches the advisory quota, the system will report an alarm but still allow data writing. [Value range] 1 KB to 256 PB The value must be less than those of Soft Quota and Hard Quota. |
|
File Quantity Quota |
Hard Quota (K) |
Once the file quantity reaches the hard quota, the system will immediately forbid file adding and report an alarm. However, operations on existing files are not affected. The unit of the hard quota has been set to K. [Value range] 1 to 100,000,000 The value must be greater than those of Soft Quota (K) and Advisory Quota (K).
NOTE:
After the file quantity reaches the hard quota, the system will forbid file adding. If you want the system to report an alarm before forbidding file adding, set a soft quota or an advisory quota. |
Soft Quota (K) |
If the file quantity reaches the soft quota, the system will report an alarm but still allow file adding. After the soft quota grace period elapses or the hard quota is reached, the system will immediately forbid file adding and report an alarm. The unit of the soft quota has been set to K. [Value range] 1 to 100,000,000 The value must be greater than the file quantity advisory quota and less than the file quantity hard quota. |
|
Advisory Quota (K) |
If the file quantity reaches the advisory quota, the system will report an alarm but still allow file adding. The unit of the advisory quota has been set to K. [Value range] 1 to 100,000,000 The value must be less than those of Soft Quota (K) and Hard Quota (K). |
|
Grace Period |
Soft Quota Grace Period (Days) |
If the space used by files or the file quantity reaches the soft quota, the system will report an alarm but still allow data writing or file adding within the grace period. After the grace period elapses, the system will immediately forbid data writing or file adding and report an alarm. [Value range] 1 to 4,294,967,294. If this parameter is not specified, the grace period is unlimited. In this case, if the space used by files or the file quantity reaches the soft quota, the system will report an alarm but still allow data writing data or file adding.
NOTE:
This parameter can be set only when Soft Quota or Soft Quota (K) is set. |
The Configure NFS Share page is displayed.
The Configure CIFS Share page is displayed.
Parameter |
Description |
|---|---|
Description |
Description of the CIFS share.
NOTE:
The description can be left blank or contain up to 255 characters. |
Create Default ACL |
Determine whether to add a default ACL. This function creates a default ACL (full control rights to everyone; applied to the current directory, its subdirectories, and files in them) for a shared CIFS root directory if the directory has no ACL. You can change the default ACL in follow-up operations. To retain the UNIX mode bits, disable this function. |
Notify |
After this function is enabled, a client's modification operations on a directory, such as adding a directory, adding a file, modifying the directory, and modifying a file, can be detected by other clients that are accessing this directory or the parent directory of this directory. Results of the modification operations are displayed after the page is automatically refreshed. |
Continuously Available |
This option is used to enable or disable the SMB Failover feature. Continuously Available takes effect only after oplock is enabled. If oplock of the CIFS service is disabled, go to the CIFS Service tab page and enable it.
NOTE:
The SMB Failover feature takes effect only after you enable the oplock configuration item and run command change service cifs smb_global_ca_enable= yes on the CLI to enable the SMB service continuity function for tenants. |
SMB3 Encryption |
Determine whether to enable SMB3 encryption. After this function is enabled, the system encrypts the share to ensure data security, but performance deteriorates.
NOTICE:
|
Unencrypted Client Access |
After this function is enabled, clients that do not have encryption capabilities can access the share.
NOTICE:
|
Oplock |
Opportunistic locking (oplock) is a mechanism used to improve client access efficiency and locally buffer files before they are sent to shared storage. This function is not recommended in the following scenarios:
NOTE:
Oplock for a share takes effect only when both oplock for the account and oplock for the share are enabled. |
Lease |
Lease allows a client to lock a file using a lease key, and the file locking can be canceled by the server.
NOTE:
|
ABE |
Access-based enumeration. Enabling this function hides files and folders that users do not have permissions to access.
NOTE:
SMB2 and SMB3 support the ABE function, but SMB1 does not. |
Show Previous Version |
After the function of displaying previous versions is enabled, a client can display previous versions and supports version rollback. |
The Configure FTP Share page is displayed.
The Associate with Zone (HDFS) page is displayed on the right.
The owner of the bucket (the account that creates the bucket) has full control of the bucket. Other users cannot access the bucket without authorization.
Any user can read objects in the current bucket, and only the bucket owner (the account that creates the bucket) can write objects.
Any user can read, write, and delete objects written by the bucket owner (the account that creates the bucket). Unauthorized users cannot read objects written by other accounts but can write or delete objects.
For data security, Public Read or Public Read and Write is not recommended.
Enabling Automatic Update of Atime compromises system performance.
Protocol |
Case Sensitivity |
Function Restriction or Impact |
|---|---|---|
NFS/FTP/DPC |
Case-sensitive |
None. |
Case-insensitive |
None. |
|
CIFS |
Case-sensitive (not recommended) |
The storage system can only process file names carried in client requests in Case-sensitive mode. In addition, the storage system returns case-sensitive file names in its responses that need to carry file names to the client. If the client cannot correctly identify case-sensitive file names, the following circumstances may occur in some special scenarios:
|
Case-insensitive (recommended) |
None. |
|
Object/HDFS |
Case-sensitive (recommended) |
None. |
Case-insensitive (not recommended) |
The listing operation of the HDFS or object protocol returns results in case-insensitive lexicographical order, which is different from that of the standard protocol. |
|
|
NOTICE:
If interworking between the CIFS protocol and the HDFS or object protocol is required, you need evaluate the service impact of the functions that are unavailable in this scenario in advance and select a case sensitivity mode with the minimum impact. If you cannot evaluate the impact on services, contact technical support engineers. |
||
Directory Space Display |
Current Directory |
File in Current Directory |
Subdirectory in Current Directory |
Subdirectory File |
|---|---|---|---|---|
Space occupied by a directory |
√ |
× |
× |
× |
Space occupied by all files in the current directory |
× |
√ |
× |
× |
Space occupied by all files in the current directory and its subdirectories |
× |
√ |
× |
√ |
√: The space size is displayed. ×: The space size is not displayed. |
||||
You can click Create to create a QoS policy.
Table 7 describes related parameters.
Parameter |
Description |
|---|---|
Snapshot Directory Visibility |
Whether the directory of namespace snapshots is visible. If this parameter is set to Visible, the system displays the .snapshot directory in the namespace. |
Cross-Site DR |
Whether to enable the cross-site DR function. After this function is enabled, data in a bucket is replicated based on the primary/standby relationship in a replication group.
NOTE:
|
Replication Group |
Select the replication group to be bound to a namespace. The replication group cannot be changed after being bound.
NOTE:
Replication groups can be selected only after cross-site DR is enabled. If the required replication group does not exist, create one by following instructions provided in Creating a Replication Group. This parameter is not displayed when the object service uses IAM authentication. If you need to bind a replication group, create a replication bucket by referring to Object Service API Reference > Operations on Buckets" > Creating a Bucket in the Service Plane API Description for Object of the corresponding version. |
Data Encryption |
Whether to enable the data encryption function. After this function is enabled, the system generates a key to encrypt the data written to the namespace.
NOTE:
|
Encryption Algorithm |
After Data Encryption is enabled, you need to select an encryption algorithm. The value can be XTS-AES-128, XTS-AES-256, or XTS-SM4.
NOTE:
|
Synchronize |
After this function is enabled, data encryption will be enabled for the corresponding namespaces in remote clusters in the replication group and the selected encryption algorithm will be used. Ensure that data encryption has been enabled for the corresponding accounts in the remote clusters.
NOTE:
This parameter is available only when both Cross-Site DR and Data Encryption are enabled. It can be configured only during namespace creation and cannot be disabled after being enabled. This parameter is not displayed when the object service uses IAM authentication. |
This function can be set only when the data pilot service is enabled for the storage pool.
If the preceding conditions are not met, node or directory hotspots may occur, causing performance deterioration. In this case, you are advised not to enable this mode.
When creating a namespace, if you associate the namespace with a replication group and disable WORM, WORM cannot be enabled after the namespace is created.
After the policy mode is set to Compliance, it cannot be changed to Enterprise or None.
Table 8 describes related parameters.
Table 8 describes related parameters.
Parameter |
Description |
|---|---|
Max. Retention Period |
Maximum protection period supported by a specified namespace. |
Min. Retention Period |
Minimum protection period supported by a specified namespace. |
Default Retention Period |
Default protection period after a file enters the protection state. |
Auto Lock |
After this function is enabled, if a file is not modified within the default waiting time, the file automatically enters the locked state. |
Legal Hold File Modification |
Common users and privileged users cannot delete legal hold files within the retention period. After the function is enabled, the retention periods of the legal hold files can be modified. |
After Legal Hold File Modification is enabled, the retention periods of the legal hold files can be modified.
Parameter |
Description |
|---|---|
Hot Pool Compression |
Whether to enable hot pool compression. If this function is enabled, data written to the cold, warm, and hot storage pools is compressed. If this function is disabled, only data written to the warm and cold storage pools is compressed. |
Compression Algorithm |
Compression algorithms can be Capacity-oriented or Performance-oriented.
|