To associate a namespace to a replication group, you only need to associate the namespace to any cluster in the replication group. After the namespace is associated, the system will automatically create a namespace with the same name in each of the other clusters.
If the object service uses IAM authentication, you cannot perform namespace association operations on DeviceManager. If necessary, create a replication bucket by referring to Object Service API Reference > Operations on Buckets" > Creating a Bucket in the Service Plane API Description for Object of the corresponding version.
The Create Namespace page is displayed.
Table 1 describes related parameters.
Parameter |
Description |
|---|---|
Account |
Account to which the new namespace belongs. |
Name |
Name of the new namespace.
NOTE:
The naming rules of a namespace are as follows:
To enable the object service for a namespace, the namespace name must meet the following rules. Otherwise, the bucket cannot be accessed in virtual hosting mode, and the domain name resolution will fail. In this case, the bucket can be accessed only in path mode.
|
Storage Pool |
Storage pool to which the new namespace belongs. |
Redundancy Ratio |
Redundancy ratio of the new namespace. It must be the same as that of the owning storage pool.
NOTE:
This parameter is available only for storage pools that use the EC redundancy policy. |
Security Style |
Security style to be selected based on service requirements. Possible options are:
NOTE:
In Mixed style (which supports NT ACLs), if you configure an NT ACL for a file or directory on a Windows client and switch Mixed to UNIX, the NT ACL in Mixed style will become invalid. |
After the recycle bin function is enabled, temporary files generated by applications will also be moved to the recycle bin during file deletion.
Parameter |
Description |
|---|---|
Retention Period |
Duration for retaining files in the recycle bin. If you select Fixed period, you need to set a specific retention period. [Value range] Minute: 1 to 4294967295. Hour: 1 to 71582788. Day: 1 to 2982616.
NOTE:
|
Recycle Bin Directory Visibility |
Whether the recycle bin directory is visible. If this parameter is set to Visible, the system displays the .recyclebininternal directory of the namespace and its dtrees. |
Recycle Bin Operation Permission |
Select a user who can operate files in the recycle bin. root: Only user root can operate files in the recycle bin. Common user: The system creates a directory for each user based on the user name and user ID. Users have the permission to operate files in their own directories. User root has the permission to operate all users' directories. |
Parameter |
Description |
|
|---|---|---|
Space Quota |
Hard Quota |
Once the space used by files reaches the hard quota, the system will immediately forbid data writing and report an alarm. [Value range] 1 KB to 256 PB The value must be greater than those of Soft Quota and Advisory Quota.
NOTE:
After the space used by files reaches the hard quota, the system will forbid data writing. If you want the system to report an alarm before forbidding data writing, set a soft quota or an advisory quota. |
Soft Quota |
If the space used by files reaches the soft quota, the system will report an alarm but still allow data writing. After the soft quota grace period elapses or the hard quota is reached, the system will immediately forbid data writing and report an alarm. [Value range] 1 KB to 256 PB The value must be greater than that of Advisory Quota and less than that of Hard Quota. |
|
Advisory Quota |
Once the space used by files reaches the advisory quota, the system will report an alarm but still allow data writing. [Value range] 1 KB to 256 PB The value must be less than those of Soft Quota and Hard Quota. |
|
File Quantity Quota |
Hard Quota (K) |
Once the file quantity reaches the hard quota, the system will immediately forbid file adding and report an alarm. However, operations on existing files are not affected. The unit of the hard quota has been set to K. [Value range] 1 to 100,000,000 The value must be greater than those of Soft Quota (K) and Advisory Quota (K).
NOTE:
After the file quantity reaches the hard quota, the system will forbid file adding. If you want the system to report an alarm before forbidding file adding, set a soft quota or an advisory quota. |
Soft Quota (K) |
If the file quantity reaches the soft quota, the system will report an alarm but still allow file adding. After the soft quota grace period elapses or the hard quota is reached, the system will immediately forbid file adding and report an alarm. The unit of the soft quota has been set to K. [Value range] 1 to 100,000,000 The value must be greater than the file quantity advisory quota and less than the file quantity hard quota. |
|
Advisory Quota (K) |
If the file quantity reaches the advisory quota, the system will report an alarm but still allow file adding. The unit of the advisory quota has been set to K. [Value range] 1 to 100,000,000 The value must be less than those of Soft Quota (K) and Hard Quota (K). |
|
Grace Period |
Soft Quota Grace Period (Days) |
If the space used by files or the file quantity reaches the soft quota, the system will report an alarm but still allow data writing or file adding within the grace period. After the grace period elapses, the system will immediately forbid data writing or file adding and report an alarm. [Value range] 1 to 4,294,967,294. If this parameter is not specified, the grace period is unlimited. In this case, if the space used by files or the file quantity reaches the soft quota, the system will report an alarm but still allow data writing data or file adding.
NOTE:
This parameter can be set only when Soft Quota or Soft Quota (K) is set. |
The Configure NFS Share page is displayed.
The Configure CIFS Share page is displayed.
The Associate with Zone (HDFS) page is displayed.
The owner of the bucket (the account that creates the bucket) has full control of the bucket. Other users cannot access the bucket without authorization.
Any user can read objects in the current bucket, and only the bucket owner (the account that creates the bucket) can write objects.
Any user can read, write, and delete objects written by the bucket owner (the account that creates the bucket). Unauthorized users cannot read objects written by other accounts but can write or delete objects.
For data security, Public Read or Public Read and Write is not recommended.
Enabling Automatic Update of Atime compromises system performance.
Protocol |
Case Sensitivity |
Function Restriction or Impact |
|---|---|---|
NFS/DPC |
Case-sensitive |
None. |
Case-insensitive |
None. |
|
CIFS |
Case-sensitive (not recommended) |
The storage system can only process file names carried in client requests in Case-sensitive mode. In addition, the storage system returns case-sensitive file names in its responses that need to carry file names to the client. If the client cannot correctly identify case-sensitive file names, the following circumstances may occur in some special scenarios:
CAUTION:
If the preceding scenarios have no impact on services or the impact is acceptable, before enabling the CIFS protocol, you are advised to choose the Case-sensitive mode, enable the recycle bin function of the namespace, and set a proper retention period to reduce the probability of data loss caused by abnormal client behaviors. |
Case-insensitive (recommended) |
None. |
|
Object/HDFS |
Case-sensitive (recommended) |
None. |
Case-insensitive (not recommended) |
The listing operation of the HDFS or object protocol returns results in case-insensitive lexicographical order, which is different from that of the standard protocol. |
|
|
CAUTION:
If interworking between the CIFS protocol and the HDFS or object protocol is required, you need evaluate the service impact of the functions that are unavailable in this scenario in advance and select a case sensitivity mode with the minimum impact. If you cannot evaluate the impact on services, contact technical support engineers. |
||
You can click Create to create a QoS policy.
Table 5 describes related parameters.
Parameter |
Description |
|---|---|
Snapshot Directory Visibility |
Whether the directory of namespace snapshots is visible. If this parameter is set to Visible, the system displays the .snapshot directory in the namespace. |
Cross-Site DR |
This function is enabled by default. |
Replication Group |
Name of the replication group to which the namespace is to be bound. |
Data Encryption |
Whether to enable the data encryption function. After this function is enabled, the system generates a key to encrypt the data written to the namespace.
NOTE:
|
Encryption Algorithm |
After Data Encryption is enabled, you need to select an encryption algorithm. The value can be XTS-AES-128, XTS-AES-256, or XTS-SM4.
NOTE:
|
Synchronize |
After this function is enabled, data encryption will be enabled for the corresponding namespaces in remote clusters in the replication group and the selected encryption algorithm will be used. Ensure that data encryption has been enabled for the corresponding accounts in the remote clusters.
NOTE:
This parameter is available only when both Cross-Site DR and Data Encryption are enabled. It can be configured only during namespace creation and cannot be disabled after being enabled. This parameter is not displayed when the object service uses IAM authentication. |
Audit Log |
Whether to enable the audit log function of the namespace. After this function is enabled, the system logs operations of the namespace.
NOTE:
This function can be set only when the data pilot service is enabled for the storage pool. |
Record Type |
After the audit log function is enabled, set the operation type to be recorded in audit logs. Possible options are Create, Delete, and Rename. |
This function can be set only when the data pilot service is enabled for the storage pool.
When creating a namespace, if you associate the namespace with a replication group and disable WORM, WORM cannot be enabled after the namespace is created.
Table 6 describes related parameters.
Parameter |
Description |
|---|---|
Max. Retention Period |
Maximum protection period supported by a specified namespace. |
Min. Retention Period |
Minimum protection period supported by a specified namespace. |
Default Retention Period |
Default protection period after a file enters the protection state. |
Auto Lock |
After this function is enabled, if a file is not modified within the default waiting time, the file automatically enters the locked state. |
Legal Hold File Modification |
Common users and privileged users cannot delete legal hold files within the retention period. After the function is enabled, the retention periods of the legal hold files can be modified. |
After Legal Hold File Modification is enabled, the retention periods of the legal hold files can be modified.