Redp 5458
Redp 5458
Redp 5458
Redpaper
International Technical Support Organization
October 2019
REDP-5458-01
Note: Before using this information and the product it supports, read the information in “Notices” on
page xi.
© Copyright International Business Machines Corporation 2017, 2019. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Chapter 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 IBM Spectrum Scale GUI architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 GUI node requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Role-based access control with GUI users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 High-availability with multiple GUI nodes in a cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Integration hub for configuration, health, and performance data . . . . . . . . . . . . . . . . . . 3
1.5 Support matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5.1 Operating system levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5.2 IBM Spectrum Scale GUI software requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI. 65
5.1 Creating file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
5.2 Mounting a file system through the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
5.3 Unmounting a file system by using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
5.4 Creating filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.5 Creating and managing snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.5.1 Scheduling snapshot creation by using snapshot rules . . . . . . . . . . . . . . . . . . . . 69
5.5.2 Example scenario for retention policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
5.6 Deleting snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.7 Configuring quota . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.8 Information lifecycle management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.8.1 Creating and applying policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5.8.2 Editing a policy by using the text editor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5.8.3 Defining the policy run settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5.8.4 Log files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
5.9 Managing storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
5.10 Managing access control lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
5.11 Managing Object Storage, SMB shares, and NFS exports . . . . . . . . . . . . . . . . . . . . . 76
5.12 Managing IBM services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.12.1 GPFS daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.12.2 CES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.12.3 CES network and CES IPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.12.4 NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.12.5 SMB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.12.6 Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Contents v
vi Monitoring and Managing IBM Spectrum Scale Using the GUI
Preface
The IBM® Spectrum Scale GUI provides an easy way to configure and monitor various
features that are available with the IBM Spectrum® Scale system. It is a web application that
runs on common web browsers, such as Chrome, Firefox, and Edge. The IBM Spectrum
Scale GUI uses Java Script and Ajax technologies to enable smooth and desktop-like
interfacing.
This IBM Redpaper publication provides a broad understanding of the architecture and
features of the IBM Spectrum Scale GUI. It includes information about how to install and
configure the GUI and in-depth information about the use of the GUI options. The primary
audience for this paper includes experienced and new users of IBM Spectrum Scale.
Authors
This paper was produced by a team of specialists from around the world working at the
International Technical Support Organization, Tucson Center.
Liju Jose is an Information Developer with the IBM ISDL ID team. He is responsible for
writing and editing the customer-facing documentation for various storage products, such as
IBM Spectrum Scale, IBM Elastic Storage® Server, and IBM Storwize V7000 Unified. He has
been with IBM for the last five years and holds a Bachelor’s degree in Physics and a Master’s
degree in Electronics Science from the Mahatma Gandhi University.
Larry Coyne
International Technical Support Organization
Sandeep Ramesh
Dietmar Fischer
Andreas Koeninger
Alifiya A Lohawalla
Dharmendra Rai
IBM Systems
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks® publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
viii Monitoring and Managing IBM Spectrum Scale Using the GUI
Stay connected to IBM Redbooks
Find us on Facebook:
http://www.facebook.com/IBMRedbooks
Follow us on Twitter:
http://twitter.com/ibmredbooks
Look for us on LinkedIn:
http://www.linkedin.com/groups?home=&gid=2130806
Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks
weekly newsletter:
https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
Stay current on recent Redbooks publications with RSS Feeds:
http://www.redbooks.ibm.com/rss.html
Preface ix
x Monitoring and Managing IBM Spectrum Scale Using the GUI
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM Research™ Storwize®
Enterprise Storage Server® IBM Spectrum® Tivoli®
IBM® Redbooks® WebSphere®
IBM Elastic Storage® Redbooks (logo) ®
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
Other company, product, or service names may be trademarks or service marks of others.
xii Monitoring and Managing IBM Spectrum Scale Using the GUI
1
Chapter 1. Overview
The IBM Spectrum Scale GUI provides an easy way to configure and monitor various features
that are available with the IBM Spectrum Scale system. The IBM Spectrum Scale GUI is a
web application that runs on common web browsers, such as Chrome, Firefox, and Edge. It
uses Java Script and Ajax technologies to enable smooth and desktop-like interfacing.
Therefore, no client-side installation is required to use the GUI.
This chapter provides a basic overview of the GUI and includes the following topics:
1.1, “IBM Spectrum Scale GUI architecture” on page 2
1.2, “Role-based access control with GUI users” on page 3
1.3, “High-availability with multiple GUI nodes in a cluster” on page 3
1.4, “Integration hub for configuration, health, and performance data” on page 3
1.5, “Support matrix” on page 4
The IBM Spectrum Scale GUI runs on an IBM WebSphere® Liberty application server on one
or more cluster nodes. The application servers provides the infrastructure for the GUI and
REST API. Configuration information from the IBM Spectrum Scale cluster is cached in a
database because some commands are resource intense and user interaction with the GUI
should not always trigger data refresh activities from the cluster. The GUI includes interfaces
to many components in the cluster.
One GUI manages a single IBM Spectrum Scale cluster, but it can also contact GUI nodes
from other clusters to exchange monitoring information through REST.
The resource consumption of the GUI service is considerably low. The memory consumption
of the application server is limited to 512 MiB, and the memory limit of the GUI including all
child processes is set to 2 GiB.
The GUI node also acts as the collector node for performance data. The collector process
uses memory that is based on the number of elements, such as nodes or disks, and depends
on collection frequency.
Use cases for the IBM Spectrum Scale GUI are described next.
GUI users are separate from the Operating System users. The GUI includes a built-in user
database that allows you to register and manage users. It is also possible to configure the
GUI to use an external authentication system, such as LDAP or AD to authenticate the GUI
users. The GUI users are also used for the IBM Spectrum Scale management API (REST
API) access.
For more information about GUI user management, “Configuring role-based access for GUI
users” on page 81.
Chapter 1. Overview 3
Monitor remote clusters
Monitor nodes and networks in the cluster
Manage IBM Spectrum Scale services
Manage SMB service and SMB shares
Manage NFS service and NFS exports
Display and modify NFSv4 ACL for files and directories
Create users and define roles for the GUI users
Configure authentication method for NFS and SMB users
Configure authentication method for GUI users
Create and manage node classes
Define default, user, group, and fileset quotas
Monitor the capacity details at various levels, such as file system, pools, filesets, users,
and user groups
Configure event notifications through emails and SNMP
Collect diagnostic data to find the root cause and troubleshoot an issue reported in the
system
Monitor events
Perform directed maintenance procedures to fix certain issues or to optimize the system
Enable and configure call home feature in the cluster
Monitor Transparent Cloud Tiering service
Manage Object Storage, and create object users and roles
The GUI nodes in the IBM Spectrum Scale cluster can be on any of the supported operating
systems or hardware platforms. That is, an intermix of GUI nodes on various operating
systems and hardware platforms are supported in a cluster.
For more information about the supported operating system and other software versions, see
this IBM Knowledge Center web page.
Note: It is recommended to move to the latest PTF level that is available for the
underlying IBM Spectrum Scale release.
The minimum release level of the cluster must be on the latest release level to display the
latest GUI features.
Chapter 1. Overview 5
6 Monitoring and Managing IBM Spectrum Scale Using the GUI
2
This chapter describes both the methods and includes the following topics:
2.1, “Installing the IBM Spectrum Scale GUI by using the installation toolkit” on page 8
2.2, “Manually installing the IBM Spectrum Scale GUI” on page 8
2.3, “Enabling performance tools in the IBM Spectrum Scale GUI” on page 11
2.4, “Manually upgrading the IBM Spectrum Scale GUI” on page 14
2.5, “Securing the IBM Spectrum Scale GUI” on page 16
2.6, “Configuring the IBM Spectrum Scale GUI to use sudo wrappers” on page 18
2.7, “Ensuring high availability of the GUI service” on page 19
2.8, “Node classes used for the IBM Spectrum Scale GUI” on page 21
2.9, “Modifying the IBM Spectrum Scale GUI property file” on page 21
2.10, “Distributed GUI preferences” on page 22
The GUI server node must be added as an administrator node by using the -a flag:
./spectrumscale node add gpfsnode3 -a
If no nodes are specified as GUI servers, the GUI is not installed. Generally, have at least two
GUI interface servers and a maximum of three for redundancy.
The GUI is installed on specified GUI servers when you run the ./spectrumscale installation
command.
At the end of a successful IBM General Parallel File System (IBM GPFS) installation or
protocol deployment, you can access the GUI through a web browser with the following node
address:
https://<GUI server IP or host name>
Note: After the installation, you must create the first GUI user to log in to the GUI and
create other GUI administrative users who perform system management and monitoring
tasks. When you start the GUI for the first time after the installation, the GUI welcome page
provides options to create the first GUI user from the command-line prompt by using the
/usr/lpp/mmfs/gui/cli/mkuser <user_name> -g SecurityAdmin command.
2.2.1 Prerequisites
The prerequisites for installing the IBM Spectrum Scale system are applicable for GUI
installations as well. For more information about the prerequisites for installation, see IBM
Spectrum Scale Installation prerequisites.
The IBM Spectrum Scale GUI package is also part of the installation package. You must
extract this package to start the installation. The performance tool packages are also required
to enable the performance monitoring tool that is integrated into the GUI. The following
packages are required for performance monitoring tools in GUI:
The performance tool collector package. This package is placed on the collector nodes
only. By default, every GUI node is also used as the collector node to receive performance
details and display them in the GUI.
The performance tool sensor package. This package is applicable for the sensor nodes, if
not already installed. It is recommended to install the sensor package on all nodes of the
cluster to monitor their performance in the GUI.
The IBM Spectrum Scale GUI and performance tool packages that are required for different
platforms are listed in Table 2-1.
Table 2-1 GUI packages that are required for each platform
Platform GUI package name
Note: Ensure that the performance tool collector runs on the same node as the GUI.
The sensor rpm must be installed on any other node that you want to monitor. All sensors
must point to the collector node.
The GUI expects that a collector runs on a GUI node. The GUI also queries the collector on
the same node for performance and capacity data. The following process uses the automated
approach to configure and maintain performance data collection by using the mmperfmon CLI
command.
The /opt/IBM/zimon/ZIMonSensors.cfg local file can be different on every node, and the
system updates this file whenever a configuration change is made. Therefore, this file must
not be edited manually when using the automated configuration mode. During the distribution
of the sensor configuration, the restrict clause is evaluated and the period for all sensors is
set to 0 in the /opt/IBM/zimon/ZIMonSensors.cfg file on the nodes that did not match the
restrict clause. You can check the local file to confirm that a restrict clause worked as
intended.
It is possible to automatically assign restrict these sensors to a single node. In IBM Spectrum
Scale 5.0.1 and later, the capacity-related sensors are configured to automatically elect a
single node where the capacity collection occurs.
Use the Services → Performance Monitoring page to set appropriate periods for these
sensors.
The GPFSDiskCap sensor includes a recommended period of 86400, which means once per
day. As the GPFSDiskCap sensor runs mmdf command to get the capacity data, it is not
recommended to use a value less than 10800 (every 3 hours).
To show fileset capacity information, quota must be enabled for all file systems where fileset
capacity must be monitored. For more information about enabling quota, see the -q option in
the mmchfs command and mmcheckquota command.
Example 2-1 Determining the GUI status using the systemctl status gpfsgui command
systemctl status gpfsgui
gpfsgui.service - IBM_Spectrum_Scale Administration GUI
Loaded: loaded (/usr/lib/systemd/system/gpfsgui.service; disabled; vendor
preset: disabled)
Active: active (running) since Tue 2017-04-11 16:09:23 CEST; 1 day 22h ago
Main PID: 1430 (java)
Status: "GSS/GPFS GUI started"
CGroup: /system.slice/gpfsgui.service
••1430 /usr/lpp/mmfs/java/jre/bin/java
-XX:+HeapDumpOnOutOfMemoryError -Dcom.ibm.gpfs.platf...
2. Issue the systemctl status pmcollector and systemctl status pmsensors commands to
determine the status of the performance tool.
You can also check whether the performance tool backend can receive data by using the
GUI or alternative by using a command line performance tool that is called zc. This tool is
available in the /opt/IBM/zimon folder. Example 2-2 shows some sample output.
This example output shows that the performance data is collected from node1 and node3,
whereas no data is available from node2. The sensor on node2 is not started or
misconfigured.
2.4.1 Prerequisites
Ensure that you are aware of the following details before you start the upgrade process:
If an external authentication server, such as AD or LDAP, is used to authenticate the GUI
users, connections to AD and LDAP systems are stored in the
/opt/ibm/wlp/usr/servers/gpfsgui/server.xml file. This file is overwritten during the
upgrade. Ensure that you save the edited server.xml file to make the similar changes on
the replaced file after the upgrade.
Note: This step is required only if you are upgrading the GUI from a version older than
5.0.1.
Local users, user groups, user roles, and snapshot rules are not affected with an upgrade
because they exist in the cluster configure repository (CCR).
Data in the postgres database is retained.
All IBM Spectrum Scale packages must be of the same release on the GUI node. For
example, do not mix the 5.0.3 GUI rpm with a 5.0.2 base rpm. However, GUI PTFs and
fixes can usually be applied without having to install the corresponding PTF or fix of the
base package. This method is helpful if you want to resolve a GUI issue without changing
anything on the base layer.
Release levels can be different among GUI nodes and other nodes of the cluster.
However, the minimum release level of the cluster must be 4.2.0.0 or later for the GUI to
function.
The scalemgmt user ID must not be used because the GUI requires this user ID to run the
IBM Spectrum Scale GUI WebSphere Java process.
The ports 443, 47080, and 47443 must not be used by other processes.
You can directly upgrade the IBM Spectrum Scale GUI from 4.2.0.0 or later to the latest
version.
Complete the following steps to upgrade the management GUI from 4.2.1.x or later to 4.2.2.x
or later:
1. Stop the GUI services on the node by issuing the systemctl stop gpfsgui command.
Ensure that the latest packages are available at the required location. For more
information about the latest packages that are required for different platforms, see 2.2,
“Manually installing the IBM Spectrum Scale GUI” on page 8.
For more information about the location of the extracted installation packages, see IBM
Knowledge Center.
2. Upgrade the GUI package. For upgrading the previously installed package, use the rpm
-Fvh or rpm -Uvh options. The rpm -Fvh option upgrades the existing installed package,
and the rpm -Uvh option installs the package and upgrades the package as well.
4. If the minimum release level set for IBM Spectrum Scale is not same as the GUI version,
the new GUI features might not be available. You can change the release level by issuing
the mmchconfig release=LATEST command.
Because changing the minimum release level affects the cluster behavior, see the
mmchconfig command man page and other related topics before you make this
configuration change. For more information, see IBM Knowledge Center.
5. Start the GUI by issuing the systemctl start gpfsgui command.
6. To ensure that the GUI and performance tool are started on the boot process, issue the
following commands:
systemctl enable gpfsgui.service
systemctl enable pmsensor.service
systemctl enable pmcollector.service
7. Issue the systemctl status gpfsgui command to verify the GUI service status.
8. Issue the systemctl status pmcollector and systemctl status pmsensors commands to
verify the status of the performance tool.
If multiple GUI nodes are available in a cluster, the communication among those GUI nodes is
carried out through the port 443.
The port 80 is open only to receive events if an older version than 4.2.3 of GPFS is used. It
cannot be used to access the GUI or REST API. Ports 443 is internally forwarded to 47443,
and port 80 is internally forwarded to 47080. This forwarding is done automatically by an
iptables rule. The iptables rules are added when the gpfsgui service is started and are
removed when it is stopped. Therefore, to access the GUI, ports such as 443, 47443, and
47080 must be opened.
The update mechanism for iptables can be disabled by setting the variable UPDATE_IPTABLES
to false, which is stored at: /etc/sysconfig/gpfsgui. You must restart the GUI for the
changes to take effect.
The iptables rules that are necessary for the port forwarding and to bind the non-root users to
the privileged ports, are automatically checked every time when the GUI is started through
the systemctl start gpfsgui command. The user does not have to configure anything
manually for this process.
Note: The IBM Spectrum Scale GUI ports are not configurable. The GUI cannot coexist
with a web server that uses the same ports.
The management GUI uses ZIMon to collect performance data. ZIMon collectors are
normally deployed with the management GUI and sometimes on other systems in a federated
configuration. Each ZIMon collector uses three ports, which can be configured in
ZIMonCollector.cfg. The default ports are 4739, 9085, and 9084. The GUI is sending its
queries on the ports 9084 and 9085 and these ports are accessible only from the localhost.
During the GUI installation, an initial self-signed certificate is created to use for secure
connections between the GUI web servers and web browsers. Based on the security
requirements for your system, you can create a new self-signed certificate or install a signed
certificate that is created by the CA. Self-signed certificates can generate web browser
security warnings and might not comply with organizational security guidelines.
The trusted certificates are created by a third-party CA. These CAs ensure that certificates
include the required security level for an organization based on purchase agreements.
Trusted certificates often feature higher security controls for data encryption and do not cause
browser security warnings. Trusted certificates are also stored in the WebSphere Liberty SSL
keystore.
Major web browsers trust the CA-certified certificates by default; therefore, they can confirm
that the certificate was received by the GUI server can be trusted. You can buy a signed
certificate from a trusted third-party authority or create your own certificate and get it certified.
You can use self-signed and trusted certificates. However, the use of a trusted is the preferred
method because the browser trusts this certificate automatically without any manual
interventions.
You can use the Services → GUI page in the GUI to install and use the certificates (see
Figure 2-1).
You can use the Services → GUI page in the GUI to perform the following tasks:
Generate a self-signed certificate by using the Install Self-Signed Certificate option.
Generate a certificate request and install it after getting it certified by the CA by using the
Create Certificate Request option.
Note: You can use new attributes for Subject Alternative Names, if the OpenSSL
version on the GUI node is 1.1.1 or later.
2.5.3 Root privilege considerations for the IBM Spectrum Scale GUI
IBM Spectrum Scale 4.2.3 or later no longer runs the GUI WebSphere Java process as “root”
but as a user named scalemgmt. This method provides improved security because web
applications running as root are vulnerable to security threats. The scalemgmt user is set up
as a system account with no login privileges.
The GUI user still requires root privileges to perform the following tasks at the backend:
Issue IBM Spectrum Scale CLI commands.
Bind to the privilege ports 80 (HTTP) and 443 (HTTPS). The iptables rule that is used
internally in the system forwards port 80 to 47080 and port 443 to 47443.
The system automatically creates the scalemgmt user. It does not require any configuration to
be performed by the user.
Make the following configuration changes to use the IBM Spectrum Scale management GUI
on a cluster where sudo wrappers are used:
1. Issue the mmchconfig sudoUser=gpfsadmin command to configure the user name.
Passwordless SSH is set up between the root user on the node where the GUI is running on
all the remote nodes in the cluster. The SSH calls are equivalent to SSH
gpfsadmin@destination-node. Therefore, it is not necessary to set up passwordless SSH
between gpfsadmin users on any two nodes.
The root user of the node where the GUI is running can do passwordless SSH to any other
node using the gpfsadmin user login. Therefore, unidirectional access from the GUI node to
the remote nodes as gpfsadmin user is sufficient.
Note: If sudo wrappers are enabled on the cluster but GUI is not configured for it, the
system raises an event.
A GUI high availability configuration with two GUI nodes is shown in Figure 2-3.
When configured for high availability, GUI nodes include the following main aspects:
The GUI nodes are configured in the active/active configuration. Up to three GUI nodes
can be configured in a cluster. All GUI nodes are fully functional and can be used in
parallel.
All GUI nodes are equal from the user’s perspective. If a GUI node fails, the user must
manually connect to the other GUI. The master role fails over automatically, but no failover
exists for the IP address of the other GUI server.
Data that cannot be gathered from GPFS is stored in CCR as shared-cluster repository.
This type of data includes GUI users, groups and roles, snapshot schedules, email
notification settings, policy templates, and ACL templates.
All GUI nodes must run on the same software level.
If an external authentication method is used to store the GUI user details and authenticate
them, such as AD or LDAP, the AD/LDAP configuration must be done on all GUI nodes to
ensure high availability. If an internal authentication method is used, the GUI nodes get the
user information from the CCR.
To display the performance monitoring information, a performance monitoring collector
must be installed on each GUI node, and these collectors must be in the federated mode.
The data collection from the sensors can be configured in such a way that the details are
sent to all collectors or only to a single collector.
You can configure the collector redundancy by modifying the colRedundancy option in
/opt/IBM/zimon/defaults/ZIMonSensors.cfg. For more information about how to ensure
collector redundancy, see IBM Knowledge Center.
The Mark as Read operation can be performed on events that are stored locally on the
GUI node. The changes that are made to the events are not visible through the other GUI
node.
Each GUI has its own local configuration cache and collects configuration changes
individually.
A corrupted cache database affects only the local GUI; other GUIs continue working. Most
of the configuration changes are simultaneously reported in the GUIs. Some configuration
changes are gathered through the individually scheduled refresh tasks, which might result
in displaying unsynchronized information.
Each node on which the GUI services are started is added to these node classes.
Note: These node classes must not be modified manually because the GUI regularly
checks and possibly updates the node class members.
The properties file is not maintained over upgrades; therefore, modifications to this file must
be reapplied when the GUI is upgraded. Typically, this file does not need to be updated.
The important settings that can be modified in the properties file are listed in Table 2-3.
ZIMonAddress=localhost, ZIMonPort=9084 Sets the host name and port where the performance
collector service is running. The only supported
configuration is hosting the collector on the node where
the GUI is running.
The distributed preferences contain various information that are needed in the distributed
environment such as user repository, LDAP and certificate settings, user account templates,
policies, and thresholds.
You can also use the Preferences tab in the Services → GUI page to set the following
options for the GUI node:
Login message
A message that can be displayed in the login page of the management GUI. Usually, this
message is used to display some important information that must be shared with other
users. For example, “Do not alter snapshot configuration”, “To get access to the system,
please contact…… “, and so on. You can specify only up to 160 characters in the
message.
Session timeout
The system automatically logs out the user after a specified period of inactivity.
Display cluster name on the banner
You can enter a name for the cluster and display it on the banner.
Note: The settings that are made under the Preferences tab are stored centrally in
CCR. Therefore, the settings that are made for one GUI node are applicable to all GUI
nodes of the cluster.
Note: The Object and Protocols menus are displayed only when these features are
enabled in the cluster.
The health status of various services, which displays only events that are in the Warning or
Critical status (see Figure 3-4).
A link to the context-sensitive help page (see Figure 3-5). This help file provides a detailed
explanation of the features that are associated with the page. The context-sensitive help
files are available in the Help menu, which is in the upper-right corner of the GUI page.
A link to the IBM Spectrum Scale Knowledge Center is also available in the Help menu,
which is in the upper-right corner of the GUI page.
The currently logged in user name, log out, and provide feedback options are available in
the user menu (see Figure 3-6).
Connection indicators that show active data transfers between browser and the GUI
server (blue light indicates, “Loading”) and connection issues (yellow light indicates,
“Disconnected”), as shown in Figure 3-7.
Table 4-1 lists the performance monitoring options that are available in the IBM Spectrum
Scale GUI.
Monitoring → Statistics Displays the performance of system resources and file and
Object Storage in various performance charts. You can
select the required charts and monitor the performance
based on the filter criteria. You can also pan and zoom charts
with detailed metrics and display past intervals.
Files → File Systems Provides a detailed view of the performance, capacity, and
health aspects of individual file systems.
Files → Active File Management Provides a detailed view of the configuration, performance,
and health status of AFM cache relationship, AFM disaster
recovery (AFMDR) relationship, and gateway nodes.
Files → Filesets Provides a detailed view of the fileset and its capacity details.
Files → Transparent Cloud Tiering Provides insight into health, performance, and configuration
of the Transparent Cloud Tiering feature.
Protocols → NFS Exports Provides an overview of the performance aspects of the NFS
export.
Protocols → SMB Shares Provides an overview of the performance aspects of the SMB
shares.
The performance and capacity data are collected with the help of the following components:
Sensors: The sensors are placed on all the nodes, and they share the data with the
collector. The sensors run on any node that is required to collect metrics.
Collector: The collector collects data from the sensors. The metric collector must run at
least on one node to gather metrics from all the nodes that are running the associated
sensors. The metrics are stored in a database on the collector node.
The performance monitoring configuration for the GUI is shown in Figure 4-1.
You can use the Services → Performance Monitoring page to configure sensors. You can
also use the mmperfmon command to configure the performance data collection through the
CLI. The GUI displays a subset of the available metrics that are available in the performance
monitoring tool.
The performance monitoring tool installation can have a single collector, or can consist of
multiple collectors to increase the scalability or the fault-tolerance of the performance
monitoring system. This latter configuration is referred to as “federation”.
You can configure the system to monitor the performance of the following functional areas in
the system:
Network
InfiniBand network
System resources
NSD server
IBM Spectrum Scale client
NFS
SMB
Object
CTDB
Transparent Cloud Tiering
AFM
Waiters
Note: The functional areas, such as NFS, SMB, Object, CTDB, and Transparent Cloud
Tiering, are available only if the feature is enabled in the system.
You can also use this page to monitor capacity. The customized charts that are marked as
favorite charts can be selected n when you add widgets in the dashboard. You can display
either or two charts at a time in the Statistics page.
The predefined performance charts and metrics help in investigating every node or any
specific node that is collecting the metrics. Figure 4-2 shows various configuration options
that are available in the Statistics page of the GUI.
Predefined charts can be selected from a predefined chart list. You can add charts to the
predefined list by clicking the Favorites button.
The Dashboard page helps to access all charts, which are predefined or custom-created
favorites.
The performance metrics are grouped under the combination of resource types and
aggregation levels. The resource types determine the area from which the data is taken to
create the performance analysis and aggregation level determines the level at which the
data is aggregated.
Figure 4-5 highlights the configuration options that are available in edit mode of the
dashboard.
When you open the IBM Spectrum Scale GUI after the installation or upgrade, you can see
the default dashboards that are included with the product. You also can modify or delete the
default dashboards to suit your requirements.
The widgets with type Performance list the charts that are marked as favorite charts in the
Statistics page of the GUI. Favorite charts (along with the predefined charts) can be selected
when you add widgets in the dashboard.
To create favorite charts, click the Star icon next to the chart title on the Monitoring →
Statistics page.
The capacity details that are displayed in the GUI are obtained from the following sources:
GPFS quota database. The system collects the quota details for users, groups, and
filesets daily and stores them in the postgres database.
Performance monitoring tool. The GUI queries the performance monitoring capacity and
displays capacity data in various pages in the GUI.
Based on the source of the capacity information, different procedures must be performed to
enable capacity and quota data collection.
To enable capacity data collection from the performance monitoring tool, the
GPFSFilesetQuota sensor must be enabled. For more information about how to enable the
performance monitoring sensor for capacity data collection, see Manual installation of IBM
Spectrum Scale GUI in IBM Spectrum Scale: Concepts, Planning, and Installation Guide.
You can set default user quotas at the file system level rather than defining user quotas
explicitly for each user. Default quota limits can be set for users. You can specify the
general quota collection scope, such as per file system or per fileset to define whether the
default quota must be defined at file system level or fileset level and set the default user
quota. After this value is set, all child objects that are created under the file system or
fileset are configured with the default soft and hard limits. You can assign a custom quota
limit to individual child objects, but the default limits remain the same unless changed at
the file system or fileset level.
After reconfiguring quota settings, it is recommended to run the mmcheckquota command
for the affected file system to verify the changes.
If capacity data collection is not configured correctly, you can use mmperfmon CLI command or
the Services → Performance Monitoring → Sensors page.
The Services → Performance Monitoring → Sensors page allows to view and edit the
sensor settings. By default, the collection periods of capacity collection sensors are set to
collect data with a period of up to one day. Therefore, it might take a while until the data is
refreshed in the GUI.
The following sensors are collecting capacity-related information and are used by the GUI:
GPFSDiskCap NSD, Pool, and File System level capacity. Uses the mmdf command in
the background and typically runs once per day because it is
resource-intensive. Should be restricted to run on a single node only.
GPFSPool Pool and file system level capacity. Requires a mounted file system
and typically runs every 5 minutes. Should be restricted to run on a
single node only.
4.4.3 Capacity information for file systems, pools, NSDs, and filesets
The Monitoring → Statistics page helps to create customized capacity reports for file
systems, pools, and filesets. You can store these reports as favorites and add them to the
dashboard.
The dedicated GUI pages combine information about configuration, health, performance, and
capacity in one place. The following GUI pages provide the corresponding capacity views:
Files → File Systems
Files → Filesets
Storage → Pools
Storage → NSDs
The Filesets grid and details depend on quota that is obtained from the GPFS quota database
and the performance monitoring sensor GPFSFilesetQuota. If quota is disabled, the system
displays a warning message in the Filesets page.
Table 4-2 System health monitoring options available in the IBM Spectrum Scale GUI
GUI page Function
Monitoring → Events Lists the events that are reported in the system. You can monitor and
troubleshoot errors on your system on the Events page.
Monitoring → Tips Lists the events of type tips, which provide recommendations about
certain events that might occur in the future.
Home Provides the overall system health of the IBM Spectrum Scale system.
Monitoring Displays the health status of nodes and lists the events that are reported
at the node level.
Cluster → Network Displays health status and configuration aspects of all available networks
and interfaces that are part of the networks.
Files → File Systems Displays the health status of file systems and lists the events that are
reported at the file system level.
Files → Filesets Displays the health status of filesets and lists the events that are reported
at the fileset level.
Files → Transparent Cloud Tiering Lists the events that are reported for the Transparent Cloud Tiering
service. The GUI displays this page only if the Transparent Cloud Tiering
feature is enabled in the system.
Files → Active File Management Displays health status and lists events that are reported for AFM cache
relationship, AFM disaster recovery (AFMDR) relationship, and gateway
nodes.
Storage → Pools Displays health status and lists events that are reported for storage
pools.
Storage → NSDs Displays health status of NSDs and lists the events that are reported at
the NSD level.
Monitoring → Command Audit Log Displays a record of various actions that are performed on the system.
This information helps the system administrator to audit the commands
and tasks that are performed by the administrators. These logs can also
be used to troubleshoot issues that are reported in the system.
Health indicator (available in the Displays the number of events with warning and critical status that are
upper-right corner of the GUI) specific to each component.
System overview widget in the Displays the number of events that were reported against each
Monitoring → Dashboard page component.
System health events widget in the Provides an overview of the warning and error events that are reported
Monitoring → Dashboard page in the system.
Timeline widget in the Monitoring → Displays the events that are reported in a selected time frame on the
Dashboard page selected performance chart.
The properties of a node display the status of various CES services, such as Object, NFS,
and SMB and the authentication status of these services if they are enabled. It also displays
other details, such as network status and information about attached NSDs and file systems.
You can customize the nodes tables individually by adding or removing columns by using the
Customize Columns feature.
You can use the Set Attributes option that is available in the Actions menu to set the node
attributes, such as site, room, and rack on any of the views. You can set attributes of multiple
nodes at a time. The attributes can be used to filter nodes in the nodes view.
The system node classes are hardcoded, but you can create user-defined node classes by
using the Nodes → Node Classes → Create Node Class option in the IBM Spectrum
Scale GUI. While creating a node class, consider the following points:
The name of the new node class must be different from the name of the existing nodes or
node classes.
You can add individual nodes and other existing node classes in a new node class from
the All Nodes and Node Classes tabs of the Create Node Class window.
Use the Modify option to change the node class name and nodes and node classes that are
part of a node class. You cannot modify system node classes.
Use the Delete option to delete the user-defined node class. You cannot delete the system
node classes.
The Transparent Cloud Tiering feature uses the ILM policy query language semantics. The
system administrators can define policies to tier data to a cloud storage.
On an IBM Spectrum Scale cluster with multiple storage tiers configured, this external cloud
storage can be used as the cooler storage tier to store infrequently accessed data from a cool
storage pool. Because of performance reasons, avoid moving any active or hot data to this
external storage pool because it drives excessive data traffic that results in delays and
application timeouts.
The Files → Transparent Cloud Tiering page (see Figure 4-7) provides performance and
health information charts about the Transparent Cloud Tiering service.
You can select a line chart or a bar chart to display the details. The line chart shows an
average rate, whereas the bar chart shows aggregated data. For example, the aggregate
view can be used by administrators to see how much data was transferred in one day.
The GUI combines the following sources on the cache or primary side:
Active File Management sensors from the performance monitoring tool
Health status and events from the mmhealth component
Active File Management configuration information
The following options are available to monitor Active File Management and Active File
Management disaster recovery relationships and gateway nodes:
A quick view gives the details of top relationships between cache and home sites in an
Active File Management or Active File Management disaster recovery relationship. It also
provides the performance information for gateway nodes that are by used memory and the
number of queued messages. The graphs that are displayed in the quick view are
refreshed regularly. The refresh intervals depend on the following selected time frame:
– Every minute for the 5-minute time frame
– Every 15 minutes for the 1-hour time frame
– Every 6 hours for the 24-hour time frame
– Every two days for the 7-day time frame
– Every seven days for the 30-day time frame
– Every four months for the 365-day time frame
Different performance metrics and configuration details display in the tabular format. The
following tables are available:
– Cache
Provides the information about configuration, health, and performance of the Active
File Management feature that is configured for data caching and replication.
– Disaster Recovery
Provides information about configuration, health, and performance of Active File
Management disaster recovery configuration in the cluster.
– Gateway Nodes
Provide details of the nodes that are designated as the gateway node in the Active File
Management or Active File Management disaster recovery configuration.
To find an Active File Management or Active File Management disaster recovery
relationship or a gateway node with extreme values, sort the values that are displayed on
the table by different attributes. Click the performance metric in the table header to sort the
data based on that metric.
The systems pools contain metadata for the entire file system. Therefore, the GUI shows
separate lines for the system pool, depending on the usage type of the NSDs in the system
pool. If the system pool of a file system is used only for storing metadata, the GUI shows one
row of details. If the system pool consists of NSDs that are of type metadataOnly and
dataOnly, the GUI shows two rows with separate data. The detailed views for this pool also
show separate performance and capacity information in the overview and NSD sections.
An NSD is a logical grouping of storage disks in a network on file storage systems. It provides
a method for cluster-wide disk naming and high-speed access to data for applications that are
running on nodes that do not have direct access to the disks.
The NSDs in the cluster might be physically attached to all nodes or serve their data through
an NSD server that provides a virtual connection. You can specify up to eight NSD servers for
each NSD. If one server fails, the next server in the list takes control from the failed node.
Each NSD server must have physical access to the same NSD. However, different servers
can serve I/O to different non-intersecting sets of clients. The subnet functions in IBM
Spectrum Scale determine which NSD server must serve a particular IBM Spectrum Scale
client.
The following options are available in the NSDs page to analyze the NSD performance, health
status, and configuration details:
An NSD table displays the available NSDs and many different performance metrics. To
find NSDs with extreme values, you can sort the values that are displayed in the table by
different performance metrics. Click the performance metric in the table header to sort the
data based on that metric.
You can select the time range that determines the averaging of the values that are
displayed in the table from the time range selector. This control is in the upper-right corner.
The metrics in the table are refreshed based on the selected time frame. You can refresh it
manually to view the latest data.
A detailed view of the performance and health aspects of individual NSDs is also available
in the NSDs page. Select the NSD for which you need to view the performance details and
click View Details. The system displays details of the NSD on the right pane.
The detailed view allows you to drill down to various performance and configuration
aspects. The following details can be obtained from each tab of the detailed view:
– Overview: Provides an overview of the NSD performance details.
– Events: Reports system health events for the NSD.
Note: NSD performance metrics are not collected if the client is running on the NSD
server. Therefore, the GUI does not display all SAN environments or workload from local
clients.
A dedicated network is used within the cluster for certain operations. For example, the system
uses the administration network when an administration command is issued. It is also used
for sharing administration-related information. This network is used for node-to-node
communication within the cluster.
The daemon network is used for sharing file system or other resources data. Remote clusters
also establish communication path through the daemon network. Similarly, the dedicated
network types like CES network and external network can also be configured in the cluster.
The performance of network is monitored by monitoring the data transfer managed through
the respective interfaces. The following types of network interfaces can be monitored through
the GUI:
IP interfaces on Ethernet and InfiniBand adapters.
Remote Direct Memory Access (RDMA) interfaces on InfiniBand adapters with Open
Fabrics Enterprise Distribution (OFED) drivers.
The Network page also exposes adapters and IPs that are not bound to a service to provide a
full view of the network activity on a node.
The details of the networks and their components can be obtained both in graphical and
tabular formats. The Network page provides the following options to analyze the performance
and status of networks and adapters:
A quick view that gives graphical representation of overall IP throughput, overall RDMA
throughput, IP interfaces by bytes sent and received, and RDMA interfaces by bytes sent
and received. You can access this view by selecting the expand button that is next to the
title of the page. You can close this view if not required.
Graphs in the overview are refreshed regularly. The refresh intervals of the top three
entities are depended on the following displayed time frames:
– Every minute for the 5-minutes time frame
– Every 15 minutes for the 1-hour time frame
– Every 6 hours for the 24-hour time frame
– Every two days for the 7-day time frame
– Every seven days for the 30-day time frame
– Every four months for the 365-day time frame
If you click a block in the IP interfaces charts, the corresponding details are displayed in
the IP interfaces table. The table is filtered by the IP interfaces that are part of the selected
block. You can remove the filter by clicking the link that appears above the table header
row.
A table that provides the following performance metrics that are available under the
following tabs of the table:
– IP Interfaces: Shows all network interfaces that are part of the Ethernet and InfiniBand
networks in the cluster. To view performance details in graphical format or to see that
the events reported against the individual adapter, select the adapter in the table and
then select Actions → View Details.
– RDMA Interfaces: Shows the details of the InfiniBand RDMA networks that are
configured in the cluster. To view performance details in graphical format or to see that
the events reported against the individual adapter, select the adapter in the table and
then select Actions → View Details.
The system displays the RDMA Interfaces tab only if there are RDMA interfaces
available.
– Networks: Shows all networks in the cluster and provides information on network
types, health status, and number of nodes and adapters that are part of the network.
– IP Addresses: Lists all IP addresses that are configured in the cluster.
To find networks or adapters with extreme values, you can sort the values that are
displayed in the tables by different performance metrics. Click the performance metric in
the table header to sort the data based on that metric. You can select the time range that
determines the averaging of the values that are displayed in the table and the time range
of the charts in the overview from the time range selector, which is in the upper right
corner. The metrics in the table do not update automatically. Click the Refresh button that
is above the table to refresh the table content with more recent data.
By establishing a connection between the GUI nodes, both the clusters can monitor the other
cluster. To enable remote monitoring capability among clusters, the release-level of the GUI
nodes that are communicating with each other must be 5.0.0 or later.
To establish a connection with the remote cluster, complete the following steps:
1. Complete the following steps on the local cluster to raise the access request:
a. Click Cluster → Remote Connections.
b. Select the Request Access option that is available under the Outgoing Requests tab
to raise the request for access.
c. In the Request Remote Cluster Access dialog, enter an alias for the remote cluster
name and specify the GUI nodes to which the local GUI node must establish the
connection.
d. If you know the credentials of the security administrator of the remote cluster, you can
also add the user name and password of the remote cluster administrator and skip step
2.
e. Click Send to submit the request.
2. Complete the following steps on the remote cluster to grant access:
a. When the request for connection is received in, the GUI displays the details of the
request in the Cluster → Remote Connections → Incoming Requests page.
b. Select Grant Access to grant the permission and establish the connection.
Now, the requesting cluster GUI can monitor the remote cluster. To enable both clusters to
monitor each other, repeat the procedure with reversed roles through the respective GUIs.
Note: Only the GUI user with Security Administrator role can grant access to the remote
connection requests.
You can see the details of the connections established with the remote clusters under the
Remote Cluster tab.
Files → File Systems The grid view provides the following remote
cluster monitoring details:
Whether the file system is mounted on a
remote cluster.
Capacity information.
Number of local nodes on which the file
system is mounted.
Performance details.
Pools, NSDs, filesets, and snapshots.
Files → File Systems → View Details → Provides the details of the remote cluster nodes
Remote Nodes where the local file system
Files → Active File Management When remote monitoring is enabled, you can
view the following AFM details:
On home and secondary, you can see the
AFM relationships configuration, health
status, and performance values of the Cache
and Disaster Recovery grids.
On the Overview tab of the detailed view, the
available home and secondary inodes are
available.
On the Overview tab of the detailed view, the
details such as NFS throughput, IOPs, and
latency details are available, if the protocol is
NFS.
Monitoring → Statistics and Monitoring → You can create customized performance charts
Dashboard to monitor the remote cluster performance. For
more information, see “Monitoring performance
of the remote cluster”.
After establishing the connection with the remote cluster by using the Cluster → Remote
Connections page, you can access the performance details of the remote cluster from the
following GUI pages:
Monitoring → Statistics
Monitoring → Dashboard
Files → File Systems
To monitor performance details of the remote cluster in the Statistics page, you must create
customized performance charts by completing the following steps:
1. Access the edit mode by clicking the icon that is available in the upper right corner of the
performance chart and select Edit.
2. In the edit mode, select the remote cluster to be monitored from the Cluster field. You can
select the local cluster or remote cluster from this field.
3. Select Resource type. The data is taken from this area to create the performance
analysis.
4. Select Aggregation level. This level determines the level at which the data is aggregated.
The aggregation levels that are available for selection varies based on the resource type.
5. Select the entities that must be graphed. The table lists all entities that are available for the
chosen resource type and aggregation level. When a metric is selected, you can also see
the selected metrics in the same grid and use methods, such as sorting, filtering, or
adjusting the time frame to select the entities that you want to select.
6. Select Metrics. These metrics are the type of data that must be included in the
performance chart. The list of metrics that is available for selection varies based on the
resource type and aggregation type.
7. Click Apply to create the customized chart.
After creating the customized performance chart, you can mark it as favorite charts so that
they are displayed on the Dashboard page.
If a file system is mounted on the remote cluster nodes, the performance details of such
remote cluster nodes are available in the Remote Nodes tab of the detailed view of file
systems in the Files → File Systems page.
You can set the following types of threshold levels for data collected through performance
monitoring sensors:
Warning level
When the data that is monitored reaches the warning level, the system raises an event
with severity Warning. When the observed value exceeds the current threshold level, the
system removes the warning.
Error level
When the data that is monitored reaches the error level, the system raises an event with
severity Error. When the observed value exceeds the current threshold level, the system
removes the error state.
Certain types of thresholds are predefined in the system. The following predefined thresholds
are available:
Inode utilization at the fileset level
Data pool capacity utilization
Metadata pool capacity utilization
Free memory utilization
Apart from the predefined thresholds, you can create user-defined thresholds for the data that
is collected through the performance monitoring sensors.
You can use the Monitoring → Thresholds page in the GUI and the mmhealth command to
manage predefined and user-defined thresholds.
You can use the Use as Template option that is available in the Actions menu to use a
defined threshold as the template to create a threshold. You can specify the following details
in a threshold rule:
Metric category
Lists all performance monitoring sensors that are enabled in the system and thresholds
that are derived by performing certain calculations on certain performance metrics. These
derived thresholds are referred as measurements. The measurements category provides
the flexibility to edit certain predefined threshold rules. The following measurements are
available for selection:
– Fileset_inode
Inode capacity utilization at the fileset level. This level is calculated as shown in the
following example:
(sum(gpfs_fset_allocInodes)-sum(gpfs_fset_freeInodes))/sum(gpfs_fset_maxInod
es)
– DataPool_capUtil
Data pool capacity utilization, which is calculated as shown in the following example:
(sum(gpfs_pool_total_dataKB)-sum(gpfs_pool_free_dataKB))/sum(gpfs_pool_total
_dataKB)
Specifies that the threshold rule is going to be defined for the metrics that
belong to the GPFSDiskCap sensor.
Filter by Cluster
Aggregator Maximum
When maximum capacity exceeds the threshold level, the system raises the
event. If the following values are selected, the nature of the threshold rule
changes:
Sum: When the sum of the metric values exceeds the threshold levels,
the system raises the events.
Average: When the average value exceeds the average, the system
raises the events.
Maximum: When the maximum value exceeds maximum level, the
system raises the events.
Minimum: When the minimum value exceeds the sum of or goes below
the threshold levels, the system raises the events.
Rate: When the rate exceeds the threshold value, the system raises
the events. Rate is only added for the “finest” group by clause. If we
wanted to get a rate for a “partial key”, this function is not supported;
that is, when Rate is selected, the system automatically selects the
best possible values in the grouping field.
The system raises an event with severity Warning when the total capacity
usage exceeds 9 GiB.
The system raises an event with severity level Error when the total capacity
usage exceeds 10 GiB.
Sensitivity 24 hours
Hysteresis 50%
If the value is reduced below 4.5 GiB, the warning state is removed.
Similarly, if the value is reduced below 5 GiB, the error state is removed.
Direction High
When the value that is being monitored exceeds the threshold limit, the
system raises an event.
You can monitor the command audit log from the Monitoring → Command Audit Log page.
You can use the Copy Command and Arguments option from the Actions menu to copy the
command and arguments that are used in an operation.
Note: You cannot create file system from the GUI in an FPO-enabled environment. In an
FPO environment, the Create File System option is disabled.
You can specify the following details while creating the file system by using the GUI:
File system name.
Storage pools that provide storage for the file system. You can create a system pool and
multiple data pools for a file system. Storage pools provide storage for the file system. You
can create a system pool and multiple data pools for a file system. A system pool can be
used for storing metadata, data, or both. The data pool can be used only for storing data.
Size of each inode.
Maximum number of inodes for the root fileset.
Data and metadata block size.
Default replication policy for the file system by specifying the number of data and metadata
copies that are required. You can later change the number of copies of data and metadata
through the CLI by using the mmchfs command.
NSDs that provide storage to the pools that are defined for the file system.
Failure groups of NSDs and certain attributes that are important for the failure group
definition.
Round-robin order in which data must be written to the NSDs in a pool.
Maximum number of IBM Spectrum Scale client nodes that can access the file system
concurrently.
Whether to enable quota for the file system. If yes, whether the user and group quota
definitions must be set at the file system level or at the individual fileset level.
Whether to enable DMAPI for the file system.
The IBM Spectrum Scale release with which the file system features are compatible.
Mount point and automatic mount mode of the file system.
The GUI has the following options that are related to mounting the file system:
Mount local file systems on nodes of the local IBM Spectrum Scale cluster.
Mount remote file systems on local nodes.
Note: You can configure automatic mount option for a file system only after the file
system is unmounted from all nodes; that is, you need to stop I/O on this file system to
configure this option. However, you can include or exclude the individual nodes for
automatic mount without unmounting the file system from all nodes.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 67
Specify whether to force unmount. Selecting the Force unmount option while unmounting
the file system unmounts the file system, even if it is still busy performing the I/O
operations. Forcing the unmount operation affects the outstanding operations and causes
data integrity issues. The IBM Spectrum Scale system relies on the native unmount
command to conduct the unmount operation.
The semantics of forced unmount are platform-specific. On certain platforms, such as
Linux, even when forced unmount is requested, the file system cannot be unmounted if it
is still being referenced by the system kernel. To unmount a file system in such cases,
identify and stop the processes that are referencing the file system. You can use system
utilities like lsof and fuser for this process.
Use the Files → Filesets → Create Fileset option to create a fileset. You can create an
independent or dependent fileset. You can specify the maximum number of inodes and the
allocated number of inodes for an independent fileset. You can also specify access control
lists for the fileset.
When Quota data collection is enabled, the GUI also provides information on fileset size and
growth rates.
When a snapshot of an independent fileset is taken, only nested dependent filesets are
included in the snapshot.
You can automate the snapshot creation and retention by creating a snapshot rule. That is, in
a snapshot rule, you can specify a frequency at which the snapshots must be created and the
number of snapshots that must be retained for a period. The system determines which
snapshots are retained based on the retention policy. The retention policy helps to avoid
unwanted storage of snapshots that result in the waste of storage resources.
2:30 AM Hourly 1 2 2 6 2 3
Based on this retention rule, the snapshots that are shown in Table 5-2 are created and
retained on 20 March 2016 at 06:10 AM.
Table 5-2 Time stamp of snapshots that are retained based on the retention policy
Time stamp Condition based on which snapshot is retained
December 31 (Thursday, 23:01 AM) Keep the latest snapshot for last 3 months
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 69
Time stamp Condition based on which snapshot is retained
January 31 (Sunday, 23:01 AM) Keep the latest snapshot for last 3 months
February 29 (Monday, 23:01 AM) Keep the latest snapshot for last 3 months
March 5 (Saturday, 23:01 AM) Keep the latest snapshot for last 2 weeks
March 12 (Saturday, 23:01 AM) Keep the latest snapshot for last 2 weeks
March 14 (Monday, 23:01 AM) Keep the latest snapshot for last 6 days
March 15 (Tuesday, 23:01 AM) Keep the latest snapshot for last 6 days
March 16 (Wednesday, 23:01 AM) Keep the latest snapshot for last 6 days
March 17 (Thursday, 23:01 AM) Keep the latest snapshot for last 6 days
March 18 (Friday, 23:01 AM) Keep the latest snapshot for last 6 days
March 19 (Saturday, 23:01 AM) Keep the latest snapshot for last 6 days
According to this rule, 13 snapshots are retained on 20 March 2016 at 06:10 AM.
Important naming information: If you do not specify a name for the snapshot, the default
name is provided. The default snapshot ID is generated at creation time by using the
format @GMT-yyyy.MM.dd-HH.mm.ss. If this option is provided and the @GMT-date-time format
is omitted, this snapshot is not identifiable by Windows VSS, and the file restore is not
possible by using that method.
Avoid white spaces, double and single quotation marks, parentheses (), the star (*),
forward slash /, and backward slash \.
Note: Snapshot capacity usage is not collected automatically because it can negatively
affect the performance of the system. If you are trying to determine overall file system
capacity, you must consider the capacity that is used by snapshot and manually aggregate
the overall capacity usage.
You can also enable quota on file systems, set grace time defaults, and trigger a quota
database repair action.
You can create new quotas and modify existing ones. A quota is the amount of disk space
and the amount of metadata that is assigned as upper limits for a specified user, group of
users, or fileset. Use the Actions menu to create or modify quotas. The management GUI
allows you to manage the capacity-related quota only. The inode-related quota management
is possible in the command-line interface only.
You can specify a soft limit, a hard limit, or both. When you set a soft limit quota, a warning is
sent to the administrator when the file system is close to reaching its storage limit. A grace
period starts when the soft quota limit is reached. Data is written until the grace period
expires, or until the hard quota limit is reached. Grace time resets when the used capacity
goes below the soft limit.
If you set a hard limit quota, you cannot save data after the quota is reached. If the quota is
exceeded, you must delete the files or raise the quota limit to store more data. The grace
period can be modified per device by using the mmsetquota command.
Note: User or user group quotas for filesets are supported only if the Per Fileset option is
enabled at the file system level.
You must unmount a file system to change the quota enablement method from per file
system to per fileset, or vice versa.
You can set the default user quotas at the file system level rather than defining user quotas
explicitly for each user. Default quota limits can be set for users. You can specify the general
quota collection scope, such as per file system or per fileset to define whether the default
quota must be defined at file system level or fileset level and set the default user quota.
After this value is set, all child objects that are created under the file system or file set are
configured with the default soft and hard limits. You can assign a custom quota limit to
individual child objects, but the default limits remain the same unless changed at the file
system or fileset level.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 71
5.8 Information lifecycle management
The information lifecycle management (ILM) feature that is available in the IBM Spectrum
Scale system facilitates automated tiered storage management. As part of the ILM, you must
create a set of policies and rules that automatically determine where to physically store your
data, regardless of its placement in the logical directory structure. The proper management of
files ensures the efficient use and balance of premium and less expensive storage resources.
Use the Files → Information Lifecycle page (see Figure 5-2) in the IBM Spectrum Scale
GUI to manage ILM rules and policies.
Policies and the rules are used to assign files to specific file system pools. A file system pool
typically contains a set of volumes that provide a specific quality of service for a specific use,
such as storing frequently accessed files on a premium or a pool with high performance and
the non-frequently accessed files on a less expensive pool.
A policy is a set of rules that describes the lifecycle of user data that is based on the file’s
attributes. Each rule defines an operation or definition, such as placing new files into different
pools or migrating files from one pool to another pool. A policy rule is an SQL-like statement
that tells the file system what to do with a file in a specific file system pool if the file meets
specific criteria. A rule can apply to any file within a file system or only to files within a specific
fileset or group of filesets.
The active policy of a file system is available on the Files → Information Lifecycle → Active
Policy page. Use the GUI to create more policies for a file system manually by editing the
existing active policy, or by creating a policy and applying it as the active policy for the file
system.
If only one rule is in the policy and it is not supported in the graphical editing mode, the entire
policy can be displayed or modified by using the policy text editor.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 73
Note: The policy run settings that you set in the GUI are applicable when the policy
execution is triggered by the default threshold callback or when using the Run Policy action
in the GUI. These parameters are not applicable when a custom callback script is
registered or when you run the policy by using the mmapplypolicy command in the CLI.
You can specify the following details that determine the policy run characteristics:
Node that run the policies
The ILM policy can run parallel on multiple nodes. The following types of nodes are
available:
– Nodes of a node class.
– Default helper nodes. Nodes can be marked as helper nodes by using the
defaultHelperNodes parameter of the mmchconfig command.
– Manager nodes. These nodes are the nodes from which file system managers and
token managers are selected.
– Individual nodes.
Local work directory
The directory to be used for temporary storage during policy execution. This local
directory, such as /tmp, is used on each helper node. A significant amount of temporary
storage is required if the file system or directories contain many files.
Global work directory
A global directory to be used for temporary storage during policy execution. The specified
directory must exist within a shared file system. It must also be mounted and available for
writing and reading from each of the nodes. The use of a global work directory causes
high performance and fault-tolerant protocols during policy execution.
File selection algorithm. The following algorithm types are available:
– Exact: Sorts all the candidate files by weight, then serially considers each file from the
highest weight to the lowest weight by choosing feasible candidates for migration,
deletion, or listing according to any applicable rule LIMITs and current storage-pool
occupancy.
– Fast: Uses a combination of statistical, heuristic, and parallel computing methods to
favor higher weight candidate files, but the set of chosen candidates might be different
than the exact method.
– Best: Chooses the optimal method based on the rest of the input parameters.
Average number of CPU cores per node.
The number of threads and sort pipelines that each node runs during the parallel inode
scan and policy evaluation.
Number of threads per policy scan.
The number of threads are created and dispatched within each mmapplypolicy process
during the directory scan phase. The default is 24.
Number of threads for policy execution.
The number of threads that are created and dispatched within each mmapplypolicy
process during the policy execution phase. The default value is 24.
The policy executions can also be triggered based on a threshold that is managed by the
callback handler, which is installed on the GUI node. Such policy execution details are logged
in the /var/adm/ras directory and /var/adm/ras/mmfs.log file.
Storage → Pools Provides an easy way to monitor the performance, health status,
and configuration aspects of all of the pools that are available in the
IBM Spectrum Scale cluster.
Storage → NSDs Provides an easy way to monitor the performance, health status,
and configuration aspects of all of the NSDs that are available in
the IBM Spectrum Scale cluster.
An ACL is a list of permissions that are associated with a directory or file. It defines which
users are allowed to access a particular directory or file. An access control entry in the ACL
defines the permissions for a user or a group of users. An ACL usually consists of multiple
entries. Each ACL has an owner that is associated with it who owns the file or directory for
which the ACL is defined. Owners usually have full access to the files or directories that they
own. If the directory contains files or subdirectories, the owner, owning group, and ACL
cannot be modified.
You can define ACL templates to help the users to set default access control permissions for
files and directories. The use of ACL template helps to save time and ensures that the correct
standard and values for each ACL entry are used. You can use any of the predefined ACL
templates to set the access rights to files and directories.
Only users with the DataAccess role can modify ACLs of files and directories on the Files →
File System ACL page.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 75
Users with the Administrator, SecurityAdmin, and DataAccess roles can edit ACL templates.
Users with the DataAccess role can modify the ACL of non-empty file system, filesets, and
exports path by using the Edit Access Control option in the corresponding GUI pages.
Users with the Administrator and SecurityAdmin role are allowed to modify only the ACLs of
file system root path, fileset link path, and export paths if they are empty.
Table 5-4 GUI options available for monitoring and managing protocol data exports
GUI page Function
Protocols → NFS Exports Create and manage NFS exports and add NFS clients.
Protocols pages are displayed in the GUI only when the
protocol feature is enabled on the cluster.
Services → NFS Specify NFS server settings and start or stop NFS services.
Protocols → SMB Shares Create and manage SMB shares. Protocols pages are
displayed in the GUI only when the protocol feature is enabled
on the cluster.
Services → SMB Specify SMB server settings and start or stop SMB services.
Object → Accounts Create and manage accounts and containers in the Object
Storage. Object pages are displayed in the GUI only when the
object feature is enabled on the cluster.
Services → Object View and change the object service status. You can define
object administrator who can manage accounts in the object
storage.
The following sections describe the IBM Spectrum Scale services that can be managed
through the Services page in the GUI.
5.12.2 CES
The cluster export service (CES) provides highly available file and object services by using
NFS, SMB, and Object protocols. The nodes that support these protocol services are referred
as CES nodes. You can perform the following actions from the CES section:
Stop CES service on a node when you are suspending the node.
Start CES service on a node when you are resuming the node.
Suspend and resume CES nodes.
Monitor the status of the CES nodes and the protocol services hosted on the node.
Monitor the events that are raised against the CES service.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 77
5.12.3 CES network and CES IPs
Provides the details of the nodes that are part of the CES network. You can perform the
following actions from the CES network section:
View all the nodes that are part of the CES network.
Add CES IP addresses by using the Add CES IP option that is available under the
Addresses section.
Monitor the events that are raised against the CES network service.
Select the distribution policy to be used for assigning the CES IP address.
5.12.4 NFS
The NFS services must be configured on the system to use NFS protocol for data transfer
between client and the IBM Spectrum Scale system. You can use NFSv3, NFSv4, or both to
use for communication between server and client. You can perform the following actions from
the NFS section:
Start and Stop NFS service
Monitor the health status of the NFS service that is configured on the CES nodes
View the events that are raised against the NFS service
Configure the lease lifetime, domain, and NFS protocol version at the NFS server level
5.12.5 SMB
You can monitor the SMB service and change global SMB configuration parameters from the
GUI.
The following options are available under the respective tabs in the SMB section:
SMB Service Status
View the details and health status of the SMB service that is configured in the CES nodes.
You can also start and stop the SMB service.
Events
Displays the events that are raised against the SMB service.
Settings
Provides options to configure the disk free quota, specify server description, set SMB
server encryption node, and specify whether to restrict anonymous access.
5.12.6 Object
You must enable and start the object services to use the Object Storage facility.
You can monitor start, and stop object service on all or individual CES nodes, from the Object
section in the Services page. In addition, object specific events and object administrator
credential settings can be managed from this section.
The following file user authentication methods can be used to authenticate the user:
Active Directory
Uses Microsoft Active Directory as the authentication server. This method is used if you
must authenticate SMB users to access the data through SMB shares. When you select
AD as the authentication server, you must configure an ID mapping method to map the
user IDs from the external domain with a set of internal user IDs.
LDAP
Uses an LDAP server to authenticate users. This method is the ideal method to use to
authenticate the NFS protocol users to access the data through the NFS exports.
NIS
The NIS-based authentication is useful in NFS-only environment where NIS acts as an ID
mapping server and is used for netgroups. When file access is configured with NIS, SMB
access cannot be enabled.
User-defined
The user can select the authentication and ID mapping methods of their choice. It is the
responsibility of the administrator of the client system to manage the authentication and ID
mapping for file access to the IBM Spectrum Scale system.
5.12.10 GUI
The GUI service manages the GUI and REST APIs that are used to configure, monitor, and
manage the IBM Spectrum Scale system. You can perform the following actions from the GUI
section:
Monitor the GUI node configuration in the cluster
Configure a login message. This message appears in the login page of the GUI, which is
typically used to display some important information that must be shared with the users
who are attempting to log in.
Configure session timeout.
Create SSL certificate request.
Install a self-signed certificate or a certificate that is issued by the certificate authority.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 79
View the certificate information of the GUI node.
View the issues that are raised against the GUI service in the cluster.
Manage GUI users, groups, and their password policy.
Assign user roles for the GUI users.
Configure an LDAP-based external configuration method for the GUI users.
For more information about the GUI user management, see “Configuring role-based access
for GUI users” on page 81.
The Performance Monitoring section of the Services page organizes the monitoring and
configuration aspects of performance monitoring under the following tabs:
Nodes
Provides the nodes on which performance monitoring is enabled. You can also see the
health status of these nodes and the performance monitoring sensors that are enabled on
the node.
Sensors
Lists all the sensors that are available with the IBM Spectrum Scale system and provides
the option to edit the sensor configuration. By clicking the Edit option, you can modify the
data collection intervals and the scope of data collection. The data can be collected at all
nodes, node group, or individual node level.
Collectors
Provides the health status of the performance monitoring collector that is configured in the
system.
Events
Lists all events that are raised against the performance monitoring component.
You can manage GUI users locally within the system and in an external authentication server,
such as Microsoft Active Directory (AD) or Lightweight Directory Access Protocol Server
(LDAP). By default, the IBM Spectrum Scale system uses an internal authentication
repository for GUI users. Internal and external authentication methods can be configured in
the system.
5.13.1 Managing GUI users locally in the IBM Spectrum Scale system
You can create users who can perform different administrative tasks on the system. Each
user must be part of a user group or multiple groups that are defined on the system. When
you create a user, you assign the user to one of the default user groups or to a custom user
group. User groups are assigned with predefined roles that authorize the users within that
group to a specific set of operations on the GUI.
Use the Services → GUI page to create users and add them to a user group.
Predefined roles are assigned to user groups to define the working scope within the GUI. If a
user is assigned to more than one user group, the permissions are additive, not restrictive.
The predefined role names cannot be changed.
The IBM Spectrum Scale GUI includes the following default user groups:
Administrator
Manages all functions on the system except those deals with managing users, user
groups, and authentication.
SecurityAdmin
Manages all functions on the system, including managing users, user groups, and user
authentication.
SystemAdmin
Manages clusters, nodes, alert logs, and authentication.
StorageAdmin
Manages disks, file systems, pools, filesets, and ILM policies.
SnapAdmin
Manages snapshots for file systems and filesets.
DataAccess
Controls access to data, such as managing access control lists.
Monitor
Monitors objects and system configuration, but cannot configure, modify, or manage the
system or its resources.
ProtocolAdmin
Manages object storage and data export definitions of SMB and NFS protocols.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 81
UserAdmin
Manages access for GUI users. Users who are part of this group have edit permissions
only in the Access pages of the GUI.
When you log in to the system for the first time after the installation, the system lists the option
to create the first GUI user.
Use the various controls that are available under the Password Policy tab of the GUI Users
page to enforce strong passwords for the users. You can modify or expire password of the
individual users or all the users that are created in the system. If the password is set as
expired, the user is prompted to change the password at the next login.
Password policy modifications: Only users with the User Administrator role can modify
the password policy of a user.
Roles apply to users on the system and are based on the user group to which the user
belongs. A user can be part of multiple user groups so that a single user can play multiple
roles in the system.
Note: Default groups are not created for the User Administrator user role in case the user
is upgrading the IBM Spectrum Scale cluster from 4.2.0.x to a later release.
The user credentials are stored in an external repository. You can store the user credentials in
the following repository types:
Microsoft Active Directory
IBM Lotus Domino
IBM SecureWay Directory Server
IBM Tivoli® Directory Server
Netscape Directory Server
Novell eDirectory
Sun Java System Directory Server
Custom (for example, OpenLdap)
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 83
Follow the wizard to complete the authentication service.
Use the Test Connection option that is available under the External Authentication tab to
determine whether a user credential is available in the internal or external repository.
--port Port number of the LDAP. Default is 389 or 636 over SSL.
--keystore Location with file name of the keystore file (.jks, .p12 or .pfx).
--truststore Location with file name of the truststore file (.jks, .p12 or .pfx).
Note: Configurations that are managed by using the mkldap and rmldap commands are not
overwritten during the upgrade; that is, you do not need to back up the configuration data.
Chapter 5. Configuring and managing tasks by using the IBM Spectrum Scale GUI 85
86 Monitoring and Managing IBM Spectrum Scale Using the GUI
6
The status icons help to quickly determine whether the event is informational, a warning, or
an error. Click an event and select Actions → Properties to see the detailed information of
that event. The event table displays the most recent events first.
A graphical view of events that are reported against each component is available. Clicking the
graph displays only the relevant events in the grid view; that is, clicking a portion in the
graphical view applies the corresponding filter on the search action and fetches only the
relevant data in the Events table.
The status icons help to quickly determine whether the event is informational, a warning, or
an error. Click an event and select Actions → Properties to see the detailed information of
that event. The event table displays the most recent events first.
Select Actions → Properties to view the details of the tip. After you review the tip, decide
whether it requires attention or can be ignored. Select Actions → Hide to ignore the events
that are not important. Select Show to mark the tips that require attention.
Email notifications can be customized by setting a custom header and footer for the emails.
You also can customize the subject by selecting and combining from the following variables:
&message
&messageId
&severity
&dateAndTime
&cluster
&component
Emails that contain the quota reports and other events that are reported in the following
functional areas are sent to the recipients:
AFM and AFM DR
Authentication
CES network
Transparent Cloud Tiering
NSD
File system
GPFS
GUI
Hadoop connector
iSCSI
Keystone
Network
NFS
Object
Performance monitoring
SMB
Object authentication
Node
CES
In the email notification method, you can also define whether a recipient must receive a report
of events that are reported in the system. These reports are sent once daily. Based on the
seriousness of the issue, a severity level is associated with each reported event in the
system.
To create email recipients, select Email Recipients from the Event Notifications page, and
then, click Create Recipient.
Note: You can change the email notification configuration or disable the email service at
any time.
With an SNMP manager, such as IBM Systems Director, you can view and act on the
messages that the SNMP agent sends. The SNMP manager can send SNMP notifications,
which are also known as traps, when an event occurs in the system.
In the SNMP mode of event notification, one SNMP notification (trap) with object identifiers
(OID) .1.3.6.1.4.1.2.6.212.10.0.1 is sent by the GUI for each event. The SNMP objects that
are included in the event notifications are listed in Table 6-1.
The traps for the core IBM Spectrum Scale and the trap objects are not included in the SNMP
notifications that are configured through the IBM Spectrum Scale management GUI.
Example 6-2 shows the SNMP event notification that is sent for an SNMP test message.
The IBM Spectrum Scale GUI MIB OID range starts with 1.3.6.1.4.1.2.6.212.10. The OID
range 1.3.6.1.4.1.2.6.212.10.0.1 denotes IBM Spectrum Scale GUI event notification (trap),
and .1.3.6.1.4.1.2.6.212.10.1.x denotes IBM Spectrum Scale GUI event notification
parameters (objects). While configuring SNMP, use the MIB file that is available at the
following location of each GUI node:
/usr/lpp/mmfs/gui/IBM-SPECTRUM-SCALE-GUI-MIB.txt
The diagnostic data is collected from each node in a cluster. In a cluster with hundreds of
nodes, downloading the diagnostic data might take a long time and the downloaded file can
be large.
It is always better to reduce the size of the log file as you might need to send it to IBM Support
to help fix the issues. You can reduce the size of the diagnostic data file by reducing the
scope. The following options are available to reduce the scope of the diagnostic data:
Include only affected functional areas
Include only affected nodes
Reduce the number of days for which the diagnostic data needs to be collected
The following three modes are available in the GUI to select the functional areas of the
diagnostic data:
Standard diagnostics
The data that is collected in the standard diagnostics consists of the configuration, status,
log files, dumps, and traces in the following functional areas:
– Core IBM Spectrum Scale
– Network
– GUI
– NFS
– SMB
– Object
– Authentication
– Cluster export services (CES)
– Crash dumps
You can download the diagnostic data for these functional areas at the following levels:
– All nodes
– Specific nodes
– All nodes within one or more node classes
Deadlock diagnostics
The data that is collected in this category consists of the minimum amount of data that is
needed to investigate a deadlock problem.
Performance diagnostics
The data that is collected in this category consists of the system performance details that
are collected from performance monitoring tools. You can use this option only if it is
requested by the IBM Support.
Note: Instead of collecting the diagnostic data again, you can also use the diagnostic
data that was previously collected. You can analyze the relevance of the historic data
based on the date on which the issue is reported in the system. Ensure to delete the
diagnostic data that is no longer needed to save disk space.
You can use the Call Home page in the GUI to perform the following tasks:
Enable the Call Home feature on the cluster.
Select one or more Call Home nodes that share the data with the IBM Support.
Specify the contact information to be used by the IBM Support if any issues exist.
Specify the proxy information that is needed to create a communication channel between
the Call Home nodes and IBM support.
Test connection with the IBM server.
Enabling Call Home reduces the response time for the IBM Support to address the issues.
The GUI does not support to change the data gathering and sharing schedules.
You can also manually upload the diagnostic data that is collected through the Support →
Diagnostic Data page in the GUI to share the diagnostic data to resolve a Problem
Management Record (PMR).
The available DMPs and the corresponding events are listed in Table 6-3.
For more information about how to enable the performance monitoring sensor for capacity
data collection, see Manual installation of IBM Spectrum Scale GUI in IBM Spectrum Scale:
Concepts, Planning, and Installation Guide.
The publications that are listed in this section are considered particularly suitable for a more
detailed discussion of the topics that are covered in this paper.
IBM Redbooks
The following IBM Redbooks publications provide more information about the topic in this
document. Note that some publications that are referenced in this list might be available in
softcopy only:
IBM Spectrum Scale Security, REDP-5426
Implementing IBM Spectrum Scale, REDP-5254
You can search for, view, download, or order these documents and other Redbooks,
Redpapers, Web Docs, draft, and other materials at the following website:
ibm.com/redbooks
Other publications
The following publications are also relevant as further information sources:
IBM Spectrum Scale Version 4 Release 2.3 Administration Guide, SA23-1455
IBM Spectrum Scale Version 4 Release 2.3 Concepts, Planning, and Installation Guide,
GA76-0441
IBM Spectrum Scale Version 4 Release 2.3 Problem Determination Guide, GA76-0443
Online resources
The following websites are also relevant as further information sources:
IBM Spectrum Scale GUI quick reference:
https://www.ibm.com/support/knowledgecenter/STXKQY_5.0.3/com.ibm.spectrum.scale
.v5r03.doc/bl1ins_quickrefforgui.htm
Examples for GUI issues and their resolutions:
https://www.ibm.com/support/knowledgecenter/STXKQY_5.0.3/com.ibm.spectrum.scale
.v5r03.doc/bl1pdg_GUI_issues.htm
IBM Spectrum Scale GUI videos:
https://www.youtube.com/playlist?list=PLS7mekU2kxDrWbtK5AiVGPyF94xTv02xN
102 Monitoring and Managing IBM Spectrum Scale Using the GUI
Back cover
REDP-5458-01
ISBN 0738456454
Printed in U.S.A.
®
ibm.com/redbooks