Isilon Cli
Isilon Cli
Isilon Cli
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Contents 3
isi auth ads spn delete.........................................................................................................................................................54
isi auth ads spn fix............................................................................................................................................................... 55
isi auth ads spn list.............................................................................................................................................................. 55
isi auth ads trusts controllers list....................................................................................................................................... 56
isi auth ads trusts list.......................................................................................................................................................... 56
isi auth ads view...................................................................................................................................................................57
isi auth duo modify...............................................................................................................................................................57
isi auth error......................................................................................................................................................................... 58
isi auth file create................................................................................................................................................................ 58
isi auth file delete..................................................................................................................................................................61
isi auth file list........................................................................................................................................................................61
isi auth file modify................................................................................................................................................................62
isi auth file view....................................................................................................................................................................67
isi auth groups create..........................................................................................................................................................67
isi auth groups delete.......................................................................................................................................................... 68
isi auth groups flush............................................................................................................................................................ 69
isi auth groups list................................................................................................................................................................69
isi auth groups members list...............................................................................................................................................70
isi auth groups modify.......................................................................................................................................................... 71
isi auth groups view............................................................................................................................................................. 72
isi auth id............................................................................................................................................................................... 73
isi auth krb5 create..............................................................................................................................................................73
isi auth krb5 delete.............................................................................................................................................................. 74
isi auth krb5 domain create................................................................................................................................................ 74
isi auth krb5 domain delete.................................................................................................................................................74
isi auth krb5 domain list...................................................................................................................................................... 75
isi auth krb5 domain modify............................................................................................................................................... 75
isi auth krb5 domain view................................................................................................................................................... 76
isi auth krb5 list.................................................................................................................................................................... 76
isi auth krb5 realm create................................................................................................................................................... 76
isi auth krb5 realm delete....................................................................................................................................................77
isi auth krb5 realm list..........................................................................................................................................................77
isi auth krb5 realm modify...................................................................................................................................................78
isi auth krb5 realm view...................................................................................................................................................... 78
isi auth krb5 spn check....................................................................................................................................................... 78
isi auth krb5 spn create.......................................................................................................................................................79
isi auth krb5 spn delete....................................................................................................................................................... 79
isi auth krb5 spn fix............................................................................................................................................................. 80
isi auth krb5 spn import...................................................................................................................................................... 80
isi auth krb5 spn list.............................................................................................................................................................80
isi auth krb5 view..................................................................................................................................................................81
isi auth ldap create............................................................................................................................................................... 81
isi auth ldap delete............................................................................................................................................................... 87
isi auth ldap list..................................................................................................................................................................... 87
isi auth ldap modify..............................................................................................................................................................88
isi auth ldap view................................................................................................................................................................. 96
isi auth local list.................................................................................................................................................................... 96
isi auth local modify............................................................................................................................................................. 97
isi auth local view.................................................................................................................................................................98
isi auth log-level modify...................................................................................................................................................... 99
4 Contents
isi auth log-level view.......................................................................................................................................................... 99
isi auth mapping create.......................................................................................................................................................99
isi auth mapping delete......................................................................................................................................................100
isi auth mapping dump....................................................................................................................................................... 101
isi auth mapping flush........................................................................................................................................................ 102
isi auth mapping import..................................................................................................................................................... 103
isi auth mapping list............................................................................................................................................................103
isi auth mapping modify.....................................................................................................................................................103
isi auth mapping token.......................................................................................................................................................104
isi auth mapping view........................................................................................................................................................ 105
isi auth netgroups view..................................................................................................................................................... 105
isi auth nis create............................................................................................................................................................... 106
isi auth nis delete................................................................................................................................................................108
isi auth nis list......................................................................................................................................................................109
isi auth nis modify...............................................................................................................................................................109
isi auth nis view................................................................................................................................................................... 114
isi auth privileges................................................................................................................................................................. 114
isi auth refresh.....................................................................................................................................................................114
isi auth roles create.............................................................................................................................................................115
isi auth roles delete............................................................................................................................................................. 115
isi auth roles list................................................................................................................................................................... 116
isi auth roles members list..................................................................................................................................................116
isi auth roles modify............................................................................................................................................................ 117
isi auth roles privileges list..................................................................................................................................................119
isi auth roles view...............................................................................................................................................................120
isi auth settings acls modify..............................................................................................................................................120
isi auth settings acls view..................................................................................................................................................124
isi auth settings global modify.......................................................................................................................................... 124
isi auth settings global view.............................................................................................................................................. 125
isi auth settings krb5 modify.............................................................................................................................................126
isi auth settings krb5 view.................................................................................................................................................127
isi auth settings mapping modify......................................................................................................................................127
isi auth settings mapping view......................................................................................................................................... 128
isi auth status......................................................................................................................................................................128
isi auth users create...........................................................................................................................................................129
isi auth users delete........................................................................................................................................................... 130
isi auth users flush.............................................................................................................................................................. 131
isi auth users list.................................................................................................................................................................. 131
isi auth users modify.......................................................................................................................................................... 132
isi auth users view.............................................................................................................................................................. 134
isi batterystatus list............................................................................................................................................................135
isi batterystatus view.........................................................................................................................................................135
isi certificate authority delete........................................................................................................................................... 136
isi certificate authority import.......................................................................................................................................... 136
isi certificate authority list................................................................................................................................................. 136
isi certificate authority modify.......................................................................................................................................... 137
isi certificate authority view.............................................................................................................................................. 137
isi certificate server delete................................................................................................................................................ 137
isi certificate server import............................................................................................................................................... 138
isi certificate server list......................................................................................................................................................138
Contents 5
isi certificate server modify...............................................................................................................................................139
isi certificate server view.................................................................................................................................................. 139
isi certificate settings modify............................................................................................................................................140
isi certificate settings view............................................................................................................................................... 140
isi cloud access add............................................................................................................................................................ 141
isi cloud access list..............................................................................................................................................................141
isi cloud access remove.....................................................................................................................................................142
isi cloud access view..........................................................................................................................................................143
isi cloud accounts create...................................................................................................................................................143
isi cloud accounts delete................................................................................................................................................... 145
isi cloud accounts list......................................................................................................................................................... 146
isi cloud accounts modify.................................................................................................................................................. 146
isi cloud accounts view......................................................................................................................................................148
isi cloud archive.................................................................................................................................................................. 148
isi cloud jobs cancel............................................................................................................................................................149
isi cloud jobs create............................................................................................................................................................149
isi cloud jobs files list..........................................................................................................................................................150
isi cloud jobs list...................................................................................................................................................................151
isi cloud jobs pause.............................................................................................................................................................152
isi cloud jobs resume.......................................................................................................................................................... 153
isi cloud jobs view...............................................................................................................................................................153
isi cloud pools create......................................................................................................................................................... 154
isi cloud pools delete..........................................................................................................................................................154
isi cloud pools list................................................................................................................................................................155
isi cloud pools modify.........................................................................................................................................................156
isi cloud pools view.............................................................................................................................................................157
isi cloud proxies create...................................................................................................................................................... 157
isi cloud proxies delete.......................................................................................................................................................158
isi cloud proxies list............................................................................................................................................................ 158
isi cloud proxies modify..................................................................................................................................................... 159
isi cloud proxies view......................................................................................................................................................... 160
isi cloud recall.......................................................................................................................................................................161
isi cloud restore_coi............................................................................................................................................................161
isi cloud settings modify.................................................................................................................................................... 162
isi cloud settings regenerate-encryption-key................................................................................................................. 163
isi cloud settings view........................................................................................................................................................164
isi cluster atime modify......................................................................................................................................................164
isi cluster atime view......................................................................................................................................................... 165
isi cluster contact modify..................................................................................................................................................165
isi cluster contact view......................................................................................................................................................166
isi cluster encoding list.......................................................................................................................................................166
isi cluster encoding modify................................................................................................................................................166
isi cluster encoding view....................................................................................................................................................167
isi cluster identity modify...................................................................................................................................................167
isi cluster identity view...................................................................................................................................................... 167
isi cluster internal-networks modify.................................................................................................................................168
isi cluster internal-networks view.................................................................................................................................... 168
isi cluster join-mode modify.............................................................................................................................................. 169
isi cluster join-mode view.................................................................................................................................................. 169
isi cluster lnnset modify.....................................................................................................................................................169
6 Contents
isi cluster lnnset view.........................................................................................................................................................170
isi cluster reboot................................................................................................................................................................. 170
isi cluster shutdown........................................................................................................................................................... 170
isi cluster time modify.........................................................................................................................................................171
isi cluster time view.............................................................................................................................................................171
isi cluster time timezone modify........................................................................................................................................171
isi cluster time timezone view...........................................................................................................................................172
isi compression stats list....................................................................................................................................................172
isi compression stats view.................................................................................................................................................173
isi compression settings modify........................................................................................................................................173
isi compression settings view........................................................................................................................................... 174
isi config...............................................................................................................................................................................174
Contents 7
isi diagnostics netlogger status........................................................................................................................................ 201
isi diagnostics netlogger stop........................................................................................................................................... 201
isi email settings modify.................................................................................................................................................... 201
isi email settings view....................................................................................................................................................... 202
isi esrs modify.................................................................................................................................................................... 203
isi esrs view........................................................................................................................................................................ 204
isi esrs dataitems list......................................................................................................................................................... 204
isi esrs dataitems modify.................................................................................................................................................. 205
isi esrs download list......................................................................................................................................................... 205
isi esrs download start...................................................................................................................................................... 206
isi esrs download view...................................................................................................................................................... 206
isi esrs telemetry modify...................................................................................................................................................207
isi esrs telemetry view.......................................................................................................................................................207
isi event alerts create........................................................................................................................................................207
isi event alerts delete........................................................................................................................................................ 209
isi event alerts list..............................................................................................................................................................209
isi event alerts modify........................................................................................................................................................210
isi event alerts view............................................................................................................................................................212
isi event channels create...................................................................................................................................................212
isi event channels delete................................................................................................................................................... 214
isi event channels list......................................................................................................................................................... 215
isi event channels modify.................................................................................................................................................. 215
isi event channels view......................................................................................................................................................218
isi event events list.............................................................................................................................................................218
isi event events view......................................................................................................................................................... 218
isi event groups bulk.......................................................................................................................................................... 219
isi event groups list............................................................................................................................................................ 219
isi event groups modify.....................................................................................................................................................220
isi event groups view......................................................................................................................................................... 221
isi event settings modify....................................................................................................................................................221
isi event settings view.......................................................................................................................................................222
isi event test create.......................................................................................................................................................... 222
isi event types list.............................................................................................................................................................. 223
isi fc settings list................................................................................................................................................................ 223
isi fc settings modify......................................................................................................................................................... 224
isi fc settings view.............................................................................................................................................................225
isi file-filter settings modify.............................................................................................................................................. 225
isi file-filter settings view..................................................................................................................................................226
isi filepool apply.................................................................................................................................................................. 226
isi filepool default-policy modify.......................................................................................................................................229
isi filepool default-policy view........................................................................................................................................... 231
isi filepool policies create................................................................................................................................................... 231
isi filepool policies delete...................................................................................................................................................235
isi filepool policies list.........................................................................................................................................................236
isi filepool policies modify..................................................................................................................................................236
isi filepool policies view..................................................................................................................................................... 240
isi filepool templates list.....................................................................................................................................................241
isi filepool templates view.................................................................................................................................................242
isi_for_array....................................................................................................................................................................... 242
isi ftp settings modify........................................................................................................................................................244
8 Contents
isi ftp settings view........................................................................................................................................................... 248
isi_gather_info...................................................................................................................................................................249
isi get...................................................................................................................................................................................254
isi hardening apply............................................................................................................................................................. 255
isi hardening revert........................................................................................................................................................... 255
isi hardening status........................................................................................................................................................... 256
isi hdfs crypto encryption-zones create.........................................................................................................................256
isi hdfs crypto settings modify........................................................................................................................................ 256
isi hdfs crypto encryption-zones list............................................................................................................................... 257
isi hdfs crypto settings view............................................................................................................................................ 257
isi hdfs fsimage job settings modify................................................................................................................................ 257
isi hdfs fsimage job settings view....................................................................................................................................258
isi hdfs fsimage job view...................................................................................................................................................258
isi hdfs fsimage latest delete........................................................................................................................................... 258
isi hdfs fsimage latest view.............................................................................................................................................. 259
isi hdfs fsimage settings modify...................................................................................................................................... 259
isi hdfs fsimage settings view..........................................................................................................................................260
isi hdfs inotify settings modify......................................................................................................................................... 260
isi hdfs inotify settings view..............................................................................................................................................261
isi hdfs inotify stream reset...............................................................................................................................................261
isi hdfs inotify stream view............................................................................................................................................... 261
isi hdfs log-level modify.................................................................................................................................................... 262
isi hdfs log-level view........................................................................................................................................................ 262
isi hdfs proxyusers create................................................................................................................................................ 262
isi hdfs proxyusers delete................................................................................................................................................. 263
isi hdfs proxyusers list.......................................................................................................................................................264
isi hdfs proxyusers members list..................................................................................................................................... 265
isi hdfs proxyusers modify................................................................................................................................................266
isi hdfs proxyusers view....................................................................................................................................................267
isi hdfs racks create.......................................................................................................................................................... 268
isi hdfs racks delete...........................................................................................................................................................268
isi hdfs racks list................................................................................................................................................................ 269
isi hdfs racks modify......................................................................................................................................................... 269
isi hdfs racks view............................................................................................................................................................. 270
isi hdfs ranger-plugin settings modify.............................................................................................................................270
isi hdfs ranger-plugin settings view................................................................................................................................. 271
isi hdfs settings modify...................................................................................................................................................... 271
isi hdfs settings view......................................................................................................................................................... 272
isi http settings modify..................................................................................................................................................... 273
isi http settings view......................................................................................................................................................... 273
isi job events list.................................................................................................................................................................274
isi job jobs cancel............................................................................................................................................................... 276
isi job jobs list......................................................................................................................................................................276
isi job jobs modify...............................................................................................................................................................277
isi job jobs pause................................................................................................................................................................ 278
isi job jobs resume..............................................................................................................................................................279
isi job jobs start.................................................................................................................................................................. 279
isi job jobs view................................................................................................................................................................... 281
isi job policies create......................................................................................................................................................... 282
isi job policies delete.......................................................................................................................................................... 282
Contents 9
isi job policies list................................................................................................................................................................283
isi job policies modify.........................................................................................................................................................284
isi job policies view............................................................................................................................................................ 285
isi job reports list................................................................................................................................................................286
isi job reports view.............................................................................................................................................................287
isi job statistics view..........................................................................................................................................................288
isi job status....................................................................................................................................................................... 289
isi job types list...................................................................................................................................................................290
isi job types modify.............................................................................................................................................................291
isi job types view................................................................................................................................................................292
isi license add..................................................................................................................................................................... 292
isi license generate............................................................................................................................................................ 293
isi license list.......................................................................................................................................................................294
isi license view....................................................................................................................................................................294
10 Contents
isi network groupnets modify........................................................................................................................................... 317
isi network groupnets view............................................................................................................................................... 318
isi network interfaces list.................................................................................................................................................. 319
isi network pools create ...................................................................................................................................................320
isi network pools delete.................................................................................................................................................... 323
isi network pools list.......................................................................................................................................................... 323
isi network pools modify................................................................................................................................................... 325
isi network pools rebalance-ips........................................................................................................................................329
isi network pools sc-resume-nodes................................................................................................................................ 329
isi network pools sc-suspend-nodes...............................................................................................................................330
isi network pools view.......................................................................................................................................................330
isi network rules create..................................................................................................................................................... 331
isi network rules delete......................................................................................................................................................331
isi network rules list........................................................................................................................................................... 332
isi network rules modify.................................................................................................................................................... 333
isi network rules view........................................................................................................................................................334
isi network sc-rebalance-all..............................................................................................................................................334
isi network subnets create............................................................................................................................................... 334
isi network subnets delete............................................................................................................................................... 335
isi network subnets list..................................................................................................................................................... 336
isi network subnets modify...............................................................................................................................................337
isi network subnets view.................................................................................................................................................. 339
isi nfs aliases create.......................................................................................................................................................... 339
isi nfs aliases delete...........................................................................................................................................................340
isi nfs aliases list.................................................................................................................................................................340
isi nfs aliases modify...........................................................................................................................................................341
isi nfs aliases view..............................................................................................................................................................342
isi nfs exports check......................................................................................................................................................... 343
isi nfs exports create.........................................................................................................................................................344
isi nfs exports delete......................................................................................................................................................... 349
isi nfs exports list...............................................................................................................................................................350
isi nfs exports modify........................................................................................................................................................352
isi nfs exports reload..........................................................................................................................................................361
isi nfs exports view............................................................................................................................................................ 361
isi nfs log-level modify....................................................................................................................................................... 361
isi nfs log-level view.......................................................................................................................................................... 362
isi nfs netgroup check.......................................................................................................................................................362
isi nfs netgroup flush.........................................................................................................................................................363
isi nfs netgroup modify..................................................................................................................................................... 363
isi nfs nlm locks list............................................................................................................................................................ 364
isi nfs nlm locks waiters.................................................................................................................................................... 365
isi nfs nlm sessions check.................................................................................................................................................366
isi nfs nlm sessions delete................................................................................................................................................ 366
isi nfs nlm sessions list...................................................................................................................................................... 366
isi nfs nlm sessions refresh...............................................................................................................................................367
isi nfs nlm sessions view................................................................................................................................................... 368
isi nfs settings export modify...........................................................................................................................................368
isi nfs settings export view...............................................................................................................................................375
isi nfs settings global modify............................................................................................................................................ 377
isi nfs settings global view................................................................................................................................................ 377
Contents 11
isi nfs settings zone modify.............................................................................................................................................. 377
isi nfs settings zone view..................................................................................................................................................379
isi ntp servers create.........................................................................................................................................................379
isi ntp servers delete......................................................................................................................................................... 379
isi ntp servers list...............................................................................................................................................................380
isi ntp servers modify........................................................................................................................................................380
isi ntp servers view............................................................................................................................................................ 381
isi ntp settings modify........................................................................................................................................................381
isi ntp settings view...........................................................................................................................................................382
isi performance datasets create......................................................................................................................................382
isi performance datasets delete...................................................................................................................................... 382
isi performance datasets list............................................................................................................................................ 383
isi peformance datasets modify.......................................................................................................................................384
isi performance datasets view......................................................................................................................................... 384
isi performance filters apply............................................................................................................................................. 384
isi performance filters list................................................................................................................................................. 385
isi performance filters modify.......................................................................................................................................... 385
isi performance filters remove......................................................................................................................................... 386
isi performance filters view.............................................................................................................................................. 386
isi performance metrics list.............................................................................................................................................. 386
isi performance metrics view........................................................................................................................................... 387
isi performance settings modify...................................................................................................................................... 387
isi performance settings view.......................................................................................................................................... 387
isi performance workloads list..........................................................................................................................................388
isi performance workloads modify...................................................................................................................................388
isi performance workloads pin......................................................................................................................................... 389
isi performance workloads unpin.....................................................................................................................................389
isi performance workloads view...................................................................................................................................... 389
isi_phone_home................................................................................................................................................................ 390
isi quota quotas create...................................................................................................................................................... 391
isi quota quotas delete......................................................................................................................................................393
isi quota quotas list............................................................................................................................................................394
isi quota quotas modify.....................................................................................................................................................396
isi quota quotas notifications clear..................................................................................................................................398
isi quota quotas notifications create...............................................................................................................................400
isi quota quotas notifications delete............................................................................................................................... 402
isi quota quotas notifications disable.............................................................................................................................. 404
isi quota quotas notifications list..................................................................................................................................... 405
isi quota quotas notifications modify.............................................................................................................................. 406
isi quota quotas notifications view.................................................................................................................................. 409
isi quota quotas view......................................................................................................................................................... 410
isi quota reports create...................................................................................................................................................... 411
isi quota reports delete......................................................................................................................................................412
isi quota reports list............................................................................................................................................................413
isi quota settings mappings create.................................................................................................................................. 413
isi quota settings mappings delete...................................................................................................................................414
isi quota settings mappings list.........................................................................................................................................414
isi quota settings mappings modify..................................................................................................................................415
isi quota settings mappings view..................................................................................................................................... 415
isi quota settings notifications clear................................................................................................................................ 415
12 Contents
isi quota settings notifications create..............................................................................................................................416
isi quota settings notifications delete.............................................................................................................................. 418
isi quota settings notifications list.................................................................................................................................... 418
isi quota settings notifications modify............................................................................................................................. 419
isi quota settings notifications view.................................................................................................................................421
isi quota settings reports modify..................................................................................................................................... 422
isi quota settings reports view.........................................................................................................................................423
isi readonly list.................................................................................................................................................................... 423
isi readonly modify............................................................................................................................................................. 424
isi readonly view.................................................................................................................................................................424
isi remotesupport connectemc modify...........................................................................................................................425
isi remotesupport connectemc view...............................................................................................................................426
Contents 13
isi snapshot aliases view................................................................................................................................................... 465
isi snapshot locks create.................................................................................................................................................. 465
isi snapshot locks delete...................................................................................................................................................466
isi snapshot locks list......................................................................................................................................................... 467
isi snapshot locks modify.................................................................................................................................................. 467
isi snapshot locks view......................................................................................................................................................468
isi snapshot schedules create.......................................................................................................................................... 469
isi snapshot schedules delete...........................................................................................................................................470
isi snapshot schedules list................................................................................................................................................. 471
isi snapshot schedules modify..........................................................................................................................................472
isi snapshot schedules pending list..................................................................................................................................473
isi snapshot schedules view............................................................................................................................................. 474
isi snapshot settings modify.............................................................................................................................................475
isi snapshot settings view.................................................................................................................................................476
isi snapshot snapshots create..........................................................................................................................................476
isi snapshot snapshots delete.......................................................................................................................................... 477
isi snapshot snapshots list................................................................................................................................................ 478
isi snapshot snapshots modify......................................................................................................................................... 479
isi snapshot snapshots view.............................................................................................................................................480
isi snmp settings modify................................................................................................................................................... 480
isi snmp settings view....................................................................................................................................................... 482
isi auth settings modify.....................................................................................................................................................482
isi statistics client...............................................................................................................................................................484
isi statistics data-reduction.............................................................................................................................................. 487
isi statistics data-reduction view.....................................................................................................................................488
isi statistics drive............................................................................................................................................................... 488
isi statistics heat................................................................................................................................................................ 490
isi statistics list keys.......................................................................................................................................................... 492
isi statistics list operations................................................................................................................................................493
isi statistics protocol......................................................................................................................................................... 494
isi statistics pstat............................................................................................................................................................... 497
isi statistics query current................................................................................................................................................ 498
isi statistics query history................................................................................................................................................. 499
isi status.............................................................................................................................................................................. 501
isi storagepool compatibilities active create................................................................................................................... 501
isi storagepool compatibilities active delete...................................................................................................................502
isi storagepool compatibilities active list.........................................................................................................................503
isi storagepool compatibilities active view..................................................................................................................... 504
isi storagepool compatibilities available list.................................................................................................................... 504
isi storagepool compatibilities class active create.........................................................................................................505
isi storagepool compatibilities class active delete......................................................................................................... 506
isi storagepool compatibilities class active list............................................................................................................... 506
isi storagepool compatibilities class active view............................................................................................................ 507
isi storagepool compatibilities class available list...........................................................................................................508
isi storagepool compatibilities ssd active create........................................................................................................... 509
isi storagepool compatibilities ssd active delete.............................................................................................................510
isi storagepool compatibilities ssd active list................................................................................................................... 511
isi storagepool compatibilities ssd active view............................................................................................................... 512
isi storagepool compatibilities ssd available list.............................................................................................................. 512
isi storagepool health.........................................................................................................................................................513
14 Contents
isi storagepool list...............................................................................................................................................................513
isi storagepool nodepools create......................................................................................................................................514
isi storagepool nodepools delete...................................................................................................................................... 514
isi storagepool nodepools list............................................................................................................................................515
isi storagepool nodepools modify.....................................................................................................................................515
isi storagepool nodepools view.........................................................................................................................................517
isi storagepool settings modify......................................................................................................................................... 517
isi storagepool settings modify.........................................................................................................................................518
isi storagepool settings view............................................................................................................................................520
isi storagepool tiers create............................................................................................................................................... 520
isi storagepool tiers delete................................................................................................................................................ 521
isi storagepool tiers list...................................................................................................................................................... 521
isi storagepool tiers modify.............................................................................................................................................. 522
isi storagepool tiers view.................................................................................................................................................. 522
isi storagepool unprovisioned view..................................................................................................................................523
isi swift accounts create...................................................................................................................................................523
isi swift accounts delete................................................................................................................................................... 524
isi swift accounts list.........................................................................................................................................................524
isi swift accounts modify..................................................................................................................................................525
isi swift accounts view......................................................................................................................................................526
isi sync certificates peer delete....................................................................................................................................... 526
isi sync certificates peer import...................................................................................................................................... 526
isi sync certificates peer list............................................................................................................................................. 527
isi sync certificates peer modify...................................................................................................................................... 527
isi sync certificates peer view..........................................................................................................................................528
isi sync certificates server delete.................................................................................................................................... 528
isi sync certificates server import................................................................................................................................... 529
isi sync certificates server list..........................................................................................................................................529
isi sync certificates server modify...................................................................................................................................530
isi sync certificates server view...................................................................................................................................... 530
isi sync jobs cancel.............................................................................................................................................................531
isi sync jobs list................................................................................................................................................................... 531
isi sync jobs pause............................................................................................................................................................. 532
isi sync jobs reports list.....................................................................................................................................................532
isi sync jobs reports view..................................................................................................................................................533
isi sync jobs resume.......................................................................................................................................................... 533
isi sync jobs start............................................................................................................................................................... 533
isi sync jobs view............................................................................................................................................................... 534
isi sync policies create...................................................................................................................................................... 534
isi sync policies delete.......................................................................................................................................................540
isi sync policies disable.......................................................................................................................................................541
isi sync policies enable....................................................................................................................................................... 541
isi sync policies list.............................................................................................................................................................542
isi sync policies modify......................................................................................................................................................543
isi sync policies reset......................................................................................................................................................... 551
isi sync policies resolve..................................................................................................................................................... 552
isi sync policies view......................................................................................................................................................... 552
isi sync recovery allow-write............................................................................................................................................552
isi sync recovery resync-prep..........................................................................................................................................553
isi sync reports list.............................................................................................................................................................553
Contents 15
isi sync reports rotate.......................................................................................................................................................555
isi sync reports subreports list.........................................................................................................................................555
isi sync reports subreports view..................................................................................................................................... 556
isi sync reports view..........................................................................................................................................................557
isi sync rules create........................................................................................................................................................... 557
isi sync rules delete........................................................................................................................................................... 558
isi sync rules list................................................................................................................................................................. 559
isi sync rules modify.......................................................................................................................................................... 559
isi sync rules reports list................................................................................................................................................... 560
isi sync rules reports view................................................................................................................................................. 561
isi sync rules view...............................................................................................................................................................561
isi sync service policies create..........................................................................................................................................561
isi sync service policies delete......................................................................................................................................... 566
isi sync service policies disable........................................................................................................................................ 567
isi sync service policies enable......................................................................................................................................... 567
isi sync service policies list............................................................................................................................................... 567
isi sync service policies modify........................................................................................................................................ 568
isi sync service policies reset........................................................................................................................................... 573
isi sync service policies resolve........................................................................................................................................574
isi sync service policies view............................................................................................................................................ 574
isi sync service recovery allow-write.............................................................................................................................. 574
isi sync service recovery resync-prep............................................................................................................................ 575
isi sync service target break.............................................................................................................................................576
isi sync service target cancel........................................................................................................................................... 576
isi sync service target list................................................................................................................................................. 576
isi sync service target view.............................................................................................................................................. 577
isi sync settings modify.....................................................................................................................................................577
isi sync settings view........................................................................................................................................................ 579
isi sync target break.......................................................................................................................................................... 579
isi sync target cancel........................................................................................................................................................ 580
isi sync target list...............................................................................................................................................................580
isi sync target reports list..................................................................................................................................................581
isi sync target reports subreports list............................................................................................................................. 583
isi sync target reports subreports view..........................................................................................................................584
isi sync target reports view..............................................................................................................................................584
isi sync target view........................................................................................................................................................... 585
isi tape delete.....................................................................................................................................................................585
isi tape list...........................................................................................................................................................................586
isi tape modify....................................................................................................................................................................586
isi tape rename...................................................................................................................................................................587
isi tape rescan.................................................................................................................................................................... 587
isi tape view....................................................................................................................................................................... 588
isi upgrade cluster add-nodes..........................................................................................................................................588
isi upgrade cluster add-remaining-nodes....................................................................................................................... 589
isi upgrade cluster archive............................................................................................................................................... 589
isi upgrade cluster assess.................................................................................................................................................589
isi upgrade cluster commit............................................................................................................................................... 589
isi upgrade cluster firmware.............................................................................................................................................590
isi upgrade cluster from-version......................................................................................................................................590
isi upgrade cluster nodes firmware..................................................................................................................................591
16 Contents
isi upgrade cluster nodes list.............................................................................................................................................591
isi upgrade cluster nodes view.........................................................................................................................................592
isi upgrade cluster retry-last-action................................................................................................................................593
isi upgrade cluster rollback...............................................................................................................................................593
isi upgrade cluster rolling-reboot.....................................................................................................................................593
isi upgrade cluster settings.............................................................................................................................................. 594
isi upgrade cluster start.................................................................................................................................................... 594
isi upgrade cluster to-version.......................................................................................................................................... 594
isi upgrade cluster view.................................................................................................................................................... 595
isi upgrade patches abort.................................................................................................................................................595
isi upgrade patches install................................................................................................................................................ 595
isi upgrade patches list..................................................................................................................................................... 596
isi upgrade patches uninstall............................................................................................................................................ 596
isi upgrade patches view.................................................................................................................................................. 597
isi version............................................................................................................................................................................ 597
isi worm cdate set............................................................................................................................................................. 597
isi worm cdate view.......................................................................................................................................................... 598
isi worm create.................................................................................................................................................................. 598
isi worm domains create...................................................................................................................................................598
isi worm domains list..........................................................................................................................................................601
isi worm domains modify.................................................................................................................................................. 602
isi worm domains view .....................................................................................................................................................605
isi worm files delete...........................................................................................................................................................605
isi worm files view............................................................................................................................................................. 605
isi zone restrictions create............................................................................................................................................... 606
isi zone restrictions delete............................................................................................................................................... 606
isi zone restrictions list......................................................................................................................................................607
isi zone zones create........................................................................................................................................................ 608
isi zone zones delete.........................................................................................................................................................609
isi zone zones list...............................................................................................................................................................609
isi zone zones modify........................................................................................................................................................ 610
isi zone zones view............................................................................................................................................................. 611
Contents 17
1
Introduction to this guide
This chapter describes this reference guide, and provides information about how to get assistance from Isilon techical support.
Topics:
• About this guide
• Where to go for support
Isilon Community The Isilon Community Network connects you to a central hub of information and experts to help you maximize
Network your current storage solution. From this site, you can demonstrate Isilon products, ask questions, view technical
videos, and get the latest Isilon product documentation.
Isilon Info Hubs For the list of Isilon info hubs, see the Isilon Info Hubs page on the Isilon Community Network. Use these info
hubs to find product documentation, troubleshooting guides, videos, blogs, and other information resources
about the Isilon products and features you're interested in.
Remote Support
For information about remote support, see the OneFS 8.2.0 Web Administration Guide.
Topics:
• isi antivirus policies create
• isi antivirus policies delete
• isi antivirus policies list
• isi antivirus policies modify
• isi antivirus policies start
• isi antivirus policies view
• isi antivirus quarantine
• isi antivirus release
• isi antivirus reports delete
• isi antivirus reports scans list
• isi antivirus reports scans view
• isi antivirus reports threats list
• isi antivirus reports threats view
• isi antivirus scan
• isi antivirus servers create
• isi antivirus servers delete
• isi antivirus servers list
• isi antivirus servers modify
• isi antivirus servers view
• isi antivirus settings modify
• isi antivirus settings view
• isi antivirus status
• isi audit progress global view
• isi audit progress view
• isi audit settings global modify
• isi audit settings global view
• isi audit settings modify
• isi audit settings view
• isi audit topics list
• isi audit topics modify
• isi audit topics view
• isi auth access
• isi auth ads create
• isi auth ads delete
• isi auth ads list
• isi auth ads modify
• isi auth ads spn check
• isi auth ads spn create
• isi auth ads spn delete
• isi auth ads spn fix
• isi auth ads spn list
• isi auth ads trusts controllers list
• isi auth ads trusts list
• isi auth ads view
• isi auth duo modify
• isi auth error
Syntax
isi antivirus policies create <name>
[--description <string>]
[--enabled {true | false}]
[--schedule <schedule>]
[--impact <impact-policy>]
[--force-run {yes | no}]
[--paths <path>...]
[--recursion-depth <integer>]
[--verbose]
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "Saturday"
and "sat" are valid.
{--impact | -i} <impact_policy>
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH, OFF_HOURS, or a
custom impact policy that you created.
{--force-run | -r} {yes | no}
Determines whether to force policy scans. If a scan is forced, all files are scanned regardless of whether OneFS
has marked files as having been scanned, or if global settings specify that certain files should not be scanned.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths, repeat the --path option. For
example:
Syntax
isi antivirus policies delete {<name> | --all}
[--force]
[--verbose]
Options
{<name> | --all}
Deletes the specified policy or all policies.
{--force | -f}
Does not prompt you to confirm that you want to delete the policy.
{--verbose | -v}
Displays a message confirming that the antivirus policy was deleted.
Syntax
isi antivirus policies list
[--limit <integer>]
[--sort {name | description | enabled}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
Syntax
isi antivirus policies modify <id>
[--name <new-name>]
[--description <string>]
[--enabled {true | false}]
[--schedule <schedule>]
[--clear-schedule]
[--impact <impact-policy>]
[--clear-impact]
[--force-run {true | false}]
[--paths <path>
[--clear-paths]
[--add-paths <path>]
[--remove-paths <path>]
[--recursion-depth <integer>]
Options
<id>
Modifies the policy with the specified policy identification number.
{--name | -n} <new-name>
Specifies a new name for this policy.
--description <string>
Specifies a description for the policy.
{--enabled | -e} {true | false}
Determines whether this policy is enabled or disabled. If set to true, the policy is enabled. The default value is
false.
{--schedule | -s} <schedule>
Specifies when the policy is run.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "Saturday"
and "sat" are valid.
--clear-schedule
Deletes the current schedule for the policy.
{--impact | -i} <impact_policy>
Specifies an impact policy for the antivirus scan jobs. You can specify LOW, MEDIUM, HIGH, OFF_HOURS, or a
custom impact policy that you created.
--clear-impact
Clears the current impact policy for antivirus scan jobs.
{--force-run | -r} {yes | no}
Determines whether to force policy scans. If a scan is forced, all files are scanned regardless of whether OneFS
has marked files as having been scanned, or if global settings specify that certain files should not be scanned.
--paths <path>
Specifies directories to scan when the policy is run. To specify multiple paths, repeat the --path option. For
example:
NOTE: If you specify this option, the specified paths will replace all previously specified paths in
the list.
--clear-paths
Clears the list of paths to scan.
--add-paths <path>
Adds the specified path to the list of paths to scan.
--remove-paths <path>
Removes the specified path from the list of paths to scan.
{--verbose | -v}
Displays a message confirming that the antivirus policy was modified.
Syntax
isi antivirus policies start <policy>
[--report-id <id>]
[--force-run {true | false}]
[--update {yes | no}]
Options
<policy>
Runs the specified policy.
--report-id <id>
Assigns the specified ID to the report generated for this run of the avscan policy. If you do not specify an ID,
OneFS will automatically assign one.
{ --force-run | -r} {true | false}
Determines whether to force the scan. If the scan is forced, all files are scanned regardless of whether OneFS
has marked files as having been scanned, or if global settings specify that certain files should not be scanned.
--update {yes | no}
Specifies whether to update the last run time in the policy file. The default value is yes.
Syntax
isi antivirus policies view <name>
Options
<name>
Displays information about the named policy.
Syntax
isi antivirus quarantine <file>
[--verbose]
Options
<file>
Quarantines the specified file. Specify as an absolute file path within the /ifs file system.
Syntax
isi antivirus release <file>
[--verbose]
Options
<file>
Removes the specified file from quarantine. Specify as a file path within the /ifs file system.
{--verbose | -v}
Displays a message confirming that the file was removed from quarantine.
Syntax
isi antivirus reports delete {<scan-id> | --all}
[--age <integer><time>]
[--verbose]
[--force]
Options
<scan-id>
Deletes the antivirus report with the specified ID.
--all
Deletes all antivirus reports.
--age <integer><time>
Delets all reports older than the specified age.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
{--verbose | -v}
Displays a message confirming that the reports have been deleted.
Syntax
isi antivirus reports scans list
[--policy-id <string>]
[--status <status>]
[--limit <integer>]
[--offset <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--policy-id <string>
Filters output based on the ID of the policy.
--status <status>
Filters output based on the current status of the scan job.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi antivirus reports scans view <id>
Options
<id>
Displays the antivirus report of the specified ID.
Syntax
isi antivirus reports threats list
[--scan-id <string>]
[--file <string>]
[--remediation <string>]
[--limit <integer>]
[--offset <integer>]
[--sort {scan_id | file | remediation | threat | time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--scan-id <string>
Unique identifier for the scan report.
--file <string>
Name of the file containing the threat report.
--remediation <string>
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi antivirus reports threats view <id>
Options
<id>
Displays information about the threat with the specified ID.
Syntax
isi antivirus scan <file>
[--policy <id>]
[--report-id <id>]
[--force-run {yes | no}]
Syntax
isi antivirus servers create <url>
[--description <string>]
[--enabled {yes | no}]
[--verbose]
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--enabled | -n} {yes | no}
Determines whether the ICAP server is enabled.
{--verbose | -v}
Displays a message confirming that the server has been added.
Syntax
isi antivirus servers delete {<url> | --all}
[--verbose]
[--force]
Options
<url>
Deletes the specified antivirus server.
--all
Deletes all antivirus servers.
Syntax
isi antivirus servers list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi antivirus servers modify <url>
[--enabled {yes | no}]
Options
<url>
Specifies the URL of the ICAP server.
--description <string>
Specifies an optional description for the policy.
{--enabled | -n} {yes | no}
Determines whether the ICAP server is enabled.
{--verbose | -v}
Displays a message confirming that the server has been added.
Syntax
isi antivirus servers view <url>
Options
<url>
Displays information about the specified ICAP server.
Syntax
isi antivirus settings modify
[--fail-open {true | false}]
[{--glob-filters <string>... | --clear-glob-filters
| --add-glob-filters <string> | --remove-glob-filters <string>}]
[--glob-filters-enabled {true | false}]
[--glob-filters-include {true | false}]
[--path-prefixes <path>... | --clear-path-prefixes
| --add-path-prefixes <path> | --remove-path-prefixes <path>}]
[--repair {true | false}]
[--report-expiry <integer><time>]
[--scan-cloudpool-files{true | false}]
[--scan-on-close {true | false}]
[--scan-on-open {true | false}]
[--scan-size-maximum <integer>{k | M | G | T | P}]
[--service {true | false}]
[--quarantine {true | false}]
[--truncate {true | false}]
[--verbose]
Wildcar Description
d
charact
er
* Matches any string in place of the asterisk.
For example, specifying "m*" would match "movies" and "m123"
NOTE: If you specify this option, the specified filters will replace all previously specified filters in
the list.
--clear-glob-filters
Clears the list of filters.
--add-glob-filters <string>
Adds the specified filters to the list of filters.
--remove-glob-filters <string>
Removes the specified filters to the list of filters.
--glob-filters-enabled {true | false}
Determines whether glob filters are enabled. If no glob filters are specified, glob filters will remain disabled even if
this option is set to true.
--glob-filters-include {true | false}
Determines how glob filters are interpreted by OneFS. If set to true, OneFS will scan only files that match a
glob filter. If set to false, OneFS will scan only files that do not match any glob filters.
--path-prefix <path>
If specified, only files contained in the specified directory path will be scanned. This option affects only on-access
scans. To specify multiple directories, you must include multiple --path-prefix options within the same
command. Specifying this option will remove any existing path prefixes.
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi antivirus settings view
Options
There are no options for this command.
Syntax
isi antivirus status <file>
Options
<file>
Displays information about the specified file. Specify the full pathname of the file. The file must be within
the /ifs file system.
{--verbose | -v}
Displays more detailed information.
Syntax
isi audit progress global view
Syntax
isi audit progress view
[--lnn <integer>]
Syntax
isi audit settings global modify
[--protocol-auditing-enabled {yes | no}]
[--audited-zones <zones>]
[--clear-audited-zones]
[--add-audited-zones <zones>]
[--remove-audited-zones <zones>]
[--cee-server-uris <uris>]
[--clear-cee-server-uris]
[--add-cee-server-uris <uris>]
[--remove-cee-server-uris <uris>]
[--hostname <string>]
[--config-auditing-enabled {yes | no}]
[--config-syslog-enabled {yes | no}]
[--cee-log-time <string>]
[--syslog-log-time <string>]
[--config-syslog-servers <string>]
[--clear-config-syslog-servers]
[--add-config-syslog-servers <string>]
[--remove-config-syslog-servers <string>]
[--protocol-syslog-servers <string>]
[--clear-protocol-syslog-servers]
[--add-protocol-syslog-servers <string>]
[--remove-protocol-syslog-servers <string>
[--verbose]
Options
--protocol-auditing-enabled {yes | no}
Enables or disables the auditing of data-access requests through the SMB, NFS, and HDFS protocols.
--audited-zones <access zones>
Specifies one or more access zones, separated by commas, which will be audited if protocol auditing is enabled.
This option overwrites all entries in the list of access zones; to add or remove access zones without affecting
current entries, use --add-audited-zones or --remove-audited-zones.
--clear-audited-zones
Clears the entire list of access zones to be audited if protocol auditing is enabled.
[protocol]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
--syslog-log-time <date>
Specifies a date after which the audit syslog forwarder will forward logs. To forward SMB, NFS, and HDFS
traffic logs, specify protocol. To forward configuration change logs, specify config. Specify <date> in the
following format:
[protocol|config]@<YYYY>-<MM>-<DD> <HH>:<MM>:<SS>
--config-syslog-servers <string>
Specifies a list of remote servers to forward audit configuration change logs to. You must specify the --
config-syslog-servers for each server to forward audit configuration change logs to.
--clear-config-syslog-servers
Clears the list of remote servers to which audit configuration change logs are forwarded for logging in syslog.
--add-config-syslog-servers <string>
Adds servers to the list of remote servers to which audit configuration change logs are forwarded for logging in
syslog. You must specify the --add-config-syslog-servers option for each additional server to add.
--remove-config-syslog-servers <string>
Removes servers from the list of remote servers to which audit configuration change logs are forwarded for
loggin in syslog. You must specify the --remove-config-syslog-servers option for each server to
remove.
--protocol-syslog-servers <string>
Syntax
isi audit settings global view
Options
There are no options for this command.
Examples
The following command displays the audit settings configured on the cluster:
Syntax
isi audit settings modify
[--audit-failure <event types>]
[--clear-audit-failure]
[--add-audit-failure <event types>]
[--remove-audit-failure <event types>]
[--audit-success <event types>]
[--clear-audit-success]
[--add-audit-success <event types>]
[--remove-audit-success <event types>]
Options
--audit-failure <event types>
Specifies one or more filters, separated by commas, for auditing protocol event types that failed. The following
event types are valid:
• close
• create
• delete
• get_security
• logoff
• logon
• read
• rename
• set_security
• tree_connect
• write
• all
This option overwrites the current list of filtered event types. To add or remove filters without affecting the
current list, configure settings with --add-audit-failure or --remove-audit-failure.
--clear-audit-failure
Clears all filters for auditing protocol event types that failed.
--add-audit-failure <event types>
Adds one or more filters, separated by commas, for auditing protocol event types that failed. Valid event type
values are the same as for --audit-failure.
--remove-audit-failure <event types>
Removes one or more filters, separated by commas, for auditing protocol event types that failed. Valid event
type values are the same as for --audit-failure.
--audit-success <event types>
Specifies one or more filters, separated by commas, for auditing protocol event types that succeeded. The
following event types are valid:
• close
• create
• delete
• get_security
• logoff
• logon
• read
• rename
• set_security
• tree_connect
• write
• all
This option overwrites the current list of filtered event types. To add or remove filters without affecting the
current list, configure settings with --add-audit-success or --remove-audit-success.
--clear-audit-success
Syntax
isi audit settings view
[--zone<access zone>]
Examples
The following command displays the audit settings configured in the zoneA access zone:
Syntax
isi audit topics list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi audit topics modify <name>
[--max-cached-messages <integer>]
[--verbose]
Options
<name>
Specifies the name of the audit topic to modify. Valid values are protocol and config.
--max-cached-messages <integer>
Specifies the maximum number of audit messages to cache before writing them to a persistent store. The larger
the number, the more efficiently audit events can be processed. If you specify 0, each audit event is sent
synchronously.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi audit topics view <name>
Options
<name>
Specifies the name of the audit topic whose properties you want to view. Valid values are protocol and
config.
Syntax
isi auth access {<user> | --uid <integer> | --sid <string>} <path>
[--zone <string>]
[--share <string>]
[--numeric]
[--verbose]
Options
<user>
Syntax
isi auth ads create <name> <user>
[--machine-account <string>]
[--instance <string>]
[--password <string>]
[--organizational-unit <string>]
[--kerberos-nfs-spn {yes | no} ]
[--kerberos-hdfs-spn {yes | no} ]
[--dns-domain <dns-domain>]
[--groupnet <groupnet>]
[--allocate-gids {yes | no}]
[--allocate-uids {yes | no}]
[--assume-default-domain {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--domain-offline-alerts {yes | no}]
[--findable-groups <string>...]
[--findable-users <string>...]
[--home-directory-template <path>]
[--ignore-all-trusts {yes | no}]
[--ignored-trusted-domains <dns-domain>...]
[--include-trusted-domains <dns-domain>...]
[--ldap-sign-and-seal {yes | no}]
[--login-shell <path>]
[--lookup-domains <dns-domain>...]
[--lookup-groups {yes | no}]
[--lookup-normalize-groups {yes | no}]
[--lookup-normalize-users {yes | no}]
[--lookup-users {yes | no}]
[--machine-password-changes {yes | no}]
[--machine-password-lifespan <duration>]
[--node-dc-affinity <string>]
[--node-dc-affinity-timeout <timestamp>]
[--nss-enumeration {yes | no}]
[--restrict-findable {yes | no}]
[--sfu-support {none | rfc2307}]
[--store-sfu-mappings {yes | no}]
[--unfindable-groups <string>...]
[--unfindable-users <string>...]
[--verbose]
Syntax
isi auth ads delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Examples
To leave an Active Directory domain named some.domain.org and delete the authentication provider that is associated with it, run the
following command:
Syntax
isi auth ads list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all the Active Directory providers that the cluster is joined to, run the following command:
Syntax
isi auth ads modify <provider-name>
[--reset-schannel {yes | no}]
[--domain-controller <string>]
[--authentication {yes | no}]
[--allocate-gids {yes | no}]
[--allocate-uids {yes | no}]
[--assume-default-domain {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--domain-offline-alerts {yes | no}]
[--findable-groups <string>...]
[--clear-findable-groups]
[--add-findable-groups <string>...]
[--remove-findable-groups <string>...]
[--findable-users <string>...]
Options
<provider-name>
Specifies the domain name that the Active Directory provider is joined to, which is also the Active Directory
provider name.
--reset-schannel {yes | no}
Resets the secure channel to the primary domain.
--domain-controller <dns-domain>
Specifies a domain controller.
--authentication {yes | no}
Enables the use of the provider for authentication and identity.
--allocate-gids {yes | no}
Enables or disables GID allocation for unmapped Active Directory groups. Active Directory groups without GIDs
can be proactively assigned a GID by the ID mapper. If this option is disabled, GIDs are not assigned proactively,
but when a user's primary group does not include a GID, the system may allocate one.
--allocate-uids {yes | no}
Enables or disables UID allocation for unmapped Active Directory users. Active Directory users without UIDs can
be proactively assigned a UID by the ID mapper. If this option is disabled, UIDs are not assigned proactively, but
when a user's identity does not include a UID, the system may allocate one.
--assume-default-domain {yes | no}
Enables lookup of unqualified user names in the primary domain.
--check-online-interval <duration>
Syntax
isi auth ads spn check <provider-name>
Options
<provider-name>
Specifies the Active Directory provider name.
Syntax
isi auth ads spn create <provider-name> <spn>
[--user <string>]
[--password <string>]
Options
<provider-name>
Specifies the Active Directory provider name.
<spn>
Specifies the service principal name.
{--user | -U} <string>
Specifies an administrative user account name with permission to create SPNs in the Active Directory domain.
{--password | -P} <string>
Specifies the administrative user account password.
Syntax
isi auth ads spn delete <provider-name> <spn>
[--user <string>]
[--password <string>]
Options
<provider-name>
Specifies the Active Directory provider name.
<spn>
Specifies the service principal name.
{--user | -U} <string>
Specifies an administrative user account name with permission modify SPNs in the Active Directory domain.
{--password | -P} <string>
Specifies the administrative user account password.
Syntax
isi auth ads spn fix <provider-name>
[--spn <string>]
[--user <string>]
[--password <string>]
[--noremove
Options
<provider-name>
Specifies the Active Directory provider name.
--spn <string>
Specifies the service principal name.
--user <string>
Specifies an administrative user account name with permission to add SPNs for the Active Directory domain.
--password <string>
Specifies the administrative user account password.
--noremove
Specifies not to remove any unexpected SPNs, but to add missing SPNs.
Syntax
isi auth ads spn list <provider-name>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<provider-name>
Specifies the Active Directory provider name.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Syntax
isi auth ads trusts controllers list <provider-name>
[--dc-site <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<provider-name> <string>
Specifies an Active Directory provider.
--dc-site
Specifies a domain controller site.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of trusted domains in an Active Directory provider named ad.isilon.com:
Syntax
isi auth ads trusts list <provider-name>
Syntax
isi auth ads view <provider-name>
[--verbose]
Options
<provider-name>
Specifies the name of the provider to view.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth duo modify
[--autopush <boolean>]
[--enabled <boolean>]
[--failmode <string>]
[--fallback-local-ip <boolean>]
[--groups <string>]
[--http-proxy <string>]
[--https-timeout <integer>]
[--prompts <integer>]
[--pushinfo <boolean>]
[--host <string>]
[--ikey <string>]
[--set-skey]
[{--verbose | -v}]
[{--help | -h}]
Options
--autopush <boolean>
Specifies if Duo automatically sends a push login request to the users phone.
--enabled <boolean>
Specifies if the Duo provider is enabled.
--failmode <string>
Specifies if Duo will fail "safe" (allow access) or "secure" (deny access) on configuration or service errors.
--fallback-local-ip <boolean>
Specifies if Duo will report the server IP if the client IP cannot be detected.
--groups <string>
Syntax
isi auth error <error-code>
Options
<error-code>
Specifies the error code to convert.
Examples
To view the definition of error code 4, run the following command:
Syntax
isi auth file create <name>
[--password-file <path>]
Options
<name>
Sets the file provider name.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
Specifies the path to a group replacement file.
--authentication {yes | no}
Enables or disables the use of the provider for authentication as well as identity. The default value is yes.
--create-home-directory {yes | no}
Specifies whether to create a home directory the first time a user logs in, if a home directory does not already
exist for the user.
--enabled {yes | no}
Enables or disables the provider.
--findable-groups <string>
Specifies a list of groups that can be found in this provider if --restrict-findable is enabled. Repeat this
option to specify each additional findable group. If populated, groups that are not included in this list cannot be
resolved.
--findable-users <string>
Specifies a list of users that can be found in this provider if --restrict-findable is enabled. Repeat this
option to specify each additional findable user. If populated, users that are not included in this list cannot be
resolved.
--group-domain <string>
Specifies the domain that this provider will use to qualify groups. The default group domain is FILE_GROUPS.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs and can
include special character sequences that are dynamically replaced with strings at home directory creation time
Syntax
isi auth file delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth file list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Syntax
isi auth file modify <provider-name>
[--name <string>]
[--password-file <path>]
[--group-file <path>]
[--authentication {yes | no}]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
[--add-findable-users <string>]
[--remove-findable-users <string>]
[--group-domain <string>]
[--home-directory-template <path>]
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
[--clear-listable-users]
[--add-listable-users <string>]
[--remove-listable-users <string>]
[--login-shell <path>]
[--modifiable-groups <string>]
[--clear-modifiable-groups]
[--add-modifiable-groups <string>]
[--remove-modifiable-groups <string>]
[--modifiable-users <string>]
[--clear-modifiable-users]
[--add-modifiable-users <string>]
[--remove-modifiable-users <string>]
[--netgroup-file <path>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--ntlm-support {all | v2only | none}]
[--provider-domain <string>]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--restrict-modifiable {yes | no}]
[--unfindable-groups <string>]
[--clear-unfindable-groups]
[--add-unfindable-groups <string>]
[--remove-unfindable-groups <string>]
[--unfindable-users <string>]
[--clear-unfindable-users]
[--add-unfindable-users <string>]
[--remove-unfindable-users <string>]
[--unlistable-groups <string>]
[--clear-unlistable-groups]
[--add-unlistable-groups <string>]
[--remove-unlistable-groups <string>]
[--unlistable-users <string>]
[--clear-unlistable-users]
[--add-unlistable-users <string>]
[--remove-unlistable-users <string>]
[--unmodifiable-groups <string>]
Options
<provider-name>
Specifies the name of the file provider to modify. This setting cannot be modified.
--name <string>
Specifies an new name for the authentication provider.
--password-file <path>
Specifies the path to a passwd.db replacement file.
--group-file <path>
Specifies the path to a group replacement file.
--authentication {yes | no}
Enables or disables the use of the provider for authentication as well as identity. The default value is yes.
--cache-entry-expiry <duration>
Specifies the length of time after which the cache entry will expire, in the format <integer>[{Y | M | W | D | H | m |
s}]. To turn off cache expiration, set this value to off.
--create-home-directory {yes | no}
Specifies whether to create a home directory the first time a user logs in, if a home directory does not already
exist for the user.
--enabled {yes | no}
Enables or disables the provider.
--enumerate-groups {yes | no}
Specifies whether to allow the provider to enumerate groups.
--enumerate-users {yes | no}
Specifies whether to allow the provider to enumerate users.
--findable-groups <string>
Specifies a group that can be found in this provider if --restrict-findable is enabled. Repeat this option
to specify multiple list items. If populated, any groups that are not included in this list cannot be resolved. This
option overwrites any existing entries in the findable groups list; to add or remove groups without affecting
current entries, use --add-findable-groups or --remove-findable-groups.
--clear-findable-groups
Removes all entries from the list of findable groups.
--add-findable-groups <string>
Adds an entry to the list of findable groups that is checked if --restrict-findable is enabled. Repeat this
option to specify multiple list items.
--remove-findable-groups <string>
Removes an entry from the list of findable groups that is checked if --restrict-findable is enabled.
Repeat this option to specify multiple list items.
--findable-users <string>
Specifies a user that can be found in the provider if --restrict-findable is enabled. Repeat this option to
specify multiple list items. If populated, any users that are not included in this list cannot be resolved. This option
overwrites any existing entries in the findable users list; to add or remove users without affecting current entries,
use --add-findable-users or --remove-findable-users.
--clear-findable-users
Syntax
isi auth file view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth groups create <name>
[--gid <integer>]
[--add-user <name>]
[--add-group <name>]
[--add-gid <integer>]
[--add-uid <integer>]
[--add-sid <string>
[--add-wellknown <name>]
[--zone <string>]
[--provider <string>]
[--verbose]
[--force]
Options
<name>
Syntax
isi auth groups delete {<group> | --gid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--force]
[--verbose]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
<group>
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies the name of the access zone that contains the group.
Syntax
isi auth groups flush
Options
There are no options for this command.
Examples
To flush all cached group information, run the following command:
Syntax
isi auth groups list
[--domain <string>]
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--domain <string>
Specifies the provider domain.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--limit | -l} <integer>
Displays no more than the specified number of items.
Syntax
isi auth groups members list {<group> | --gid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--zone <string>
Specifies an access zone.
--provider <string>
Specifies an authentication provider.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth groups modify {<group> | --gid <integer> | --sid <string>}
[--new-gid <integer>]
[--add-uid <integer>]
[--remove-uid <integer>]
[--add-user <name>]
[--add-group <name>]
[--add-gid <integer>
[--remove-user <name>]
[--remove-group <name>]
[--remove-gid <integer>]
[--add-sid <string>]
[--remove-sid <string>]
[--add-wellknown <name>]
[--remove-wellknown <name>]
[--zone <string>]
[--provider <string>]
[--verbose]
[--force]
Options
This command requires <group>, --gid <integer>, or --sid <string>.
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by security identifier (SID).
--new-gid <integer>
Specifies a new GID for the group. Setting this option is not recommended.
--add-uid <integer>
Specifies the UID of a user to add to the group. Repeat this option to specify multiple list items.
--remove-uid <integer>
Specifies the UID of a user to remove from the group. Repeat this option to specify multiple list items.
--add-user <name>
Specifies the name of a user to add to the group. Repeat this option to specify multiple list items.
--remove-user <name>
Specifies the name of a user to remove from the group. Repeat this option to specify multiple list items.
--add-group <name>
Specifies the name of the group to add to this group. Repeat this option to specify multiple groups to add.
--remove-group <name>
Specifies the name of the group to remove from this group. Repeat this option to specify multiple groups to
remove.
--add-gid <integer>
Specifies the GID of the group to add to this group. Repeat this option to specify multiple GIDs to add.
--remove-gid <integer>
Specifies the GID of the group to remove from this group. Repeat this option to specify multiple GIDs to remove.
Syntax
isi auth groups view {<group> | --gid <integer> | --sid <string>}
[--cached]
[--provider <string>]
[--show-groups]
[--zone <string>]
Options
<group>
Specifies the group by name.
--gid <integer>
Specifies the group by GID.
--sid <string>
Specifies the group by SID.
--cached
Displays cached information.
--provider <string>
Specifies the name of an authentication provider.
--show-groups
isi auth id
Displays your access token.
Syntax
isi auth id
Options
There are no options for this command.
Syntax
isi auth krb5 create <realm> {<user> | --keytab-file <string> }
[--password <string>]
[--spn <string>]
[--groupnet <groupnet>]
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
[--verbose]
Options
<realm>
Specifies the Kerberos realm name.
<user>
Specifies the name of a user with permission to create service principal names (SPNs) in the Kerberos realm.
--keytab-file <string>
Specifies the keytab file to import.
--password <string>
Specifies the password used for joining a Kerberos realm.
--spn <string>
Specifies the SPNs to register. Specify --spn for each additional SPN that you want to register.
--groupnet <groupnet>
Specifies the groupnet referenced by the Kerberos provider. The groupnet is a top-level networking container
that manages hostname resolution against DNS nameservers and contains subnets and IP address pools. The
groupnet specifies which networking properties the Kerberos provider will use when communicating with
external servers.
--is-default-realm {yes | no}
Specifies whether the Kerberos realm is the default.
Syntax
isi auth krb5 delete <provider-name>
[--force]
Options
<provider-name>
Specifies the Kerberos provider name.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 domain create <domain> <realm>
Options
<domain>
Specifies the name of the Kerberos domain.
<realm>
Specifies the name of the Kerberos realm.
Syntax
isi auth krb5 domain delete <domain>
[--force]
Syntax
isi auth krb5 domain list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos domain mappings to display.
--format {table | json | csv | list}
Specifies whether to display the Kerberos domain mappings in a tabular, JSON, CSV, or list formats.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 domain modify <domain>
[--realm <string>]
Options
<domain>
Specifies the Kerberos domain name.
--realm <string>
Specifies the Kerberos realm name.
Syntax
isi auth krb5 domain view <domain>
Options
<domain>
Specifies the Kerberos domain name.
Syntax
isi auth krb5 list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos providers to display.
--format {table | json | csv | list}
Specifies to display the Kerberos providers in a tabular, JSON, CSV, or list format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 realm create <realm>
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
Options
<realm>
Syntax
isi auth krb5 realm delete <realm>
[--force]
Options
<realm>
Specifies the Kerberos realm name.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 realm list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
{--limit | -l} <integer>
Specifies the number of Kerberos realms to display.
--format {table | json | csv | list}
Specifies whether to display the Kerberos realms in a tabular, JSON, CSV, or list format.
{--no-header | -a}
Specifies not to display the headers in the CSV or tabular formats.
{--no-footer | -z}
Specifies not to display the table summary footer information.
Syntax
isi auth krb5 realm modify <realm>
[--is-default-realm {yes | no}]
[--kdc <string>]
[--admin-server <string>]
[--default-domain <string>]
Options
<realm>
Specifies the Kerberos realm name.
--is-default-realm {yes | no}
Specifies whether the Kerberos realm is the default.
--kdc <string>
Specifies the hostname, IPv4 address, or IPv6 address of the Key Distribution Center (KDC). Specify --kdc for
each additional KDC you want to add to the realm.
--admin-server <string>
Specifies the hostname, IPv4 address, or IPv6 address of the administrative server (master KDC).
--default-domain <string>
Specifies the default domain for the Kerberos realm used for translating v4 principal names.
Syntax
isi auth krb5 realm view <realm>
Options
<realm>
Specifies the Kerberos realm name.
Syntax
isi auth krb5 spn check <provider-name>
Options
<provider-name>
Syntax
isi auth krb5 spn create <provider-name> <user> <spn>
[--password <string>]
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to create the service principal names (SPNs) in the Kerberos realm.
<spn>
Specifies the SPN.
--password <string>
Specifies the password used during the modification of a Kerberos realm.
Syntax
isi auth krb5 spn delete <provider-name> <spn> {<kvno> | --all}
Options
<provider-name>
Specifies the Kerberos provider name.
<spn>
Specifies the service principal name (SPN).
<kvno>
Specifies the key version number.
--all
Deletes all the key versions.
Syntax
isi auth krb5 spn fix <provider-name> <user>
[--password <string>]
[--force]
Options
<provider-name>
Specifies the Kerberos provider name.
<user>
Specifies a user name with permissions to join clients to the given Kerberos domain.
--password <string>
Specifies the password that was used when modifying the Kerberos realm.
{--force | -f}
Specifies not to ask for a confirmation.
Syntax
isi auth krb5 spn import <provider-name> <keytab-file>
Options
<provider-name>
Specifies the Kerberos provider name.
<keytab-file>
Specifies the keytab file to import.
Syntax
isi auth krb5 spn list <provider-name>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Syntax
isi auth krb5 view <provider-name>
Options
<provider-name>
Specifies the Kerberos provider name.
Syntax
isi auth ldap create <name>
[--base-dn <string>]
[--server-uris <string>]
[--alternate-security-identities-attribute <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--bind-dn <string>]
[--bind-timeout <integer>]
[--certificate-authority-file <string>]
[--check-online-interval <duration>]
[--cn-attribute <string>]
[--create-home-directory {yes | no}]
[--crypt-password-attribute <string>]
[--email-attribute <string>]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--findable-users <string>]
[--gecos-attribute <string>]
[--gid-attribute <string>]
[--group-base-dn <string>]
[--group-domain <string>]
[--group-filter <string>]
[--group-members-attribute <string>]
Options
<name>
Sets the LDAP provider name.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example, CN=Users,DC=mycompany,DC=com.
--server-uris <string>
Specifies a list of LDAP server URIs to be used when accessing the server. Repeat this option to specify multiple
list items.
Specify the LDAP server URI in the format ldaps://<server>:<port> for secure LDAP or ldap://<server>:<port>
for non-secure LDAP.
The server can be specified as an IPv4 address, an IPv6 address, or a hostname.
If you do not specify a port number, the default port is used; 389 for secure LDAP or 636 for non-secure LDAP.
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs and can
include special character sequences that are dynamically replaced with strings at home directory creation time
that represent specific variables. For example, %U, %D, and %Z are replaced with the user name, provider
domain name, and zone name, respectively. For more information about home directory variables, see Home
directories.
--homedir-attribute <string>
Specifies the LDAP attribute that contains home directories. The default value is homeDirectory.
--ignore-tls-errors {yes | no}
Continues over a secure connection even if identity checks fail.
--listable-groups <string>
Specifies a list of groups that can be viewed in this provider if --restrict-listable is enabled. Repeat this
option to specify multiple list items. If populated, groups that are not included in this list cannot be viewed.
--listable-users <string>
Specifies a list of users that can be viewed in this provider if --restrict-listable is enabled. Repeat this
option to specify multiple list items. If populated, users that are not included in this list cannot be viewed.
--login-shell <path>
Specifies the pathname of the user's login shell for users who access the file system through SSH.
--member-lookup-method {default | rfc2307bis}
Sets the method by which group member lookups are performed. Use caution when changing this option
directly.
--member-of-attribute <string>
Sets the attribute to be used when searching LDAP for reverse memberships. This LDAP value should be an
attribute of the user type posixAccount that describes the groups in which the POSIX user is a member.
--name-attribute <string>
Specifies the LDAP attribute that contains UIDs, which are used as login names. The default value is uid.
--netgroup-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for netgroups.
--netgroup-filter <string>
Sets the LDAP filter for netgroup objects.
--netgroup-members-attribute <string>
Specifies the LDAP attribute that contains netgroup members. The default value is memberNisNetgroup.
--netgroup-search-scope <scope>
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is nisNetgroupTriple.
--normalize-groups {yes | no}
Normalizes group names to lowercase before lookup.
--normalize-users {yes | no}
Normalizes user names to lowercase before lookup.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly used value is ntpasswdhash.
--ntlm-support {all | v2only | none}
For users with NTLM-compatible credentials, specifies which NTLM versions to support.
--provider-domain <string>
Specifies the domain that the provider will use to qualify user and group names.
--require-secure-connection {yes | no}
Specifies whether to require a TLS connection.
--restrict-findable {yes | no}
Specifies whether to check the provider for filtered lists of findable and unfindable users and groups.
--restrict-listable {yes | no}
Specifies whether to check the provider for filtered lists of listable and unlistable users and groups.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform LDAP searches.
The following values are valid:
--search-timeout <integer>
Specifies the number of seconds after which to stop retrying and fail a search. The default value is 100.
--shadow-user-filter <string>
Sets the LDAP filter for shadow user objects.
--shadow-expire-attribute <string>
Sets the attribute name that indicates the absolute date to expire the account.
--shadow-flag-attribute <string>
Sets the attribute name that indicates the section of the shadow map that is used to store the flag value.
--shadow-inactive-attribute <string>
default Applies the search scope that is defined in the default query settings.
base Searches only the entry at the base DN.
onelevel Searches all entries exactly one level below the base DN.
subtree Searches the base DN and all entries below it.
children Searches all entries below the base DN, excluding the base DN itself.
--groupnet <groupnet>
Syntax
isi auth ldap delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
{--force | -f}
Suppresses command-line prompts and messages.
<provider-name>
Specifies the name of the provider to delete.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth ldap list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi auth ldap modify <provider-name>
[--name <string>]
[--base-dn <string>]
[--server-uris <string>]
[--add-server-uris <string>]
[--remove-server-uris <string>]
[--alternate-security-identities-attribute <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--bind-dn <string>]
[--bind-timeout <integer>]
[--certificate-authority-file <string>]
[--check-online-interval <duration>]
[--cn-attribute <string>]
[--create-home-directory {yes | no}]
[--crypt-password-attribute <string>]
[--email-attribute <string>]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
[--clear-findable-users]
[--add-findable-users <string>]
[--remove-findable-users <string>]
[--gecos-attribute <string>]
[--gid-attribute <string>]
[--group-base-dn <string>]
[--group-domain <string>]
[--group-filter <string>]
[--group-members-attribute <string>]
[--group-search-scope <scope>]
[--homedir-attribute <string>]
[--home-directory-template <string>]
[--ignore-tls-errors {yes | no}]
[--listable-groups <string>]
[--clear-listable-groups]
[--add-listable-groups <string>]
[--remove-listable-groups <string>]
[--listable-users <string>]
Options
<provider-name>
Specifies the name of the LDAP provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--base-dn <string>
Sets the root of the tree in which to search for identities. For example, CN=Users,DC=mycompany,DC=com.
NOTE:
--home-directory-template <path>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs and can
include special character sequences that are dynamically replaced with strings at home directory creation time
that represent specific variables. For example, %U, %D, and %Z are replaced with the user name, provider
domain name, and zone name, respectively. For more information, see the Home directories section.
--homedir-attribute <string>
Specifies the LDAP attribute that is used when searching for the home directory. The default value is
homeDirectory.
--ignore-tls-errors {yes | no}
Continues over a secure connection even if identity checks fail.
--listable-groups <string>
Specifies a list of groups that can be viewed in this provider if --restrict-listable is enabled. Repeat this
option to specify multiple list items. If populated, groups that are not included in this list cannot be viewed in this
provider. This option overwrites the entries in the listable groups list; to add or remove groups without affecting
current entries, use --add-listable-groups or --remove-listable-groups.
--clear-listable-groups
Removes all entries from the list of viewable groups.
--add-listable-groups <string>
Adds an entry to the list of listable groups that is checked if --restrict-listable is enabled. Repeat this
option to specify multiple list items.
--remove-listable-groups <string>
Removes an entry from the list of viewable groups that is checked if --restrict-listable is enabled.
Repeat this option to specify multiple list items.
--listable-users <string>
Specifies a list of users that can be viewed in this provider if --restrict-listable is enabled. Repeat this
option to specify multiple list items. If populated, users that are not included in this list cannot be viewed in this
provider. This option overwrites the entries in the listable users list; to add or remove users without affecting
current entries, use --add-listable-users or --remove-listable-users.
--clear-listable-users
Removes all entries from the list of viewable users.
--add-listable-users <string>
Adds an entry to the list of listable users that is checked if --restrict-listable is enabled. Repeat this
option to specify multiple list items.
--remove-listable-users <string>
Removes an entry from the list of viewable users that is checked if --restrict-listable is enabled.
Repeat this option to specify multiple list items.
--login-shell <path>
Specifies the pathname to the user's login shell, for users who access the file system through SSH.
--member-lookup-method {default | rfc2307bis
Sets the method by which group member lookups are performed. Use caution when changing this option
directly.
--member-of-attribute <string>
Sets the attribute to be used when searching LDAP for reverse memberships. This LDAP value should be an
attribute of the user type posixAccount that describes the groups in which the POSIX user is a member.
--name-attribute <string>
Specifies the LDAP attribute that contains UIDs, which are used as login names. The default value is uid.
--netgroup-base-dn <string>
Specifies the distinguished name of the entry at which to start LDAP searches for netgroups.
--netgroup-filter <string>
Sets the LDAP filter for netgroup objects.
NOTE:
--netgroup-triple-attribute <string>
Specifies the LDAP attribute that contains netgroup triples. The default value is nisNetgroupTriple.
--normalize-groups {yes | no}
Normalizes group names to lowercase before lookup.
--normalize-users {yes | no}
Normalizes user names to lowercase before lookup.
--nt-password-attribute <string>
Specifies the LDAP attribute that contains Windows passwords. A commonly used value is ntpasswdhash.
--ntlm-support {all | v2only | none}
For users with NTLM-compatible credentials, specifies which NTLM versions to support.
The following values are valid:
all
v2only
none
--provider-domain <string>
Specifies the domain that this provider will use to qualify user and group names.
--require-secure-connection {yes | no}
Specifies whether to require a TLS connection.
--restrict-findable {yes | no}
Specifies whether to check this provider for filtered lists of findable and unfindable users and groups.
--restrict-listable {yes | no}
Specifies whether to check this provider for filtered lists of viewable and unviewable users and groups.
--search-scope <scope>
Defines the default depth from the base distinguished name (DN) to perform LDAP searches.
The following values are valid:
--search-timeout <integer>
NOTE:
Syntax
isi auth ldap view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth local list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
Syntax
isi auth local modify <provider-name>
[--authentication {yes | no}]
[--create-home-directory {yes | no}]
[--home-directory-template <string>]
[--lockout-duration <duration>]
[--lockout-threshold <integer>]
[--lockout-window <duration>]
[--login-shell <string>]
[--machine-name <string>]
[--min-password-age <duration>]
[--max-password-age <duration>]
[--min-password-length <integer>]
[--password-prompt-time <duration>]
[--password-complexity{lowercase | uppercase |
numeric | symbol}]
[--clear-password-complexity]
[--add-password-complexity {lowercase | uppercase |
numeric | symbol}]
[--remove-password-complexity <string>]
[--password-history-length <integer>]
[--verbose]
Options
<provider-name>
Specifies the name of the local provider to modify.
--authentication {yes | no}
Uses the provider for authentication as well as identity. The default setting is yes.
--create-home-directory {yes | no}
Creates a home directory the first time a user logs in.
--home-directory-template <string>
Specifies the path to use as a template for naming home directories. The path must begin with /ifs and can
include special character sequences that are dynamically replaced with strings at home directory creation time
that represent specific variables. For example, %U, %D, and %Z are replaced with the user name, provider
domain name, and zone name, respectively. For more information, see the Home directories section.
--lockout-duration <duration>
Sets the length of time that an account will be inaccessible after multiple failed login attempts.
--lockout-threshold <integer>
Specifies the number of failed login attempts after which an account will be locked out.
--lockout-window <duration>
Sets the time in which the number of failed attempts specified by the --lockout-threshold option must be
made for an account to be locked out. Duration is specified in the format <integer>[{Y | M | W | D | H | m | s}].
--login-shell <string>
Syntax
isi auth local view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth log-level modify <level>
[--verbose]
Options
<level>
Sets the log level for the current node. The log level determines how much information is logged.
The following values are valid and are organized from least to most information:
• always
• error
• warning
• info
• verbose
• debug
• trace
NOTE: Levels verbose, debug, and trace may cause performance issues. Levels debug and
trace log information that likely will be useful only when consulting EMC Isilon Technical
Support.
{--verbose | -v}
Displays detailed information.
Syntax
isi auth log-level view
Options
There are no options for this command.
Syntax
isi auth mapping create {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string>}
[{--uid | --gid | --sid}]
[--on-disk]
[--2way]
Options
<source>
Specifies the mapping source by identity type, in the format <type>:<value>—for example, UID:2002.
--source-uid <integer>
Specifies the mapping source by UID.
--source-gid <integer>
Specifies the mapping source by GID.
--source-sid <string>
Specifies the mapping source by SID.
--uid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped UID.
--gid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped GID.
--sid
Generates a mapping if one does not exist for the identity; otherwise, retrieves the mapped SID.
--on-disk
Specifies that the source on-disk identity should be represented by the target identity.
--2way
Specifies a two-way, or reverse, mapping.
--target <string>
Specifies the mapping target by identity type, in the format <type>:<value>—for example, UID:2002.
--target-uid <integer>
Specifies the mapping target by UID.
--target-gid <integer>
Specifies the mapping target by GID.
--target-sid <string>
Specifies the mapping target by SID.
--zone<string>
Specifies the access zone that the ID mapping is applied to. If no access zone is specified, the mapping is applied
to the default System zone.
Syntax
isi auth mapping delete {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string> | --all}
[{--only-generated | --only-external | --2way | --target <string>
| --target-uid <integer> | --target-gid <integer> | --target-sid <string>}]
[--zone<string>]
[{--force | -f}]
Syntax
isi auth mapping dump <file>
[--zone <string>]
[{--verbose | -v}]
Options
If no option is specified, the full kernel mapping database is displayed.
<file>
Examples
To view the kernel mapping database, run the following command:
Syntax
isi auth mapping flush {--all | --source <string>
| --source-uid <integer> | --source-gid <integer>
| --source-sid <string>}
[--zone<string>]
Options
You must specify either --all or one of the source options.
--all
Flushes all identity mappings on the cluster.
--source <string>
Specifies the mapping source by identity type, in the format <type>:<value>—for example, UID:2002.
--source-uid <integer>
Specifies the source identity by UID.
--source-gid <integer>
Specifies the source identity by GID.
--source-sid <string>
Specifies the source identity by SID.
--zone<string>
Specifies the access zone of the source identity. If no access zone is specified, any mapping for the specified
source identity is flushed from the default System zone.
Syntax
isi auth mapping import <file>
[{--replace | -r}]
[{--verbose]| -v}]
Options
<file>
Specifies the full path to the file to import. File content must be in the same format as the output that is
displayed by running the isi auth mapping dump command. File must specify an absolute path within
the /ifs file system.
{--replace | -r}
Overwrites existing entries in the mapping database file with the file content.
{--verbose | -v}
Displays detailed information.
Syntax
isi auth mapping list
[--zone <string>]
Options
--zone <string>
Specifies an access zone.
Syntax
isi auth mapping modify {<source>| --source-uid <integer>
| --source-gid <integer> | --source-sid <string> | --target <string>
| --target-uid <integer> | --target-gid <string> | --target-sid <string>}
[--on-disk]
[--2way]
[--zone<string>]
Options
<source>
Syntax
isi auth mapping token {<user> | --uid <integer>
| --kerberos-principal <string>}
[--zone <string>]
[--primary-gid <integer>]
[--gid <integer>]
Options
This command requires <user> or --uid <integer> or --kerberos-principal <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--kerberos-principal <string>
Specifies the Kerberos principal by name. For example, user@realm.com.
--zone <string>
Specifies the name of the access zone that contains the mapping.
--primary-gid <integer>
Specifies the primary GID.
--gid <integer>
Syntax
isi auth mapping view {<id>| --uid <integer>
| --gid <integer> | --sid <string>}
[--nocreate]
[--zone <string>]
Options
<id>
Specifies the ID of the source identity type in the format <type>:<value>—for example, UID:2002.
--uid <integer>
Specifies the mapping source by UID.
--gid <integer>
Specifies the mapping source by GID.
--sid <string>
Specifies the mapping source by SID.
--nocreate
Specifies that nonexistent mappings should not be created.
--zone
Specifies the access zone of the source identity. If no access zone is specified, OneFS displays mappings from
the default System zone.
Examples
The following command displays mappings for a user whose UID is 2002 in the zone3 access zone:
Syntax
isi auth netgroups view <netgroup>
[--zone <string>]
[--provider <string>]
Options
<netgroup>
Specifies the netgroup name.
--zone <string>
Specifies the access zone.
--provider <string>
Specifies the authentication provider.
--recursive {true | false}
Specifies wether to recursively resolve nested netgroups. The default value is true.
--ignore {true | false}
Specifies whether to ignore errors and unresolvable netgroups. The default value is false.
Syntax
isi auth nis create <name>
[--nis-domain <string>]
[--servers <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--findable-users <string>]
[--group-domain <string>]
[--home-directory-template <path>]
[--hostname-lookup {yes | no}]
[--listable-groups <string>]
[--listable-users <string>]
[--login-shell <path>]
[--normalize-groups {yes | no}]
[--normalize-users {yes | no}]
[--provider-domain <string>]
[--ntlm-support {all | v2only | none}]
[--request-timeout <integer>]
[--restrict-findable {yes | no}]
[--restrict-listable {yes | no}]
[--retry-time <integer>]
[--unfindable-groups <string>]
[--unfindable-users <string>]
[--unlistable-groups <string>]
[--unlistable-users <string>]
[--user-domain <string>]
[--ypmatch-using-tcp {yes | no}]
[--groupnet <groupnet>]
[--verbose]
Options
<name>
Syntax
isi auth nis delete <provider-name>
[--force]
[--verbose]
Options
<provider-name>
Specifies the name of the provider to delete.
Syntax
isi auth nis list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth nis modify <provider-name>
[--name <string>]
[--nis-domain <string>]
[--servers <string>]
[--add-servers <string>]
[--remove-servers <string>]
[--authentication {yes | no}]
[--balance-servers {yes | no}]
[--check-online-interval <duration>]
[--create-home-directory {yes | no}]
[--enabled {yes | no}]
[--enumerate-groups {yes | no}]
[--enumerate-users {yes | no}]
[--findable-groups <string>]
[--clear-findable-groups]
[--add-findable-groups <string>]
[--remove-findable-groups <string>]
[--findable-users <string>]
Options
<provider-name>
Specifies the name of the NIS provider to modify.
--name <string>
Specifies an new name for the authentication provider.
--nis-domain <string>
Specifies the NIS domain name.
--servers <string>
Specifies a list of NIS server to be used by this provider. Repeat this option to specify multiple list items. Specify
the NIS server as an IPv4 address or hostname. This option overwrites the entries in the NIS servers list; to add
or remove servers without affecting current entries, use --add-servers or --remove-servers.
--add-servers <string>
Adds an entry to the list of NIS servers. Repeat this option to specify multiple items.
--remove-servers <string>
Removes an entry from the list of NIS servers. Repeat this option to specify multiple items.
--authentication {yes | no}
Enables or disables the use of this provider for authentication as well as identity. The default value is yes.
--balance-servers {yes | no}
Makes this provider connect to a random server on each request.
Syntax
isi auth nis view <provider-name>
Options
<provider-name>
Specifies the name of the provider to view.
Syntax
isi auth privileges
[--zone <string>
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone for which to display system privileges.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
NOTE: When using the --verbose option, the output Read Write: No means that the
privileges are read-only.
Syntax
isi auth refresh
Syntax
isi auth roles create <name>
[--description <string>]
[--zone <string>]
[--verbose]
Options
<name>
Specifies the name of the role.
--description <string>
Specifies a description of the role.
--zone <string>
Specifies the name of the access zone in which to create the role.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi auth roles delete <role>
[--zone <string>
[--force]
[--verbose]
Options
<role>
Specifies the name of the role to delete.
--zone <string>
Specifies the name of the access zone from which to delete the role.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth roles list
[--zone <string>]
[--limit <integer>]
[--sort {id | name | description}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone for which to list roles.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort {id | name | description}
Specfies the field on which to sort data.
{--descending | -d}
Specifies to sort data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth roles members list <role>
[--zone <string>]
[--limit <integer>]
[--sort {id | name | type}]
[{--descending | -d}]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Examples
To view the members of the SystemAdmin role, run the following command:
In the following sample output, the SystemAdmin role currently contains one member, a user named admin:
Type Name
----------
user admin
----------
Total: 1
Syntax
isi auth roles modify <role>
[--zone <string>]
[--name <string>]
[--description <string>]
[--add-group <string>]
[--remove-group <string>]
[--add-gid <integer>]
[--remove-gid <integer>]
[--add-uid <integer>]
[--remove-uid <integer>]
[--add-user <string>]
[--remove-user <string>]
[--add-sid <string>]
[--remove-sid <string>]
[--add-wellknown <string>]
Options
<role>
Specifies the name of the role to modify.
--zone <string>
Specifies the name of the zone in which to modify the role.
--name <string>
Specifies a new name for the role. Applies to custom roles only.
--description <string>
Specifies a description of the role.
--add-group <string>
Adds a group with the specified name to the role. Repeat this option for each additional item.
--remove-group <string>
Removes a group with the specified name from the role. Repeat this option for each additional item.
--add-gid <integer>
Adds a group with the specified GID to the role. Repeat this option for each additional item.
--remove-gid <integer>
Removes a group with the specified GID from the role. Repeat this option for each additional item.
--add-uid <integer>
Adds a user with the specified UID to the role. Repeat this option for each additional item.
--remove-uid <integer>
Removes a user with the specified UID from the role. Repeat this option for each additional item.
--add-user <string>
Adds a user with the specified name to the role. Repeat this option for each additional item.
--remove-user <string>
Removes a user with the specified name from the role. Repeat this option for each additional item.
--add-sid <string>
Adds a user or group with the specified SID to the role. Repeat this option for each additional item.
--remove-sid <string>
Removes a user or group with the specified SID from the role. Repeat this option for each additional item.
--add-wellknown <string>
Adds a well-known SID with the specified name—for example, Everyone—to the role. Repeat this option for
each additional item.
--remove-wellknown <string>
Removes a well-known SID with the specified name from the role. Repeat this option for each additional item.
--add-priv <string>
Adds a read/write privilege to the role. Applies to custom roles only. Repeat this option for each additional item.
--add-priv-ro <string>
Adds a read-only privilege to the role. Applies to custom roles only. Repeat this option for each additional item.
--remove-priv <string>
Removes a privilege from the role. Applies to custom roles only. Repeat this option for each additional item.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi auth roles privileges list <role>
[--zone <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<role>
Specifies a role by name.
--zone <string>
Specifies the role's access zone.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To list the privileges that are associated with the built-in SecurityAdmin role, run the following command:
Syntax
isi auth roles view <role>
[--zone <string>
Options
<role>
Specifies the name of the role to view.
--zone <string>
Specifies the role's access zone.
Syntax
isi auth settings acls modify
[--create-over-smb {allow | disallow}]
[--chmod {remove | replace | replace_users_and_groups | merge | deny | ignore}]
[--chmod-inheritable {yes | no}]
[--chown {owner_group_and_acl | owner_group_only | ignore}]
[--access {unix | windows}]
[--rwx {retain | full_control}]
[--group-owner-inheritance {native | parent | creator}]
[--chmod-007 {default | remove}]
[--calcmode-owner {owner_aces | owner_only}]
[--calcmode-group {group_aces | group_only}]
[--synthetic-denies {none | remove}]
[--utimes {only_owner | owner_and_write}]
[--dos-attr {deny_smb | deny_smb_and_nfs}]
[--calcmode {approx | 777}]
[--calcmode-traverse {ignore | require}]
[--verbose]
Options
--create-over-smb {allow | disallow}
Specifies whether to allow or deny creation of ACLs over SMB.
NOTE: Inheritable ACLs on the system take precedence over this setting. If inheritable ACLs are
set on a folder, any new files and folders created in that folder will inherit the folder's ACL.
Disabling this setting does not remove ACLs currently set on files. If you want to clear an existing
ACL, run the chmod -b <mode> <file> command to remove the ACL and set the correct
permissions.
--chmod {remove | replace | replace_users_and_groups | merge | deny | ignore}
Specifies how permissions are handled when a chmod operation is initiated on a file with an ACL, either locally or
over NFS. This setting controls any elements that affect UNIX permissions, including File System Explorer.
Enabling this policy setting does not change how chmod operations affect files that do not have ACLs. The
following values are valid:
CAUTION: If you attempt to run the chmod command on the same permissions that are currently
set on a file with an ACL, you may cause the operation to silently fail. The operation appears to be
successful, but if you were to examine the permissions on the cluster, you would notice that the
chmod command had no effect. As an alternative, you can run the chmod command away from
the current permissions and then perform a second chmod command to revert to the original
permissions. For example, if your file shows 755 UNIX permissions and you want to confirm this
number, you could run chmod 700 file; chmod 755 file.
ownder_group_an Modifies only the owner or group, which enables the chown or chgrp operation to
d_acl perform as it does in UNIX. Enabling this setting modifies any ACEs in the ACL
associated with the old and new owner or group.
owner_group_only Modifies the owner or group and ACL permissions, which enables the NFS chown or
chgrp operation to function as it does in Windows. When a file owner is changed over
Windows, no permissions in the ACL are changed.
ignore Ignores the chown and chgrp operations if file has an existing ACL, which prevents an
NFS client from making changes to the owner or group.
NOTE: Over NFS, the chown or chgrp operation changes the permissions and user or group that
has ownership. For example, a file owned by user Joe with rwx------ (700) permissions indicates
rwx permissions for the owner, but no permissions for anyone else. If you run the chown
command to change ownership of the file to user Bob, the owner permissions are still rwx but
they now represent the permissions for Bob, rather than for Joe, who lost all of his permissions.
This setting does not affect UNIX chown or chgrp operations performed on files with UNIX
permissions, and it does not affect Windows chown or chgrp operations, which do not change
any permissions.
--access {unix | windows}
In UNIX environments, only the file owner or superuser has the right to run a chmod or chown operation on a
file. In Windows environments, you can implement this policy setting to give users the right to perform chmod
unix Allows only the file owner to change the mode or owner of the file, which enable chmod
and chown access checks to operate with UNIX-like behavior.
windows Allow the file owner and users with WRITE_DAC and WRITE_OWNER permissions to
change the mode or owner of the file, which enables chmod and chown access checks
to operate with Windows-like behavior.
retain Retains rwx permissions and generates an ACE that provides only read, write, and
execute permissions.
full_control Treats rwx permissions as full control and generates an ACE that provides the maximum
Windows permissions for a user or a group by adding the change permissions right, the
take ownership right, and the delete right.
native Specifies that if an ACL exists on a file, the group owner will be inherited from the file
creator's primary group. If there is no ACL, the group owner is inherited from the parent
folder.
parent Specifies that the group owner be inherited from the file's parent folder.
creator Specifies that the group owner be inherited from the file creator's primary group.
owner_aces Approximates owner mode bits using all possible group ACEs. This causes the owner
permissions to appear more permissive than the actual permissions on the file.
owner_only Approximates owner mode bits using only the ACE with the owner ID. This causes the
owner permissions to appear more accurate, in that you see only the permissions for a
particular owner and not the more permissive set. This may cause access-denied
problems for UNIX clients, however.
none Does not modify synthetic ACLs and mode bit approximations, which prevents
modifications to synthetic ACL generation and allows “deny” ACEs to be generated
when necessary.
CAUTION: This option can lead to permissions being reordered,
permanently denying access if a Windows user or an application performs
an ACL get, an ACL modification, and an ACL set to and from Windows.
remove Removes deny ACEs when generating synthetic ACLs. This setting can cause ACLs to
be more permissive than the equivalent mode bits.
only_owner Allows only owners to change utimes to client-specific times, which complies with the
POSIX standard.
owner_and_write Allows owners as well as users with write access to modify utimes to client-specific
times, which is less restrictive.
deny_smb Denies permission to modify files with DOS read-only attribute over SMB only.
deny_smb_nfs Denies permission to modify files with DOS read-only attribute through both NFS and
SMB.
approx Specifies to use ACL to approximate mode bits. Displays the approximation of the NFS
mode bits that are based on ACL permissions.
777 Specifies to always display 777 if an ACL exists. If the approximated NFS permissions are
less permissive than those in the ACL, you may want to use this setting so the NFS
client does not stop at the access check before performing its operation. Use this
setting when a third-party application may be blocked if the ACL does not provide the
proper access.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth settings acls view
Options
There are no options for this command.
Syntax
isi auth settings global modify
[--send-ntlmv2 {yes | no}]
[--revert-send-ntlmv2]
[--space-replacement <character>]
[--revert-space-replacement]
[--workgroup <string>]
[--revert-workgroup]
[--provider-hostname-lookup {dns-first | nis-first | disabled}]
[--user-object-cache-size <size>]
[--revert-user-object-cache-size]
[--on-disk-identity {native | unix | sid}]
[--revert-on-disk-identity]
[--rpc-block-time <duration>]
[--revert-rpc-block-time]
[--rpc-max-requests <integer>]
[--revert-rpc-max-requests]
[--unknown-gid <integer>]
[--revert-unknown-gid]
[--unknown-uid <integer>]
[--revert-unknown-uid]
[--verbose]
Options
--send-ntlmv2 {yes | no}
Specifies whether to send only NTLMv2 responses to an SMB client. The default value is no. Valid values are
yes, no. The default value is no.
--revert-send-ntlmv2
Reverts the --send-ntlmv2 setting to the system default value.
--space-replacement <character>
For clients that have difficulty parsing spaces in user and group names, specifies a substitute character. Be
careful to choose a character that is not in use.
--revert-space-replacement
Reverts the --space-replacement setting to the system default value.
--workgroup <string>
Specifies the NetBIOS workgroup. The default value is WORKGROUP.
--revert-workgroup
native Allows OneFS to determine the identity to store on disk. This is the recommended
setting.
unix Always stores incoming UNIX identifiers (UIDs and GIDs) on disk.
sid Stores incoming Windows security identifiers (SIDs) on disk unless the SID was
generated from a UNIX identifier. If the SID was generated from a UNIX identifier,
OneFS converts it back to the UNIX identifier and stores it on disk.
NOTE: To prevent permission errors after changing the on-disk identity, run the Repair
Permissions job with the convert mode specified.
--revert-on-disk-identity
Sets the --on-disk-identity setting to the system default value.
--rpc-block-time <integer>
Specifies the length of time, in milliseconds, before an ID mapper request becomes asynchronous.
--revert-rpc-block-time
Sets the --rpc-block-time setting to the system default value.
--rpc-max-requests <integer>
Specifies the maximum number of simultaneous ID mapper requests allowed. The default value is 64.
--revert-rpc-max-requests
Sets the --rpc-max-requests setting to the system default value.
--unknown-gid <integer>
Specifies the GID to use for the unknown (anonymous) group.
--revert-unknown-gid
Sets the --unknown-gid setting to the system default value.
--unknown-uid <integer>
Specifies the UID to use for the unknown (anonymous) user.
--revert-unknown-uid
Sets the --unknown-uid setting to the system default value.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth settings global view
Examples
To view the current authentication settings on the cluster, run the following command:
Syntax
isi auth settings krb5 modify
[--allow-weak-crypto <boolean>]
[--revert-allow-weak-crypto
[--always-send-preauth <boolean> | --revert-always-send-preauth]
[--default-realm <string>]
[--dns-lookup-kdc <boolean> | --revert-dns-lookup-kdc]
[--dns-lookup-realm <boolean> | --revert-dns-lookup-realm]
[--verbose]
Options
--allow-weak-crypto <boolean>
Enables DES encryption support.
--revert-allow-weak-crypto
Sets the value to the system default for --allow-weak-crypto.
--always-send-preauth <boolean>
Specifies whether to send preauth.
Syntax
isi auth settings krb5 view
Syntax
isi auth settings mapping modify
[--gid-range-enabled {yes | no}]
[--gid-range-min <integer>]
[--gid-range-max <integer>]
[--gid-range-next <integer>]
[--uid-range-enabled {yes | no}]
[--uid-range-min <integer>]
[--uid-range-max <integer>]
[--uid-range-next <integer>]
[--zone <string>]
[--verbose]
Options
If no option is specified, the kernel mapping database is displayed.
--gid-range-enabled {yes | no}
Enables automatic allocation of GIDs by the ID mapping service. This setting is enabled by default.
--gid-range-min <integer>
Specifies the lower value in the range of GIDs that are available for allocation. The default value is 1000000.
--gid-range-max <integer>
Specifies the upper value of the range of GIDs that are available for allocation. The default value is 2000000.
--gid-range-next <integer>
Syntax
isi auth settings mapping view
[--zone <string>]
Options
--zone <string>
Displays mapping settings from the specified access zone. If no access zone is specified, displays mappings from
the default System zone.
Syntax
isi auth status
[--zone <string>]
[--groupnet <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies an access zone by name.
--groupnet <string>
Specifies a groupnet by name.
Syntax
isi auth users create <name>
[--enabled {yes | no}]
[--expiry <timestamp>]
[--email <string>]
[--gecos <string>]
[--home-directory <path>]
[--password <string>]
[--password-expires {yes | no}]
[{--primary-group <name> | --primary-group-gid <integer>
| --primary-group-sid <string>}]
[--prompt-password-change {yes | no}]
[--shell <path>]
[--uid <integer>]
[--zone <string>]
[--provider <string>]
[--set-password]
[--verbose]
[--force]
Options
<name>
Specifies the user name.
--enabled {yes | no}
Enables or disables the user.
{--expiry | -x} <timestamp>
Specifies the time at which the user account will expire, using the date format <YYYY>-<MM>-<DD> or the
date/time format <YYYY>-<MM>-<DD>T<hh>:<mm>[:<ss>].
--email <string>
Specifies the email address of the user.
--gecos <string>
Specifies the values for the following Gecos field entries in the user's password file:
Full Name:
Office Location:
Office Phone:
Home Phone:
Other information:
Syntax
isi auth users delete {<user> | --uid <integer> | --sid <string>}
[--zone <string>]
[--provider <string>]
[--force]
[--verbose]
Syntax
isi auth users flush
Options
There are no options for this command.
Examples
To flush all cached user information, run the following command:
NOTE: The --domain option must be specified to list Active Directory users.
Syntax
isi auth users list
[--domain <string>]
[--zone <string>]
[--provider <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
Options
--domain <string>
Displays only the users in the specified provider domain.
--zone <string>
Specifies the access zone whose users you want to list. The default access zone is System.
--provider <string>
Displays only the users in the specified authentication provider. The syntax for specifying providers is <provider-
type>:<provider-name>, being certain to use the colon separator; for example, isi auth users list --
provider="lsa-ldap-provider:Unix LDAP".
{--limit | -l} <integer>.
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi auth users modify {<user> | --uid <integer> | --sid <string>}
[--enabled {yes | no}]
[--expiry <timestamp>]
[--unlock]
[--email <string>]
[--gecos <string>]
[--home-directory <path>]
[--password <string>]
[--password-expires {yes | no}]
[{--primary-group <string> | --primary-group-gid <integer>
| --primary-group-sid <string>}]
[--prompt-password-change {yes | no}]
[--shell <path>]
[--new-uid <integer>]
[--zone <string>]
[--add-group <name>]
[--add-gid <id>]
[--remove-group <name>]
[--remove-gid <id>]
[--provider <string>]
[--set-password]
[--verbose]
[--force]
Syntax
isi auth users view {<user> | --uid <integer> | --sid <string>}
[--cached]
[--show-groups]
[--resolve-names]
[--show-ssh-keys]
[--zone <string>]
[--provider <string>]
Options
This command requires <user>, --uid <integer>, or --sid <string>.
<user>
Specifies the user by name.
--uid <integer>
Specifies the user by UID.
--sid <string>
Specifies the user by SID.
--cached
Returns only cached information.
--show-groups
Displays groups that include the user as a member.
--resolve-names
Resolves the names of all related groups and related identities.
--show-ssh-keys
Syntax
isi batterystatus list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi batterystatus view
[--node-lnn <integer>
Options
--node-lnn <integer>
Specifies the node LNN to view. If omitted, battery status for the local node is displayed.
Syntax
isi certificate authority delete <id>
[--force]
[--verbose]
Options
<id>
The system TLS certificate identifier or name.
{--force | -f}
Does not prompt you to confirm that you want to delete the policy.
{--verbose | -v}
Displays a message confirming that the authority was deleted.
Syntax
isi certificate authority list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer}
[--verbose]
Options
{--limit | -l} <integer>
The number of certificate authorities to display. You can specify an integer value.
--format {table | json | csv | list}
Display the list of certificate authorities in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate authority modify <id>
[--name <string>]
[--description <string>]
[--verbose]
Options
<id>
The certificate identifier or name.
--name <string>
An administrator-configured certificate identifier.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate authority view <id>
[--format {list | json]}
Options
<id>
The certificate identifier or name.
--format {list | json}
Display the list of certificate authorities in list or JSON format.
OneFS displays the specified TLS certificate authority.
Syntax
isi certificate server delete <id>
[--force]
[--verbose]
Syntax
isi certificate server import <certificate-path> <certificate-key-path>
[--name <string>]
[--description <string>]
[--certificate-key-password <string>]
[--verbose]
Option
--name <string>
The administrator-configured certificate identifier.
<certificate-path>
The local path to the TLS certificate file, in PEM format. The certificate file is copied into the system certificate
store and can be removed after import. This must be an absolute path within the OneFS file system.
<certificate-key-path>
The local path to the TLS certificate key file, in PEM format. The certificate key file is copied into the system
certificate store, and should be removed after import for security reasons.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
--certificate-key-password <string>
The password for the certificate key if a private key is password-encrypted.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer}
[--verbose]
Syntax
isi certificate server modify <id>
[--name]
[--description <string>]
[--verbose]
Options
<id>
The certificate identifier.
--name
Specifies the administrator-configured name of a certificate to use to connect to a TLS-enabled service.
--description <string>
A description field provided for administrative convenience, in which you can enter a comment about the
certificate.
{--verbose | -v}
Displays more detailed information.
Syntax
isi certificate server view <id>
[--format {list | json]}
Options
<id>
The certificate identifier.
--format {list | json}
Syntax
isi certificate settings modify
[--certificate-monitor-enabled <boolean>]
[--certificate-pre-expiration-threshold <duration>]
[--default-https-certificate <string>]
[--verbose]
Options
--certificate- Enable certificate expiration monitoring.
monitor-
enabled
<boolean>
--certificate- The amount of time before a certificate expires to state a reminder of the upcoming expiry.
pre-
expiration-
threshold
<duration>
--default- Specify the default HTTPS X.509 certificate for the cluster.
https-
certificate
<string>
{--verbose | -v} Displays more detailed information.
Syntax
isi certificate settings view
Options
None
Syntax
isi cloud access add <guid>
[--expiration-date]<timestamp>
[--force
[--verbose]
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cloud account.
--expiration-date <timestamp>
The date and time when unreferenced (stale) data will be removed from the cloud. The timestamp format is
MMDDYY:hh:mm. For example, 022016:12:00 specifies an expiration date and time of February 20, 2016 at
12:00 PM.
{-- force | -f}
Do not ask for confirmation.
{--verbose | -v}
Displays more detailed information.
Examples
The following example adds cloud write access to a cluster by specifying the cluster GUID and an expiration date:
OneFS displays a message indicating the cloud accounts and file pool policies to which the secondary cluster will have access, and requires
confirmation. Type yes, and press ENTER to complete the process.
Syntax
isi cloud access list
[--limit]<integer>
[--sort {name | guid | state}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of eligible clusters displayed in the list.
Syntax
isi cloud access remove <guid>
[--force]
[--verbose]
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster from which you want to remove cloud
write access.
{--force | -f}
Execute the command without requiring confirmation.
{--verbose | -v }
Displays more detailed information.
Examples
The following example removes cloud write access from a cluster identified by a specified GUID:
OneFS displays a message indicating the cloud accounts and file pool policies to which the cluster will no longer have access, and requires
confirmation. Type yes, and press ENTER to complete the process.
Syntax
isi cloud access view <guid>
Options
<guid>
The reference number, or globally unique identifier (GUID), of the cluster.
Syntax
isi cloud accounts create <name> <type> <uri>
[--account-username <string>]
[--key <string>]
[--enabled {yes | no}]
[--account-id <string>]
[--telemetry-bucket <string>]
[--storage-region <string>]
[--skip-ssl-validation {yes | no}]
[--enable-ocsp {yes | no}]
[--ocsp-responder-url-required {yes | no}]
[--proxy <string>]
[--credential-provider-uri <string>]
[--credential-provider-agency <string>]
[--credential-provider-certificate <string>]
[--credential-provider-mission <string>]
[--credential-provider-proxy <string>]
[--credential-provider-role <string>]
[--force]
[--verbose]
Options
<name>
The name of the cloud storage account.
<type>
The type of cloud storage account. Use one of the following values:
Value Description
isilon Dell EMC Isilon
ecs Dell EMC ECS Appliance
virtustream Virtustream Storage Cloud
azure Microsoft Azure
s3 Amazon S3
c2s-s3 Amazon Commercial Cloud Services S3
<uri>
The cloud account URI. This URI must match that provided to the cloud vendor.
{--account-username | -u} <string>
The username for the cloud account. This name must be identical to the user name provided to the cloud
vendor.
--key <string>
The cloud account access key or password. This information is provided by the cloud vendor.
--enabled {yes | no}
Enables or disables the account at creation time. By default, a cloud storage account is enabled on creation. To
disable an account on creation, use this setting with the no option.
--account-id <string>
A required Amazon S3-only setting. The account ID number provided by Amazon when you first establish an
account with the vendor.
--telemetry-bucket <string>
A required Amazon S3-only setting. The telemetry bucket name that you specified when you first established an
account with the vendor. This is where usage reports are stored.
--storage-region <string>
An optional parameter for Amazon S3 or Google Storage Platform cloud types. The region value must match the
storage region that you specified when you first established an account with the cloud provider. For example,
us-west-1. If you do not specify a region, the cloud provider chooses its default region.
--skip-ssl-validation {yes | no}
Specifies whether to circumvent SSL certificate validation when connecting to a cloud provider's storage
repository. Unless you specify this setting with a yes instruction, OneFS will attempt to perform SSL certificate
validation when connecting. For security purposes, we recommend not enabling this setting. If you are
connecting to a cloud provider that is within your corporate network (for example, Isilon or ECS), and you are
having trouble connecting, you can skip SSL validation.
--enable-ocsp {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether to use OCSP to check the revocation status of the
authentication certificate.
--ocsp-responder-url-required {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether a certificate without an OCSP responder URL is
considered valid or not.
--proxy <string>
The network proxy through which CloudPools traffic to and from a public cloud provider should be redirected.
The specified network proxy must already have been created with the isi cloud proxies create
command.
--credential-provider-uri <string>
Applies only to the C2S-S3 cloud type. The URI to connect to a credential provider.
--credential-provider-agency <string>
Applies only to the C2S-S3 cloud type. The agency name required to connect to the credential provider.
--credential-provider-certificate <string>
Applies only to the C2S-S3 cloud type. The name or id of a certificate to connect to the credential provider.
--credential-provider-mission <string>
Applies only to the C2S-S3 cloud type. The Mission name required to connect to the credential provider.
--credential-provider-proxy <string>
Applies only to the C2S-S3 cloud type. The name or id of a proxy to connect to the credential provider.
Examples
The following example creates a Microsoft Azure cloud account:
WARNING: Deleting an account results in the permanent loss of access to the data. In effect, you are deleting the data.
Syntax
isi cloud accounts delete <id>
[--acknowledge <string>]
[--verbose]
Options
<id>
The name of the cloud account. You can use the isi cloud accounts list command to display the
names of cloud accounts.
--acknowledge <string>
Enables the account deletion to proceed. This parameter is required. You must include a text string with the
parameter, such as yes, proceed, or other string.
{--verbose | -v}
Displays more detailed information.
Example
The following example deletes a Microsoft Azure cloud account:
When you run the command, OneFS displays the following message and requires confirmation:
**********************************************************************
WARNING: Deleting an account is extremely dangerous.
Continuing with this operation will result in a permanent loss of data.
Type 'confirm delete data' to proceed. Press enter to cancel:
To proceed, type confirm delete data, and press ENTER.
Syntax
isi cloud accounts list
[--limit <integer>]
[--sort {id | name | type | account_username | uri | state | bucket}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of cloud accounts displayed in the list.
--sort {id | name | type | account_username | uri | state | bucket}
Sorts the list of cloud accounts according to the specified category. The following values are valid:
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--descending | -d}
Outputs the list of cloud accounts in descending order according to the specified sort option.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud accounts modify <id>
[--name <string>]
[--account-username <string>]
[--key <string>]
[--uri <string>]
[--enabled {yes | no}]
[--account-id <string>]
[--telemetry-bucket <string>]
[--storage-region <string>]
[--skip-ssl-validation {yes | no}]
[--enable-ocsp {yes | no}]
[--ocsp-responder-url-required {yes | no}]
[{--proxy <string> | --clear-proxy}]
[--skip-account-check {yes | no}]
[--credential-provider-uri <string>]
Options
<id>
The ID of the cloud account. In this case, the ID is the same as the cloud account name.
{--name | -n} <string>
The name of the cloud account. In this case, the name is the same as the ID.
{--account-username | -u} <string>
The username for the cloud account. This name must be identical to the user name provided to the cloud
vendor.
--key <string>
The cloud account access key or password. This information is provided by the cloud vendor.
--uri <string>
The cloud account URI. This URI must match that provided to the cloud vendor.
--enabled {yes | no}
By default, when you create a cloud storage account, it is enabled. To disable the account on creation, you can
use this setting with the no option.
--account-id <string>
This is a required Amazon S3-only setting. The account ID number provided by Amazon when you first establish
an account with the vendor.
--telemetry-bucket <string>
This is a required Amazon S3-only setting. The telemetry bucket name that you specified when you first
established an account with the vendor.
--storage-region <string>
This is a required Amazon S3, Google Cloud Platform, Alibaba Cloud setting. The storage region that you
specified when you first established an account with the vendor. For example, us-west-1.
--skip-ssl-validation {yes | no}
Specifies whether to circumvent SSL certificate validation when connecting to a cloud provider's storage
repository. Unless you specify this setting with a yes instruction, OneFS will attempt to perform SSL certificate
validation when connecting. For security purposes, we recommend not enabling this setting. If you are
connecting to a cloud provider (for example, RAN or ECS) that is inside your corporate network, and you are
having trouble connecting, you can skip SSL validation.
--enable-ocsp {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether to use OCSP to check the revocation status of the
authentication certificate.
--ocsp-responder-url-required {yes | no}
Applies only to the C2S-S3 cloud type. It indicates whether a certificate without an OCSP responder URL is
considered valid or not.
{--proxy <string> | --clear-proxy}
Use --proxy to set or change a network proxy through which CloudPools traffic is redirected, on its way to
and from a public cloud provider. The specified network proxy must already have been created with the isi
cloud proxies create command.
Use --clear-proxy to remove a previously set proxy. When you remove a proxy, CloudPools traffic flows
directly to the cloud provider.
--skip-account-check {yes | no}
If set to yes, CloudPools skips the validation step to determine if the cloud storage account is still accessible. We
do not recommend skipping this check.
Example
The following example modifies a Microsoft Azure cloud account:
Syntax
isi cloud accounts view <id>
Options
<id>
Specifies the id of the cloud account to view. You can use the isi cloud accounts list command to
obtain ids of available cloud accounts.
Syntax
isi cloud archive <files>
[--recursive {yes | no}]
[--policy <string>]
[--verbose]
[--help]
Options
<files>
Specifies the files to archive. Specify --files for each additional file to process. Alternatively, you can specify
a file matching pattern such as /ifs/data/archive/images/*.jpg.
{--recursive | -r} {yes | no}
Specifies whether the operation should apply recursively to nested directories in the file string.
--policy <string>
Specifies the file pool policy to appy to the specified files. If you specify one or more files to be archived and do
not specify a policy, OneFS will compare the files with each configured file pool policy.
{--verbose | -v}
Displays more detailed information.
The following example archives an entire directory to the cloud. The operation must match an existing file pool policy to be successful.
Syntax
isi cloud jobs cancel <id>
[--verbose]
Options
<id>
The ID for the cloud job. Run isi cloud jobs list to see a list of all manual and system jobs and their
associated IDs.
{--verbose | -v}
Displays more detailed information.
Example
This following example cancels a CloudPools job with the ID of 21.
Syntax
isi cloud jobs create {archive | recall}
[--files <string>]
[--begin-filter] <criteria> [--end-filter]
[--recursive {yes | no}]
[--accounts <string>]
[--expiration-date <timestamp>]
[--policy <string>]
[--verbose]
Options
{archive | recall}
Examples
For archive jobs, you can specify one or more directories to archive. The following command archives a single directory:
Syntax
isi cloud jobs files list <job-id>
[--offset <integer>]
[--page <integer>]
[--id <boolean>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<job-id>
The ID of the job. To find the list of job IDs in CloudPools, run the isi cloud jobs list command.
--offset <integer>
Example
The following example displays a list of files associated with a specific cloud job:
Syntax
isi cloud jobs list
[--limit <integer>]
[--sort {id | job_state | operation_state |effective_state | type
| state_change_time | completion_time | create_time | description}]
[--descending ]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -d} <integer>
Displays no more than the specified number of items.
--sort {id | job_state | operation_state | effective_state | type | state_change_time |
completion_time | create_time | description}
Orders results by this field. The default value is id. Note that, to sort on other than ID, description, effective
state, and type, use the --verbose parameter with the command.
{--descending | -d}
Sorts and presents data in descending order.
Syntax
isi cloud jobs pause <id>
[--verbose]
Options
id
The ID of the cloud job to pause. Use the isi cloud jobs list command to view the IDs of all cloud jobs.
Although possible, we recommend that you not pause any of the CloudPools system jobs that run in the
background and are critical for proper operation. These include:
{--verbose | -v}
Displays more detailed information.
Example
The following example pauses a cloud job with ID 19.
Syntax
isi cloud jobs resume <id>
[--verbose]
Options
<id>
The ID for the cloud job to resume. Use the isi cloud jobs list command to view a list of jobs and their
associated IDs.
{--verbose | -v}
Displays more detailed information.
Example
The following command resumes a paused job with an ID of 26:
Syntax
isi cloud jobs view <id>
Options
<id>
Specify the ID of the cloud job. Use the isi cloud jobs list command to view all jobs and their
associated IDs.
Example
The following command shows the details of a job with the ID of 27:
Syntax
isi cloud pools create <name> <type> <account>
[--description <string>]
[--vendor <string>]
[--verbose]
Options
<name>
The name of the CloudPool.
<type>
The type of account, one of isilon, azure, s3, ecs, virtustream, or google.
<account>
The name of the cloud storage account to which the CloudPool connects. The cloud storage account is required
and must match the CloudPool type. Only one cloud storage account can be specified.
--description <string>
A description of the CloudPool.
--vendor <string>
The name of the vendor hosting the cloud storage account.
{--verbose | -v}
Displays more detailed information.
Example
This following command creates a CloudPool containing a Microsoft Azure cloud storage account:
Syntax
isi cloud pools delete <id>
[--force]
[--verbose]
Options
<id>
The name of the CloudPool. You can use the isi cloud pools list command to list existing CloudPools
and their associated IDs.
{--force | -f}
Example
The following command deletes a CloudPool:
When you press ENTER to run the command, OneFS asks for confirmation. Type yes, and then press ENTER.
Syntax
isi cloud pools list
[--limit <integer>]
[--sort {id | name | type | description | vendor}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort {id | name | type | description | vendor}
Orders results by this field. The default value is id, which, in this case, is the same as name. Unless you use the
--verbose option, you can only sort on name or type.
{--descending | -d}
Sorts and presents data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud pools modify <id>
[--name <string>]
[--accounts <string> | --clear-accounts | --add-accounts <string> | --remove-accounts
<string>]
[--description <string>]
[--vendor <string>]
[--verbose]
Options
<id>
The ID of the CloudPool. Run isi cloud pools list to view the IDs of all CloudPools.
{--name | -n} <string>
Specifies a new name for the CloudPool.
{--accounts <string> | --clear-accounts | --add-accounts <string> | --remove-accounts <string>}
Adds or removes accounts associated with this cloudpool.
Only one account per CloudPool is allowed. To change the account associated with a CloudPool, we recommend
the following:
• Create a new CloudPool using the isi cloud pools create command, specifying the correct account.
• Delete the old CloudPool using the isi cloud pools delete command. Proceed with caution. If you
delete a CloudPool, OneFS is no longer able to access the associated cloud storage account.
{--description | -d} <string>
Provides a description of this cloud pool.
---vendor <string>
Provides the name of the vendor hosting the cloud pool account.
{--verbose | -v}
Displays more detailed information.
Examples
The following command adds a vendor name and description to an existing CloudPool:
Syntax
isi cloud pools view <id>
Options
<id>
The ID of the cloud pool. Run the isi cloud pool list command to view all CloudPools and their
associated IDs.
Example
The following command displays information about a CloudPool named my_azure_pool.
Syntax
isi cloud proxies create <name> <host> <type> <port>
[--username <string>]
[--password <string>]
[--verbose]
Options
<name>
The name of the network proxy. This can be any alphanumeric string, but should be a simple, recognizable name.
<host>
The DNS name or IP address of the proxy server. For example, myproxy1.example.com or
192.168.107.107.
<type>
The proxy protocol type, one of socks_4, socks_5, or http.
<port>
The port number to communicate with the proxy server. The correct port number depends on the port opened
up on the proxy server for communication with CloudPools.
{--username | -u} <string>
The user name to authenticate with the SOCKS v5 or HTTP proxy server. Note that SOCKS v4 does not
support authentication.
{--password | -p} <string>
The password to authenticate with the SOCKS v5 or HTTP proxy server.
{--verbose | -v}
Displays more detailed information.
Syntax
isi cloud proxies delete <name>
[--force]
[--verbose]
Options
<name>
The unique id or name of the network proxy. You can use the isi cloud proxies list command to
display the names of proxies.
{--force | -f}
Enables the proxy deletion to proceed without confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following example deletes a network proxy named myproxy1:
When you run the command, OneFS displays the following message and requires confirmation:
Are you sure? (yes/[no]):
To proceed, type yes, and press ENTER. If the proxy is attached to a cloud storage account, OneFS displays the following message:
Cannot delete proxy while used by accounts
Syntax
isi cloud proxies list
[--limit <integer>]
[--sort {id | name | host | type | port}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Example
The following example creates a network proxy to use with CloudPools:
Syntax
isi cloud proxies modify <name>
[--name <string>]
[--host <string>]
[--type {socks_4 | socks_5 | http}]
[--port <integer>]
[--username <string>]
[--clear-username]
[--password <string>]
[--clear-password]
[--verbose]
Options
<name>
The current name of the network proxy.
{--name | -n} <string>
The new name of the network proxy. This can be any alphanumeric string, but should be a simple, recognizable
name.
--host <string>
Examples
The following example modifies a network proxy in CloudPools:
Syntax
isi cloud proxies view <name>
Options
<name>
Specifies the id or name of the network proxy to view. You can use the isi cloud proxies list
command to display a list of the available proxies.
Example
The following example displays the details of a network proxy named myproxy1:
Syntax
isi cloud recall <files>
[--begin-filter] <criteria> [--end-filter]
[--recursive {yes | no}]
[--verbose]
You can also provide a file matching filter to specify a set of files to act on. The basic syntax follows. For a full description on file matching
criteria, use man isi-file-matching on the command line.
Options
<files>
The files to recall. For multiple specifications, use --files for each additional file name entry.
[--begin-filter] <criteria> [--end-filter]
A file matching filter that defines a set of files to act on. For a description of <criteria> and valid operators to use
in the filter, enter man isi-file-matching on the command line.
{--recursive | -r} {yes | no}
Specifies whether the recall should apply recursively to nested subdirectories.
{--verbose | -v}
Displays more detailed information about the operation.
Usage
The isi cloud recall command restores the full file to its original directory, and overwrites the associated SmartLink file. If the file
pool policy that originally archived the file to the cloud is still in effect, the next time the SmartPools job runs, the recalled file is archived to
the cloud again. If you do not want the recalled file to be re-archived, you can move the file to a different directory that would not be
affected by the file pool policy, or you can modify or delete the policy.
Examples
The following example recalls all files from the cloud for a directory and its subdirectories:
The command starts a cloud job. If you use the --verbose parameter, OneFS reports the job number, as in the following example:
Created job [29]
You can use the isi cloud jobs view command with the job number to see information about the job.
Usage
WARNING: Do not execute this command unless instructed to do so by Isilon Technical Support.
Syntax
isi cloud restore_coi
[--accounts <string>]
[--expiration-date <timestamp>]
[--verbose]
Options
--accounts <string>...
The name of the cloud storage account whose COI you intend to restore. By restoring the COI, you enable
OneFS to not only read data from the cloud, but also to write data to the cloud.
Use an additional --accounts parameter for each additional cloud account.
--expiration-date <timestamp>
The expiration date for orphaned cloud data objects.
{--verbose | -v}
Displays more detailed information about the operation.
Example
The following example restores the COI for a cloud storage account:
Syntax
isi cloud settings modify
[--default-accessibility {cached | no-cache}]
[--default-cache-expiration <duration>]
[--default-compression-enabled {yes | no}]
[--default-data-retention <duration>]
[--default-encryption-enabled {yes | no}]
[--default-full-backup-retention <duration>]
[--default-incremental-backup-retention <duration>]
[--default-read-ahead <string>]
[--default-writeback-frequency <duration>]
[--verbose]
Example
The following example modifies several of the default CloudPools settings:
Syntax
isi cloud settings regenerate-encryption-key
[--verbose]
Syntax
isi cloud settings view
Options
There are no options for this command.
Example
The following example shows sample output. Explanations of the displayed properties are included in the descriptions for isi cloud settings
modify on page 162.
Syntax
isi cluster atime modify
[--enabled <boolean>]
[--precision <integer>]
[--verbose]
Options
--enabled {yes | Specifies whether the access time grace period is enabled.
no}
--precision The amount of time between file access time updates, in seconds.
<integer>
{--verbose | -v} Displays more detailed information.
Syntax
isi cluster atime view
Options
None
OneFS displays whether cluster access time grace periods are enabled, and the prevision interval, in seconds.
Syntax
isi cluster contact modify
[--company <string>]
[--location <string>]
[--primary-name <string>]
[--primary-email <string>]
[--primary-phone1 <string>]
[--primary-phone2 <string>]
[--secondary-name <string>]
[--secondary-email <string>]
[--secondary-phone1 <string>]
[--secondary-phone2 <string>]
[--verbose]
Options
{--company | -c} The company name for the cluster contact information.
{--location | - The company location for the cluster contact information.
o}
{--primary- The name of the primary administration contact.
name | -n}
{--primary- The email address for the primary administration contact.
email | -e}
{--primary- The main phone number for the primary administration contact.
phone1 | -p}
{--primary- Alternate phone number for the primary administration contact.
phone2 | -P}
{--secondary- The name of the secondary administration contact.
name | -N}
{--secondary- The email address for the secondary administration contact.
email | -E}
{--secondary- The main phone number for the secondary administration contact.
phone1 | -s}
Syntax
isi cluster contact view
[--format (list | json]
Options
--format (list | Display cluster contacts in list or JSON format.
json)
Syntax
isi cluster encoding list
Options
None
Syntax
isi cluster encoding modify <current-encoding>
[--verbose]
Options
<current- Enter the supported character encoding selection
encoding>
{--verbose | -v} Displays more detailed information.
Syntax
isi cluster encoding view
Options
None
Syntax
isi cluster identity modify
[--description <string>]
[--motd <string>]
[--motd-header <string>]
[--name <string>]
[--verbose]
Options
{--description Text description of the cluster.
| -d}
{--motd | -m} The cluster message of the day.
{--motd-header The cluster message of the day header text.
| -M}
{--name | -n} The cluster name specified at installation.
{--verbose | -v} Displays more detailed information.
Syntax
isi cluster identity view
[--format (list | json]
OneFS displays the cluster name, description, and message of the day.
Syntax
isi cluster internal-networks modify
[--int-a-ip-addresses <ip_address_range>]
[--int-b-ip-addresses <ip_address_range>]
[--failover-ip-addresses <ip_address_range>]
[--failover-status <boolean>]
[--int-a-prefix-length <integer>]
[--int-b-prefix-length <integer>]
Options
--int-a-ip- The IP address range for the int-a network interface. To specify an IP address range, enter two IP addresses
addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_rang
e>
--int-b-ip- The IP address range for the int-b network interface. To specify an IP address range, enter two IP addresses
addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_rang
e>
--failover-ip- The IP address range for the failover network interface. To specify an IP address range, enter two IP addresses
addresses separated by a hyphen (-), such as 10.7.0.0-10.7.255.255.
<ip_address_rang
e>
--failover- The status of the int-b network interface.
status (enabled
| disabled)
--int-a- The prefix size for the int-a network interface.
prefix-length
<integer>
--int-b- The prefix size for the int-b network interface.
prefix-length
<integer>
Syntax
isi cluster internal-networks view
Syntax
isi cluster join-mode modify <mode>
Options
<mode> (secure | Set the cluster join mode to secure or manual.
manual)
Syntax
isi cluster join-mode view
Options
None
Syntax
isi cluster lnnset modify <lnns>
Options
<lnns> The logical node names (LNNs) to be modified. Specify the current LNN and then the desired new LNN,
separated by a hyphen (-). The new LNN must not currently be in use. For example, to rename the node with the
current LNN from 1 to 9, enter:
Syntax
isi cluster lnnset view
[--lnn <integer>]
Options
--lnn <integer> Specify a LNN to view information about only that LNN.
OneFS displays LNN names and their associated device IDs and IP addresses.
NOTE: To perform a rolling reboot, run the isi upgrade rolling-reboot command.
Syntax
isi cluster reboot
[--node-lnn <string>
Options
--node-lnn The LNN of the node to reboot, or all to reboot all nodes. If omitted, OneFS selects the local node.
<string>
Syntax
isi cluster shutdown
[--node-lnn <string>
Options
--node-lnn The LNN of the node to shut down, or all to shut down all nodes. If omitted, OneFS selects the local node.
<string>
Syntax
isi cluster time modify <time>
Options
<time> The date and time in yyyy-mm-ddThh:mm:ss format.
Syntax
isi cluster time view
Options
None
Syntax
isi cluster time timezone modify
[--abbreviation <string>]
[--path <string>]
[--force]
[--verbose]
Options
NOTE: If you wish to use an interactive time zone selection tool, do not enter values for --abbreviation or --path.
{-- An abbreviation for the cluster time zone, such as PDT for United States Pacific Daylight Time. Do not enter a
abbreviation | - value if you wish to use the interactive time zone selector.
a} <string>
{--path | -p} A time zone hierarchical path, such as America/Los_Angeles for United States Pacific Daylight Time (PDT).
<string> Do not enter a value if you wish to use the interactive time zone selector.
{--force | -f} Do not prompt for confirmation of any modifications.
{--verbose | -v} Display more detailed information.
Syntax
isi cluster time timezone view
Options
None
Syntax
isi compression stats list
[--begin <integer>]
[--end <integer>]
[--resolution <integer>]
[--pretty-time]
[--local]
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
--begin <time>
Specifies begin time in UNIX Epoch timestamp format.
--end <time>
Specifies end time in UNIX Epoch timestamp format.
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--pretty-time
Displays the timestamp as a readable string.
--local
Show statistics for the local node only.
{--limit | -l} <integer>
Limits the number of compression statistics to display.
--format (table | json | csv | list )
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), or list format.
{--noheader | -a}
Displays data without headers.
{ --no-footer | -z}
Syntax
isi compression stats view
[--resolution <integer>]
[--local]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--local
Shows statistics for the local node only.
{--help | -h}
Displays help for this command.
Syntax
isi compression settings modify
[--enabled <boolean>]
[{--verbose | -v}]
[{--help | -h}]
Options
--enabled <boolean>
Determines whether data compression is enabled or disable.
This setting only applies for data that resides on compatible hardware (i.e. F810).
{--verbose | -v}
Displays more detailed information.
{--help | -h}
Displays help for this command.
Syntax
isi compression settings view
isi config
Opens a new prompt where node and cluster settings can be altered.
The command-line prompt changes to indicate that you are in the isi config subsystem. While you are in the isi config
subsystem, other OneFS commands are unavailable and only isi config commands are valid.
Syntax
isi config
NOTE:
• The following commands are not recognized unless you are currently at the isi config command prompt.
• Changes are not applied until you run the commit command.
• Some commands require you to restart the cluster.
Commands
changes
Displays a list of changes to the configuration that have not been committed.
commit
Commits configuration settings and then exits isi config.
date <time-and-date>
Displays or sets the current date and time on the cluster.
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
h Specifies hours
s Specifies seconds
exit
Exits the isi config subsystem.
help
Displays a list of all isi config commands. For information about specific commands, the syntax is help
[<command>].
interface <interface-name> {enable | disable}
The interface command displays the IP ranges, netmask, and MTU and enables or disables internal interfaces.
When issued with no argument, this command displays IP ranges, netmask, and MTU of all interfaces. When
issued with an <interface-name> argument, this command displays IP ranges, netmask, and MTU for only the
specified interface.
manual Configures the cluster so that joins can be initiated by either the node or the cluster.
secure Configures the cluster so that joins can be initiated by only the cluster.
<interface-name> Specifies the name of the interface as int-a, int-b, and failover.
<old-ip-range> Specifies the range of IP addresses that can no longer be assigned to nodes. If
unspecified, all existing IP ranges are removed before the new IP range is added. Specify
in the form of <lowest-ip>-<highest-ip>.
<new-ip-range> Specifies the range of IP addresses that can be assigned to nodes. Specify in the form
of <lowest-ip>-<highest-ip>.
-n <netmask> Specifies a new netmask for the interface.
NOTE: If more than one node is given a new IP address, the cluster reboots when the change is
committed. If only one node is given a new IP address, only that node is rebooted.
mtu [<value>]
Displays the size of the maximum transmission unit (MTU) that the cluster uses for internal network
communications when run with no arguments. Sets a new size of the MTU value, when specified. This command
is for the internal network only.
NOTE: This command is not valid for clusters with an InfiniBand back end.
<value> Specifies the new size of the MTU value. Any value is valid, but not all values may be
compatible with your network. The most common settings are 1500 for standard frames
and 9000 for jumbo frames.
name [<new_name>]
Displays the names currently assigned to clusters when run with no arguments. Assigns new names to clusters,
as specified.
<interface-name> Specifies the name of the interface. Valid names are int-a and int-b.
<ip-mask> Specifies the new IP mask for the interface.
quit
Exits the isi config subsystem.
reboot [{<node_lnn> | all}]
Reboots one or more nodes, specified by LNN. If no nodes are specified, reboots the node from which the
command is run. To reboot the cluster, specify all.
NOTE: If run on an unconfigured node, this command does not accept any arguments.
remove
Deprecated. Instead, run the isi devices -a smartfail command.
shutdown [{<node_lnn> | all}]
Shuts down one or more nodes, specified by LNN. If no nodes are specified, shuts down the node from which
the command is run. To shut down the cluster, specify all.
NOTE: If run on an unconfigured node, this command does not accept any arguments.
status [advanced]
Displays current information on the status of the cluster. To display additional information, including device
health, specify advanced.
timezone [<timezone identifier>]
Displays the current time zone or specifies new time zones. Specifies the new timezone for the cluster as one of
the following values:
version
Displays information about the current OneFS version.
wizard
Activates a wizard on unconfigured nodes and reactivates the wizard if you exit it during the initial node
configuration process. The wizard prompts you through the node-configuration steps.
Topics:
• isi dedupe inline settings modify
• isi dedupe inline settings view
• isi dedupe reports list
• isi dedupe reports view
• isi dedupe settings modify
• isi dedupe settings view
• isi dedupe stats
• isi devices add
• isi devices config modify
• isi devices config view
• isi devices drive add
• isi devices drive firmware list
• isi devices drive firmware update list
• isi devices drive firmware update start
• isi devices drive firmware update view
• isi devices drive firmware view
• isi devices format
• isi devices list
• isi devices node add
• isi devices node list
• isi devices node smartfail
• isi devices node stopfail
• isi devices purpose
• isi devices purposelist
• isi devices smartfail
• isi devices stopfail
• isi devices suspend
• isi devices view
• isi diagnostics gather settings modify
• isi diagnostics gather settings view
• isi diagnostics gather start
• isi diagnostics gather status
• isi diagnostics gather stop
• isi diagnostics netlogger settings modify
• isi diagnostics netlogger settings view
• isi diagnostics netlogger start
• isi diagnostics netlogger status
• isi diagnostics netlogger stop
• isi email settings modify
• isi email settings view
• isi esrs modify
• isi esrs view
• isi esrs dataitems list
• isi esrs dataitems modify
• isi esrs download list
• isi esrs download start
Syntax
isi dedupe inline settings modify
[--mode ] enabled | assess | paused | disabled]
[{--verbose | --v}]
Options
mode
Set the specified inline data deduplication mode. Mode settings are cluster-wide.
• enabled turns on inline data deduplication.
• assess allows you to assess the potential space savings from inline data deduplication.
• paused deactivates inline data deduplication but leaves the index table intact.
• disabled deactivate inline data deduplication and de-allocates the index table.
{--verbose | -v}
Displays more detailed information.
Examples
The following command enables inline data deduplication in assessment mode:
Syntax
isi dedupe settings view
Options
There are no options for this command.
Syntax
isi dedupe reports list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of storage space
consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of deduplication reports, run the following command:
Syntax
isi dedupe reports view <job-id>
Examples
The following command displays a deduplication job:
Syntax
isi dedupe settings modify
[{[--paths <path>]... | --clear-paths}]
[--add-paths <path>]...
[--remove-paths <path>]...
[{[--assess-paths <path>]... | --clear-assess-paths]
[--add-assess-paths <path>]...
[--remove-assess-paths <path>]...
[--verbose]
Examples
The following command starts deduplicating /ifs/data/active and /ifs/data/media:
Syntax
isi dedupe settings view
Options
There are no options for this command.
Syntax
isi dedupe stats
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of storage space
consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Examples
To view information about deduplication space savings, run the following command:
NOTE: You can add available nodes to a cluster by running the command isi devices node add.
Syntax
isi devices add {<bay> | all}
[--sled <string>
[--node-lnn <integer>]
Options
{<bay> | all }
Specifies the bay number that contains the drive to be added to the node. You can specify all to scan the
entire node.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
--node-lnn <integer>
Specifies the node number to scan for new drives. If omitted, the local node will be scanned.
{--force | -f}
Adds the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices config modify
[--automatic-replacement-recognition {yes | no}]
[--instant-secure-erase {yes | no}]
[--node-lnn {all | <string>}]
[--verbose]
Options
--automatic-replacement-recognition {yes | no}
Changes the ARR status for a cluster or specific node. A value of yes will enable ARR, a value of no will disable
ARR.
--instant-secure-erase {yes | no}
Enable or disable the Instant Secure Erase (ISE) feature on the device. A value of yes will enable ISE, a value of
no will disable ISE.
--node-lnn {all | <string>}
Specifies the node LNN for which to modify the device configuration. You can specify all to modify
configuration of all nodes. If omitted, all nodes will be modified.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices config view
[--node-lnn {all | <string>}]
Options
--node-lnn {all | <string>}
Specifies the node you want to view. You may specify all nodes. If omitted, ARR status for the local node is
displayed.
Syntax
isi devices drive add {<bay> | --sled <string>}
[--node-lnn <integer>]
[--force]
[--verbose]
Options
{<bay> | all}
Specifies the bay number that contains the drive to be added to the node. You can specify all to scan the
entire node.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
--node-lnn <integer>
Specifies the node number to scan for new drives. If omitted, the local node will be scanned.
{--force | -f}
Adds the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware list
[--node-lnn <string>]
[--sled <string> ]
[{--summary | -s}]
Options
--node-lnn {all | <integer>}
Specifies the node number of the drives you would like to display firmware information for. You may specify all
nodes. If omitted, only the drive firmware information for the local node will be displayed.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
{--override | -v}
Uses the legacy node designations instead of the grid XY values.
{ --summary | -s}
Displays a summary of drive firmware counts by model and revision.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware update list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware update start <bay>
[--node-lnn <integer>]
[--force]
[--verbose]
Options
{<bay> | all}
Specifies the bay number that contains the drive to be updated. You can specify all to update every drive in
the node.
--node-lnn <integer>
Specifies the node number on which to update drives. If omitted, drives will be updated in the local node.
{--force | -f}
Updates the drive or drives without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices drive firmware update view
[--node-lnn <integer>]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that is running the firmware update you want to view. If
omitted, firmware update status for the local node will be displayed.
Syntax
isi devices drive firmware view {<bay> | --lnum <integer>}
[--node-lnn <integer>]
Options
{<bay> | --lnum <integer>}
Syntax
isi devices format {<bay> | --sled <string>}
[--node-lnn <integer>]
[--purpose <string>]
[--force | -f]
Options
<bay>
Specifies the bay number that contains the drive to be formatted.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to format. If omitted, the
specified drive in the local node will be formatted.
--purpose <string>
Specifies the purpose to assign to the new drive. You can view a list of the possible drive purposes by running
isi devices drive purposelist. If omitted, OneFS will automatically assign the drive purpose.
{--force | -f}
Formats the drive without asking for confirmation.
NOTE: You can display nodes that are available to join the cluster by running the command isi devices node list.
Syntax
isi devices list
[--node-lnn <string>]
[--sled <string>]
[--override]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--node-lnn {all | <integer>}
Syntax
isi devices node add <serial-number>
[--force]
Options
<serial-number>
Specifies the serial number of the node you want to add to the cluster.
{--force | -f}
Adds the node to the cluster without asking for confirmation.
Syntax
isi devices node list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Syntax
isi devices node smartfail
[--node-lnn <integer>]
[--force]
[--verbose]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to smartfail. If omitted, the local node will be
smartfailed.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices node stopfail
[--node-lnn <integer>]
[--force]
[--verbose]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to discontinue smartfailing. If omitted, the
local node will discontinue smartfailing.
{--force | -f}
Discontinues smartfailing the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices purpose {<bay> | --lnum <integer>}
[--node-lnn <integer>]
[--purpose <string>]
[--force | -f]
[--verbose | -v]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to assign.
--purpose <string>
Specifies the purpose to assign to the drive. You can view a list of the possible drive purposes by running isi
devices drive purposelist.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to assign. If omitted, the
specified drive in the local node will be assigned.
{--force | -f}
Formats the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices purposelist
[--node-lnn <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that you want to view the purpose list for. If omitted, the
purpose list of the local node will display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
NOTE: You can smartfail a node by running the command isi devices node smartfail.
Syntax
isi devices smartfail {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to smartfail.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to smartfail. If omitted,
the specified drive in the local node will be smartfailed.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
NOTE: You can discontinue the smartfail process on a node by running the command isi devices node stopfail.
Syntax
isi devices stopfail {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to discontinue smartfailing.
--sled <string>
Specifies the prefix for the location of the sled of drives on which to operate. Must be one of [A | B | C |
D | E].
--node-lnn <integer>
Syntax
isi devices suspend {<bay> | --lnum <integer> | --sled <string>}
[--node-lnn <integer>]
[{--force | -f}]
[{--verbose | -v}]
Options
{<bay> | --lnum <integer> | --sled <string>}
Specifies the bay number or LNUM (logical drive number), or prefix for the location of the sled drive(s) to
suspend. The --sled<string> must be one of [A | B | C | D | E].
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to suspend. If omitted,
the specified drive in the local node will be suspended.
{--force | -f}
Smartfails the drive without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi devices view {<bay> | --lnum <integer>}
[--node-lnn <integer>]
Options
{<bay> | --lnum <integer>}
Specifies the bay number or LNUM (logical drive number) of the drive to view.
--node-lnn <integer>
Specifies the LNN (logical node number) of the node that contains the drive you want to view. If omitted, the
drive in the local node will be displayed.
Syntax
isi diagnostics gather settings modify
[--upload {enable | disable}]
[--esrs {enable | disable}]
[--gather-mode {incremental | full}]
[--http-upload {enable | disable}]
[--http-upload-host <host>]
[--http-upload-path <path>]
[--http-upload-proxy <host>]
[--http-upload-proxy-port <port>]
[--ftp-upload {enable | disable}]
[--ftp-upload-host <host>]
[--ftp-upload-path <path>]
[--ftp-upload-proxy <host>]
[--ftp-upload-proxy-port <port>]
[--ftp-upload-user <username>]
[--ftp-upload-pass <password>]
[--set-ftp-upload-pass]
[--verbose]
Options
--upload {enable | disable}
Enables the upload of gathered logs
--esrs {enable | disable}
Specifies EMC Secure Remote Services (ESRS) for log uploads.
--gather-mode {incremental | full}
Specifies whether you will start an incremental or full gather of logs.
--http-upload {enable | disable}
Specifies HTTP for log uploads.
--http-upload-host <host>
Specifies the HTTP site for upload.
--http-upload-path <path>
Specifies the HTTP upload directory.
--http-upload-proxy <host>
Specifies an HTTP proxy server.
--http-upload-proxy-port <port>
Specifies the HTTP proxy server port.
--ftp-upload {enable | disable}
Specifies FTP for log uploads.
--ftp-upload-host <host>
Specifies the FTP site for upload.
--ftp-upload-path <path>
Specifies the FTP upload directory.
--ftp-upload-proxy <host>
Specifies an FTP proxy server.
--ftp-upload-proxy-port <port>
Specifies the FTP proxy server port.
Syntax
isi diagnostics gather settings view
Options
This command has no options.
Syntax
isi diagnostics gather start
[--upload {enable | disable}]
[--esrs {enable | disable}]
[--gather-mode {incremental | full}]
[--http-upload {enable | disable}]
[--http-upload-host <host>]
[--http-upload-path <path>]
[--http-upload-proxy <host>]
[--http-upload-proxy-port <port>]
[--ftp-upload {enable | disable}]
[--ftp-upload-host <host>]
[--ftp-upload-path <path>]
[--ftp-upload-proxy <host>]
[--ftp-upload-proxy-port <port>]
[--ftp-upload-user <username>]
[--ftp-upload-pass <password>]
[--set-ftp-upload-pass]
Options
--upload {enable | disable}
Enables the upload of gathered logs
--esrs {enable | disable}
Specifies EMC Secure Remote Services (ESRS) for log uploads.
--gather-mode {incremental | full}
Syntax
isi diagnostics gather status
Options
This command has no options.
Syntax
isi diagnostics gather stop
Syntax
isi diagnostics netlogger settings modify
[--interfaces <interface>]
[--count <integer>]
[--duration <duration>]
[--snaplength <bytes>]
[--nodelist <LNN>]
[--clients <IP>]
[--ports <string>]
[--protocols {ip | ip6 | arp | tcp | udp}]
[--verbose]
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes. The default value is three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format <integer>{Y|M|W|D|H|m|s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is 64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number (LNN). Multiple values can be
specified in a comma-separated list, for example, --nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified in a comma-separated list. The
default value is all.
--ports <port>
Specifies TCP or UDP ports to report statistics on. Multiple ports can be specified in a comma-separated list.
The default value is all.
--protocols {ip | ip6 | arp | tcp | udp}
Specifies a protocol to report statistics on.
{--verbose | -v}
Displays more detailed information.
Syntax
isi diagnostics netlogger settings view
Options
This command has no options.
Syntax
isi diagnostics netlogger start
[--interfaces <interface>]
[--count <integer>]
[--duration <duration>]
[--snaplength <bytes>]
[--nodelist <LNN>]
[--clients <IP>]
[--ports <string>]
[--protocols {ip | ip6 | arp | tcp | udp}]
Options
--interfaces <interface>
Specifies the network interface on which to capture traffic.
--count <integer>
Specifies the number of capture files that you will keep after the capture finishes. The default value is three files.
--duration <duration>
Specifies how long you will capture IP traffic for each capture file, in the format <integer>{Y|M|W|D|H|m|s}
--snaplength <bytes>
The snap length for the capture. Default is 320 bytes. Valid range for this value is 64-9100.
--nodelist <nodes>
Specifies nodes to report statistics on. Specify nodes by Logical Node Number (LNN). Multiple values can be
specified in a comma-separated list, for example, --nodes 1,2. The default value is all.
--clients <clients>
Specifies client IPs to report statistics on. Multiple IP addresses can be specified in a comma-separated list. The
default value is all.
--ports <port>
Specifies TCP or UDP ports to report statistics on. Multiple ports can be specified in a comma-separated list.
The default value is all.
--protocols {ip | ip6 | arp | tcp | udp}
Specifies a protocol to report statistics on.
Syntax
isi diagnostics netlogger status
Options
This command has no options.
Syntax
isi diagnostics netlogger stop
Options
This command has no options.
Syntax
isi email settings modify
[--mail-relay <string>]
[--smtp-port <integer>]
[--mail-sender <string>]
[--mail-subject <string>]
[--use-smtp-auth {yes | no}]
[--smtp-auth-username <string>]
[--use-encryption {yes | no}]
[--batch-mode {all | severity | category | none}]
[--user-template <string>]
[--clear-user-template]
[--smtp-auth-passwd <string>]
[--clear-smtp-auth-passwd]
[--set-smtp-auth-passwd]
[--verbose]
Options
--mail-relay <string>
Sets the SMTP relay address.
--smtp-port <integer>
Sets the SMTP port. The default is 25.
Syntax
isi email settings view
Example
To view the currently-configured email settings, run the following command:
Syntax
isi esrs modify
[--enabled <boolean>]
[--username <string>]
[--password <string>]
[--force]
[--primary-esrs-gateway <string>]
[--secondary-esrs-gateway <string>]
[--alert-on-disconnect <boolean>]
[--gateway-access-pools <string> (--clear-gateway-access-pools | --add-gateway-access-pools
<string> | --remove-gateway-access-pools <string>)]
[--connectivity-check-period <integer>]
[--ui-reporting-period <integer>]
[--download-enabled <boolean>]
[--download-timeout-period <integer>]
[--download-error-retries <integer>]
[--download-chunk-size <integer>]
[--download-filesystem-limit <integer>
Options
--enabled (yes | Enables or disables ESRS. The default is no.
no)
--username The Dell EMC user name for technical assistance.
<string>
--password The password associated with the Dell EMC user name.
<string>
--force Forces ESRS de-provisioning when communication with ESRS or the ESRS gateway are not available.
--primary- The host name or IP address of the primary ESRS gateway.
esrs-gateway
<string>
--secondary- The host name or IP address of the secondary ESRS gateway.
esrs-gateway
<string>
--alert-on- Generate a CELOG alert if on-cluster ESRS is disconnected from the ESRS gateway.
disconnect (yes
| no)
--gateway- A list of the pools available to access ESRS gateways.
access-pools
<string> (-- --clear- Clear the list of pool IDs.
clear-gateway- gateway-
access-pools | access-pools
--add-gateway- --add-gateway- Add items to the list of pool identifiers. Use this option multiple times for additional pools.
access-pools access-pools
<string> | -- <string>
remove-
gateway- --remove- Remove items from the list of pool identifiers. Use this option multiple times for additional
access-pools gateway- pools.
<string>) access-pools
<string>
Syntax
isi esrs view
Options
None
OneFS displays ESRS configuration and gateway setting information for the cluster.
Syntax
isi esrs dataitems list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
OneFS displays a list of ESRS data items, whether items are enabled, the frequency items are generated, and most recent timestamp.
Syntax
isi esrs dataitems modify
[--dataitems-enabled <boolean>]
[--name <string>]
[--enabled <boolean>]
[--frequency <duration>]
[--timestamp-delete]
Options
--dataitems- Enables or disables ESRS data items. The default is enabled.
enabled
<boolean>
--name <string> The name of an ESRS data item.
--enabled Enables or disables an ESRS data item.
<boolean>
--frequency Establishes how often an ESRS data item is generated.
<duration>
--timestamp- Resets the last run timestamp for a selected ESRS data item to zero.
delete
Syntax
isi esrs download list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
Options
{--limit | -l} The number of ESRS downloads to display.
<integer>
--format (table Displays ESRS data items in table, JSON, CSV, or list format.
| json | csv |
list)
{--no-header | - Do not display headers in table or CSV formats.
a}
{--no-footer | - Do not display table summary footer information.
z}
{--verbose | -v} Display more detailed information.
Syntax
isi esrs download start <file> <path>
Options
<file> The file name as displayed in the ESRS file locker.
<path> The path in which the file will be placed after successful download.
Syntax
isi esrs download view <file>
Options
<file> The name of the file as displayed in the ESRS file locker.
Syntax
isi esrs telemetry modify
[--enabled (yes | no)]
Options
--enabled (yes | Enables or disables the ESRS telemetry upload feature. This option is enabled by default.
no)
Syntax
isi esrs telemetry view
Options
None
OneFS displays whether ESRS telemetry is enabled and the number of pending uploads.
Syntax
isi event alerts create <name> <condition> channel
[--category <string>]
[--eventgroup <string>]
[--severity {emergency | critical | warning | information}]
[--limit <integer>]
[--interval <duration>]
[--transient <duration>]
[--verbose]
Options
<name>
Specifies the alert name.
<condition>
Specifies the condition under which alert is sent.
Condition values are case sensitive. The following values are valid:
<channel> ...
Specifies the channel over which to deliver the alert. Use the --channel parameter to specify additional
channels.
--category <string>...
Specifies the name of one or more event group categories to alert on.
--eventgroup <string>...
Specifies the name of one or more event groups to alert on.
--severity {emergency | critical | warning | information}
Specifies the event severity that the alert will report on. Severity values are case sensitive. Repeat --
severity to make the alert report on additional severity levels.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the NEW_EVENTS alert condition.
--interval <integer> <time>
Sets the time period between reports for ongoing alerts. Applies only to the ONGOING alert condition.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts delete <name>
[--force | -f]
[--verbose | -v]
Options
<name>
Specifies the name of the alert you want to delete.
{--force | -f}
Deletes the alert without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts list
[--channel | -c <string>]
[--limit | -l <integer>]
[--sort {name | eventgroup | category | channel | condition | limit |
interval | transient}]
[--descending | -d]
[--format {table | json | csv | list}]
[--no-header | -a]
[--no-footer | -z]
[--verbose | -v]
Options
{--channel | -c} <string>...
Displays alerts for the specified channel only.
{--limit | -l} <integer>
Sets the maximum number of alerts to display.
--sort {name | eventgroup | category | channel | condition | limit | interval | transient}
Specifies the field to sort items by.
{--descending | -d}
Sorts the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Syntax
isi event alerts modify <name>
[--eventgroup <string>]
[--clear-eventgroup]
[--add-eventgroup <string>]
[--remove-eventgroup <string>]
[--category <string>]
[--clear-category]
[--add-category <string>]
[--remove-category <string>]
[--channel | -c <string>]
[--clear-channel]
[--add-channel <string>]
[--remove-channel <string>]
[--severity {emergency | critical | warning | information}]
[--clear-severity]
[--add-severity {emergency | critical | warning | information}]
[--remove-severity {emergency | critical | warning | information}]
[--condition {NEW | NEW_EVENTS | ONGOING | SEVERITY_INCREASE
| SEVERITY_DECREASE | RESOLVED}]
[--limit <integer>]
[--interval <integer> <time>]
[--transient <integer> <time>]
[--verbose]
Options
<name>
Specifies the name of the alert you want to modify.
--eventgroup <string>...
Specifies the name of one or more event groups to alert on.
--clear-eventgroup
Clears the value for an event group to alert on.
--add-eventgroup <string>...
Adds the name of one or more event groups to alert on.
--remove-eventgroup <string>...
Removes the name of one or more event groups to alert on.
--category <string>...
Specifies the name of one or more event group categories to alert on.
--clear-category
Clears the value for an event group category to alert on.
--add-category <string>...
Adds the name of one or more event group categories to alert on.
--remove-category <string>...
Removes the name of one or more event group categories to alert on.
{--channel | -c} <string>...
Specifies the name of one or more channels to deliver the alert over.
NEW Reports on event group occurrences that have never been reported on before.
NEW_EVENTS Reports on event group occurrences that are new since the event group was last
reported on.
ONGOING Provides periodic reports on event group occurrences that have not been resolved.
SEVERITY_INCRE Reports on event group occurrences whose severity has increased since the event
ASE group was last reported on.
SEVERITY_DECRE Reports on event group occurrences whose severity has decreased since the event
ASE group was last reported on.
RESOLVED Reports on event group occurrences that have been resolved since the event group was
last reported on.
--limit <integer>
Sets the maximum number of alerts that can be sent. Applies only to the NEW_EVENTS alert condition.
--interval <integer> <time>
Sets the time period between reports for ongoing alerts. Applies only to the ONGOING alert condition.
The following <time> values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
{--verbose | -v}
Displays more detailed information.
Syntax
isi event alerts view <name>
Options
<name>
Specifies the name of the alert condition.
Syntax
isi event channels create <name> <type>
[--enabled {true | false}]
[--allowed-nodes <integer>]
[--excluded-nodes <integer>]
[--address <string>]
[--send-as <string>]
[--subject <string>]
[--smtp-host <string>]
[--smtp-port <integer>]
[--smtp-use-auth <boolean>]
[--smtp-username <string>]
[--smtp-password <string>]
[--smtp-security {STARTTLS | NONE}]
[--batch {NONE | ALL | CATEGORY | SEVERITY}]
[--batch-period <integer> <time>]
[--host <string>]
[--community <string>]
[--use-snmp-trap {true | false}]
[--snmp-use-v3 {true | false}]
[--snmp-security-name <string>]
[--snmp-security-level {noAuthNoPriv | authNoPriv | authPriv}]
[--snmp-auth-protocol {MD5 | SHA}]
[--snmp-auth-password <string>]
[--snmp-priv-protocol {AES | DES}]
[--snmp-priv-password <string>]
[--snmp-engine-id <string>]
[--verbose]
Y Specifies years
M Specifies months
W Specifies weeks
--host <string>
For SNMP channels only. Specifies the host name or address
--community <string>
For SNMP channels only. Specifies the community string.
--use-snmp-trap {true | false}
Specifies using snmptrap instead of snmpinform for this channel.
--snmp-use-v3 {true | false}
Specifies using version 3 traps for this channel.
--snmp-security-name <string>
Specifies the name for the version 3 user.
--snmp-security-level {noAuthNoPriv | authNoPriv | authPriv}
Specifies the SNMPv3 security level for this channel..
--snmp-auth-protocol {MD5 | SHA}
Specifies the SNMPv3 authentication algorithm to use for this channel.
--snmp-auth-password <string>
Specifies the SNMPv3 authentication password.
--snmp-priv-protocol {AES | DES}
Specifies the SNMPv3 encryption algorithm to use for this channel.
--snmp-priv-password <string>
Specifies the SNMPv3 encryption password.
--snmp-engine-id <string>
Specifies the SNMPv3 engine ID of the receiving trap daemon.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels delete <name>
[--force]
[--verbose]
Options
<name>
Specifies the name of the channel you want to delete.
{--force | -f}
Deletes the channel without asking for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels list
[--limit <integer>]
[--sort {id | name | type | enabled | allowed_nodes | excluded_nodes |
address | send_as | subject | smtp_host | smtp_port |
smtp_use_auth | smtp_username | smtp_password | smtp_security |
batch | batch_period | host | community}
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Sets the maximum number of channels to display.
--sort {id | name | type | enabled | allowed_nodes | excluded_nodes | address | send_as | subject |
smtp_host | smtp_port | smtp_use_auth | smtp_username | smtp_password | smtp_security | batch |
batch_period | host | community}
Specifies the field to sort items by.
{--descending | -d}
Sorts the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels <name>
[--type {smtp | snmp | connectemc}]
[--enabled {true | false}]
[--allowed-nodes <integer>]
[--clear-allowed-nodes]
[--add-allowed-nodes <integer>]
[--remove-allowed-nodes <integer>]
[--excluded-nodes <integer>]
[--clear-excluded-nodes]
[--add-excluded-nodes <integer>]
[--remove-excluded-nodes <integer>]
[--address <string>]
Options
<name>
Specifies the name of the channel you want to modify.
<type>
Specifies the mechanism by which alerts are sent.
Type values are case sensitive. The following values are valid:
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--host <string>
For SNMP channels only. Specifies the host name or address
--community <string>
For SNMP channels only. Specifies the community string.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event channels view <name>
Options
<name>
Specifies the name of the channel you want to view.
Syntax
isi event events list
[--eventgroup-id <name>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--eventgroup-id <name>
Displays events that are included in the specified event group.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event events view <id>
Syntax
isi event groups bulk
[--ignore {true | false}]
[--resolved {true | false}]
[--verbose]
Options
--ignore {true | false}
Specifies whether all event groups have a status of ignored.
--resolved {true | false}
Specifies whether all event groups have a status of resolved.
After you resolve an event group, you cannot reverse that action. Any new events that would have been added
to the resolved event group will be added to a new event group.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event groups list
[--begin <timestamp>]
[--end <timestamp>]
[--resolved {true | false}]
[--ignore {true | false}]
[--events <integer>]
[--cause <string>]
[--limit <integer>]
[--sort {id | started | causes_long | last_event | ignore |
ignore_time | resolved | ended | events | severity}
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--begin | -b} <timestamp>
Filters the list to only show event groups that were created after the specified date and time.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
Filters the list to only show event groups that were created before the specified date and time.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
Syntax
isi event <id>
[--ignore {true | false}]
[--resolved {true | false}]
[--verbose]
Options
<id>
Specifies the ID number of the event group you want to modify.
--ignore {true | false}
Specifies whether the event group has a status of ignored.
Syntax
isi event groups view <id>
Options
<id>
Specifies the ID number of the event group you want to view.
Syntax
isi event settings modify
[--retention-days <integer>]
[--storage-limit <integer>]
[--maintenance-start <timestamp>]
[--clear-maintenance-start]
[--maintenance-duration <duration>]
[--heartbeat-interval <string>]
[--verbose]
Options
{--retention-days | -r} <integer>
Retention of resolved event group data in days.
{--storage-limit | -s} <integer>
Sets the amount of memory that event data can occupy on your cluster. You can set this limit to be between 1
and 100 megabytes of memory. For smaller clusters, the minimum amount of memory that will be set aside is 1
gigabyte.
--maintenance-start <timestamp>
Sets the start date and time of a maintenance window.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
--clear-maintenance-start
Clears the value for the start date and time of a maintenance window.
--maintenance-duration <integer> <time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
--heartbeat-interval <string>
Sets the interval between heartbeat events.
The following <time> values are valid:
• daily
• weekly
• monthly
{--verbose | -v}
Displays more detailed information.
Syntax
isi event settings view
Syntax
isi event test create <message>
[--verbose]
Options
<message>
Specifies the message text of the test alert.
{--verbose | -v}
Displays more detailed information.
Syntax
isi event types list
[--category <string>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--category <string>
Enter a OneFS event category. If you do not enter a category, OneFS displays all categories.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi fc settings list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--format {table | json | csv | list}
Displays Fibre Channel port settings in table, JSON, CSV, or list format.
{--no-header | -a}]
Does not display headers in table or CSV formats.
{--no-footer | -z}
Does not display table summary footer information.
Syntax
isi fc settings modify --port <port>
[--wwnn <string>]
[--wwpn <string>]
[--state {enable | disable}]
[--topology {auto | loop | ptp}]
[--rate {auto | 1 | 2 | 4 | 8}]
Options
--wwnn <string>
Specifies the world-wide node name (WWNN) of the port as a string of 16 hexadecimal numerals.
--wwpn <string>
Specifies the world-wide port name (WWPN) of the port as a string of 16 hexadecimal numerals.
--state {enable | disable}
Specifies whether the port is enabled or disabled.
--topology {auto | loop | ptp}
Specifies the type of Fibre Channel topology that the port expects. The following settings are valid:
auto Causes the port to detect the topology automatically. This is the recommended setting.
Specify this setting if you are using a fabric topology.
loop Causes the port to expect an arbitrated loop topology, with multiple backup devices
connected to a single port in a circular formation.
ptp Causes the port to expect a point-to-point topology, with one backup device or Fibre
Channel switch directly connected to the port.
--rate {auto | 1 | 2 | 4 | 8}
Specifies the rate that OneFS will attempt to send data through the port. The following rates are valid:
auto OneFS automatically negotiates with the DMA to determine the rate. This is the
recommended setting.
1 Attempts to send data through the port at a speed of 1 Gb per second.
2 Attempts to send data through the port at a speed of 2 Gb per second.
4 Attempts to send data through the port at a speed of 4 Gb per second.
8 Attempts to send data through the port at a speed of 8 Gb per second.
Syntax
isi fc settings view port
[--format {list | json}]
Options
<port>
A Fibre Channel port ID in the format <lnn>.<fc port>.
--format {list | json}
Displays the Fibre Channel port settings in list or JSON format.
Syntax
isi file-filter settings modify
[--file-filtering-enabled {yes | no}]
[--revert-file-filtering-enabled]
[--file-filter-extensions <string>...]
[--clear-file-filter-extensions]
[--add-file-filter-extensions <string>]
[--remove-file-filter-extensions <string>]
[--revert-file-filter-extensions]
[--file-filter-type {allow | deny}]
[--revert-file-filter-type
[--zone <string>]
[--verbose]
Options
--file-filtering-enabled {yes | no}
Enables or disables file filtering in the access zone. File filtering is disabled by default.
--revert-file-filtering-enabled
Sets the value of --file-filtering-enabled to the system default value.
--file-filter-extensions <string>...
Specifies a list of file types by their extensions. Each extension should start with a "." such as .txt. You can
specify multiple extensions in a comma-separated list or you run --file-filter-extensions for each
extension.
--clear-file-filter-extensions
Deletes the entire list of file filter extensions.
--add-file-filter-extensions <string>
Adds one or more file filter extensions to the list. Each extension should start with a "." such as .txt. You can
specify multiple extensions in a comma-separated list or you run --add-file-filter-extensions for
each extension.
--remove-file-filter-extensions <string>
Syntax
isi file-filter settings view
[--zone <string>]
[--format {list | json}]
Options
--zone
Specifies the name of the access zone. If you do not specifiy an access zone, the system will display the file
filtering settings of the System zone.
--format {list | json}
Specifies whether to display the output as a list (default) or in JavaScript Object Notation (JSON).
Syntax
isi filepool apply <path>
[--path]<path>
[--dont-restripe]
[--nop]
[--stats]
[--quiet]
[--recurse]
[--verbose]
Examples
These examples show the results of running isi filepool apply in verbose mode. In the examples, the output shows the results of
comparing the path specified with each file pool policy. The recurse option is set so that all files in the /ifs/data/projects path
are matched against all file pool policies. The first policy listed is always the system default policy. In this example, the second match is to
the file pool policy Technical Data.
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
{'default' :
{'Policy Number': -2,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':1, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 1,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
'system':
{'Policy Number': -1,
'Files matched': {'head':0, 'snapshot': 0},
'Directories matched': {'head':0, 'snapshot': 0},
'ADS containers matched': {'head':0, 'snapshot': 0},
'ADS streams matched': {'head':0, 'snapshot': 0},
'Access changes skipped': 0,
'Protection changes skipped': 0,
'File creation templates matched': 0,
'File data placed on HDDs': {'head':0, 'snapshot': 0},
'File data placed on SSDs': {'head':0, 'snapshot': 0},
},
Syntax
isi filepool default-policy modify
[--data-access-pattern {random | concurrency | streaming}]
[--set-requested-protection {default | +1 | +2:1 | +2 | +3:1 |
+3 | +4 | 2x | 3x | 4x | 5x | 6x |
7x | 8x}]
[--data-storage-target <string>]
[--data-ssd-strategy {metadata | metadata-write | data | avoid}]
[--snapshot-storage-target <string>]
[--snapshot-ssd-strategy {metadata | metadata-write | data | avoid}]
[--enable-coalescer {yes | no}]
[--cloud-pool <string>]
[--cloud-accessibility {cached | no-cache}]
[--cloud-cache-expiration <duration>]
[--cloud-compression-enabled {yes | no}]
[--cloud-data-retention <duration>]
[--cloud-encryption-enabled {yes | no}]
[--cloud-full-backup-retention <duration>]
[--cloud-incremental-backup-retention <duration>]
[--cloud-read-ahead <string>]
[--cloud-writeback-frequency <duration>]
[--cloud-archive-snapshot-files {yes | no}]
[--verbose]
Options
--data-access-pattern <string>
Specifies the preferred data access pattern, one of random, streaming, or concurrent.
--set-requested-protection <string>
Specifies the requested protection for files that match this filepool policy (for example, +2:1).
--data-storage-target <string>
Specifies the node pool or tier to which the policy moves files on the local cluster.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra mirror
of the file metadata is written to SSDs, if SSDs are available. The SSD mirror is in
addition to the number required to satisfy the requested protection. Enabling global
namespace acceleration (GNA) makes read acceleration available to files in node pools
that do not contain SSDs.
metadata-write Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to five times
more SSD storage than the Metadata setting. Enabling GNA does not affect read/
write acceleration.
data Uses SSD node pools for both data and metadata, regardless of whether global
namespace acceleration is enabled. This SSD strategy does not result in the creation of
additional mirrors beyond the normal requested protection but requires significantly more
storage space compared with the other SSD strategy options.
--snapshot-storage-target <integer>
Syntax
isi filepool default-policy view
Syntax
isi filepool policies create <name>
[--description <string>]
[--begin-filter{<predicate> <operator> <link>}...--end-filter]
[--apply-order <integer>]
[--data-access-pattern {random | concurrency | streaming}]
[--set-requested-protection {default | +1 | +2:1 | +2 | +3:1 | +3 | +4 | 2x | 3x | 4x | 5x |
6x | 7x | 8x}]
[--data-storage-target <string>]
[--data-ssd-strategy {metadata | metadata-write | data | avoid}]
[--snapshot-storage-target <string>]
[--snapshot-ssd-strategy {metadata | metadata-write | data | avoid}]
[--enable-coalescer {Yes | No}]
[--enable-packing {Yes | No}]
Options
<name>
Specifies the name of the file pool policy to create.
--begin-filter {<predicate> <operator> <link>}... --end-filter
Specifies the file-matching criteria that determine the files to be managed by the filepool policy.
Each file matching criterion consists of three parts:
• Predicate. Specifies what attribute(s) to filter on. You can filter by path, name, file type, timestamp, or
custom attribute, or use a combination of these attributes.
• Operator. Qualifies an attribute (for example, birth time) to describe a relationship to that attribute (for
example, before).
• Link - Combines attributes using AND and OR statements.
The following predicates are valid:
--size=<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--path=<pathname>
Selects files relative to the specified pathname.
--file-type= <value>
Selects only the specified file-system object type.
The following values are valid:
--operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
Link arguments can be used to specify multiple file-matching criteria. The following links are valid:
--and
Connects two file-matching criteria where files must match both criteria.
--or
Connects two file-matching criteria where files must match one or the other criteria.
--description <string>
Specifies a description of the filepool policy
--apply-order <integer>
Specifies the order index for execution of this policy.
--data-access-pattern <string>
Data access pattern random, streaming or concurrent.
--set-requested-protection <string>
Specifies a protection level for files that match this filepool policy (e.g., +3, +2:3, 8x).
--data-storage-target <string>
The name of the node pool or tier to which the policy moves files on the local cluster. If you do not specify a data
storage target, the default is anywhere.
--data-ssd-strategy <string>
Specifies how to use SSDs to store local data.
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra mirror
of the file metadata is written to SSDs, if SSDs are available. The SSD mirror is in
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots. If you do not specify a snapshot storage
target, the default is anywhere.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata, metadata-write, data,
avoid. The default is metadata.
--enable-coalescer {Yes | No}
Enables the coalescer.
--enable-packing {Yes | No}
Enables packing.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where cloud data is to be archived.
--cloud-accessibility {cached | no-cache}
Specifies whether, when a SmartLink file is accessed, cloud data is incrementally downloaded (cached) as
needed, or fully downloaded (not cached).
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed by a unit of time is accepted.
For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D would specify a two-
day duration.
--cloud-compression-enabled {yes | no}
Specifies whether data is to be compressed when archived to the cloud.
--cloud-data-retention <duration>
Specifies the minimum amount of time that archived data will be retained in the cloud after a SmartLink file is
deleted from the cluster. A number followed by a unit of time is accepted. For example, a setting of 9H would
specify a nine-hour duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-encryption-enabled {yes | no}
Specifies whether data is to be encrypted when archived to the cloud.
--cloud-full-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the creation of a full backup. A
number followed by a unit of time is accepted. For example, a setting of 9H would specify a nine-hour duration.
Similarly, a setting of 2D would specify a two-day duration.
--cloud-incremental-backup-retention <duration>
Specifies the minimum amount of time that cloud files will be retained after the creation of an incremental
backup. A number followed by a unit of time is accepted. For example, a setting of 9H would specify a nine-hour
duration. Similarly, a setting of 2D would specify a two-day duration.
--cloud-read-ahead {partial | full}
Specifies the cache readahead strategy when SmartLink files are accessed. A partial strategy means that only
the amount of data needed by the user is cached. A full strategy means that all file data will be cached when the
user accesses a SmartLink file.
--cloud-writeback-frequency <duration>
Examples
The following example creates a file pool policy that moves all files in directory /ifs/data/chemical/arco/finance to the local
storage target named Archive_2.
The following example matches older files that have not been accessed or modified later than specified dates, and moves the files to an
archival tier of storage.
Syntax
isi filepool policies delete <name>
[--force]
[--verbose]
Options
<name>
Specifies the name of the file pool policy to be deleted.
--force
Deletes the file pool policy without asking for confirmation.
--verbose
Displays more detailed information.
Example
The following command deletes a file pool policy named ARCHIVE_OLD. The --force option circumvents the requirement to confirm
the deletion.
Syntax
isi filepool policies list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--limit <integer>
Specifies a limit to the number of policies that are displayed.
--format
Output the list of file pool policies in a variety of formats. The following options are valid: table , json ,
csv , and list .
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following example lists custom file pool policies in .csv format and outputs the list to a file in the OneFS file system.
Syntax
isi filepool policies modify <id>
[--name <string>]
[--description <string>]
[--begin-filter{<predicate> <operator> <link>}...--end-filter]
[--apply-order <integer>]
[--data-access-pattern {random | concurrency | streaming }]
[--clear-data-access-pattern ]
[--set-requested-protection {{default | +1 | +2:1 | +2 | +3:1 | +3 | +4 | 2x | 3x | 4x | 5x
| 6x | 7x | 8x} | --clear-set-requested-protection}]
[--clear-set-requested-protection ]
[--data-storage-target <string>]
[--clear-data-storage-target]
[--data-ssd-strategy {metadata | metadata-write | data | avoid}]
[--snapshot-storage-target <string>]
Options
<id>
Specifies an ID for the filepool policy.
<name>
Specifies the name of the file pool policy to create.
--begin-filter {<predicate> <operator> <link>}... --end-filter
Specifies the file-matching criteria that determine the files to be managed by the filepool policy.
Each file matching criterion consists of three parts:
• Predicate. Specifies what attribute(s) to filter on. You can filter by path, name, file type, timestamp, or
custom attribute, or use a combination of these attributes.
• Operator. Qualifies an attribute (for example, birth time) to describe a relationship to that attribute (for
example, before).
• Link - Combines attributes using AND and OR statements.
The following predicates are valid:
--size=<nn>[{B | KB | MB | GB | TB | PB}]
Selects files according to the specified size.
--path=<pathname>
Selects files relative to the specified pathname.
--file-type= <value>
Selects only the specified file-system object type.
The following values are valid:
--operator=<value>
Value Description
ne Not equal
lt Less than
gt Greater than
not Not
Link arguments can be used to specify multiple file-matching criteria. The following links are valid:
--and
Connects two file-matching criteria where files must match both criteria.
--or
Connects two file-matching criteria where files must match one or the other criteria.
--description <string>
Specifies a description of the filepool policy
--apply-order <integer>
Specifies the order index for execution of this policy.
--data-access-pattern <string>
Specifies the data access pattern as random, streaming or concurrent.
--clear-data-access-pattern
Removes the action to set the data access pattern on matching files.
--set-requested-protection <string>
Specifies a protection level for files that match this filepool policy (for example, +3, +2:3, 8x).
--clear-set-requested-protection
avoid Writes all associated file data and metadata to HDDs only.
metadata Writes both file data and metadata to HDDs. This is the default setting. An extra mirror
of the file metadata is written to SSDs, if SSDs are available. The SSD mirror is in
addition to the number required to satisfy the requested protection. Enabling GNA
makes read acceleration available to files in node pools that do not contain SSDs.
metadata-write Writes file data to HDDs and metadata to SSDs, when available. This strategy
accelerates metadata writes in addition to reads but requires about four to five times
more SSD storage than the Metadata setting. Enabling GNA does not affect read/
write acceleration.
data Uses SSD node pools for both data and metadata, regardless of whether global
namespace acceleration is enabled. This SSD strategy does not result in the creation of
additional mirrors beyond the normal requested protection but requires significantly
increases storage requirements compared with the other SSD strategy options.
--snapshot-storage-target <string>
The name of the node pool or tier chosen for storage of snapshots.
--clear-snapshot-storage-target
Removes the action to set the snapshot storage target on matching files.
--snapshot-ssd-strategy <string>
Specifies how to use SSDs to store snapshots. Valid options are metadata, metadata-write, data,
avoid. The default is metadata.
--enable-coalescer {Yes | No}
Enables the coalescer.
--clear-enable-coalescer
Removes the action to change the coalescer setting on matching files.
--enable-packing
Enables packing.
--clear-enable-packing
Removes the action to change the packing setting on matching files.
--cloud-pool <string>
Specifies the default CloudPool and, therefore, the cloud storage account where cloud data is to be archived.
--clear-cloud-pool
Remove the action to set a cloud storage target on matching files.
--cloud-accessibility {cached | no-cache}
Specifies whether, when a SmartLink file is accessed, cloud data is incrementally downloaded (cached) as
needed, or fully downloaded (not cached).
--cloud-cache-expiration <duration>
Specifies the minimum amount of time until the cache expires. A number followed by a unit of time is accepted.
For example, a setting of 9H would specify a nine-hour duration. Similarly, a setting of 2D would specify a two-
day duration.
--cloud-compression-enabled {yes | no}
Specifies whether data is to be compressed when archived to the cloud.
--cloud-data-retention <duration>
Examples
The following example modifies a file pool policy to move matched files to a different local storage target named Archive_4. The next
time the SmartPools job runs, matched files would be moved to the new storage target.
The following example matches older files that have not been accessed or modified later than specified dates, and moves the files to an
archival tier of storage.
Syntax
isi filepool policies view <name>
Options
<name>
Example
The following example displays details about a file pool policy named my_policy:
Output from the command would look similar to the following display:
Name: my_policy
Description: Archive older files to the cloud
State: OK
State Details:
Apply Order: 1
File Matching Pattern: Path == data/old_files (begins with) AND Name == *.*
Set Requested Protection: -
Data Access Pattern: -
Enable Coalescer: -
Data Storage Target: -
Data SSD Strategy: -
Snapshot Storage Target: -
Snapshot SSD Strategy: -
Cloud Pool: my_s3_pool
Cloud Compression Enabled: False
Cloud Encryption Enabled: False
Cloud Data Retention: 604800
Cloud Incremental Backup Retention: 604800
Cloud Full Backup Retention: 157680000
Cloud Accessibility: cached
Cloud Read Ahead: partial
Cloud Cache Expiration: 86400
Cloud Writeback Frequency: 14400
Cloud Archive Snapshot Files: False
Syntax
isi filepool templates list
[--limit <integer>
[--sort <string>]
[--descending <string>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Specifies the number of templates to display.
--sort <string>
Sorts data by the field specified.
--descending | -d
Sorts data in descending order.
--format
Syntax
isi filepool templates view <name>
Options
<name>
The name of the template to view.
isi_for_array
Runs commands on multiple nodes in an array, either in parallel or in serial.
When options conflict, the one specified last takes precedence.
NOTE: The -k, -u, -p, and -q options are valid only for SSH transport.
Syntax
isi_for_array
[--array-name <array>]
[--array-file <filename>]
[--directory <directory>]
[--diskless]
[--ignore-errors]
[--known-hosts-file <filename>]
[--user <user>]
[--nodes <nodes>]
[--password <password>]
[--pre-command <command>]
[--query-password]
[--quiet]
[--serial]
[--storage]
[--transport <transport-type>]
[--throttle <count>]
[--exclude-nodes <nodes>]
[--exclude-down-nodes]
Syntax
isi ftp settings modify
[--accept-timeout <duration>]
[--revert-accept-timeout]
[--allow-anon-access {yes | no}]
[--revert-allow-anon-access]
[--allow-anon-upload {yes | no}]
[--revert-allow-anon-upload
[--allow-dirlists {yes | no}]
[--revert-allow-dirlists]
[--allow-downloads {yes | no}]
[--revert-allow-downloads]
[--allow-local-access {yes | no}]
[--revert-allow-local-access]
[--allow-writes {yes | no}]
[--revert-allow-writes]
[--always-chdir-homedir {yes | no}]
[--revert-always-chdir-homedir]
[--anon-chown-username <string>]
[--revert-anon-chown-username]
[--anon-password-list <string>...]
[--clear-anon-password-list]
[--add-anon-password-list <string>...]
[--remove-anon-password-list <string>...]
[--revert-anon-password-list]
[--anon-root-path <path>]
[--revert-anon-root-path]
[--anon-umask <integer-octal>]
[--revert-anon-umask]
[--ascii-mode {off | upload | download | both}]
[--revert-ascii-mode]
[--chroot-exception-list <string>...]
[--clear-chroot-exception-list]
[--add-chroot-exception-list <string>...]
[--remove-chroot-exception-list <string>...]
[--revert-chroot-exception-list]
[--chroot-local-mode {all | none | all-with-exceptions | none-with-exceptions}]
[--revert-chroot-local-mode
[--connect-timeout <duration>]
[--revert-connect-timeout]
[--data-timeout <duration>]
[--revert-data-timeout]
[--denied-user-list <string>...]
[--clear-denied-user-list]
[--add-denied-user-list <string>...]
[--remove-denied-user-list <string>...]
[--revert-denied-user-list]
[--dirlist-localtime {yes | no}]
[--revert-dirlist-localtime]
[--dirlist-names {numeric | textual | hide}]
[--revert-dirlist-names]
[--file-create-perm <integer-octal>]
[--revert-file-create-perm]
[--limit-anon-passwords {yes | no}]
[--revert-limit-anon-passwords]
Options
--accept-timeout <duration>
Specifies the time, in seconds, that a remote client has to establish a PASV style data connection before
timeout. All integers between 30 and 600 are valid values. The default value is 60.
--revert-accept-timeout
Sets the value to the system default for --accept-timeout.
--allow-anon-access {yes | no}
Controls whether anonymous logins are permitted. If enabled, both the usernames ftp and anonymous are
recognized as anonymous logins. The default value is No.
--revert-allow-anon-access
Sets the value to the system default for --allow-anon-access.
--allow-anon-upload {yes | no}
Controls whether anonymous users are able to upload files under certain conditions. For anonymous users to be
able to upload, you must set the --allow-writes option to Yes, and the anonymous user must have write
permission on the desired upload location. The default value is Yes.
--revert-allow-anon-upload
Sets the value to the system default for --allow-anon-upload.
--allow-dirlists {yes | no}
Controls whether directory list commands are enabled. The default value is Yes.
--revert-allow-dirlists
Sets the value to the system default for --allow-dirlists.
--allow-downloads {yes | no}
Controls whether files can be downloaded. The default value is Yes.
--revert-allow-downloads
Sets the value to the system default for --allow-downloads.
--allow-local-access {yes | no}
Controls whether local logins are permitted. If set to Yes, normal user accounts can be used to log in. The
default value is Yes.
--revert-allow-local-access
Sets the value to the system default for --allow-local-access.
--allow-writes {yes | no}
Sets and displays whether commands that change the file system are permitted. Controls whether any of the
following commands are allowed:
• STOR
• DELE
• RNFR
• RNTO
• MKD
• RMD
--revert-anon-umask
Sets the value to the system default for --anon-umask.
--ascii-mode {off | upload | download | both}
Enables ASCII downloads, uploads, or both.
--revert-ascii-mode
Sets the value to the system default for --ascii-mode.
--chroot-exception-list <string>
Displays the list of local user chroot exceptions.
--clear-chroot-exception-list
Clears the list of local user chroot exceptions.
--add-chroot-exception-list <string>
Adds users to the chroot exception list.
numeric Numeric IDs are shown in the user and group fields of directory listings.
textual Names are shown in text format in the user and group fields of directory listings.
hide All user and group information in directory listings is displayed as ftp. This is the default
setting.
--revert-dirlist-names
Sets the value to the system default for --dirlist-names.
--file-create-perm <integer-octal>
Specifies the permissions with which uploaded files are created. Valid values are octal permission numbers. The
default value is 0666.
NOTE: For uploaded files to be executable, set the permissions to 0777.
--revert-file-create-perm
--revert-local-umask
Sets the value to the system default for --local-umask.
--server-to-server {yes | no}
Specifies whether to allow server-to-server (FXP) transfers. Valid values are Yes and No. The default value is
No.
--revert-server-to-server
Sets the value to the system default for --server-to-server.
--session-support {yes | no}
Enables or disables FTP session support. If set to YES, the command maintains login sessions for each user
through Pluggable Authentication Modules (PAM). If set to NO, the command prevents automatic home
directory creation if that functionality is otherwise available. The default value is YES.
--revert-session-support
Sets the value to the system default for --session-support.
--session-timeout <duration>
Specifies the maximum time (in seconds) that a remote client may spend between FTP commands before the
remote client is kicked off. Valid values are integers between 30 and 600. The default value is 300 (five minutes).
--revert-session-timeout
Sets the value to the system default for --session-timeout.
--user-config-dir <path>
Specifies the directory where user-specific configurations that override global configurations can be found. The
default value is the local user home directory.
--revert-user-config-dir
Sets the value to the system default for --user-config-dir.
--service {yes | no}
Specifies whether the FTP service is enabled.
Syntax
isi ftp settings view
Example
The following is an example of the output generated by this command:
Accept Timeout: 1m
Allow Anon Access: No
Allow Anon Upload: Yes
Allow Dirlists: Yes
Allow Downloads: Yes
Allow Local Access: Yes
Allow Writes: Yes
Always Chdir Homedir: Yes
Anon Chown Username: root
Anon Password List: -
Anon Root Path: /ifs/home/ftp
Anon Umask: 0077
Ascii Mode: off
Chroot Exception List: -
Chroot Local Mode: none
Connect Timeout: 1m
Data Timeout: 5m
Denied User List: -
Dirlist Localtime: No
Dirlist Names: hide
File Create Perm: 0666
Limit Anon Passwords: Yes
Local Root Path: -
Local Umask: 0077
Server To Server: No
Session Support: Yes
Session Timeout: 5m
User Config Dir: -
FTP Service Enabled: No
isi_gather_info
Collects and uploads the most recent cluster log information to EMC Secure Remote Services (ESRS).
Multiple instances of -i, -f, -s, -S, and -1 are allowed.
gather_expr and analysis_expr can be quoted.
The default temporary directory is /ifs/data/Isilon_Support/ (change with -L or -T).
Syntax
isi_gather_info
[-h]
[-v]
[-u <user>]
[-p <password>]
[-i]
[--incremental]
[-l]
[-f <filename>]
[-n <nodes>]
[--local-only]
[--skip-node-check]
[-s gather-script]
[-S gather-expr]
[-1 gather-expr]
[-a analysis-script]
[-A analysis-expr]
Options
-h
Prints this message and exits.
-v
Prints version info and exits.
-u <user>
Specifies the login as <user> instead of as the default root user.
-p <password>
Uses <password>.
-i
Syntax
isi get {{[-a] [-d] [-g] [-s] [{-D | -DD | -DDC}] [-R] <path>}
| {[-g] [-s] [{-D | -DDO | -DDC}] [-R] -L <lin>}}
Options
-a
Displays the hidden "." and ".." entries of each directory.
-d
Displays the attributes of a directory instead of the contents.
-g
Displays detailed information, including snapshot governance lists.
-s
Displays the protection status using words instead of colors.
-D
Displays more detailed information.
-DDO
Includes information about protection groups and security descriptor owners and groups.
-DDC
Includes cyclic redundancy check (CRC) information.
-R
Displays information about the subdirectories and files of the specified directories.
<path>
Displays information about the specified file or directory.
Specify as a file or directory path.
-L <lin>
Displays information about the specified file or directory.
Specify as a file or directory LIN.
Examples
The following command displays information on ifs/home/ and all of its subdirectories:
/ifs/home/admin:
default 4+2/2 concurrency on .zshrc
/ifs/home/ftp:
default 4x/2 concurrency on incoming/
default 4x/2 concurrency on pub/
/ifs/home/ftp/incoming:
/ifs/home/ftp/pub:
Syntax
isi hardening apply <profile>
[--report {yes | no}]
[--verbose]
Options
<profile>
Specifies the hardening profile that will be applied to the Isilon cluster. Currently, OneFS supports only the DISA
(Defense Information Systems Agency) STIG (Security Technology Implementation Guide) profile for security
hardening on the cluster.
--report {yes | no}
Specifies whether to check the state of the Isilon cluster and report the results without actually applying the
hardening profile. The system displays any issues it finds, which can be resolved by the hardening engine or
deferred to be fixed manually.
{--verbose | -v}
Displays more detailed information.
Syntax
isi hardening revert
[--verbose]
[--force]
Options
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Suppresses command-line prompts and messages to revert hardening.
Syntax
isi hardening status
Options
There are no options for this command.
Syntax
isi hdfs crypto encryption-zones create <path><keyname>
Options
<path> <keyname>
Specifies a directory and key name for the encryption zone.
The encryption zone must be somewhere within the HDFS root directory for that zone.
Syntax
isi hdfs crypto settings modify
[--kms-url <string>]
Options
--kms-url <string>
Specifies the URL of the Key Management Server.
Syntax
isi hdfs crypto encryption-zones list
Options
There are no options for this command.
Syntax
isi hdfs crypto settings view
Options
There are no options for this command.
Syntax
isi hdfs fsimage job settings modify
[--generation-interval <string>]
[--verbose]
[--zone <string>]
Options
--generation-interval <string>
The interval between successive FSImages.
--help <string>
Display help for this command.
{--verbose | -v}
Display more detailed information.
--zone <string>
Syntax
isi hdfs fsimage job settings view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage job view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage latest delete
[--zone <string>]
[{--verbose | -v}]
[{--force | -f}]
Options
--zone <string>
The access zone to which the HDFS settings apply.
{--verbose | -v}
Syntax
isi hdfs fsimage latest view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage settings modify
[--enabled {yes | no}]
[--zone <string>]
[--verbose]
Options
--enabled {yes | no}
Enables or disables the HDFS FSImage service. Allow access to FSImage and start FSImage generation. The
HDFS FSImage service is disabled by default. This service should only be enabled on a Hadoop-enabled Access
Zone that will use Cloudera Navigator.
--help <string>
Display help for this command.
{--verbose | -v}
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs fsimage settings view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify settings modify
[--enabled {yes | no}]
[--maximum-delay <string>]
[--retention <string>]
[--zone <string>]
[--verbose]
Options
--enabled {yes | no}
Allows access to FSImage and starts FSImage generation. The HDFS FSImage service is disabled by default. This
service should only be enabled on a Hadoop-enabled access zone that will use Cloudera Navigator.
--help <string>
Display help for this command.
--maximum-delay <string>
The maximum duration until an edit event is reported in INotify.
--retention <string>
The minimum duration edits will be retained.
{--verbose | -v}
Display more detailed information.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify settings view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
The access zone to which the HDFS settings apply.
Syntax
isi hdfs inotify stream reset
[--zone <string>]
[{--verbose | -v}]
[{--force | -f}]
Options
--zone <string>
The access zone to which the HDFS settings apply.
{--verbose | -v}
Display more detailed information.
{--force | -f}
Do not prompt for confirmation.
Syntax
isi hdfs inotify stream view
[--zone <string>]
Options
--help <string>
Display help for this command.
--zone <string>
Syntax
isi hdfs log-level modify
[--set {always|error|warning|info|verbose|debug|trace|default} ]
[--verbose| -v]
Options
--set {always | error | warning | info | verbose | debug | trace | default}
Sets the default logging level for the HDFS service on the cluster. The default value is default.
--verbose | -v
Displays more detailed information.
Syntax
isi hdfs log-level view
Options
There are no options for this command.
Syntax
isi hdfs proxyusers create <proxyuser-name>
[--zone <zone-name>]
[--add-group <group-name>...]
[--add-gid <group-identifier>...]
[--add-user <user-name>...]
[--add-uid <user-identifier>...]
[--add-sid <security-identifier>...]
[--add-wellknown <well-known-name>...]
[--verbose]
Options
<proxyuser-name>
Specifies the user name of a user currently configured on the cluster to be designated as a proxy user.
--zone <zone-name>
Examples
The following command designates hadoop-user23 in zone1 as a new proxy user:
The following command designates hadoop-user23 in zone1 as a new proxy user and adds the group of users named hadoop-users to the
list of members that the proxy user can impersonate:
The following command designates hadoop-user23 in zone1 as a new proxy user and adds UID 2155 to the list of members that the proxy
user can impersonate:
Syntax
isi hdfs proxyusers delete <proxyuser-name>
[--zone <zone-name>]
[--force]
[--verbose]
Examples
The following command deletes hadoop-user23 in zone1 from the list of proxy users:
Syntax
isi hdfs proxyusers list
[--zone <zone-name>]
[--format {table | json | csv | list}]
[--no-header ]
[--no-footer ]
[--verbose]
Options
--zone <zone-name>
Specifies the name of the access zone.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command displays a list of all proxy users that are configured in zone1:
Syntax
isi hdfs proxyusers members list <proxyuser-name>
[--zone <zone-name>]
[--format {table | json | csv | list}]
[--no-header ]
[--no-footer ]
[--verbose]
Options
<proxyuser-name>
Specifies the name of the proxy user.
--zone <zone-name>
Specifies the access zone the proxy user authenticates through.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
{ --verbose | -v}
Displays more detailed information.
Examples
The following command displays a detailed list of the users and groups that are members of proxy user hadoop-user23 in zone1:
Syntax
isi hdfs proxyusers modify <proxyuser-name>
[--zone <zone-name>]
[--add-group <group-name>...]
[--add-gid <group-identifier>...]
[--add-user <user-name>...]
[--add-uid <user-identifier>...]
[--add-sid <security-identifier>...]
[--add-wellknown <well-known-name>...]
[--remove-group <group-name>...]
[--remove-gid <group-identifier>...]
[--remove-user <user-name>...]
[--remove-uid <user-identifier>...]
[--remove-sid <security-identifier>...]
[--remove-wellknown <well-known-name>...]
[--verbose]
Options
<proxyuser-name>
Specifies the user name of the proxy user to be modified.
--zone <zone-name>
Specifies the access zone that the proxy user authenticates through.
--add-group <group-name>...
Adds the group specified by name to the list of proxy user members. The proxy user can impersonate any user in
the group. The users in the group must authenticate to the same access zone as the proxy user. You can specify
multiple group names in a comma-separated list.
--add-gid <group-identifier>...
Adds the group specified by UNIX GID to the list of proxy user members. The proxy user can impersonate any
user in the group. The users in the group must authenticate to the same access zone as the proxy user. You can
specify multiple UNIX GIDs in a comma-separated list.
--add-user <user-name>...
Adds the user specified by name to the list of members the proxy user can impersonate. The user must
authenticate to the same access zone as the proxy user. You can specify multiple user names in a comma-
separated list.
--add-uid <user-identifier>...
Adds the user specified by UNIX UID to the list of members the proxy user can impersonate. The user must
authenticate to the same access zone as the proxy user. You can specify multiple UNIX UIDs in a comma-
separated list.
--add-sid <security-identifier>...
Adds the user, group of users, machine or account specified by Windows SID to the list of proxy user members.
The object must authenticate to the same access zone as the proxy user. You can specify multiple Windows
SIDs in a comma-separated list.
--add-wellknown <well-known-name>...
Adds the well-known user specified by name to the list of members the proxy user can impersonate. The well-
known user must authenticate to the same access zone as the proxy user. You can specify multiple well-known
user names in a comma-separated list.
--remove-group <group-name>...
Removes the group specified by name from the list of proxy user members so that the proxy user can no longer
impersonate any user in the group. You can specify multiple group names in a comma-separated list.
--remove-gid <group-identifier>...
Examples
The following command adds the well-known local user to, and removes the user whose UID is 2155 from, the list of members for proxy
user hadoop-user23 in zone1:
Syntax
isi hdfs proxyusers view <proxyuser-name>
[--zone <zone-name>]
Options
<proxyuser-name>
Specifies the user name of the proxy user.
--zone <zone-name>
Specifies the access zone the proxy user authenticates through.
Examples
The following command displays the configuration details for the hadoop-user23 proxy user in zone1:
Syntax
isi hdfs racks create <rack-name>
[--client-ip-ranges <low-ip-address>-<high-ip-address>]...
[--ip-pools <subnet>:<pool>]...
[--zone <string>]
[--verbose]
Options
<rack-name>
Specifies the name of the virtual HDFS rack. The rack name must begin with a forward slash—for example, /
example-name.
--client-ip-ranges <low-ip-address>-<high-ip-address>...
Specifies IP address ranges of external Hadoop compute clients assigned to the virtual rack.
--ip-pools <subnet>:<pool>...
Assigns a pool of Isilon cluster IP addresses to the virtual rack.
--zone <string>
Specifies the access zone that will contain the virtual rack.
{--verbose | -v}
Displays more detailed information.
Syntax
isi hdfs racks delete <rack-name>
[--zone <string>]
[--force]
[--verbose]
Options
<rack-name>
Deletes the specified virtual HDFS rack. Each rack name begins with a forward slash—for example, /example-
name.
--zone <string>
Specifies the access zone that contains the virtual rack you want to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Syntax
isi hdfs racks list
[--zone <string>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone. The system displays all virtual racks in the specified zone.
--format {table | json | csv | list}
Display HDFS racks in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in CSV or table output format.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi hdfs racks modify <rack-name>
[--name <rack-name>]
[--client-ip-ranges <low-ip-address>-<high-ip-address>]...
[--add-client-ip-ranges <low-ip-address>-<high-ip-address>]...
[--remove-client-ip-ranges <low-ip-address>-<high-ip-address>]...
[--clear-client-ip-ranges]
[--ip-pools <subnet>:<pool>]...
[--add-ip-pools <subnet>:<pool>]...
[--remove-ip-pools <subnet>:<pool>]...
[--clear-ip-pools]
[--zone <string>]
[--verbose]
Options
<rack-name>
Specifies the virtual HDFS rack to be modified. Each rack name begins with a forward slash—for example /
example-name.
--name <rack-name>
Assigns a new name to the specified virtual rack. The rack name must begin with a forward slash—for
example /example-name.
Syntax
isi hdfs racks view <rack-name>
[--zone <string>]
Options
<rack-name>
Specifies the name of the virtual HDFS rack to view. Each rack name begins with a forward slash—for
example, /example-name.
--zone <string>
Specifies the access zone that contains the virtual rack you want to view.
Syntax
isi hdfs ranger-plugin settings modify
[--enabled <boolean>]
Options
--enabled <boolean>
Enable the HDFS Ranger plug-in.
--policy-manager-url <string>
The scheme, host name, and port of the Apache Ranger server (for example, http://ranger.com:6080).
--repository-name <string>
The HDFS repository name hosted on the Apache Ranger server.
--zone <string>
The access zone containing the HDFS repository.
{--verbose | -v}
Display more detailed information.
Syntax
isi hdfs ranger-plugin settings view
[--zone <string>]
Options
--zone <string>
The access zone containing the HDFS repository.
Syntax
isi hdfs settings modify
[--service {yes | no}]
[--default-block-size <size>]
[--default-checksum-type {none | crc32 | crc32c}]
[--authentication-mode {all | simple_only | kerberos_only}]
[--root-directory <path>]
[--webhdfs-enabled {yes | no]
[--ambari-server <string>]
[--ambari-namenode <string>]
[--ambari-metrics-collector <string>]
[--odp-version <string>]
[--data-transfer-cipher {none | aes_128_ctr | aes_192_ctr | aes_256_ctr}]
[--zone <string>]
[--verbose]
Syntax
isi hdfs settings view
[--zone <string>]
Options
--zone <string>
Specifies the access zone. The system will display the HDFS settings for the specified zone.
Syntax
isi http settings modify
[--access control {yes | no}]
[--basic-authentication {yes | no}]
[--dav {yes | no}]
[--enable-access-log {yes | no}]
[--integrated-authentication {yes | no}]
[--server-root <path>]
[--service {enabled | disabled | redirect}]
[--verbose]
Options
--access control {yes | no}
Enables access control authentication, which allows the Apache web server to perform access checks. Access
control authentication requires at least one type of authentication to be enabled.
--basic-authentication {yes | no}
Enables HTTP basic authentication. User credentials are sent in plain text format.
--dav {yes | no}
Enables multiple users to manage and modify files collaboratively across web servers.
NOTE: All DAV clients must go through a single node. DAV compliance is not met if you go
through SmartConnect, or through two or more node IP addresses.
--enable-access-log {yes | no}
Enables writing to a log when the HTTP server is accessed.
--integrated-authentication {yes | no}
Enables integrated authentication via NTLM, Kerberos, or both.
--server-root <path>
Specifies the root document directory. This must be a valid directory path within /ifs.
--service {enabled | disabled | redirect}
Enables or disables the HTTP service, or redirects to the OneFS web UI.
{--verbose | -v}
Displays more detailed information.
Syntax
isi http settings view
Options
There are no options for this command.
Syntax
isi job events list
[--job-type <string>]
[--job-id <integer>]
[{--begin} <timestamp>]
[--end <timestamp>]
[--state {failed | running | cancelled_user | succeeded | paused_user | unknown |
paused_priority | cancelled_system | paused_policy | paused_system}]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--job-type <string>
Displays all events of all instances of a specific job type (for example, SmartPools).
--job-id <integer>
Displays all events of a specific job instance.
--begin <timestamp>
Specifies the beginning of the time period for which job events should be listed. For example: --begin
"2013-09-17T00:00". This means that job events beginning at the first moment of September 17, 2013
should be listed.
--end <timestamp>
Specifies the end of the time period for job events to be listed. For example, --end "2013-09-17T23:59"
means that job events right up to the last minute of September 17, 2013 should be listed.
--state {failed | running | cancelled_user | succeeded | paused_user | unknown | paused_priority |
cancelled_system | paused_policy |paused_system}
Specifies that events of the given state or states should be listed.
{--limit | -l} <integer>
Displays no more than the specified number of job events. If no timestamp parameters are specified, the most
recent job events of the specified number are listed.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Examples
The following command lists all FSAnalyze events that happened in the month of September.
isi job events list --job-type fsanalyze --begin "2013-09-01" --end "2013-09-30"
Time Message
-----------------------------------------------------
2013-09-16T22:00:21 FSAnalyze[7] Waiting
2013-09-16T22:00:23 FSAnalyze[7] Running
2013-09-16T22:00:25 FSAnalyze[7] Phase 1: begin scan
2013-09-16T22:01:45 FSAnalyze[7] Phase 1: end scan
2013-09-16T22:01:46 FSAnalyze[7] Phase 2: begin merge
2013-09-16T22:02:30 FSAnalyze[7] Phase 2: end merge
2013-09-16T22:02:31 FSAnalyze[7] Succeeded
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
-----------------------------------------------------
Total: 14
The following command lists all the job events that happened on a specific day.
Time Message
------------------------------------------------------------------
2013-09-17T22:00:04 SmartPools[8] Waiting
2013-09-17T22:00:05 FSAnalyze[9] Waiting
2013-09-17T22:00:06 SmartPools[8] Running
2013-09-17T22:00:07 SmartPools[8] Phase 1: begin lin policy update
2013-09-17T22:00:08 FSAnalyze[9] Running
2013-09-17T22:00:11 FSAnalyze[9] Phase 1: begin scan
2013-09-17T22:01:01 SmartPools[8] Phase 1: end lin policy update
2013-09-17T22:01:03 SmartPools[8] Phase 2: begin sin policy update
2013-09-17T22:01:06 SmartPools[8] Phase 2: end sin policy update
2013-09-17T22:01:09 SmartPools[8] Succeeded
2013-09-17T22:01:37 FSAnalyze[9] Phase 1: end scan
2013-09-17T22:01:38 FSAnalyze[9] Phase 2: begin merge
2013-09-17T22:02:24 FSAnalyze[9] Phase 2: end merge
2013-09-17T22:02:26 FSAnalyze[9] Succeeded
------------------------------------------------------------------
Total: 14
Syntax
isi job jobs cancel <job>
Options
<job>
Specifies the job to cancel. You can specify the job by job ID or job type. Specify a job type only if one instance of
that job type is active.
Examples
The following command cancels an active MultiScan job.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs list
[--state {running | paused_user | paused_priority | paused_policy | paused_system}]
[--limit <integer>]
[--sort {id | type | state | impact | policy | priority | start_time | running_time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--state {running | paused_user | paused_priority | paused_policy | paused_system}
Controls which jobs are listed according to status.
{--limit | -l} <integer>
Displays no more than the specified number of items. If no other parameters are specified, displays the most
recently activated jobs up to the specified number.
--sort {id | type | state | impact | policy | priority | start_time | running_time}
Examples
The following example lists jobs that have been manually paused.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs modify <job>
[--priority <integer>]
[--policy <string>]
Options
<job>
Specifies the job ID or job type to modify. If you specify job type (for example, FlexProtect), only one instance of
that type can be active.
{--priority | -p} <integer>
Examples
The following command changes the impact policy of an active MultiScan job. This command example, which specifies the job type, works
only when a single instance of MultiScan is active.
If more than one instance of a job type is active, you can specify the job ID number instead of job type. The following command changes
the priority of an active job with an ID of 7.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs pause <job>
Options
<job>
Specifies the job to pause. You can specify the job by job type or job ID. If you use job type, only one instance of
the job type can be active.
Examples
The following command pauses an active AutoBalance job.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs resume <job>
Options
<job>
Specifies the job to resume. You can specify the job by job type or job ID. If you use the job type parameter, only
one instance of this job type can be in the Job Engine queue.
Examples
The following command resumes a paused AutoBalance job.
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs start <type>
[--policy <string>]
[--priority <integer>]
[--no-dup]
[--paths <path>]
[--delete]
[--delete-quotas]
[--root <path>]
[--dm-type {snaprevert | synciq}]
[--mapping-type {clone | sid | unix | native}]
[--mode {clone | inherit | convert}]
[--template <path>]
[--zone <string>]
[--snapid <integer>]
[--verbose]
Attempt to remove directory <lin> with quota domains still defined on it,
operation not permitted.
Ignore this log message. The --delete-quotas option deletes the quota first and then it removes the
directory.
--root <path>
Valid for the DomainMark job only. Specifies the root path location for the DomainMark job.
--dm-type {snaprevert | synciq}
Valid for the DomainMark job only. Specifies the domain type for the DomainMark job.
--mapping-type {global | sid | unix | native}
Valid for the PermissionRepair job only, and is only used with the --mode convert option. Specifies the type
for PermissionRepair.
--mode {clone | inherit | convert}
Valid for the PermissionRepair job only. Specifies the mode for PermissionRepair.
--template <path>
Valid for the PermissionRepair job only. Specifies the pathname of a template file to use as a model for the
PermissionRepair job. Must be within the /ifs path.
--zone <string>
Valid for the PermissionRepair job only. Specifies the access zone for PermissionRepair.
--snapid <integer>
Valid for the SnapRevert job only. Specifies a snapshot ID for the SnapRevert job.
{--verbose | -v}
Displays more detailed information.
The following command starts a MultiScan job with a priority of 8 and a high impact policy.
The following command starts a TreeDelete job with a priority of 10 and a low impact policy that deletes the /ifs/data/old directory.
isi job jobs start treedelete --path /ifs/data/old --priority 10 --policy low
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job jobs view <job>
Options
<job>
Specifies the job to view. You can specify the job by job type or job ID. If you specify a job type, only one instance
of this job can be active.
Examples
The following command displays information about an AutoBalance job with a job ID of 15.
ID: 15
Type: AutoBalance
State: Paused by user
Impact: Low
Policy: LOW
Pri: 4
Phase: 1/5
Start Time: 2013-09-19T09:08:28
Running Time: 24s
Participants: 1, 2, 3
Progress: Drives: 6 done, 0 in progress; last updated 3:0; Processed 4624 LINs and
918669 KB; 0 ECCs and 0 errors
Waiting on job ID: -
Description:
In all instructions that include the isi job jobs command, you can omit the jobs entry.
Syntax
isi job policies create <name>
[--description <string>]
[--impact {Low | Medium |High |Paused }]
[--begin <interval_time>]
[--end <interval_time>]
Options
<name>
Specifies a name for the new impact policy. The following names are reserved and cannot be used: LOW,
MEDIUM, HIGH, and OFF_HOURS.
--description <string>
Describes the job policy.
--impact {Low | Medium High | Paused}
Specifies an impact level for the policy: Low, Medium, High, or Paused. You can specify an --impact
parameter for each impact interval that you define.
--begin <interval_time>
Specifies the beginning time, on a 24-hour clock, of the period during which a job can run. For example: --
begin "Friday 20:00".
--end <interval_time>
Specifies the ending time, on a 24-hour clock, of the period during which a job can run. For example: --end
"Sunday 11:59".
Examples
The following command creates a new impact policy named HIGH-WKEND.
isi job policies create HIGH-WKEND --impact high --begin "Saturday 00:01" --end "Sunday 23:59"
The following command creates a more complex impact policy named HI-MED-WKEND. This policy includes multiple impact levels and
time intervals. At the end of the specified intervals, a job running with this policy would automatically return to LOW impact.
isi job policies create HI-MED-WKEND --description "High to medium impact when run on the
weekend" --impact high --begin "Friday 20:00" --end "Monday 03:00" --impact medium --begin
"Monday 03:01" --end "Monday 08:00"
Options
<id>
Specifies the name of the impact policy to delete. If you are unsure of the name, you can use the isi job
policies list command.
--force
Forces deletion of the impact policy without the system asking for confirmation.
Examples
The following command deletes a custom impact policy named HIGH-MED.
When you press ENTER, OneFS displays a confirmation message: Are you sure you want to delete the policy HIGH-
MED? (yes/[no]):
Type yes, and then press ENTER.
The following command deletes a custom impact policy named HIGH-WKEND without the confirmation message being displayed.
Syntax
isi job policies list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Examples
The following command displays a list of available impact policies.
ID Description
------------------------------------------------------
HIGH Isilon template: high impact at all times
LOW Isilon template: low impact at all times
MEDIUM Isilon template: medium impact at all times
OFF_HOURS Isilon template: paused M-F 9-5, low-impact
at other times
HI-MED High to medium to low
HI-WKEND High impact when run on weekends
MED-WKEND Medium impact when run on weekends
------------------------------------------------------
Total: 7
The following command displays more information about available policies.
The system displays verbose output in a list format as shown in the following partial example:
ID: HIGH
Description: Isilon template: high impact at all times
System: True
Impact Intervals
Impact : High
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
ID: LOW
Description: Isilon template: low impact at all times
System: True
Impact Intervals
Impact : Low
Begin : Sunday 00:00
End : Sunday 00:00
----------------------------------------------------------
Syntax
isi job policy modify <ID>
[--description<string>
[--impact {Low | Medium | High | Paused}]
[--begin <interval_time>]
[--end <interval_time>]
[--reset_intervals]
Examples
The following command clears the custom intervals from a custom policy named MY_POLICY as the first step to adding new intervals.
isi job policies modify MY_POLICY --impact high --begin "Friday 20:00" --end "Sunday 11:59"
Syntax
isi job policies view
[<id> <string>]
Options
<id> <string>
Specifies the job policy to display by policy ID.
Examples
The following command displays the details for the default job policy, HIGH.
ID: HIGH
Syntax
isi job reports list
[--job-type <string>]
[--job-id <integer>]
[{--begin} <timestamp>]
[{--end} <timestamp>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--job-type <string>
Displays reports for all instances of the specified job type.
--job-id <integer>
Displays the report for a job with the specified job ID. If a job has multiple phases, Job Engines displays a report
for each phase of the specified job ID.
{--begin | -b} <interval_time>
Specifies the beginning of the time period for the job reports list. For example: --begin "2013-09-19".
{--end | -e} <interval_time>
Specifies the end of the time period for the job reports list. For example: --end "2013-09-20".
{--limit | -l} <integer>
Displays no more than the specified number of reports.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Examples
The following command displays reports for all MultiScan jobs within a specified time period.
isi job reports list --job-type multiscan --begin "2013-9-19" --end "2013-9-20"
Syntax
isi job reports view <id>
Options
<id>
Specifies the job ID for the reports you want to view.
Examples
The following command requests reports for an FSAnalyze job with an ID of 7.
The system displays output similar to the following example. Note that when a job has more than one phase, a report for each phase is
provided.
Syntax
isi job statistics view
[--job-id <integer>]
[--devid <integer>]
[--verbose]
[--format {table | json | csv | list}]
Options
--job-id <integer>
Displays statistics for a specific job ID.
--devid <integer>
Displays statistics for a specific node (device) in the cluster.
{--verbose | -v}
Displays more detailed statistics for an active job or jobs.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
Examples
The following command requests statistics for an AutoBalance job with an ID of 6.
The system displays output similar to the following example. In the example, PID is the process ID, and CPU indicates CPU utilization by
the job. Also indicated are how many worker threads exist for the job on each node and what the sleep-to-work (STW) ratio is for each
thread. The statistics represent how the system throttles the job based on impact policies.
Job ID: 6
Phase: 2
Nodes
Node : 1
PID : 17006
CPU : 0.00% (0.00% min, 7.91% max, 4.50% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.08M (10.01M min, 10.11M max, 10.09M avg)
I/O
Read : 4141 ops, 45.33M
Write : 5035 ops, 35.28M
Workers : 2 (0.60 STW avg.)
Node : 2
PID : 16352
CPU : 13.96% (1.95% min, 13.96% max, 9.61% avg)
Memory
Virtual : 104.62M (104.37M min, 104.62M max, 104.59M avg)
Physical : 10.01M (9.90M min, 10.01M max, 10.00M avg)
I/O
Read : 3925 ops, 43.39M
Write : 4890 ops, 34.13M
Workers : 2 (0.60 STW avg.)
Node : 3
PID : 15929
Syntax
isi job status
[--verbose]
Options
{--verbose | -v}
Displays more detailed job status information, including information about the cluster and nodes.
Examples
The following command provides basic job status.
The system displays additional output that includes cluster and node information.
Syntax
isi job types list
[--all]
[--sort {id | policy | exclusion_set | priority}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--all
Displays all job types available in the Job Engine.
--sort {id | policy | exclusion_set | priority}
Sorts the output by the specified parameter.
--descending
In conjunction with --sort option, specifies that output be sorted descending order. By default, output is
sorted in ascending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated values (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information about a specific job type or all job types.
Examples
The following command provides detailed information about job types.
ID: AVScan
Description: Perform an antivirus scan on all files.
Enabled: Yes
Syntax
isi job types modify <id>
[--enabled <boolean>]
[--policy <string>]
[--schedule<string>]
[--priority <integer>]
[--clear-schedule]
Options
<id>
Specifies the job type to modify.
--enabled <boolean>
Specifies whether the job type is enabled or disabled.
--policy<string>
Sets the policy for the specified job type.
--schedule <string>
Sets a recurring date pattern to run the specified job type.
--priority<integer>
Sets the priority level for the specified job type. Job types have a priority value between 1 and 10, with 1 being
the highest priority and 10 being the lowest.
--clear-schedule
Clears any schedule associated with the specified job type.
--force
Forces the modification without a confirmation message.
When you run this command, the system prompts you to confirm the change. Type yes or no, and then press ENTER.
Syntax
isi job types view <id>
Options
<id>
Specifies the job type to view.
Examples
The following command displays the parameters of the job type MultiScan.
ID: MultiScan
Description: Perform the work of the AutoBalance and Collect jobs simultaneously.
Enabled: Yes
Policy: LOW
Schedule:
Exclusion Set: Restripe, Mark
Priority: 4
Syntax
isi license add
[--path <string>]
[--evaluation <string>]
[--verbose]
Options
--path <string>
The location of the license file on the cluster.
--evaluation <string>
Syntax
isi license generate
[--include <module>]
[--exclude <module>]
[--only <module>...]
[--action (license_list_only | generate_activation)]
[--file <path>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
--include <module>
Adds a software module license to the activation file. Specify --include for each license you want to include
in the activation file.
--exclude <module>
Removes a software module license from the activation file. Specify --exclude for each license you want to
remove from the activation file.
--only <module>
Adds a software module license to the activation file. Specify --only for each license you want to include in the
activation file.
--action (license_list_only | generate_activation)
Specifies the action you want the command to take. You cangenerate an activation file, or you can return a list of
activated licenses without generating an activation file.
--file <path>
Sets the location on the cluster where you want to save the new activation file.
--format {table | json | csv | list}
Display licenses in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{verbose |-v}
Displays more detailed information.
Syntax
isi license list
[--limit <integer>]
[--sort {name | module | status | expiration}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
The number of licenses to display.
--sort {name | module | status | expiration}
Sort data by the specified field.
{--descending | -d}
Sort data in descending order.
--format {table | json | csv | list}
Display licenses in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi license view <name>
[--format (list | json)]
Options
<name>
Product name for the license to view.
{--format | -f} (list | json)
Display licenses in list or JSON format.
OneFS displays the license name, status and expiration for the license.
Topics:
• isi ndmp contexts delete
• isi ndmp contexts list
• isi ndmp contexts view
• isi ndmp dumpdates delete
• isi ndmp dumpdates list
• isi ndmp sessions delete
• isi ndmp sessions list
• isi ndmp sessions view
• isi ndmp settings diagnostics modify
• isi ndmp settings diagnostics view
• isi ndmp settings global modify
• isi ndmp settings global view
• isi ndmp settings preferred-ips create
• isi ndmp settings preferred-ips delete
• isi ndmp settings preferred-ips list
• isi ndmp settings preferred-ips modify
• isi ndmp settings preferred-ips view
• isi ndmp settings variables create
• isi ndmp settings variables delete
• isi ndmp settings variables list
• isi ndmp settings variables modify
• isi ndmp users create
• isi ndmp users delete
• isi ndmp users list
• isi ndmp users modify
• isi ndmp users view
• isi network dnscache flush
• isi network dnscache modify
• isi network dnscache view
• isi network external modify
• isi network external view
• isi network groupnets create
• isi network groupnets delete
• isi network groupnets list
• isi network groupnets modify
• isi network groupnets view
• isi network interfaces list
• isi network pools create
• isi network pools delete
• isi network pools list
• isi network pools modify
• isi network pools rebalance-ips
• isi network pools sc-resume-nodes
• isi network pools sc-suspend-nodes
• isi network pools view
Syntax
isi ndmp contexts delete --id <id>
[--force]
[--verbose]
Syntax
isi ndmp contexts list
[--type {bre | backup | restore}]
[--format {table | json | csv | list}]
Options
{--type | -t} {bre | backup | restore}
Displays entries for the specified level: backup restartable extension (BRE), backup, or restore.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
Syntax
isi ndmp contexts view --id <id>
[--format {list | json}
Options
--id <id>
The context ID string.
--format {list | json}
Lists the NDMP context in the specified format.
Syntax
isi ndmp dumpdates delete --path <path>
[--level <integer>]
[--force]
[--verbose]
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Deletes a dumpdate entry for a backup of the specified level for the given directory. If this option is not specified,
deletes all dumpdate entries for the given directory.
Examples
The following command deletes the dumpdate entry for a level 0 backup of /ifs/data/media:
Syntax
isi ndmp dumpdates list
[--path <path>]
[--level <integer>]
[--limit <integer>]
[--sort {path | level}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--path <path>
The path of the NDMP dumpdate. Must be within the /ifs directory structure.
--level <integer>
Displays dumpdate entries for a backup of the specified level for the given directory path.
{--limit | -l}<integer>
The number of NDMP dumpdates to display.
--sort {path | level}
Sorts data by the specified field.
Examples
To view NDMP dumpdate entries, run the following command:
Syntax
isi ndmp sessions delete --session <session>
[--force]
[--level
[--path]
[--session]
[--verbose]
Options
{--force | -f}
Skips the confirmation prompt.
--level
Stops an NDMP session for a specified level.
--path
Stops an NDMP session that is running at a specified path.
--session <session>
The NDMP session identifier. The session ID consists of the logical node number (LNN) followed by a decimal
point and then the process ID (PID), such as <lnn>.<pid>.
{verbose | -v}
Displays more detailed information.
Syntax
isi ndmp sessions list
[--node <integer>]
[--session <string>]
[--consolidate}
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--node | -n} <integer>
Displays only sessions for the specified node.
{--session | -s} <string>
The NDMP session identifier. The session ID consists of the logical node number (LNN) followed by a decimal
point and then the process ID (PID), such as <lnn>.<pid>.
{--consolidate | -c}
Consolidates sessions of a multi-stream context.
{--limit | -l} <integer>
The number of NDMP sessions to display.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{verbose | -v}
Displays more detailed information.
Syntax
isi ndmp sessions view --session <session>
[--probe]
[--format {list | json}]
Syntax
isi ndmp settings diagnostics modify
[--diag-level <integer>]
[--protocol-version <integer>]
[--trace-level {none | standard | include-file-history | log-file-history}]
Options
--diag-level <integer>
The diagnostics level for NDMP.
--protocol-version <integer>
The NDMP protocol version (3 or 4).
--trace-level {none | standard | include-file-history | log-file-history}
The NDMP trace log level. Select none for no log, standard for NDMP protocol tracing, include-file-
history to log file history information into the trace file, or log-file-history to log file history into the file
history log.
Syntax
isi ndmp settings diagnostics view
[--format {list | json}]
Options
--format {list | json}
Displays NDMP diagnostic settings information in list or JSON format.
Syntax
isi ndmp settings global modify
[--service {true | false}]
[--dma {generic | atempo | bakbone | commvault | emc | symantec | tivoli | symantec-
netbackup | symantec-backupexec}]
[--port <integer>]
[--bre-max-num-contexts <integer>]
[--msb-context-retention-duration <integer>]
[--msr-context-retention-duration <integer>]
Options
{--service | -s} {true | false}
Enables or disables the NDMP service.
{--dma | -d} {generic | atempo | bakbone | commvault | emc | symantec | tivoli | symantec-netbackup |
symantec-backupexec}
The data management application (DMA) that controls NDMP sessions.
{--port | -p} <integer>
Sets the TCP/IP port number on which the NDMP daemon listens for incoming connections. The default port is
10000.
--bre-max-num-contexts <integer>
Sets the maximum number of restartable backup contexts. The system maximum limit is 1024, and the default is
64. Set this option to zero (0) to disable restartable backups.
--msb-context-retention-duration <integer>
Sets the duration of multi-stream backup context retention. Express durations in YMWDHms integer format. The
default duration is 5m (five minutes).
--msr-context-retention-duration <integer>
Sets the duration of multi-stream restore context retention. Express durations in YMWDHms integer format. The
default duration is 10m (ten minutes).
--stub-file-open-timeout
During a backup or a restore, a smartlinked file may not be opened due to active operations. NDMP will retry, but
will fail after this timeout. The default value is 15 (15 seconds). The maximum timeout value is 120 seconds (2
minutes).
--enable-redirector
Enable or disable NDMP redirector which does load distribution of NDMP backup and restore operations.
--throttler-cpu-threshold
Enable or disable NDMP throttler which limits CPU usage for NDMP backup and restore operations on each
node.
--enable-throttler
When NDMP throttler is enabled, NDMP makes sure that NDMP backup or restore operations will not go over
this CPU threshold. The value is represented in percentage which ranges from 1 to 100. The default value is 50.
Syntax
isi ndmp settings global view
[--format {list | json}]
Options
--format {list | json}
Displays NDMP global settings in list or JSON format.
Example
The following is an example of the output generated by this command:
Service: True
Port: 10000
Dma: emc
Bre Max Num Contexts: 64
Msb Context Retention Duration: 300
Msr Context Retention Duration: 600
Syntax
isi ndmp settings preferred-ips create --scope <scope> --data-subnets <subnets>
[{verbose | -v}]
Options
--scope <scope>
Specifies the scope of the preferred IP setting. The scope determines the conditions under which the IPs listed
under the data-subnets will be preferred during a three-way NDMP backup or restore operation. The scope can
either be the subnet that is receiving the incoming NDMP request or it can be a cluster in case of a cluster-wide
preference. There can be upto one preference setting for each subnet scope and one for the cluster scope.
--data-subnets <subnets>
Specifies a comma-separated list of flexnet subnet names where the IPs in the subnets are preferred for
outgoing data (during a backup) or incoming data (during a restore). The list of IPs are rearranged according to
the order of subnets listed under data-subnets. If an IP is in the listed data-subnets, that IP is placed at the
top of the list. A subnet in the data-subnets has no effect if none of the IPs in the list belong to the subnet. The
preferences will be applied only under the condition specified by the scope parameter. The scope and data-
subnets values can be set to the same subnet. In this case, the same subnet is used for the NDMP outgoing
data even as the incoming data comes in on that subnet. For example, if the scope is groupnet0.subnet0,
the data-subnets value is 10gnet.subnet0,globalnet0.subnet0, and the NDMP data for a backup
operation comes in over groupnet0.subnet0, the IP of 10gnet.subnet0 is placed at the top of the list,
However, if that IP is not available, then the IP of globalnet0.subnet0 is placed at the top of the list. The
subnet names must always be separated by commas.
--verbose | -v
Syntax
isi ndmp settings preferred-ips delete --scope <scope>
[{--verbose | -v}]
[{--help | -h}]
Option
--scope <scope>
Scope of the preferred IP setting. You can set the preferred IP to have a cluster-wide scope by specifying a
value for the cluster or you can select a OneFS-configured subnet, for example, groupnet0.mysubnet1.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Syntax
isi ndmp settings preferred-ips list
[{--limit | -l} <integer>]
[--format (table | json | csv | list)]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
[{--help | -h}]
Options
--limit | -l <integer>
The number of NDMP preferred IP settings to display.
--format (table | json | csv | list)
Display the NDMP preferred IP settings in a tabular, JSON, CSV, or list format.
--no-header | -a
Do not display headers in CSV or table formats.
--no-footer | -z
Do not display table summary footer information.
--verbose | -v
Display additional details.
Syntax
isi ndmp settings preferred-ips modify --scope <scope>
[--data-subnets <subnet> | --add-data-subnets <subnet> |
--remove-data-subnets <subnet>]
[{--verbose | -v}]
[{--help | -h}]
Options
--scope <scope>
Scope of the NDMP preferred IP setting. You can set the preferred IP to have a cluster-wide scope by
specifying a value for the cluster or you can select a OneFS-configured subnet, for example,
groupnet0.mysubnet1.
--data-subnets <subnet>
A network subnet value. Specify a value for--data-subnets for each additional network subnet that you
want to specify. The subnet names must be separated by commas.
--add-data-subnets <subnet>
Add a network subnet. Specify --add-data-subnets for each network subnet that you want to add. The
subnet names must be separated by commas.
--remove-data-subnets <subnet>
Remove a network subnet. Specify --remove-data-subnets for each network subnet that you want to
remove. The subnet names must be separated by commas.
--verbose | -v
Display additional details.
--help | -h
Display help for this command.
Syntax
isi ndmp settings preferred-ips view --scope <scope>
[--format (list | json)]
[{--help | -h}]
Options
--scope <scope>
Scope of the NDMP preferred IP setting. You can set the preferred IP to have a cluster-wide scope by
specifying cluster as the value o r you can select a OneFS-configured subnet, for example,
groupnet0.mysubnet1.
--format (list | json)
Display the NDMP preferred IP settings in a list or JSON format.
Syntax
isi ndmp settings variables create --path <path> --name <name> --value <value>
For a list of available environment variables, see the NDMP environment variables section in the version-appropriate OneFS Backup and
Recovery Guide.
Options
--path <path>
Applies the default NDMP environment variable value to the specified path. The directory path must be within /
ifs.
--name <name>
Specifies the NDMP environment variable to define.
--value <value>
Specifies the value to be applied to the NDMP environment variable.
Examples
The following command enables snapshot-based incremental backups to be performed for /ifs/data/media by default:
Syntax
isi ndmp settings variables delete
[--path <path>
[--name <name>
[--force]
[--verbose]
Options
For a list of available environment variables, see the NDMP environment variables section in the version-appropriate OneFS Backup and
Recovery Guide.
<path>
Applies the default NDMP-environment-variable value to the specified path. This must be a valid directory path
within /ifs.
<name>
The name of the variable to be deleted. If you do not specify a variable name, all environment variables are
deleted for the specified path.
If this option is not specified, deletes default values for all the NDMP environment variables for the given
directory.
Examples
The following command removes all default NDMP settings for /ifs/data/media:
The following command removes the default file-history setting for backing up /ifs/data/media:
Syntax
isi ndmp settings variables list
[--path <path>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--path <path>
Applies the default NDMP-environment-variable value to the specified path.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Syntax
isi ndmp settings variables modify --path <path> --name <name> --value <value>
Options
For a list of available environment variables, see the NDMP environment variables section in the version-appropriate OneFS Backup and
Recovery Guide.
Syntax
isi ndmp users create --name <name>
[--password <string>]
Options
--name <name>
The name of the user.
--password <string>
The password for the new NDMP user. If you do not specify a password, the new user will be prompted to enter
a password, and will be prompted to confirm the password by entering it again. This command fails if the
specified user already exists.
Examples
The following command creates an NDMP user account with username ndmp_user and password 1234:
Syntax
isi ndmp users delete --name <name>
[--force]
[--verbose]
Options
--name <name>
The name of the NDMP user to delete.
{--force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Syntax
isi ndmp users list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Example
This is an example of the output created by this command:
Name
----------
ndmp_nick
ndmp_lisa
ndmp_jason
----------
Total: 3
Syntax
isi ndmp users delete --name <name>
Options
--name <name>
The name of NDMP user you are modifying.
Syntax
isi ndmp users view --name <name>
[--format {list | json}]
Output
--name <name>
The name of the NDMP user.
--format {list | json}
Lists the NDMP user in the specified format.
Example
The following is an example of the output created by this command, for an NDMP user named ndmp_lisa, and with JSON format
specified:
[{"id": "ndmp_lisa", "name": "ndmp_lisa"}]
Syntax
isi network dnscache flush
[--verbose]
Options
{ --verbose | -v}
Displays more detailed information.
Syntax
isi network dnscache modify
[--cache-entry-limit <integer>]
[--revert-cache-entry-limit]
[--cluster-timeout <integer>]
[--revert-cluster-timeout]
[--dns-timeout <integer>]
[--revert-dns-timeout]
[--eager-refresh <integer>]
Options
--cache-entry-limit <integer>
Specifies the maximum number of entries that the DNS cache can contain. The limit must be a value between
1024 and 1048576. The default value is 65536 entries.
--revert-cache-entry-limit
Sets the value of --cache-entry-limit to the default system value.
--cluster-timeout <integer>
Specifies the timeout limit, in seconds, for calls made to other nodes in the cluster. The limit must be a value
between 0 and 60. The default value is 5.
--revert-cluster-timeout
Sets the value of --cluster-timeout to the default system value.
--dns-timeout <integer>
Specifies the timeout limit, in seconds, for calls made to the DNS resolver. The limit must be a value between 0
and 60. The default value is 5.
--revert-dns-timeout
Sets the value of --dns-timeout to the default system value.
--eager-refresh <integer>
Specifies the lead time, in seconds, to refresh cache entries that are nearing expiration. The lead time must be a
value between 0 and 30. The default value is 0.
--revert-eager-refresh
Sets the value of --eager-refresh to the default system value.
--testping-delta <integer>
Specifies the delta, in seconds, for checking the cbind cluster health. The delta must be a value between 0 and
60. The default value is 30.
--revert-testping-delta
Sets the value of --testping-delta to the default system value.
--ttl-max-noerror <integer>
Specifies the upper time-to-live boundary, in seconds, on cache hits. The boundary must be a value between 0
and 3600. The default value is 3600.
--revert-ttl-max-noerror
Sets the value of --ttl-max-noerror to the default system value.
--ttl-min-noerror <integer>
Specifies the lower time-to-live boundary, in seconds, on cache hits. The boundary must be a value between 0
and 3600. The default value is 30.
Syntax
isi network dnscache view
Options
There are no options for this command.
Syntax
isi network external modify
[--sbr {true | false}]
[--revert-sbr]
[--sc-rebalance-delay <integer>]
[--revert-sc-rebalance-delay]
[--tcp-ports <integer>]
[--clear-tcp-ports]
[--add-tcp-ports <integer>]
[--remove-tcp-ports <integer>]
[--revert-tcp-ports]
[--verbose]
Options
--sbr {true | false}
Enables or disables source-based routing on the cluster. Source-based routing is disabled by default.
--revert-sbr
Sets the value of --sbr to the default system value.
--sc-rebalance-delay <integer>
Specifies a period of time (in seconds) that should pass after a qualifying event before an automatic rebalance is
performed. The default value is 0 seconds.
--revert-sc-rebalance-delay
Sets the value of --sc-rebalance-delay to the default system value.
--tcp-ports <integer>
Sets a list of recognized client TCP ports. 65535 is the maximum supported port number. You can specify
multiple TCP ports separated by commas, or specify this option for each additional TCP port.
--clear-tcp-ports
Removes all client TCP ports.
--add-tcp-ports <integer>
Adds one or more recognized client TCP ports, separated by commas, to the existing list. 65535 is the maximum
supported port number.
--remove-tcp-ports <integer>
Removes one or more recognized client TCP ports, separated by commas.
--revert-tcp-ports
Sets the value of --tcp-ports to the default system value.
{ --verbose | -v}
Displays more detailed information.
Syntax
isi network external view
Options
There are no options for this command.
Syntax
isi network groupnets create <id>
[--description <string>]
[--dns-cache-enabled {true | false}]
[--dns-search <domain name>]
[--dns-servers <ip address>]
[--dns-options <string>]
[--server-side-dns-search {true | false}]
[--verbose]
Options
<id>
Specifies a unique ID for the groupnet. The ID can be up to 32 alphanumeric characters long and can include
underscores or hyphens, but cannot include spaces or other punctuation. The ID cannot exceed 32 characters.
--description <string>
Specifies an optional description of the groupnet. The description cannot exceed 128 bytes.
--dns-cache-enabled {true | false}
Specifies whether DNS caching for the groupnet is enabled. DNS caching is enabled by default.
--dns-search <domain name>
Sets the list of DNS search suffixes. Suffixes are appended to domain names that are not fully qualified. The list
cannot contain more than six suffixes.
NOTE: Do not begin suffixes with a leading dot; leading dots are automatically added.
Syntax
isi network groupnets delete <id>
[--force]
[--verbose]
Options
< id>
Specifies the ID of the groupnet to be deleted.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network groupnets list
[{--limit | -l} <integer>]
[--sort {description | dns_cache_enabled | id | name | server_side_dns_search}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[{--verbose | -v}]
Options
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {description | dns_cache_enabled | id | name | server_side_dns_search}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
Syntax
isi network groupnets modify <id>
[--description <string>]
[--clear description]
[--dns-cache-enabled {true | false}]
[--revert-dns-cache-enabled]
[--dns-search <domain name>]
[--clear-dns-search]
[--add-dns-search <domain name>]
[--remove-dns-search <domain name>]
[--dns-servers <IP address>]
[--clear-dns-servers]
[--add-dns-servers <IP address>]
[--remove-dns-servers <IP address>]
[--dns-options <string>]
[--clear-dns-options]
[--add-dns-options <string>]
[--remove-dns-options <string>]
[--name <string>]
[--server-side-dns-search {true | false}]
[--revert server-side-dns-search]
[--verbose]
Options
<id>
Specifies the ID of the groupnet to be modified.
--description <string>
Specifies an optional description of the groupnet. This option overwrites the existing description. The description
cannot exceed 128 bytes.
--clear-description
Clears the current description.
--dns-cache-enabled {true | false}
Specifies whether DNS caching for the groupnet is enabled. DNS caching is enabled by default.
--revert-dns-cache-enabled
Sets the value of --dns-cache-enabled to the system default value.
--dns-search <domain name>
Sets the list of DNS search suffixes. Suffixes are appended to domain names that are not fully qualified. The list
cannot contain more than six suffixes. This option overwrites the current list of DNS search suffixes.
NOTE: Do not begin suffixes with a leading dot; leading dots are automatically added.
--clear-dns-search
Removes the current list of DNS search suffixes.
Syntax
isi network groupnets view <id>
Options
<id>
Specifies the ID of the groupnet to be viewed.
Syntax
isi network interfaces list
[--nodes <integer>]
[--show-inactive]
[--limit <integer>]
[--sort {lnn |
name} | status]
[--descending]
[--format {table |
json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, the command displays a list of all network interfaces on the cluster.
--nodes <lnn>
Lists interfaces only from the specified nodes. Specify nodes by Logical Node Number. Separate multiple nodes
by commas.
--show-inactive
Includes inactive interfaces in the output.
{ --limit | -l} <integer>
Displays no more than the specified number of interfaces.
--sort {lnn | name | status}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command lists network interfaces on node 1:
Syntax
isi network pools create <id>
[--access-zone <zone-name>]
[--aggregation-mode {roundrobin | failover | lacp | fec}]
[--alloc-method {dynamic | static}]
[--description <string>]
[--ifaces <node-interface-range>]...
[--ranges <ip-address-range>]...
[--rebalance-policy{manual | auto}]
[--sc-auto-unsuspend-delay <integer>]
[--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--sc-dns-zone <domain-name>]
[--sc-dns-zone-aliases <domain-name>]...
[--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--sc-subnet <string>]
[--sc-ttl <integer>]
[--static-routes <route>]...
[--force]
[--verbose]
Options
<id>
Specifies the ID of the new pool that you want to create. The pool must be added to an existing groupnet and
subnet. The ID can be up to 32 alphanumeric characters long and can include underscores or hyphens, but
cannot include spaces or other punctuation. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0. The pool name must be unique in the
subnet.
--access-zone <zone-name>
Associates an access zone with the pool. Clients will be allowed to connect to the specified access zone only
through IP addresses in the pool. The access zone must belong to the same groupnet as the IP address pool.
--aggregation-mode {roundrobin | failover | lacp | fec}
Specifies how outgoing traffic is distributed across aggregated network interfaces. The aggregation mode is
applied only if at least one aggregated network interface is a member of the IP address pool.
The following values are valid:
roundrobin Rotates connections through the nodes in a first-in, first-out sequence, handling all
processes without priority. Balances outbound traffic across all active ports in the
aggregated link and accepts inbound traffic on any port.
failover Switches to the next active interface when the primary interface becomes unavailable.
Manages traffic only through a primary interface. The second interface takes over the
work of the first as soon as it detects an interruption in communication.
static Assigns each network interface in the IP address pool a single, permanent IP address
from the pool. Depending on the number of IP addresses available, some IP addresses
might go unused. The static option is the default setting.
dynamic Specifies that all pool IP addresses must be assigned to a network interface at all times.
Enables multiple IP addresses to be assigned to an interface. If a network interface
becomes unavailable, this option helps to ensure that the assigned IP address are
redistributed to another interface.
NOTE: This option is only available if a SmartConnect Advanced license is
active on the cluster.
--description <string>
Specifies an optional description of the IP address pool. The description cannot exceed 128 bytes.
--ifaces <node-interface-range>...
Specifies which network interfaces should be members of the IP address pool. Specify network interfaces in the
following format:
<node>:<interface>
To specify a range of nodes, separate the lower and upper node IDs with a dash (-). To specify multiple network
interfaces, separate each interface with a comma. The following example adds the interfaces from nodes 1, 2
and 3:
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
NOTE: If you attempt to add an interface that has already been added as part of an aggregated
interface, you will receive an error message.
--ranges <ip-address-range>...
Specifies one or more IP address ranges for the pool. IP addresses within these ranges are assigned to the
network interfaces that are members of the pool.
Specify the IP address range in the following format:
<low-ip-address>-<high-ip-address>
--rebalance-policy{manual | auto}
Specifies when to redistribute pool IP addresses if a network interface that was previously unavailable becomes
available.
manual Requires that connection rebalancing be performed manually after network interface
failback.
To manually rebalance all IP addresses in a specific pool, run the following command:
auto Causes connections to be rebalanced automatically after network interface failback. This
is the default value.
--sc-auto-unsuspend-delay <integer>
Specifies the time delay (in seconds) before a node that is automatically unsuspended resumes SmartConnect
DNS query responses for the node. During certain cluster operations such as rolling upgrades, general node
splits, or node reboots, a node is automatically suspended and then unsuspended by the system.
--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}
Specifies how incoming DNS queries for client connections are balanced across IP addresses.
The following values are valid:
round-robin Rotates connections through nodes equally. This value is the default policy.
conn-count Assigns connections to the node that has the fewest number of connections.
throughput Assigns connections to the node with the least throughput.
cpu-usage Assigns connections to the node with the lowest CPU usage.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are returned in response to DNS queries
to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple aliases can be specified in a
comma-separated list.
--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}
Specifies how IP addresses that belong to an unavailable interface are rebalanced across the remaining network
interfaces.
The following values are valid:
round-robin Assigns IP addresses across nodes equally. This is the default policy.
conn-count Assigns IP addresses to the node that has fewest number of connections.
throughput Assigns IP addresses to the node with least throughput.
cpu-usage Assigns IP addresses to the node with lowest CPU usage.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS requests for the SmartConnect
zone.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in seconds). DNS responses are only
valid for the time specified. The default value is 0 seconds.
--static-routes <route>
Designates an IP addresses as a static route and specifies the destination gateway. If a client connects through a
static route IP address, outgoing client traffic is routed through the specified gateway. Multiple routes can be
specified in a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR) notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Forces commands without warnings.
The following command creates a new IP address pool called pool1 under groupnet0.subnet0 and assigns IP addresses
198.51.100.10-198.51.100.20 to the pool. The command also includes aggregated interfaces from nodes 1-3 and specifies FEC as the
aggregation mode:
The following command creates a new IP address pool called pool1 under groupnet0.subnet0, assigns IP addresses
198.51.100.10-198.51.100.20 to the pool, and specifies that connection rebalancing must be performed manually:
Syntax
isi network pools delete <id>
[--force]
[--verbose]
Options
<id>...
Specifies the ID of the IP address pool to be deleted. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Options
If no options are specified, the command displays a list of all IP address pool on the cluster.
--subnet-id <string>...
Displays IP address pools only from the specified subnet ID. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0.
--groupnet <string>...
Displays IP address pools only from the specified groupnet name.
--subnet <string>...
Displays IP address pools only subnets with the specified name.
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {aggregation_mode | alloc_method | description | id | name | rebalance_policy |
sc_auto_suspend_dealy | sc_connect_policy | sc_dns_zone | sc_failover_policy | sc_subnet | sc_ttl}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {true | table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools modify <id>
[--access-zone <zone-name>]
[--revert-access-zone]
[--aggregation-mode {roundrobin | failover | lacp | fec}]
[--revert-aggregation-mode]
[--alloc-method {dynamic | static}]
[--revert-alloc-method]
[--description <string>]
[--clear-description]
[--ifaces <node-interface-range>]...
[--clear-ifaces]
[--add-ifaces <node-interface-range>]...
[--remove-ifaces <node-interface-range>]...
[--name <string>
[--ranges <ip-address-range>]...
[--clear-ranges]
[--add-ranges <ip-address-range>]...
[--remove-ranges <ip-address-range>]...
[--rebalance-policy{manual | auto}]
[--revert-rebalance-policy]
[--sc-auto-unsuspend-delay <integer>]
[--revert-sc-auto-unsuspend-delay]
[--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--revert-sc-connect-policy]
[--sc-dns-zone <domain-name>]
[--sc-dns-zone-aliases <domain-name>]...
[--clear-sc-dns-zone-aliases]
[--add-sc-dns-zone-aliases <domain-name>]...
[--remove-sc-dns-zone-aliases <domain-name>]...
[--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}]
[--revert-sc-failover-policy]
[--sc-subnet <string>]
[--sc-ttl <integer>]
[--revert-sc-ttl]
[--static-routes <route>]...
[--clear-static-routes]
[--add-static-routes <route>]...
[--remove-static-routes <route>]...
[--force]
[--verbose]
Options
<id>
Specifies the ID of the IP address pool that you want to modify. Specify the ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0. The pool name must be unique in the
subnet.
--access-zone <zone-name>
Associates an access zone with the pool. Clients will be allowed to connect to the specified access zone only
through IP addresses in the pool. The access zone must belong to the same groupnet as the IP address pool.
--revert-access-zone
Sets the value of --access-zone to the system default value.
--aggregation-mode {roundrobin | failover | lacp | fec}
roundrobin Rotates connections through the nodes in a first-in, first-out sequence, handling all
processes without priority. Balances outbound traffic across all active ports in the
aggregated link and accepts inbound traffic on any port.
failover Switches to the next active interface when the primary interface becomes unavailable.
Manages traffic only through a primary interface. The second interface takes over the
work of the first as soon as it detects an interruption in communication.
lacp Supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP). Balances
outgoing traffic across the interfaces based on hashed protocol header information that
includes the source and destination address and the VLAN tag, if available. Also
assembles interfaces of the same speed into groups called Link Aggregated Groups
(LAGs) and balances traffic across the fastest LAGs. This option is the default mode for
new pools.
fec Provides static balancing on aggregated interfaces through the Cisco Fast EtherChannel
(FEC) driver, which is found on older Cisco switches. Capable of load-balancing traffic
across Fast Ethernet links. Enables multiple physical Fast Ethernet links to combine into
one logical channel.
--revert-aggregation-mode
Sets the value of --aggregation-mode to the system default value.
--alloc-method {dynamic | static}
Specifies the method by which IP addresses are allocated to the network interfaces that are members of the
pool.
The following values are valid:
static Assigns each network interface in the IP address pool a single, permanent IP address
from the pool. Depending on the number of IP addresses available, some IP addresses
might go unused. The static option is the default setting.
dynamic Specifies that all pool IP addresses must be assigned to a network interface at all times.
Enables multiple IP addresses to be assigned to an interface. If a network interface
becomes unavailable, this option helps to ensure that the assigned IP address are
redistributed to another interface.
NOTE: This option is only available if a SmartConnect Advanced license is
active on the cluster.
--revert-alloc-method
Sets the value of --alloc-method to the system default value.
--description <string>
Specifies an optional description of the IP address pool. This option overwrites the existing description. The
description cannot exceed 128 bytes.
--clear-description
Clears the description of the IP address pool.
--ifaces <node-interface-range>...
Adds network interfaces to the IP address pool. Specify network interfaces in the following format:
<node>:<interface>
To specify a range of nodes, separate the lower and upper node IDs with a dash (-). To specify multiple network
interfaces, separate each interface with a comma. The following example adds the interfaces from nodes 1, 2
and 3:
--ifaces 1-2:ext-1,3:ext-2,1:10gige-agg-1,3:10gige-1
--clear-ifaces
Removes all network interfaces from the IP address pool.
<low-ip-address>-<high-ip-address>
This option overwrites the existing list of IP address ranges. Use the --add-ranges and --remove-ranges
options to modify the existing list.
--clear-ranges
Removes all IP address ranges from the pool.
--add-ranges
Adds one or more IP address ranges to the pool.
--remove-ranges
Removes one or more IP address ranges from the pool.
--rebalance-policy{manual | auto}
Specifies when to redistribute pool IP addresses if a network interface that was previously unavailable becomes
available.
manual Requires that connection rebalancing be performed manually after network interface
failback.
To manually rebalance all IP addresses in a specific pool, run the following command:
To manually rebalance all IP addresses across the cluster, run the following command:
auto Causes connections to be rebalanced automatically after network interface failback. This
is the default value.
--revert-rebalance-policy
Sets the value of --rebalance-policy to the system default value.
--sc-auto-unsuspend-delay <integer>
Specifies the time delay (in seconds) before a node that is automatically unsuspended resumes SmartConnect
DNS query responses for the node. During certain cluster operations such as rolling upgrades, general node
splits, or node reboots, a node is automatically suspended and then unsuspended by the system.
--revert-sc-auto-unsuspend-delay
Sets the value of --sc-auto-unsuspend-delay to the system default value.
--sc-connect-policy {roundrobin | conn_count | throughput | cpu_usage}
Specifies how incoming DNS requests for client connections are balanced across IP addresses.
The following values are valid:
roundrobin Rotates connections through nodes equally. This value is the default policy.
conn_count Assigns connections to the node that has the fewest number of connections.
--revert-sc-connect-policy
Sets the value of --sc-connect-policy to the system default value.
--sc-dns-zone <domain-name>
Specifies the SmartConnect DNS zone name for this pool. IP addresses are returned in response to DNS queries
to this SmartConnect zone.
--sc-dns-zone-aliases <domain-name>...
Specifies a list of alternate SmartConnect DNS zone names for the pool. Multiple aliases can be specified in a
comma-separated list. This option overwrites the existing list of SmartConnect DNS zone aliases. Use the --
add-sc-dns-zone-aliases and --remove-sc-dns-zone-aliases options to modify the existing list.
--clear-sc-dns-zone-aliases
Removes all SmartConnect DNS zone aliases from the pool.
--add-sc-dns-zone-aliases <domain-name>...
Adds one or more SmartConnect DNS zone aliases to the pool.
--remove-sc-dns-zone-aliases <domain-name>...
Removes one or more SmartConnect DNS zone aliases from the pool.
--sc-failover-policy {roundrobin | conn_count | throughput | cpu_usage}
Specifies how IP addresses that belong to an unavailable interface are rebalanced across the remaining network
interfaces.
The following values are valid:
roundrobin Assigns IP addresses across nodes equally. This is the default policy.
conn_count Assigns IP addresses to the node that has fewest number of connections.
throughput Assigns IP addresses to the node with least throughput.
cpu_usage Assigns IP addresses to the node with lowest CPU usage.
--revert-failover-policy
Sets the value of --sc-failover-policy to the system default value.
--sc-subnet <string>
Specifies the name of the service subnet that is responsible for handling DNS requests for the SmartConnect
zone.
--sc-ttl <integer>
Specifies the time-to-live value for SmartConnect DNS query responses (in seconds). DNS responses are only
valid for the time specified. The default value is 0 seconds.
--static-routes <route>...
Designates an IP addresses as a static route and specifies the destination gateway. If a client connects through a
static route IP address, outgoing client traffic is routed through the specified gateway. Multiple routes can be
specified in a comma-separated list.
Specify the static route in the following classless inter-domain routing (CIDR) notation format:
<network-address>/<subnet-mask>-<gateway-ip-address>
This option overwrites the existing list of static routes. Use the --add-static-routes and --remove-
static-routes options to modify the existing list.
--clear-static-routes
Removes all static routes from the pool.
--add-static-routes <route>...
Adds one or more static routes to the pool.
--remove-static-routes <route>...
Removes one or more static routes from the pool.
Syntax
isi network pools rebalance-ips <id>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool to be rebalanced. Specify the pool name in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools sc-resume-nodes <id> <lnn>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query responses should be resumed.
Specify the pool name in the following format:
<groupnet_id>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS query responses should be
resumed.
Syntax
isi network pools sc-suspend-nodes <id> <lnn>...
[--force]
[--verbose]
Options
<id>...
Specifies the name of the IP address pool for which SmartConnect DNS query responses should be suspended.
Specify the pool name in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters—
for example, groupnet0:subnet1:pool0.
<lnn>...
Specifies the Logical Node Number of the node for which SmartConnect DNS query responses should be
suspended.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network pools view <id>
Options
<id>
Specifies the ID of the IP address pool to be viewed. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0.
Syntax
isi network rules create <id> <iface>
[--desc <string>]
[--node-type {any | storage | accelerator | backup-accelerator}]
[--verbose]
Options
<id>
Specifies the ID and location of the new provisioning rule. New network interfaces that meet the rule criteria will
be assigned to the IP address pool that contains the rule. Valid IDs include the groupnet, subnet, pool, and rule
name. The rule name must be unique throughout the given IP address pool. Specify the rule ID in the following
format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0:rule3. The rule name must be unique in the
pool.
<iface>
Specifies the network interface name the rule applies to. To view a list of interfaces on your system, run the isi
network interfaces list command.
--description <string>
Specifies an optional description of the provisioning rule. The description cannot exceed 128 bytes.
--node-type {any | storage | accelerator | backup-accelerator}
Sets the provisioning rule to apply to one or more of the specified type of node. The default setting is any.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network rules delete <id>
Options
<id>...
Specifies the ID of the provisioning rule to be deleted. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0:rule3.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
Syntax
isi network rules list
[--pool-id <string>]
[--groupnet <string>]
[--subnet <string>]
[--pool <string>]
[{--limit | -l} <integer>]
[--sort {id | description | iface | node_type | name}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[--verbose]
Options
If no options are specified, the command displays a list of all provisioning rules on the cluster.
--pool-id <string>
Displays provisioning rules only from the specified pool ID. Specify the pool ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0:rule3.
--groupnet <string>
Displays provisioning rules only from the specified groupnet name.
--subnet <string>
Displays provisioning rules only from subnets with the specified name.
--pool <string>
Displays provisioning rules only from IP address pools with the specified name.
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {id | description | iface | node_type | name}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
The system displays the list of rules in output similar to the following example:
ID Node Type Interface
---------------------------------------------------
groupnet0.subnet0.pool0.rule0 any ext-1
groupnet3.subnet3.pool3.rule3 any ext-4
---------------------------------------------------
Total: 2
Syntax
isi network rules modify <id>
[--description <string>]
[--clear-description ]
[--iface <node_interface>]
[--name <string>]
[--node-type {any | storage | accelerator | backup-accelerator}]
[--revert-node-type ]
[--verbose]
Options
<id>
Specifies the ID of the provisioning rule to be modified. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0:rule3.
--description <string>
Specifies an optional description of the provisioning rule. This option overwrites the existing description. The
description cannot exceed 128 bytes.
--clear-description
Clears the description of the provisioning rule.
--iface <node_interface>
Specifies the network interface name the rule applies to. This option overwrites the existing interface name.
--name <string>
Specifies a new name for the rule. The new rule name must be unique in the pool.
--node-type {any | storage | accelerator | backup-accelerator}
Sets the provisioning rule to apply to one or more of the specified type of node. The default node type is any.
--revert-node-type
Sets the value of --node-type to the system default value.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network rules view <id>
Options
<id>
Specifies the ID of the provisioning rule to be viewed. Specify the rule ID in the following format:
<groupnet_name>.<subnet_name>.<pool_name>.<rule_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1:pool0:rule3.
Syntax
isi network sc-rebalance-all
[--force]
[--verbose]
Options
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi networks create subnet <id> <addr-family> {ipv4 | ipv6} <prefixlen>
[--description <string>]
[--dsr-addrs <ip-address>]...
[--gateway <ip-address>]
[--gateway-priority <integer>]
[--mtu <integer>]
[--sc-service-addr <ip-address>]
[--vlan-enabled {true | false}]
[--vlan-id <integer>]
[--verbose]
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1. The subnet name must be unique in the
groupnet.
<addr-family> {ipv4 | ipv6}
Specifies IP address format to be applied to the subnet. All subnet settings and IP address pools added to the
subnet must use the specified address format. You cannot modify the address family once the subnet has been
created.
<prefixlen>
Sets the prefix length of the subnet. Specify a prefix length appropriate for the selected address family.
--description <string>
Specifies an optional description of the subnet. The description cannot exceed 128 bytes.
--dsr-addrs <ip_address>...
Sets one or more Direct Server Return addresses for the subnet. If an external hardware load balancer that uses
DSR addresses is used, this parameter is required.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
NOTE: The IP address must belong to the appropriate gateway. If no gateway is assigned or an
incorrect IP address is specified, communication with the cluster might be disabled.
--gateway-priority <integer>
Specifies the gateway priority for the subnet. Valid values start at 1. A lower value has a higher priority—for
example, a gateway with priority 3 is given priority over a gateway with priority 7. When a new gateway is
configured on the system, it is given a default priority of the current lowest priority plus 10 to ensure it does not
take priority over existing gateways until you modify the priority level.
--mtu <integer>
Sets the maximum transmission unit (MTU) of the subnet. Common values are 1500 and 9000.
NOTE: Using a larger frame size for network traffic permits more efficient communication on the
external network between clients and cluster nodes. For example, if a subnet is connected
through a 10 GbE interface, we recommend that you set the MTU to 9000. To benefit from using
jumbo frames, all devices in the network path must be configured to use jumbo frames.
--sc-service-addr <ip_address>
Specifies the IP address on which the SmartConnect module listens for domain name server (DNS) requests on
this subnet.
--vlan-enabled {true | false}
Enables or disables VLAN tagging on the subnet.
--vlan-id <integer>
Specifies the VLAN ID for all interfaces in the subnet.
{--verbose | -v}
Displays more detailed information.
Options
<id>...
Specifies the ID of the subnet to be deleted. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Displays more detailed information.
Syntax
isi network subnets list
[--groupnet-id <string>]
[--groupnet <string>]
[{--limit | -l} <integer>]
[--sort {id | name | addr_family | base_addr | description | gateway | gateway_priority |
mtu | prefixlen | sc_service_addr | vlan_enabled | vlan_id}]
[{--descending | -d}]
[--format {true | table | json | csv | list}]
[{--no-header | -a}]
[{--no-footer | -z}]
[--verbose]
Options
If no options are specified, the command displays a list of all subnets on the cluster.
--groupnet-id <string>
Displays subnets only from the specified groupnet ID.
--groupnet <string>
Displays subnets only from the specified groupnet ID.
{ --limit | -l} <integer>
Displays no more than the specified number.
--sort {id | description | iface | node_type | name}
Sorts output displayed by the specified attribute.
{ --descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
Examples
The following command displays a list of all subnets:
Syntax
isi network subnets modify <id>
[--description <string>|--clear-description]
[--dsr-addrs <ip_address>|--clear-dsr-addrs
| --add-dsr-addrs <ip_address>|--remove-dsr-addrs
<ip_address>]
[--revert-dsr-address]
[--gateway <ip-address>]
[--gateway-priority <integer>]
[--mtu <integer>]
[--revert-mtu]
[--prefixlen <prefixlen>]
[--name <string>]
[--sc-service-addr <ip_address_range>
| --clear-sc-service-addrs|--add-sc-service-addrs
<ip_address_range> | --remove-sc-service-addrs <ip_address_range>]
[--sc-service-name <domain_name>]
[--vlan-enabled <boolean>
[--revert-vlan-enabled]
[--vlan-id <integer>]
[{--force | -f}]
[{--verbose | -v}]
[{--help| -h}]
Options
<id>
Specifies the ID of the subnet that you want to modify. A subnet ID consists of a <groupnet_id>, followed by a
':', followed by a subnet name. A subnet name must be unique throughout the cluster, and can be up to 32
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1.
--description <string>
Specifies an optional description of the subnet. The description cannot exceed 128 bytes.
--clear-description
Clears the description of the subnet.
--dsr-addrs <ip_address>...
Specifies a list of IP addresses that use Direct Server Return (DSR). You need to specify --dsr-addrs for
each additional IP address.
--clear-dsr-addrs
Clears list of IP addresses that use Direct Server Return.
--add-dsr-addrs <ip_address>...
Adds items to the list of IP addresses that use Direct Server Return. You need to specify--add-dsr-addrs
for each additional IP address that you want to add.
--remove-dsr-addrs <ip_address>...
Removes items from the list of IP addresses that use Direct Server Return. You need to specify --remove-
dsr-addrs for each additional IP address that you want to remove.
--revert-dsr-addrs
Sets the value of --dsr-addrs to the system default value.
--gateway <ip_address>
Specifies the gateway IP address used by the subnet.
--gateway-priority <integer>
Specifies priority of the subnet gateway, where the lowest number is of the highest priority.
--mtu <integer>
Sets the size of the maximum transmission unit (MTU) of the subnet that the cluster uses in network
communication.
--revert-mtu
Sets the value of --mtu to the system default value.
--prefixlen <iprefixlen>
Sets the prefix size of the subnet.
--name <string>
Specifies the name for the subnet.
--sc-service-addrs <ip_address_range>...
Specifies a range of IP addresses in the subnet which will receive incoming DNS requests. You need to specify
--sc-service-addrs for each additional IP address.
--clear-sc-service-addrs
Clears the list of SmartConnect Service IP addresses.
--add-sc-service-addrs <ip_address_range>...
Adds the items to the list of SmartConnect Service IP addresses. You need to specify --add-sc-service-
addrs for each additional IP address you want to add.
--remove-sc-service-addrs <ip_address_range>...
Removes the items from the list of SmartConnect Service IP addresses. You need to specify --remove-sc-
service-addrs for each additional IP address you want to remove.
--sc-service-name <domain_name>
Specifies the domain name corresponding to the SmartConnect Service IP address.
Syntax
isi network subnets view <id>
Options
<id>
Specifies the ID of the subnet to be viewed. Specify the subnet ID in the following format:
<groupnet_name>.<subnet_name>
The groupnet name is optional if referring to the default groupnet0. Colons are also acceptable as delimiters
between component names—for example, groupnet0:subnet1.
Syntax
isi nfs aliases create <name> <path>
[--zone <string>]
[--force]
[--verbose]
Options
<name>
The name of the alias. Alias names must be formed as Unix root directory with a single forward slash followed by
the name. For example, /home.
<path>
The OneFS directory pathname the alias links to. The pathname must be an absolute path below the access zone
root. For example, /ifs/data/ugroup1/home.
Example
The following command creates an alias in a zone named ugroup1:
Syntax
isi nfs aliases delete <name>
[--zone <string>]
[--force]
[--verbose]
Options
<name>
The name of the alias to be deleted.
--zone <string>
The access zone in which the alias is active.
{--force | -f}
Forces the alias to be deleted without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following command deletes an alias from a zone named ugroup1.
Syntax
isi nfs aliases list
[--check]
[--zone <string>]
Options
--check
For the current zone, displays a list of aliases and their health status.
--zone <string>
The access zone in which the alias is active.
{--limit | -l} <integer>
Displays no more than the specified number of NFS aliases.
--sort {zone | name | path | health}
Specifies the field to sort by.
{--descending | -d}
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Example
The following command displays a table of the aliases in a zone named ugroup1 including their health status.
Syntax
isi nfs aliases modify <alias>
[--zone <string>]
[--new-zone <string>]
[--name <string>]
[--path <path>]
Options
<alias>
The current name of the alias, for example, /home.
--zone <string>
The access zone in which the alias is currently active.
--new-zone <string>
The new access zone in which the alias is to be active.
--name <string>
A new name for the alias.
--path <path>
The new OneFS directory pathname the alias should link to. The pathname must be an absolute path below the
access zone root. For example, /ifs/data/ugroup2/home.
{--force | -f}
Forces modification of the alias without requiring confirmation.
{--verbose | -v}
Displays more detailed information.
Example
The following command modifies the zone, name, and path of an existing alias:
isi nfs aliases modify /home --name /users --zone ugroup1 --new-zone ugroup2
--path /ifs/data/ugroup2/users
Syntax
isi nfs aliases view <name>
[--zone <string>]
[--check]
Options
<name>
The name of the alias.
--zone <string>
The access zone in which the alias is active.
--check
Include the health status of the alias.
Syntax
isi nfs exports check
[--limit <integer>]
[--zone <string>
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--ignore-unresolvable-hosts]
[--ignore-bad-paths]
[--ignore-bad-auth]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of NFS exports.
--zone <string>
Specifies the access zone in which the export was created.
[--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
--ignore-unresolvale-hosts
Does not present an error condition on unresolvable hosts when creating or modifying an export.
--ignore-bad-paths
Does not present an error condition on bad paths when creating or modifying an export.
--ignore-bad-auth
Ignores bad authentication for mapping options when creating or modifying an export.
{--verbose | -v}
Displays more detailed information.
Examples
The following command checks the exports in a zone namedZone-1:
Syntax
isi nfs exports create <paths>
[--block-size <size>]
[--can-set-time {yes | no}]
[--case-insensitive {yes | no}]
[--case-preserving {yes | no}]
[--chown-restricted {yes | no}]
[--directory-transfer-size <size>]
[--link-max <integer>]
[--max-file-size <size>]
[--name-max-size <integer>]
[--no-truncate {yes | no}]
[--return-32bit-file-ids {yes | no}]
[--symlinks {yes | no}]
[--zone <string>]
[--clients <client>]
[--description <string>]
[--root-clients <client>]
[--read-write-clients <client>]
[--read-only-clients <client>]
[--all-dirs {yes | no}]
[--encoding <string>]
[--security-flavors {unix | krb5 | krb5i | krb5p}]
[--snapshot <snapshot>]
[--map-lookup-uid {yes | no}]
[--map-retry {yes | no}]
[--map-root-enabled {yes | no}]
[--map-non-root-enabled {yes | no}]
[--map-failure-enabled {yes | no}]
[--map-all <identity>]
[--map-root <identity>]
[--map-non-root <identity>]
[--map-failure <identity>]
[--map-full {yes | no}]
[--commit-asynchronous {yes | no}]
[--read-only {yes | no}]
[--readdirplus {yes | no}]
[--read-transfer-max-size <size>]
[--read-transfer-multiple <integer>]
[--read-transfer-size <size>]
[--setattr-asynchronous {yes | no}]
[--time-delta <time delta>]
[--write-datasync-action {datasync | filesync |unstable}]
[--write-datasync-reply {datasync | filesync}]
[--write-filesync-action {datasync | filesync |unstable}]
[--write-filesync-reply filesync]
[--write-unstable-action {datasync | filesync |unstable}]
[--write-unstable-reply {datasync | filesync |unstable}]
[--write-transfer-max-size <size>]
[--write-transfer-multiple <integer>]
[--write-transfer-size <size>]
[--ignore-unresolvable-hosts]
Options
<paths> ...
Required. Specifies the path to be exported, starting at /ifs. This option can be repeated to specify multiple
paths.
--block-size <size>
Specifies the block size, in bytes.
--can-set-time {yes | no}
If set to yes, enables the export to set time. The default setting is no.
--case-insensitive {yes | no}
If set to yes, the server will report that it ignores case for file names. The default setting is no.
--case-preserving {yes | no}
If set to yes, the server will report that it always preserves case for file names. The default setting is no.
--chown-restricted {yes | no}
If set to yes, the server will report that only the superuser can change file ownership. The default setting is no.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed by a case-sensitive unit of
measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by default. The
maximum value is 4294967295b. The initial default value is 128K.
--link-max <integer>
The reported maximum number of links to a file.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger than the specified value, an
error is returned.
--name-max-size <integer>
The reported maximum length of characters in a filename.
--no-truncate {yes | no}
If set to yes, too-long file names will result in an error rather than be truncated.
--return-32bit-file-ids {yes | no}
Applies to NFSv3 and NFSv4. If set to yes, limits the size of file identifiers returned from readdir to 32-bit
values. The default value is no.
NOTE: This setting is provided for backward compatibility with older NFS clients, and should not
be enabled unless necessary.
--symlinks {yes | no}
If set to yes, advertises support for symlinks. The default setting is no.
--zone <string>
Access zone in which the export should apply. The default zone is system.
--clients <client>
Specifies a client to be allowed access through this export. Specify clients as an IPv4 or IPv6 address, hostname,
netgroup, or CIDR range. You can add multiple clients by repeating this option.
NOTE: This option replaces the entire list of clients. To add or remove a client from the list,
specify --add-clients or --remove-clients.
--description <string>
The description for this NFS export.
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
Examples
The following command creates an NFS export for a particular zone and set of clients:
The following command creates an NFS export with multiple directory paths and a custom security type (Kerberos 5):
Syntax
isi nfs exports delete <id>
[--zone <string>]
Options
<id>
Specifies the ID of the NFS export to delete. You can use the isi nfs exports list command to view a
list of exports and their IDs in the current zone.
--zone <string>
Specifies the access zone in which the export was created. The default is the current zone.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Syntax
isi nfs exports list
[--zone <string>
[--limit <integer>]
[--sort <field>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the name of the access zone in which the export was created.
{--limit | -l} <integer>
Displays no more than the specified number of NFS exports.
--sort <field>
Specifies the field to sort by. Valid values are as follows:
• id
• zone
• paths
• description
• clients
• root_clients
• read_only_clients
• read_write_clients
• unresolved_clients
• all_dirs
• block_size
• can_set_time
Examples
The following command lists NFS exports, by default in the current zone:
NOTE: You can run the isi nfs settings export view command to see the full list of default settings for exports.
Syntax
isi nfs exports modify <id>
[--block-size <size>]
[--revert-block-size]
[--can-set-time {yes | no}]
[--revert-can-set-time]
[--case-insensitive {yes | no}]
[--revert-case-insensitive]
[--case-preserving {yes | no}]
[--revert-case-preserving]
[--chown-restricted {yes | no}]
[--revert-chown-restricted]
[--directory-transfer-size <size>]
[--revert-directory-transfer-size]
[--link-max <integer>]
[--revert-link-max]
[--max-file-size <size>]
[--revert-max-file-size]
[--name-max-size <integer>]
[--revert-name-max-size]
[--no-truncate {yes | no}]
[--revert-no-truncate]
[--return-32bit-file-ids {yes | no}]
[--revert-return-32bit-file-ids]
[--symlinks {yes | no}]
[--revert-symlinks]
[--new-zone <string>]
[--description <string>]
[--paths <path>]
[--clear-paths]
[--add-paths <string>]
[--remove-paths <string>]
[--clients <string>]
[--clear-clients]
[--add-clients <string>]
[--remove-clients <string>]
[--root-clients <string>]
[--clear-root-clients]
[--add-root-clients <string>]
[--remove-root-clients <string>]
[--read-write-clients <string>]
[--clear-read-write-clients]
[--add-read-write-clients <string>]
[--remove-read-write-clients <string>]
[--read-only-clients <string>]
[--clear-read-only-clients]
[--add-read-only-clients <string>]
[--remove-read-only-clients <string>]
[--all-dirs {yes | no}]
[--revert-all-dirs]
[--encoding <string>]
[--revert-encoding]
[--security-flavors {unix | krb5 | krb5i | krb5p}]
[--revert-security-flavors]
[--clear-security-flavors]
[--add-security-flavors {unix | krb5 | krb5i | krb5p}]
[--remove-security-flavors <string>]
[--snapshot <snapshot>]
[--revert-snapshot]
[--map-lookup-uid {yes | no}]
[--revert-map-lookup-uid]
[--map-retry {yes | no}]
Options
<id>
The export ID number. You can use the isi nfs exports list command to view all the exports and their
ID numbers in the current access zone.
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--can-set-time {yes | no}
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
--revert-encoding
Restores the setting to the system default.
--security-flavors {unix | krb5 | krb5i | krb5p}
Specifies a security flavor to support. To support multiple security flavors, repeat this option for each additional
entry. The following values are valid:
--revert-security-flavors
Restores the setting to the system default.
--clear-security-flavors
Clears the value for supported security flavors.
--add-security-flavors {unix | krb5 | krb5i | krb5p}
Adds supported security flavors. Repeat for each additional supported security flavor to add.
--remove-security-flavors
Removes supported security flavors. Repeat for each additional supported security flavor to remove from the
list.
--snapshot {<snapshot> | <snapshot-alias>}
Specifies the ID of a snapshot or snapshot alias to export. If you specify this option, directories will be exported in
the state captured in either the specified snapshot or the snapshot referenced by the specified snapshot alias. If
the snapshot does not capture the exported path, the export will be inaccessible to users.
If you specify a snapshot alias, and the alias is later modified to reference a new snapshot, the new snapshot will
be automatically applied to the export.
Because snapshots are read-only, clients will not be able to modify data through the export unless you specify
the ID of a snapshot alias that references the live version of the file system.
Specify <snapshot> or <snapshot-alias> as the ID or name of a snapshot or snapshot alias.
--revert-snapshot
Restores the setting to the system default.
--map-lookup-uid {yes | no}
If set to yes, incoming UNIX user identifiers (UIDs) will be looked up locally. The default setting is no.
--revert-map-lookup-uid
Restores the setting to the system default.
--map-retry {yes | no}
If set to yes, the system will retry failed user-mapping lookups. The default setting is no.
--revert-map-retry
Restores the setting to the system default.
--map-root-enabled {yes | no}
Syntax
isi nfs exports reload
[--zone <string>
Options
--zone
The access zone for the exports you are reloading.
Syntax
isi nfs exports view <id>
[--zone <string>]
Options
<id>
Specifies the ID of the NFS export to display. If you do not know the ID, use the isi nfs exports list
command to view a list of exports and their associated IDs.
--zone <string>
Specifies the name of the access zone in which the export was created.
Syntax
isi nfs log-level modify <level>
[--verbose]
error Specifies that only NFS error conditions are logged in NFS log files.
warning Specifies that only NFS warning conditions are logged in NFS log files.
info Specifies that only NFS information conditions are logged in NFS log files.
{--verbose | -v}
Displays more detailed information.
Syntax
isi nfs log-level view
Options
There are no options for this command.
Syntax
isi nfs netgroup check
[--host <string>]
[--verbose]
Options
--host <string>
The IPv4 or IPv6 address of the node to check. The default is the localhost IP address.
{--verbose | -v}
Displays more detailed information.
Syntax
isi nfs netgroup flush
[--host <string>]
[--verbose]
Options
--host <string>
The IPv4 or IPv6 address of the node to flush. If you do not specify a node, all nodes are flushed (default).
{verbose | -v}
Displays more detailed information.
Syntax
isi nfs netgroup modify
[--bgwrite <duration>]
[--expiration <duration>]
[--lifetime <duration>]
[--retry <duration>]
[--verbose]
Options
NOTE: In the following option definitions, express duration in integer format as [YMWDHms].
Syntax
isi nfs nlm locks list
[--limit <integer>]
[--sort {client | path | lock_type | range | created}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of NFS nlm locks.
--sort {client | path | lock_type | range | created}
Specifies the field to sort by.
{--descending | -d}
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
To view a detailed list of all current NLM locks, run the following command:
In the following sample output, there are currently three locks: one on /ifs/home/test1/file.txt and two on /ifs/home/
test2/file.txt.
Client Path Lock Type Range
------------------------ ------------------------ --------- ------
machineName/10.72.134.119 /ifs/home/test1/file.txt exclusive [0, 2]
machineName/10.59.166.125 /ifs/home/test2/file.txt shared [10, 20]
machineName/10.63.119.205 /ifs/home/test2/file.txt shared [10, 20]
Syntax
isi nfs nlm locks waiters
[--limit <integer>]
[--sort {client | path | lock_type | range | created}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
Displays no more than the specified number of NLM locks.
--sort {client | path | lock_type | range | created}
Specifies the field to sort by.
--descending
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Examples
The following command displays a detailed list of clients waiting to lock a currently-locked file:
Syntax
isi nfs nlm sessions check
[--cluster-ip <string>]
[--zone <string>]
Options
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
Syntax
isi nfs nlm sessions delete <hostname> <cluster-ip>
[--zone <string>]
[--force]
[--verbose]
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{force | -f}
Skips the confirmation prompt.
{verbose | -v}
Displays more detailed information.
Syntax
isi nfs nlm sessions list
[--limit <integer>]
[--sort {ID | client}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
Options
{--limit | -l} <integer>
The number of NFS NLM sessions to display.
--sort {hostname | cluster_ip | is_active | notify_attempts_remaining}
Specifies the field to sort by.
{--descending | -d}
Specifies to sort the data in descending order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
To view a list of active NLM sessions, run the following command:
Syntax
isi nfs nlm sessions refresh <hostname> <cluster-ip>
[--zone <string>]
[--force]
[--verbose]
Options
<hostname>
The name of the client that initiated the session.
<cluster-ip>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--force | -f}
Skips the confirmation prompt.
Syntax
isi nfs nlm sessions view <hostname>
[--cluster-ip <string>]
[--zone <string>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<hostname>
The name of the client that initiated the session.
--cluster-ip <string>
The cluster IP address to which the client is connected.
--zone <string>
The access zone to which the client is connected.
{--limit | -l} <integer>
Displays no more than the specified number of NFS nlm locks.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi nfs exports modify <ID>
[--block-size <size>]
[--revert-block-size]
[--can-set-time {yes|no}]
[--revert-can-set-time]
Options
--block-size <size>
Specifies the block size, in bytes.
--revert-block-size
Restores the setting to the system default.
--can-set-time {yes|no}
If set to yes, enables the export to set time. The default setting is no.
--revert-can-set-time
Restores the setting to the system default.
--case-insensitive {yes|no}
If set to yes, the server will report that it ignores case for file names. The default setting is no.
--revert-case-insensitive
Restores the setting to the system default.
--case-preserving {yes|no}
If set to yes, the server will report that it always preserves case for file names. The default setting is no.
--revert-case-preserving
Restores the setting to the system default.
--chown-restricted {yes|no}
If set to yes, the server will report that only the superuser can change file ownership. The default setting is no.
--revert-chown-restricted
Restores the setting to the system default.
--directory-transfer-size <size>
Specifies the preferred directory transfer size. Valid values are a number followed by a case-sensitive unit of
measure: b for bytes; K for KB; M for MB; or G for GB. If no unit is specified, bytes are used by default. The
maximum value is 4294967295b. The initial default value is 128K.
--revert-directory-transfer-size
Restores the setting to the system default.
--link-max <integer>
The reported maximum number of links to a file.
--revert-link-max
Restores the setting to the system default.
--max-file-size <size>
Specifies the maximum allowed file size on the server (in bytes). If a file is larger than the specified value, an
error is returned.
--revert-max-file-size
Restores the setting to the system default.
--name-max-size <integer>
Value Encoding
cp932 Windows-SJIS
cp949 Windows-949
cp1252 Windows-1252
euc-kr EUC-KR
euc-jp EUC-JP
euc-jp-ms EUC-JP-MS
utf-8-mac UTF-8-MAC
utf-8 UTF-8
--revert-encoding
Restores the setting to the system default.
--security-flavors {unix|krb5|krb5i|krb5p} ...
Specifies a security flavor to support. To support multiple security flavors, repeat this option for each additional
entry. The following values are valid:
--revert-security-flavors
Restores the setting to the system default.
--snapshot {<snapshot>|<snapshot-alias>}
Specifies the ID of a snapshot or snapshot alias to export. If you specify this option, directories will be exported in
the state captured in either the specified snapshot or the snapshot referenced by the specified snapshot alias. If
the snapshot does not capture the exported path, the export will be inaccessible to users.
If you specify a snapshot alias, and the alias is later modified to reference a new snapshot, the new snapshot will
be automatically applied to the export.
Because snapshots are read-only, clients will not be able to modify data through the export unless you specify
the ID of a snapshot alias that references the live version of the file system.
Specify <snapshot> or <snapshot-alias> as the ID or name of a snapshot or snapshot alias.
--revert-snapshot
Restores the setting to the system default.
--map-lookup-uid {yes|no}
If set to yes, incoming UNIX user identifiers (UIDs) will be looked up locally. The default setting is no.
--revert-map-lookup-uid
Restores the setting to the system default.
--map-retry {yes|no}
If set to yes, the system will retry failed user-mapping lookups. The default setting is no.
--revert-map-retry
Restores the setting to the system default.
--map-root-enabled {yes|no}
Enable/disable mapping incoming root users to a specific account.
--revert-map-root-enabled
Restores the setting to the system default.
--map-non-root-enabled {yes|no}
Enable/disable mapping incoming non-root users to a specific account.
--revert-map-non-root-enabled
Restores the setting to the system default.
Syntax
isi nfs settings export view
[--zone <string>]
Example
To view the currently-configured default export settings, run the following command:
Syntax
isi nfs settings global modify
[--lock-protection <integer>]
[--nfsv3-enabled {yes | no}]
[--nfsv4-enabled {yes | no}]
[--force]
Options
--lock-protection <integer>
Specifies the number of nodes failures that can happen before a lock might be lost.
--nfsv3-enabled {yes | no}
Specifies that NFSv3 is enabled.
--nfsv4-enabled {yes | no}
Specifies that NFSv4 is enabled.
{--force
Causes the command to be executed without your confirmation.
Syntax
isi nfs settings global view
Options
There are no options for this command.
Example
The following is an example of the report generated by this command.
NFSv3 Enabled: Yes
NFSv4 Enabled: No
NFS Service Enabled: Yes
Syntax
isi nfs settings zone modify
[--nfsv4-domain <string>]
Options
--nfsv4-domain <string>
Specifies the NFSv4 domain name.
--revert-nfsv4-domain
Returns the --nfsv4-domain setting to the system default ( localhost).
--nfsv4-replace-domain {yes | no}
Replaces the owner/group domain with the NFSv4 domain name.
--revert-nfsv4-replace-domain
Returns setting to the system default. Default is yes.
--nfsv4-no-domain {yes | no}
Sends owners/groups without the NFSv4 domain name.
--revert-nfsv4-no-domain
Returns setting to the system default. Default is no.
--nfsv4-no-domain-uids {yes | no}
Sends UIDs/GIDs without the NFSv4 domain name.
--revert-nfsv4-no-domain-uids
Returns setting to the system default. Default is yes.
--nfsv4-no-names {yes | no}
Always sends owners/groups as UIDs/GIDs.
--revert-nfsv4-no-names
Returns setting to the system default. Default is no.
--nfsv4-allow-numeric-ids {yes | no}
Sends owners/groups as UIDs/GIDs when look-ups fail or if --nfsv4-no-names is enabled.
--revert-nfsv4-allow-numeric-ids
Returns setting to the system default. Default is yes.
--zone <string>
Specifies the access zone.
{--verbose | -v}
Displays more detailed information.
Example
The following command specifies that the NFS server would accept UIDs/GIDs in place of user names:
Syntax
isi nfs settings zone view
[--zone <string>]
Options
--zone <string>
Specifies the access zone for which you want to view NFSv4-related settings.
Example
The following command specifies that you want to examine NFSv4-related settings for an access zone named Zone1:
Syntax
isi ntp servers create <name>
[--key <string>]
[--verbose]
Options
<name> The host name of the NTP server you are adding to the cluster.
{--key | -k} Value that maps the NTP server to a key in the key file.
<string>
{--verbose | -v} Display more detailed information.
Syntax
isi ntp servers delete (<name> | --all)
[--verbose]
[--force]
Syntax
isi ntp servers list
[--limit <integer>]
[--sort (name | key)]
[--descending]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} The number of NTP servers to display.
<integer>
--sort (name | Sort the list output by server name or key path.
key)
{--descending | Sort data in descending order.
-d}
--format (table Displays NTP servers in table, JSON, CSV, or list format.
| json | csv |
list)
{--no-header | - Do not display headers in table or CSV formats.
a}
{--no-footer | - Do not display table summary footer information.
z}
{--verbose | -v} Display more detailed information.
Syntax
isi ntp servers modify <name>
[--key (<string> | --clear-key)]
[--verbose]
Syntax
isi ntp servers view <name>
Options
<name> The host name of the NTP server.
Syntax
isi ntp settings modify
[--chimers <integer>]
[--excluded (<lnn> | --clear-excluded | --add-excluded <lnn> | --remove-excluded <lnn>)]
[--key-file (<path> | --clear-key-file]
[--verbose]
Options
--chimers The number of chimer nodes that contact NTP servers.
<integer>
{--excluded | - Specify logical node name (LNN) numbers for to exclude nodes from chimer duty. Specify this option again for
x} (<lnn> | -- each additional desired LNN.
clear-excluded
--clear- Clear the list of LNNs excluded from chimer duty.
| --add-
excluded
excluded <lnn> |
--remove- --add-excluded Add a server to the list of LNNs excluded from chimer duty. Specify this option again for
excluded <lnn>) <lnn> each additional desired LNN.
--remove Remove a server from the list of LNNs excluded from chimer duty. Specify this option
excluded <lnn> again for each additional desired LNN.
Syntax
isi ntp settings view
Options
None
Syntax
isi performance datasets create <metrics> {groupname | local_address | path | protocol |
remote_address | share_name | username | zone_name}
[--filters]
[--name]
Options
<metrics> The statistics metric(s) to include in the new data set. You can specify multiple metric options.
{groupname |
local_address |
path | protocol |
remote_address
| share_name |
username |
zone_name)
{--filter | -f} A statistics metric to filter the new dataset, from the available values in the <metrics> parameter.
{--name | -n} A custom name for the new data set.
Syntax
isi performance datasets delete <dataset>
[--remove-filters]
Options
<dataset> The name or numeric ID of the data set you are deleting.
{--remove- Remove all filters from a performance data set before deleting the data set.
filters | -r}
{--unpin- Un-pin all workloads from a performance data set before deleting the data set.
workloads | -u}
{--force | -f} Do not prompt for confirmation of the data set deletion.
Syntax
isi performance datasets list
[--sort {id | name | statkey | creation_time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--sort {id | Sort data by the specified field.
name | statkey |
creation_time}
{--descending | Specifies to sort the data in descending order.
-d}
--format {table Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
| json | csv | format.
list}
{--no-header | Displays table and CSV output without headers.
-a}
{--no-footer | Displays table output without footers.
-z}
{--verbose | - Displays more detailed information.
v}
Syntax
isi performance datasets modify <dataset>
[--name <string>]
Options
<dataset> The name or numeric ID of the data set you are modifying.
{--name | -n} A new custom name for the performance data set.
Syntax
isi performance datasets view <dataset>
Options
<dataset> The name or numeric ID of the OneFS performance data set for which you are viewing properties.
OneFS displays the properties for the specified OneFS performance data set.
Syntax
isi performance filters apply <dataset> <metric-value>
[--name]
Options
<dataset> The name or numeric ID for the data set to which you are applying a filter.
<metric-value> A metric value for defining the new feature. Specify --metric-value for each additional value required. A
metric value is a performance metric and a value for the metric, joined with a colon symbol (:). For example,
protocol:smb2.
{--name | -n} A custom name for the new filter.
Syntax
isi performance filters list <dataset>
[--sort {id | name | creation_time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<dataset> The name or numeric ID of the data set for which you are listing filters.
--sort {id | Sort data by the specified field.
name |
creation_time}
{--descending | Specifies to sort the data in descending order.
-d}
--format {table Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
| json | csv | format.
list}
{--no-header | Displays table and CSV output without headers.
-a}
{--no-footer | Displays table output without footers.
-z}
{--verbose | - Displays more detailed information.
v}
Syntax
isi performance filters modify <dataset> <filter>
[--name <string>]
Options
<dataset> The name or numeric ID of the data set for which you are modifying a filter.
<filter> The name or numeric ID of the filter you are modifying.
{--name | -n} A new custom name for the filter.
Syntax
isi performance filters remove <dataset> <filter>
[--force]
Options
<dataset> The name or numeric ID of the data set from which you are removing a filter.
<filter> The name or numeric ID of the filter to remove from the data set.
{--force | -f} Do not prompt for confirmation of the filter deletion.
Syntax
isi performance filters view <dataset> <filter>
Options
<dataset> The name or numeric ID of the data set to which you have applied the filter.
<filter> The name or numeric ID of the filter to view.
OneFS displays the properties for the specified filter applied to the OneFS performance data set.
Syntax
isi performance metrics list
[--sort {id | datatype | system_only}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--sort {id | Sort data by the specified field. Metrics classified as system_only are reserved for use by the system data set.
datatype |
system_only}
Syntax
isi performance metrics view <id>
Options
<id> The name or numeric ID of the statistics metric to view.
Syntax
isi performance settings modify <top-n-collection-count>
Options
<top-n-collection- The number of the highest resource consuming workloads, tracked and collected by OneFS for each configured
count> performance data set. The default amount is 1,024.
Syntax
isi performance settings view
Syntax
isi performance workloads list <dataset>
[--sort {id | name | creation_time}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<dataset> The name or numeric ID of the data set for which you are listing pinned workloads.
--sort {id | Sort data by the specified field.
name |
creation_time}
{--descending | Specifies to sort the data in descending order.
-d}
--format {table Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
| json | csv | format.
list}
{--no-header | Displays table and CSV output without headers.
-a}
{--no-footer | Displays table output without footers.
-z}
{--verbose | - Displays more detailed information.
v}
Syntax
isi performance workloads modify <dataset> <workload>
[--name <string>]
Options
<dataset> The name or numeric ID of the data set for which you are modifying a pinned workload.
<workload> The name or numeric ID of the workload you are modifying.
{--name | -n} A new custom name for the workload.
Syntax
isi performance workloads pin <dataset> <metric-value>
[--name <string>]
Options
<dataset> The name or numeric ID of the data set for which you are pinning a workload.
<metric-value> A metric value for defining the new feature. Specify --metric-value for each additional value required. A
metric value is a performance metric and a value for the metric, joined with a colon symbol (:). For example,
protocol:smb2.
{--name | -n} A custom name for the workload.
Syntax
isi performance workloads unpin <dataset> <workload>
[--force]
Options
<dataset> The name or numeric ID of the data set from which you are un-pinning a workload.
<workload> The name or numeric ID of the workload to un-pin from the data set.
{--force | -f} Do not prompt for confirmation of the un-pinning of the workload from the data set.
Syntax
isi performance workloads view <dataset> <workload>
Options
<dataset> The name or numeric ID of the data set to view.
<workload> The name or numeric ID of the workload to view.
OneFS displays the properties for the specified workload pinned to the OneFS performance data set.
Syntax
isi_phone_home
[--enable]
[--disable]
[--logging-level {debug | info | warning | error | critical}]
[--list-file <string>]
[--script-file <string>]
[--create-package]
[--send-data]
[--delete-data]
Options
NOTE: We recommend that you run only the --enable or --disable options from the OneFS command-line interface.
All others are run automatically when the tool is enabled, and are provided here for reference in case Isilon Technical
Support asks you for a specific type of information.
{--enable | -e}
Enables isi_phone_home, providing that ESRS is configured and enabled. If you enabled ESRS when
configuring the Isilon cluster, this feature is automatically enabled.
{--disable | -d}
Disables isi_phone_home.
{--logging-level | -o} {debug | info | warning | error | critical}
Emits logs specific to a log state, as well as all logs of higher priority. The default is error, which means all logs of
condition error and critical are emitted. If you select a lower level log such as warning, all logs of level
warning, error, and critical are emitted. We recommend that you do not change the default setting.
{--list-file | -l} <string>
Receives the name of a list file that contains isi commands to be run against the cluster. These list files are
located in /usr/local/isi_phone_home/list.
{--script-file | -r} <string>
Receives the name of a Python script file to be run against the cluster. These script files are located in /usr/
local/isi_phone_home/script.
{--create-package | -c}
Groups all the files in the /ifs/data/Isilon_Support/phone_home/data directory into a gzip file that
is copied to /ifs/data/Isilon_Support/phone_home/pkg.
{--send-data | -s}
Scans /ifs/data/Isilon_Support/phone_home/pkg and uploads any unsent gzip files to Isilon
Technical Support through ESRS.
{--delete-data | -t}
Deletes all gzip files older than 30 days from the /ifs/data/Isilon_Support/phone_home/pkg
directory.
Syntax
isi quota quotas create <path> <type>
[--user <name>]
[--group <name>]
[--gid <id>]
[--uid <id>]
[--sid <sid>]
[--wellknown <name>]
[--hard-threshold <size>]
[--advisory-threshold <size>]
[--soft-threshold <size>]
[--soft-grace <duration>]
[--container {yes | no}]
[--ignore-limit-checks]
[--include-snapshots {yes | no}]
[--percent-advisory-threshold=<value>]
[--percent-soft-threshold=<value>]
[--thresholds-include-overhead {yes | no}]
[--thresholds-on {fslogicalsize | physicalsize | applogicalsize}]
[--zone <string>]
[--enforced {yes | no}] [--zone <zone>]
[--verbose]
Options
<path>
Specifies an absolute path within the /ifs file system.
CAUTION:
You should not create quotas of any type on the /ifs directory. A root-level quota may result in
significant performance degradation.
<type> {directory | user | group | default-directory | default-user | default-group}
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Specifies a user name.
--group <name>
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
fslogicalsize Base quota enforcement on file system logical size; storage usage which does not
include metadata and data protection.
physicalsize Base quota enforcement on physical size; storage usage which includes metadata and
data protection.
applogicalsize Base quota enforcement on application logical size; storage usage which includes
capacity consumption on the cluster as well as data tiered to the cloud. This storage
usage is usually equal to or less than the file system logical size.
Syntax
isi quota quotas delete <path> <type>
[--uid <id>]
[--user <name>]
[--gid <id>]
[--group <name>]
[--sid <sid>]
[--wellknown <name>]
[--recurse-path-parents]
[--recurse-path-children]
[--include-snapshots {yes | no}]
[--zone <zone>]
[--verbose]
Options
<path>
Specifies an absolute path within the /ifs file system.
<type> {directory | user | group | default-directory | default-user | default-group | --all}
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of --user, --uid, or --
sid.
group Specifies a quota for one specific group. Requires specification of the --group, --
gid, or --sid option.
default- Specifies a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a master quota that creates a linked quota for every user who has data in the
directory.
default-group Specifies a master quota that creates a linked quota for every group that owns data in
the directory.
--all Deletes all quotas. Flag may not be specified with <type> or <path>.
--uid <id>
Deletes a quota by the specified numeric user identifier (UID).
--user <name>
Deletes a quota associated with the user identified by name.
--gid <id>
Deletes a quota by the specified numeric group identifier (GID).
--group <name>
Deletes a quota associated with the group identified by name.
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Deletes a quota associated with the wellknown persona.
--recurse-path-parents
Searches parent paths for quotas.
--recurse-path-children
Searches child paths for quotas.
--include-snapshots {yes | no}
Deletes quotas that include snapshot data usage.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota quotas list
[--user <name> | --group <name> | --gid <id> | --uid <id> | --sid <sid> | --wellknown <name>]
[--type (directory | user | group | default-directory | default-user | default-group)]
[--path <path>]
[--recurse-path-parents]
[--recurse-path-children]
[--include-snapshots <boolean>]
Options
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--path <path>
Specifies quotas on the specified path.
--recurse-path-parents
Specifies parent paths for quotas.
--recurse-path-children
Specifies child paths for quotas.
--include-snapshots <boolean>
Specifies quotas that include snapshot data usage.
--exceeded
Specifies only quotas that have an exceeded threshold.
--enforced <boolean>
Specifies quotas that have an enforced threshold.
--zone <string>
Syntax
isi quota quotas modify <path> <type>
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--hard-threshold <size>]
[--clear-hard-threshold]
[--advisory-threshold <size>]
[--clear-advisory-threshold]
[--soft-threshold <size>]
[--clear-soft-threshold]
[--soft-grace <duration>]
[--container {yes | no}]
[--ignore-limit-checks]
[--include-snapshots {yes | no}]
[--percent-advisory-threshold=<value>]
[--thresholds-include-overhead {yes | no}]
[--thresholds-on {fslogicalsize | physicalsize | applogicalsize}]
[--enforced {yes | no}]
[--linked {yes | no}]
[--zone <string>]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, or
--sid option.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota that you want to modify. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--hard-threshold <size>
Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the request violates the
quota limit. Size is a capacity value formatted as <integer>[{b | K | M | G | T | P}].
--clear-hard-threshold
Clears an absolute limit for disk usage.
--advisory-threshold <size>
Sets the advisory threshold. For notification purposes only. Does not enforce limitations on disk write requests.
Size is a capacity value formatted as <integer>[{b | K | M | G | T | P}].
--clear-advisory-threshold
Clears the advisory threshold.
--soft-threshold <size>
Specifies the soft threshold, which allows writes to disk above the threshold until the soft grace period expires.
Attempts to write to disk are denied thereafter. Size is a capacity value formatted as <integer>[{b | K | M | G | T
| P}].
--clear-soft-threshold
Clears the soft threshold.
--soft-grace <duration>
Specifies the soft threshold grace period, which is the amount of time to wait before disk write requests are
denied.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
fslogicalsize Base quota enforcement on file system logical size; storage usage which does not
include metadata and data protection.
physicalsize Base quota enforcement on physical size; storage usage which includes metadata and
data protection.
applogicalsize Base quota enforcement on application logical size; storage usage which includes
capacity consumption on the cluster as well as data tiered to the cloud. This storage
usage is usually equal to or less than the file system logical size.
NOTE: Use the isi quota quotas notifications disable command to disable all notifications for a quota.
Options
<path>
Specifies an absolute path within the /ifs file system.
<type>
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
{--force | -f}
Skips the confirmation prompt.
Syntax
isi quota quotas notifications create
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--schedule <name>]
[--holdoff <duration>]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Specifies quotas that include snapshot data usage.
--schedule <name>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
Syntax
isi quota quotas notifications delete
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--verbose]
Options
--path <path>
Deletes quota notifications set on an absolute path within the /ifs file system.
--type
Deletes a quota notification by specified type. The following values are valid:
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of the --user, --uid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a master quota that creates a linked quota for every user who has data in the
directory.
default-group Specifies a master quota that creates a linked quota for every group that owns data in
the directory.
--threshold
Deletes a quota notification by specified threshold. The following values are valid:
--condition
Deletes a quote notification by the specified condition on which to send a notification. The following values are
valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
--user <name>
Deletes a quota notification by the specified user name.
--group <name>
Deletes a quota notification by the specified group name.
--gid <id>
Deletes a quota notification by the specified numeric group identifier (GID).
--uid <id>
Deletes a quota notification by the specified numeric user identifier (UID).
--sid <sid>
Deletes a quota notification by the specified security identifier (SID) for selecting the quota. For example,
S-1-5-21-13.
--wellknown <name>
Deletes a quota notification by the specified well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Deletes a quota notification by the specified settings for Included snapshots in the quota size.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota quotas notifications disable
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Disables quotas of the specified type. Argument must be specified with the --path option. The following values
are valid:
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of -user, --uid, --
sid, or --wellknown option.
group Specifies a quota for one specific group. Requires specification of the --group, --
gid, --sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a master quota that creates a linked quota for every user who has data in the
directory.
default-group Specifies a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Disables a quota associated with the user identified by name.
--gid <id>
Disables a quota by the specified numeric group identifier (GID).
--uid <id>
Disables a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting a quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Disables quotas that include snapshot data usage.
Syntax
isi quota quotas notifications list
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
Syntax
isi quota quotas notifications modify
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--schedule <string>]
[--holdoff <duration>]
[--clear-holdoff]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--clear-action-email-address]
[--add-action-email-address <address>]
[--remove-action-email-address <address>]
[--email-template <path>]
[--clear-email-template]
[--verbose]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Sets a security identifier (SID). For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
--schedule <name>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
--clear-holdoff
Clears the value for the --holdoff duration.
--action-alert {yes | no}
Generates an alert when the notification condition is met.
--action-email-owner {yes | no}
Specifies that an email be sent to a user when the threshold is crossed. Requires --action-email-
address.
--action-email-address <address>
Specifies the email address of the user to be notified. Specify --action-email-address for each additional
email address of user to notify.
--clear-action-email-address
Clears the value for the email address of the user to notify.
Syntax
isi quota quotas notifications view
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
Options
--path <path>
Specifies an absolute path within the /ifs file system.
--type
Specifies a quota type. The following values are valid:
directory Creates a quota for all data in the directory, regardless of owner.
user Creates a quota for one specific user. Requires specification of the --user, --uid, --
sid, or --wellknown option.
group Creates a quota for one specific group. Requires specification of the --group, --gid,
--sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Creates a master quota that creates a linked quota for every user who has data in the
directory.
default-group Creates a master quota that creates a linked quota for every group that owns data in
the directory.
--threshold
Specifies the threshold type. The following values are valid:
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
--user <name>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <id>
Specifies the numeric group identifier (GID).
--uid <id>
Specifies a numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Includes snapshots in the quota size.
Syntax
isi quota quotas view
--path <path>
--type {directory | user | group | default-directory | default-user | default-group}
[--user <name> | --group <name> | --gid <id> | --uid <id>
| --sid <sid> | --wellknown <name>]
[--include-snapshots {yes | no}]
[--zone <string>]
directory Specifies a quota for all data in the directory, regardless of owner.
user Specifies a quota for one specific user. Requires specification of -user, --uid, --
sid, or --wellknown option.
group Specifies a quota for one specific group. Requires specification of the --group, --
gid, --sid, or --wellknown option.
default- Creates a master quota that creates a linked quota for every immediate subdirectory
directory created in the directory.
default-user Specifies a master quota that creates a linked quota for every user who has data in the
directory.
default-group Specifies a master quota that creates a linked quota for every group that owns data in
the directory.
--user <name>
Specifies a quota associated with the user identified by name.
--group <name>
Specifies a quota associated with the group identified by name.
--gid <id>
Specifies a quota by the numeric group identifier (GID).
--uid <id>
Specifies a quota by the specified numeric user identifier (UID).
--sid <sid>
Specifies a security identifier (SID) for selecting the quota. For example, S-1-5-21-13.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
--include-snapshots {yes | no}
Specifies quotas that include snapshot data usage.
--zone <zone>
Specifies an access zone.
Syntax
isi quota reports create
[--verbose]
Syntax
isi quota reports delete
--time <string>
--generated {live | scheduled | manual}
--type {summary | detail}
[--verbose]
Options
--time <string>
Specifies the timestamp of the report.
Specify <time-and-date> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
h Specifies hours
s Specifies seconds
--generated
Specifies the method used to generate the report. The following values are valid:
live
scheduled
manual
--type
Specifies a report type. The following values are valid:
summary
detail
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota reports list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header
[--no-footer]
[--verbose]
Options
--limit <integer>
Specifies the number of quotas to display.
--format
Displays quotas in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Suppresses headers in CSV or table formats.
{--no-footer | -z}
Suppresses table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings mappings create <type> <domain> <mapping>
[--verbose]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
The fully-qualified domain name for the destination domain you are mapping to.
{--verbose | -v}
Syntax
isi quota settings mappings delete <type> <domain>
[--all]
[--verbose]
[--force]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
--all
Deletes all mapping rules.
{--verbose | -v}
Displays more detailed information.
{force | -f}
Forces the deletion without displaying a confirmation prompt.
Syntax
isi quota settings mappings list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
The number of quota mapping settings to display.
--format {table | json | csv | list}
Display quota mappings settings in table, JSON, CSV, or list format.
{--no-header | -a}
Do not display headers in table or CSV formats.
{--no-footer | -z}
Do not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings mappings modify <type> <domain> <mapping>
[--verbose]
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
<mapping>
The fully-qualified domain name for the destination domain you are mapping to.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings mappings view <type> <domain>
Options
<type> {ad | local | nis | ldap}
The authentication provider type for the source domain.
<domain>
The fully-qualified domain name for the source domain you are mapping.
Syntax
isi quota settings notifications clear
Syntax
isi quota settings notifications create
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
--schedule <string>
--holdoff <duration>
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address<address>]
[--email-template <path>]
[--verbose]
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only soft
thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--holdoff <duration>
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer> <units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
s Specifies seconds
Syntax
isi quota settings notifications delete
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--verbose]
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only soft
thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings notifications list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi quota settings notifications modify
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
[--schedule <string>]
[--holdoff <duration>]
[--clear-holdoff]
[--action-alert {yes | no}]
[--action-email-owner {yes | no}]
[--action-email-address <address>]
[--clear-action-email-address]
[--add-action-email-address <address>]
[--remove-action-email-address <address>]
[--email-template <path>]
[--clear-email-template]
[--verbose
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
Specifies the quota condition on which to send a notification. The following values are valid:
--schedule <string>
Specifies the date pattern at which recurring notifications are made.
--holdoff <duration>
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
Specifies the length of time to wait before generating a notification.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
--clear-holdoff
Clears the value for the --holdoff duration.
--action-alert {yes | no}
Generates an alert when the notification condition is met.
--action-email-owner {yes | no}
Specifies that an email be sent to a user when the threshold is crossed. Requires --action-email-
address.
--action-email-address <address>
Specifies the email address of user to be notified. Specify --action-email-address for each additional
email address of user to notify.
--clear-action-email-address
Clears the value for the email address of the user to notify.
--add-action-email-address<address>
Adds the email address of the user to be notified. Specify --add-action-email-address for each
additional email address of user to notify.
--remove-action-email-address<address>
Removes the email address of the user to notify. Specify --remove-action-email-address for each
email address of user to notify.
--email-template <path>
Specifies the path in /ifs to the email template.
--clear-email-template
Clears the setting for the path to the email template.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings notifications view
--threshold {hard | soft | advisory}
--condition {exceeded | denied | violated | expired}
Options
--threshold
Specifies the threshold type. The following values are valid:
hard Sets an absolute limit for disk usage. Attempts to write to disk are generally denied if the
request violates the quota limit.
soft Specifies the soft threshold. Allows writes to disk above the threshold until the soft
grace period expires. Attempts to write to disk are denied thereafter.
advisory Sets the advisory threshold. For notification purposes only. Does not enforce limitations
on disk write requests.
--condition
denied Specifies a notification when a hard threshold or soft threshold outside of its soft grace
period causes a disk write operation to be denied.
exceeded Specifies a notification when disk usage exceeds the threshold. Applies to only soft
thresholds within the soft-grace period.
violated Specifies a notification when disk usage exceeds a quota threshold but none of the other
conditions apply.
expired Specifies a notification when disk usage exceeds the soft threshold and the soft-grace
period has expired.
Syntax
isi quota settings reports modify
[--schedule <schedule>]
[--revert-schedule]
[--scheduled-dir <dir>]
[--revert-scheduled-dir]
[--scheduled-retain <integer>]
[--revert-scheduled-retain]
[--live-dir <dir> | --revert-live-dir]
[--live-retain <integer> | --revert-live-retain]
[--verbose]
Options
--schedule <schedule>
Specifies the date pattern at which recurring notifications are made.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--revert-schedule
Sets the --schedule value to system default.
--scheduled-dir <dir>
Specifies the location where scheduled quota reports are stored.
--revert-scheduled-dir
Sets the --scheduled-dir value to system default.
--scheduled-retain <integer>
Specifies the maximum number of scheduled reports to keep.
--revert-scheduled-retain
Sets the --scheduled-retain value to system default.
--live-dir <dir>
Specifies the location where live quota reports are stored.
--revert-live-dir
Sets the --live-dir value to system default.
--live-retain <integer>
Specifies the maximum number of live quota reports to keep.
--revert-live-retain
Sets the --live-retain value to system default.
{--verbose | -v}
Displays more detailed information.
Syntax
isi quota settings reports view
Options
There are no options for this command.
Syntax
isi readonly list
[--format (table | json | csv | list)]
Options
--format (table Displays ESRS data items in table, JSON, CSV, or list format.
| json | csv |
list)
{--no-header | - Do not display headers in table or CSV formats.
a}
{--no-footer | - Do not display table summary footer information.
z}
{--verbose | -v} Display more detailed information.
OneFS displays a list of current read-only modes and statuses for nodes, sorted by LNN.
Syntax
isi readonly modify
[--allowed (yes | no)]
[--enabled (yes | no)]
[--node-lnn <string>]
[--verbose]
Options
--allowed (yes | Read-only status allowed for the node. Default is yes.
no)
--enabled (yes | Read-only status enabled for the node. Default is no.
no)
--node-lnn The logical node number (LNN) of the node to modify read-only status. If you do not specify an LNN, the local
<string> node is selected.
{--verbose | -v} Displays more detailed information.
Syntax
isi readonly view
[--node-lnn <integer>]
Syntax
isi remotesupport connectemc modify
[--enabled {yes|no}]
[--primary-esrs-gateway <string>]
[--secondary-esrs-gateway <string>]
[--use-smtp-failover {yes|no}]
[--email-customer-on-failure {yes|no}]
[--gateway-access-pools <string>]...
[--clear-gateway-access-pools]
[--add-gateway-access-pools <string>]...
[--remove-gateway-access-pools <string>]...
Options
--enabled {yes|no}
Specifies whether support ESRS is enabled on the Isilon cluster.
--primary-esrs-gateway <string>
Specifies the primary ESRS gateway server. The gateway server acts as the single point of entry and exit for IP-
based remote support activities and monitoring notifications. You can specify the gateway as an IPv4 address or
the gateway name.
--secondary-esrs-gateway <string>
Specifies an optional secondary ESRS gateway server that acts as a failover server. You can specify the gateway
as an IPv4 address or the gateway name.
--use-smtp-failover {yes|no}
Specifies whether to send event notifications to a failover SMTP address upon ESRS transmission failure. The
SMTP email address is specified through the isi email settings modify command.
--email-customer-on-failure {yes|no}
Specifies whether to send an alert to a customer email address upon failure of other notification methods. The
customer email address is specified through the isi_promptesrs -e command.
--gateway-access-pools <string>...
Specifies the IP address pools on the Isilon cluster that will handle remote support connections through the
ESRS gateway.
The IP address pools must belong to a subnet under groupnet0, which is the default system groupnet.
NOTE: We recommend that you designate pools with static IP addresses that are dedicated to
remote connections through ESRS.
--clear-gateway-access-pools
Deletes the list of IP address pools that handle remote support connections.
--add-gateway-access-pools <string>...
Adds one or more IP address pools to the list of pools that will handle remote support connections through the
ESRS gateway.
--remove-gateway-access-pools <string>...
Examples
The following command enables ESRS, specifies an IPv4 address as the primary gateway, directs OneFS to email the customer if all
transmission methods fail, and removes an IP address pool from the list of pools that handle gateway connections:
Syntax
isi remotesupport connectemc view
Options
This command has no options.
Topics:
• isi servicelight list
• isi servicelight modify
• isi servicelight view
• isi services
• isi set
• isi smb log-level filters create
• isi smb log-level filters delete
• isi smb log-level filters list
• isi smb log-level filters view
• isi smb log-level modify
• isi smb log-level view
• isi smb openfiles close
• isi smb openfiles list
• isi smb sessions delete
• isi smb sessions delete-user
• isi smb sessions list
• isi smb settings global modify
• isi smb settings global view
• isi smb settings shares modify
• isi smb settings shares view
• isi smb settings zone modify
• isi smb settings zone view
• isi smb shares create
• isi smb shares delete
• isi smb shares list
• isi smb shares modify
• isi smb shares permission create
• isi smb shares permission delete
• isi smb shares permission list
• isi smb shares permission modify
• isi smb shares permission view
• isi smb shares view
• isi snapshot aliases create
• isi snapshot aliases delete
• isi snapshot aliases list
• isi snapshot aliases modify
• isi snapshot aliases view
• isi snapshot locks create
• isi snapshot locks delete
• isi snapshot locks list
• isi snapshot locks modify
• isi snapshot locks view
• isi snapshot schedules create
• isi snapshot schedules delete
• isi snapshot schedules list
• isi snapshot schedules modify
Syntax
isi servicelight list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{ --no-header | -a}
Displays table and CSV output without headers.
{ --no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi servicelight modify
[--enabled <boolean>]
[--node-lnn <integer>]
[--verbose]
Options
--enabled <boolean>
Enables or disables a node's service LED.
--node-lnn <integer>
Specifies the node on which you want to modify the service light status. If omitted, the local node will be used.
{--verbose | -v}
Displays more detailed information.
Syntax
isi servicelight view
[--node-lnn <integer>]
Options
--node-lnn <integer>
Specifies the node you want to view. If omitted, service LED status for the local node is displayed.
isi services
Displays a list of available services. The -l and -a options can be used separately or together.
Syntax
isi services
[-l | -a]
[<service> [{enable | disable}]]
Options
-l
Lists all available services and the current status of each. This is the default value for this command.
- a
Lists all services, including hidden services, and the current status of each.
<service> {enable | disable}
Enables or disables the specified service.
Examples
The following example shows the command to enable a specified hidden service.
isi set
Works similar to chmod, providing a mechanism to adjust OneFS-specific file attributes, such as the requested protection, or to explicitly
restripe files. Files can be specified by path or LIN.
Syntax
isi set
[-f -F -L -n -v -r -R]
Options
-f
Suppresses warnings on failures to change a file.
-F
Includes the /ifs/.ifsvar directory content and any of its subdirectories. Without -F, the /ifs/.ifsvar
directory content and any of its subdirectories are skipped. This setting allows the specification of potentially
dangerous, unsupported protection policies.
-L
Specifies file arguments by LIN instead of path.
-n
Displays the list of files that would be changed without taking any action.
-v
Displays each file as it is reached.
-r
Runs a restripe.
-R
Sets protection recursively on files.
-p <policy>
Specifies protection policies in the following forms:
+M Where M is the number of node failures that can be tolerated without loss of data. +M
must be a number from, where numbers 1 through 4 are valid.
+D:M Where D indicates the number of drive failures and M indicates number of node failures
that can be tolerated without loss of data. D must be a number from 1 through 4 and M
must be any value that divides into D evenly. For example, +2:2 and +4:2 are valid, but
+1:2 and +3:2 are not.
Nx Where N is the number of independent mirrored copies of the data that will be stored. N
must be a number, with 1 through 8 being valid choices.
-w <width>
Specifies the number of nodes across which a file is striped. Typically, w = N + M, but width can also mean the
total of the number of nodes that are used.
You can set a maximum width policy of 32, but the actual protection is still subject to the limitations on N and M.
-c {on | off}
Specifies whether write-coalescing is turned on.
-g <restripe goal>
avoid Writes all associated file data and metadata to HDDs only. The data and metadata of the
file are stored so that SSD storage is avoided, unless doing so would result in an out-of-
space condition.
metadata Writes both file data and metadata to HDDs. One mirror of the metadata for the file is on
SSD storage if possible, but the strategy for data is to avoid SSD storage.
metadata-write Writes file data to HDDs and metadata to SSDs, when available. All copies of metadata
for the file are on SSD storage if possible, and the strategy for data is to avoid SSD
storage.
data Uses SSD node pools for both data and metadata. Both the metadata for the file and
user data, one copy if using mirrored protection and all blocks if FEC, are on SSD storage
if possible.
Syntax
isi smb log-level filters create <level>
[--ops <string>]
[--ip-addrs <string>]
[--verbose]
Options
<level>
The logging level for the new filter. Valid logging levels are:
• always
• error
• warning
• info
Syntax
isi smb log-level filters delete <id> <level>
[--all]
[--force]
[--verbose]
Options
<id>
Deletes a specific SMB log filter, by ID.
<level>
Deletes all SMB log filters at a specified level. The following levels are valid:
• always
• error
• warning
• info
• verbose
• debug
• trace
--all
Deletes all SMB log-level filters.
{--force | -f}
Skips the delete confirmation prompt.
{verbose | -v}
Displays more detailed information.
Syntax
isi smb log-level filters list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Syntax
isi smb log-level filters view <id>
[--level <string>]
Options
<id>
The ID of the SMB log-level filter to view.
{--level | -l} <string>
Specifies a log-level to view. The following levels are valid:
• always
• error
• warning
• info
• verbose
• debug
• trace
Syntax
isi smb log-level modify <level>
[--verbose]
Options
<level>
Specifies a log level to set for the SMB service. The following levels are valid:
Syntax
isi smb log-level view
Options
There are no options for this command.
To view a list of open files, run the isi smb openfiles list command.
Syntax
isi smb openfiles close <id>
[--force]
Options
<id>
Specifies the ID of the open file to close.
{--force | -f}
Suppresses command-line prompts and messages.
Examples
The following command closes a file with an ID of 32:
Syntax
isi smb openfiles list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of smb openfiles.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
NOTE: Any open files are automatically closed before an SMB session is deleted.
Syntax
isi smb sessions delete <computer-name>
[{--user <name> | --uid <id> | --sid <sid>}]
[--force]
[--verbose]
Options
<computer-name>
Required. Specifies the computer name. If a --user, --uid, or --sid option is not specified, the system
deletes all SMB sessions associated with this computer.
--user <string>
Specifies the name of the user. Deletes only those SMB sessions to the computer that are associated with the
specified user.
--uid <id>
Specifies a numeric user identifier. Deletes only those SMB sessions to the computer that are associated with
the specified user identifier.
Examples
The following command deletes all SMB sessions associated with a computer named computer1:
The following command deletes all SMB sessions associated with a computer named computer1 and a user named user1:
Any open files are automatically closed before an SMB session is deleted.
Syntax
isi smb sessions delete-user {<user> | --uid <id> | --sid <sid> }
[--computer-name <string>]
[--force]
[--verbose]
Options
<user>
Required. Specifies the user name. If the --computer-name option is omitted, the system deletes all SMB
sessions associated with this user.
{--computer-name | -C} <string>
Deletes only the user's SMB sessions that are associated with the specified computer.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Examples
The following command deletes all SMB sessions associated with a user called user1:
The following command deletes all SMB sessions associated with a user called user1 and a computer called computer1:
Syntax
isi smb sessions list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Specifies the maximum number of SMB sessions to list.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi smb settings global modify
[--access-based-share-enum {yes | no}]
[--revert-access-based-share-enum]
[--dot-snap-accessible-child {yes | no}]
[--revert-dot-snap-accessible-child]
[--dot-snap-accessible-root]
[--revert-dot-snap-accessible-root]
[--dot-snap-visible-child {yes | no}]
[--revert-dot-snap-visible-child]
[--dot-snap-visible-root {yes | no}]
[--revert-dot-snap-visible-root]
[--enable-security-signatures {yes | no}]
[--revert-enable-security-signatures]
[--guest-user <string>]
[--revert-guest-user]
[--ignore-eas {yes | no}]
[--revert-ignore-eas]
[--onefs-cpu-multiplier <integer>]
[--revert-onefs-cpu-multiplier]
[--onefs-num-workers <integer>]
[--revert-onefs-num-workers]
[--reject-unencrypted-access {yes | no}]
[--revert-reject-unencrypted-access]
[--require-security-signatures {yes | no}]
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--dot-snap-accessible-child {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible in subdirectories of the share root. The
default setting is no.
--revert-dot-snap-accessible-child
Sets the value to the system default for --dot-snap-accessible-child.
--dot-snap-accessible-root {yes | no}
Specifies whether to make the /ifs/.snapshot directory accessible at the share root. The default setting is
yes.
--revert-dot-snap-accessible-root
Sets the value to the system default for --dot-snap-accessible-root.
--dot-snap-visible-child {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible in subdirectories of the share root. The
default setting is no.
--revert-dot-snap-visible-child
Sets the value to the system default for --dot-snap-visible-child.
--dot-snap-visible-root {yes | no}
Specifies whether to make the /ifs/.snapshot directory visible at the root of the share. The default setting
is no.
--revert-dot-snap-visible-root
Sets the value to the system default for --dot-snap-visible-root.
--enable-security-signatures {yes | no}
Indicates whether the server supports signed SMB packets.
--revert-enable-security-signatures
Sets the value to the system default for --enable-security-signatures.
--guest-user <integer>
Specifies the fully qualified user to use for guest access.
--revert-guest-user
Sets the value to the system default for --guest-user.
--ignore-eas {yes | no}
Specifies whether to ignore EAs on files.
--revert-ignore-eas
Sets the value to the system default for --ignore-eas.
Syntax
isi smb settings global view
Options
There are no options for this command.
Syntax
isi smb settings shares modify
[--access-based-enumeration {yes | no}]
[--revert-access-based-enumeration]
[--access-based-enumeration-root-only {yes | no}]
[--revert-access-based-enumeration-root-only]
[--allow-delete-readonly {yes | no}]
[--revert-allow-delete-readonly]
[--allow-execute-always {yes | no}]
[--revert-allow-execute-always]
[--ca-timeout <integer>]
[--revert-ca-timeout]
[--strict-ca-lockout {yes | no}]
[--revert-strict-ca-lockout]
[--ca-write-integrity {none | write-read-coherent | full}]
[--revert-ca-write-integrity]
[--change-notify {all | norecurse | none}]
[--revert-change-notify]
[--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}]
[--revert-create-permissions]
[--directory-create-mask <integer>]
[--revert-directory-create-mask]
[--directory-create-mode <integer>]
[--revert-directory-create-mode]
[--file-create-mask <integer>]
[--revert-file-create-mask]
[--file-create-mode <integer>]
[--revert-file-create-mode]
[--file-filtering-enabled {yes | no}]
[--revert-file-filtering-enabled]
[--file-filter-extensions <string>]
[--clear-file-filter-extensions]
[--add-file-filter-extensions <string>]
[--remove-file-filter-extensions <string>]
[--revert-file-filter-extensions]
[--file-filter-type {deny | allow}
[--revert-file-filter-type]
[--hide-dot-files {yes | no}]
[--revert-hide-dot-files]
[--host-acl <host-acl>]
[--revert-host-acl]
[--clear-host-acl]
[--add-host-acl <string>]
[--remove-host-acl <string>]
[--impersonate-guest {always | "bad user" | never}]
[--revert-impersonate-guest]
Options
--access-based-enumeration {yes | no}
Specifies whether access-based enumeration is enabled.
--revert-access-based-enumeration
Sets the value to the system default for --access-based-enumeration.
--access-based-enumeration-root-only {yes | no}
Specifies whether access-based enumeration is only enabled on the root directory of the share.
--revert-access-based-enumeration-root-only
Sets the value to the system default for --access-based-enumeration-root-only.
--allow-delete-readonly {yes | no}
Specifies whether read-only files can be deleted.
--revert-allow-delete-readonly
Sets the value to the system default for --allow-delete-readonly.
--allow-execute-always {yes | no}
Specifies whether a user with read access to a file can also execute the file.
--revert-allow-execute-always
Sets the value to the system default for --allow-execute-always.
--ca-timeout <integer>
The amount of time, in seconds, a persistent handle is retained after a client is disconnected or a server fails. The
default is 120 seconds.
--revert-ca-timeout
Sets the value to the system default for --ca-timeout.
--strict-ca-lockout {yes | no}
If set to yes, prevents another client from opening a file if a client has an open but disconnected persistent
handle for that file. If set to no, OneFS issues persistent handles, but discards them if any client other than the
original opener attempts to open the file. This option is only relevant if --continuously-available was
set to yes when the share was created. The default is yes.
--revert-strict-ca-lockout
Sets the value to the system default for --strict-ca-lockout.
--ca-write-integrity {none | write-read-coherent | full}
Specifies the level of write integrity on continuously available shares:
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--change-notify {norecurse | all | none}
Defines the change notify setting. The acceptable values are norecurse, all, and none.
--revert-change-notify
Sets the value to the system default for --change-notify.
--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}
Sets the default permissions to apply when a file or directory is created.
--revert-create-permissions
Sets the value to the system default for --create-permissions.
--directory-create-mask <integer>
Defines which mask bits are applied when a directory is created.
--revert-directory-create-mask
Sets the value to the system default for --directory-create-mask.
--directory-create-mode <integer>
Defines which mode bits are applied when a directory is created.
--revert-directory-create-mode
Sets the value to the system default for --directory-create-mode.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--file-create-mode <integer>
Defines which mode bits are applied when a file is created.
--revert-file-create-mode
Sets the value to the system default for --file-create-mode.
--file-filtering-enabled {yes | no}
If set to yes, enables file filtering at the share level. The default setting is no.
--revert-file-filtering-enabled
Sets the value for the system default of --file-filtering-enabled.
--file-filter-type {deny | allow}
If set to allow, allows the specified file types to be written to the share. The default setting is deny.
--revert-file-filter-type
Sets the value for the system default of --file-filter-type.
--file-filter-extensions <string>
Specifies the list of file types to deny or allow writes to the share, depending on the setting of --file-
filter-type. File types may be specified in a list of comma separated values.
--clear-file-filter-extensions
Clears the list of file filtering extensions for the share.
--add-file-filter-extensions <string>
Syntax
isi smb settings shares view
[--zone <string>]
Options
--zone <string>
Specifies the name of the access zone. Displays only the settings for shares in the specified zone.
Syntax
isi smb settings zone modify
[--access-based-share-enum {yes | no}]
[--revert-access-based-share-enum]
[--enable-security-signatures {yes | no}]
[--revert-enable-security-signatures]
[--reject-unencrypted-access {yes | no}]
[--revert-reject-unencrypted-access]
[--require-security-signatures {yes | no}]
[--revert-require-security-signatures]
[--server-side-copy {yes | no}]
[--revert-server-side-copy]
[--support-multichannel {yes | no}]
[--revert-support-multichannel]
Options
--access-based-share-enum {yes | no}
Enumerates only the files and folders that the requesting user has access to.
--revert-access-based-share-enum
Sets the value to the system default for --access-based-share-enum.
--enable-security-signatures {yes | no}
Indicates whether the server supports signed SMB packets.
--revert-enable-security-signatures
Sets the value to the system default for --enable-security-signatures.
--reject-unencrypted-access {yes | no}
Rejects unencrypted client sessions.
--revert-reject-unencrypted-access
Sets the value to the system default for --reject-unencrypted-access.
--require-security-signatures {yes | no}
Specifies whether packet signing is required. If set to yes, signing is always required. If set to no, signing is not
required but clients requesting signing will be allowed to connect if the --enable-security-signatures
option is set to yes.
--revert-require-security-signatures
Sets the value to the system default for --require-security-signatures.
--server-side-copy {yes | no}
Enables or disables SMB server-side copy functionality. The default is yes.
--revert-server-side-copy
Sets the value to the system default for --server-side-copy.
--support-multichannel {yes | no}
Specifies whether Multichannel for SMB 3.0 is enabled on the cluster. SMB Multichannel is enabled by default.
--revert-support-multichannel
Set the value of --support-multichannel back to the default system value.
--support-smb2 {yes | no}
Specifies whether to support the SMB 2.0 protocol. The default setting is yes.
--revert-support-smb2
Sets the value to the system default for --support-smb2.
--support-smb3-encryption {yes | no}
Supports SMBv3 encryption for the access zone. The default setting is no.
--revert-support-smb3-encryption
Sets the value to the system default for --support-smb3-encryption.
--zone <string>
Access zone.
Syntax
isi smb settings zone view
[--zone <string>]
Options
--zone <string>
The name of the access zone for which you are viewing SMB settings.
Syntax
isi smb shares create <name> <path>
[--zone <string>]
[--inheritable-path-acl {yes | no}]
[--create-path]
[--host-acl <string>]
[--description <string>]
[--csc-policy {none | documents | manual | programs}]
[--allow-variable-expansion {yes | no}]
[--auto-create-directory {yes | no}]
[--browsable {yes | no}]
[--allow-execute-always {yes | no}]
[--directory-create-mask <integer>]
[--strict-locking {yes | no}]
[--hide-dot-files {yes | no}]
[--impersonate-guest {always | "bad user" | never}]
[--strict-flush {yes | no}]
[--access-based-enumeration {yes | no}]
[--access-based-enumeration-root-only {yes | no}]
[--continuously-available {yes | no}]
[--ca-timeout <integer>]
[--strict-ca-lockout {yes | no}]
[--ca-write-integrity {none | write-read-coherent | full}]
[--mangle-byte-start <string>]
[--file-create-mask <integer>]
[--create-permissions {"default acl" | "inherit mode bits"
| "use create mask and mode"}]
[--mangle-map <string>]
[--impersonate-user <string>]
[--change-notify <string>]
[--oplocks {yes | no}]
[--allow-delete-readonly {yes | no}]
[--directory-create-mode <integer>]
[--ntfs-acl-support {yes | no}]
[--file-create-mode <integer>]
[--file-filtering-enabled {yes | no}]
[--file-filter-type {deny | allow}]
[--file-filter-extensions <string>]
[--smb3-encryption-enabled {yes | no}]
none Continuously available writes are not handled differently than other writes to the cluster.
If you specify none and a node fails, you may experience data loss without notification.
Therefore, we do not recommend this option.
write-read- Ensures that writes to the share are moved to persistent storage before a success
coherent message is returned to the SMB client that sent the data. This is the default setting.
full Ensures that writes to the share are moved to persistent storage before a success
message is returned to the SMB client that sent the data, and prevents OneFS from
granting SMB clients write-caching and handle-caching leases.
--mangle-byte-start <string>
Specifies the wchar_t starting point for automatic invalid byte mangling.
--file-create-mask <integer>
Defines which mask bits are applied when a file is created.
--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}
Sets the default permissions to apply when a file or directory is created. Valid values are "default acl",
"inherit mode bits", and "use create mask and mode"
--mangle-map <string>
Maps characters that are valid in OneFS but are not valid in SMB names.
--impersonate-user <string>
Allows all file access to be performed as a specific user. This value must be a fully qualified user name.
--change-notify {norecurse | all | none}
Defines the change notify setting. The acceptable values are norecurse, all, or none.
--oplocks {yes | no}
If set to yes, allows oplock requests. The default setting is yes.
--allow-delete-readonly {yes | no}
If set to yes, allows read-only files to be deleted. The default setting is no.
--directory-create-mode <integer>
Defines which mode bits are applied when a directory is created.
--ntfs-acl-support {yes | no}
If set to yes, allows ACLs to be stored and edited from SMB clients. The default setting is yes.
--file-create-mode <integer>
Defines which mode bits are applied when a file is created.
--file-filtering-enabled {yes | no}
If set to yes, enables file filtering at the share level. The default setting is no.
--file-filter-type {deny | allow}
If set to allow, allows the specified file types to be written to the share. The default setting is deny.
--file-filter-extensions <string>
Specifies the list of file extensions to deny or allow writes to the share, depending on the setting of --file-
filter-type. File types may be specified in a list of comma separated values.
--smb3-encryption-enabled {yes | no}
Enables SMBv3 encryption on the share.
Syntax
isi smb shares delete <share>
[--zone <string>]
[--force]
[--verbose]
Options
<share>
Specifies the name of the SMB share to delete.
--zone <string>
Specifies the access zone the SMB share is assigned to. If no access zone is specified, the system deletes the
SMB share with the specified name assigned to the default System zone, if found.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays more detailed information.
Examples
The following command deletes a share named "test-smb" in the "example-zone" access zone without displaying a warning prompt:
Syntax
isi smb shares list
[--zone <string>]
[--limit <integer>]
[--sort {name | path | description}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Specifies the access zone. Displays all SMB shares in the specified zone. If no access zone is specified, the
system displays all SMB shares in the default System zone.
{--limit | -l} <integer>
Specifies the maximum number of items to list.
Syntax
isi smb shares modify <share>
[--name <string>]
[--path <path>]
[--zone <string>]
[--new-zone <string>]
[--host-acl <host-acl>]
[--revert-host-acl]
[--clear-host-acl]
[--add-host-acl <string>]
[--remove-host-acl <string>]
[--description <string>]
[--csc-policy {manual | documents | programs | none}]
[--revert-csc-policy]
[--allow-variable-expansion {yes | no}]
[--revert-allow-variable-expansion]
[--auto-create-directory {yes | no}]
[--revert-auto-create-directory {yes | no}]
[--browsable {yes | no}]
[--revert-browsable]
[--allow-execute-always {yes | no}]
[--revert-allow-execute-always]
[--directory-create-mask <integer>]
[--revert-directory-create-mask]
[--strict-locking {yes | no}]
[--revert-strict-locking]
[--hide-dot-files {yes | no}]
[--revert-hide-dot-files]
[--impersonate-guest {always | "bad user" | never}]
[--revert-impersonate-guest]
[--strict-flush {yes | no}]
[--revert-strict-flush]
[--access-based-enumeration {yes | no}]
[--revert-access-based-enumeration]
[--access-based-enumeration-root-only {yes | no}]
[--revert-access-based-enumeration-root-only]
[--ca-timeout <integer>]
[--revert-ca-timeout]
[--strict-ca-lockout {yes | no}]
[--revert-strict-ca-lockout]
[--ca-write-integrity {none | write-read-coherent | full}]
[--revert-ca-write-integrity]
[--mangle-byte-start <integer>]
[--revert-mangle-byte-start]
Options
<share>
Required. Specifies the name of the SMB share to modify.
--name <name>
Specifies the name for the SMB share.
--path <path>
Specifies a new path for the SMB share, starting in /ifs.
--zone <string>
Specifies the access zone that the SMB share is assigned to. If no access zone is specified, the system modifies
the SMB share with the specified name assigned to the default System zone, if found.
--new-zone <string>
Specifies the new access zone that SMB share will be reassigned to.
--host-acl <host-acl>
An ACL expressing which hosts are allowed access. Specify --host-acl for each additional host ACL clause.
--revert-host-acl
Sets the value to the system default for --host-acl.
--clear-host-acl
Clears the value of an ACL that expresses which hosts are allowed access.
--add-host-acl <string>
Adds an ACL expressing which hosts are allowed access. Specify --add-host-acl for each additional host
ACL clause to add.
--remove-host-acl <string>
none Continuously available writes are not handled differently than other writes to the cluster.
If you specify none and a node fails, you may experience data loss without notification.
Therefore, we do not recommend this option.
write-read- Ensures that writes to the share are moved to persistent storage before a success
coherent message is returned to the SMB client that sent the data. This is the default setting.
full Ensures that writes to the share are moved to persistent storage before a success
message is returned to the SMB client that sent the data, and prevents OneFS from
granting SMB clients write-caching and handle-caching leases.
--revert-ca-write-integrity
Sets the value to the system default for --ca-write-integrity.
--mangle-byte-start <interger>
Specifies the wchar_t starting point for automatic byte mangling.
--revert-mangle-byte-start
Sets the value to the system default for --mangle-byte-start.
--file-create-mask <integer>
Specifies the file create mask bits.
--revert-file-create-mask
Sets the value to the system default for --file-create-mask.
--create-permissions {"default acl" | "inherit mode bits" | "use create mask and mode"}
Sets the create permissions for new files and directories in a share.
--revert-create-permissions
Sets the value to the system default for --create-permissions.
--mangle-map <mangle-map>
The character mangle map. Specify --mangle-map for each additional character mangle map.
--revert-mangle-map
Sets the value to the system default for --mangle-map.
--clear-mangle-map
Clears the value for character mangle map.
--add-mangle-map <string>
Adds a character mangle map. Specify --add-mangle-map for each additional Add character mangle map.
--remove-mangle-map <string>
Syntax
isi smb shares permission create <share> {<user> | --group <name>
| --gid <id> | --uid <id> | --sid <string> | --wellknown <string>}
{--run-as-root | --permission-type {allow | deny}
--permission {full | change | read}}
[--zone <zone>]
[--verbose]
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
{--permission-type | -d} {deny | allow}
Specifies whether to allow or deny a permission.
{--permission | -p} {read | full | change}
Specifies the level of control to allow or deny.
--run-as-root {yes | no}
If set to yes, allows the account to run as root. The default setting is no.
--zone <zone>
Specifies an access zone.
{--verbose | -v}
Displays more detailed information.
Syntax
isi smb shares permission delete <share> {<user> | --group <name>
|--gid <id> | --uid <id> | --sid <string> | --wellknown <string>}
[--zone <string>]
[--force]
[--verbose]
Options
<share>
Required. Specifies the SMB share name.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
{--force | -f}
Specifies that you want the command to execute without prompting for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi smb shares permission list <share>
[--zone <zone>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
Syntax
isi smb shares permission modify <share> {<user> | --group <name>
| --gid <id> | --uid <id> | --sid <string> | --wellknown <string>}
{--run-as-root | --permission-type {allow | deny}
--permission {full | change | read}}
[--zone <zone>]
[--verbose]
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user by name.
--group <name>
Specifies a group by name.
--gid <id>
Specifies a group by UNIX group identifier.
--uid <id>
Specifies a user by UNIX user identifier.
--sid <string>
Specifies an object by its Windows security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
{--permission-type | -d} {deny | allow}
Specifies whether to allow or deny a permission.
{--permission | -p} {read | full | change}
Specifies the level of control to allow or deny.
Syntax
isi smb shares permission view <share> {<user> |
--group <name> | --gid <integer>
| --uid <integer> | --sid <string>
| --wellknown <string>}
[--zone <string>]
Options
<share>
Specifies the name of the SMB share.
<user>
Specifies a user name.
--group <name>
Specifies a group name.
--gid <integer>
Specifies a numeric group identifier.
--uid <integer>
Specifies a numeric user identifier.
--sid <string>
Specifies a security identifier.
--wellknown <string>
Specifies a well-known user, group, machine, or account name.
--zone <string>
Specifies an access zone.
Syntax
isi smb shares view <share>
[--zone <string>]
Syntax
isi snapshot aliases create <name> <target>
[--verbose]
Options
<name>
Specifies the a name for the alias.
<target>
Assigns the alias to the specified snapshot or to the live version of the file system.
Specify as a snapshot ID or name. To target the live version of the file system, specify LIVE.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot aliases delete {<alias> | --all}
[--force]
[--verbose]
Options
<alias>
Deletes the snapshot alias of the specified name.
Specify as a snapshot-alias name or ID.
--all
Deletes all snapshot aliases.
{--force | -f}
Runs the command without prompting you to confirm that you want to delete the snapshot alias.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot aliases list
[--limit <integer>]
[--sort {id | name | target_id | target_name | created}]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot aliases modify <alias>
{--name <name> | --target <snapshot>}
[--verbose]
Syntax
isi snapshot aliases view <alias>
Options
<alias>
Displays detailed information about the specified snapshot alias.
Specify as a snapshot-alias name or ID.
Syntax
isi snapshot locks create <snapshot>
[--comment <string>]
[--expires {<timestamp> | <duration>}]
[--verbose]
Options
<snapshot>
Specifies the name of the snapshot to apply this lock to.
{--comment | -c} <string>
Specifies a comment to describe the lock.
Specify as any string.
{--expires | -x} {<timestamp> | <duration>}
Specifies when the lock will be automatically deleted by the system.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
Syntax
isi snapshot locks delete <snapshot> <id>
[--force]
[--verbose]
Options
<snapshot>
Deletes a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
{--force | -f}
Does not prompt you to confirm that you want to delete this snapshot lock.
{--verbose | -v}
Displays a message confirming that the snapshot lock was deleted.
Syntax
isi snapshot locks list <snapshot>
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<snapshot>
Displays all locks belonging to the specified snapshot.
Specify as a snapshot name.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
It is recommended that you do not modify the expiration date of snapshot locks and do not run this command.
Modifying the expiration date of a snapshot lock that was created by OneFS might result in data loss.
Options
<snapshot>
Modifies a snapshot lock that has been applied to the specified snapshot.
Specify as a snapshot name or ID.
<id>
Modifies the snapshot lock of the specified ID.
{--expires | -x} {<timestamp> | <duration>}
Specifies when the lock will be automatically deleted by the system.
If this option is not specified, the snapshot lock will exist indefinitely.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--clear-expires
Removes the duration period for the snapshot lock. If specified, the snapshot lock will exist on the cluster
indefinitely.
{--verbose | -v}
Displays a message confirming that the snapshot lock was modified.
Examples
The following command causes a snapshot lock applied to Wednesday_Backup to expire in three weeks:
Syntax
isi snapshot locks view <snapshot> <id>
Syntax
isi snapshot schedules create <name> <path> <pattern> <schedule>
[--alias <alias>]
[--duration <duration>]
[--verbose]
Options
<name>
Specifies a name for the snapshot schedule.
<path>
Specifies the path of the directory to include in the snapshots.
<pattern>
Specifies a naming pattern for snapshots created according to the schedule.
<schedule>
Specifies how often snapshots are created.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--alias <alias>
Specifies an alias for the latest snapshot generated based on the schedule. The alias enables you to quickly
locate the most recent snapshot that was generated according to the schedule.
Specify as any string.
{--duration | -x} <duration>
Specifies how long snapshots generated according to the schedule are stored on the cluster before OneFS
automatically deletes them.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
{--verbose | -v}
Displays a message confirming that the snapshot schedule was created.
Syntax
isi snapshot schedules delete {<schedule-name> | <all>
[--force]
[--verbose]
Options
<schedule-name>
Deletes the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
<all>
Deletes all snapshot schedules.
Syntax
isi snapshot schedules list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Syntax
isi snapshot schedules modify <schedule-name>
{--name <name> | --alias <name> | --path <path>
| --pattern <naming-pattern> | --schedule <schedule>
| --duration <duration> | --clear-duration}...
[--verbose]
Options
<schedule-name>
Modifies the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
--name <name>
Specifies a new name for the schedule.
Specify as any string.
{--alias | -a} <name>
Specifies an alias for the latest snapshot generated based on the schedule. The alias enables you to quickly
locate the most recent snapshot that was generated according to the schedule. If specified, the specified alias
will be applied to the next snapshot generated by the schedule, and all subsequently generated snapshots.
Specify as any string.
--path <path>
Specifies a new directory path for this snapshot schedule. If specified, snapshots generated by the schedule will
contain only this directory path.
Specify as a directory path.
--pattern <naming-pattern>
Specifies a pattern by which snapshots created according to the schedule are named.
--schedule <schedule>
Specifies how often snapshots are created.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
{--duration | -x} <duration>
Specifies how long snapshots generated according to the schedule are stored on the cluster before OneFS
automatically deletes them.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--clear-duration
Removes the duration period for snapshots created according to the schedule. If specified, generated snapshots
will exist on the cluster indefinitely.
{--verbose | -v}
Displays a message confirming that the snapshot schedule was modified.
Syntax
isi snapshot schedules pending list
[--begin <timestamp>]
[--end <timestamp>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
Options
{--begin | -b} <timestamp>
Displays only snapshots that are scheduled to be generated after the specified date.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are scheduled to be generated after the
current time.
{--end | -e} <time>
Displays only snapshots that are scheduled to be generated before the specified date.
Specify <time> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
If this option is not specified, the output displays a list of snapshots that are scheduled to be generated before
30 days after the begin time.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format <output-format>
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot schedules view <schedule-name>
Options
<schedule-name>
Displays information about the specified snapshot schedule.
Specify as a snapshot schedule name or ID.
Syntax
isi snapshot settings modify
{--service {enable | disable}
| --autocreate {enable | disable}
| --autodelete {enable | disable}
| --reserve <integer>
| --global-visible-accessible {yes | no}
| --nfs-root-accessible {yes | no}
| --nfs-root-visible {yes | no}
| --nfs-subdir-accessible {yes | no}
| --smb-root-accessible {yes | no}
| --smb-root-visible {yes | no}
| --smb-subdir-accessible {yes | no}
| --local-root-accessible {yes | no}
| --local-root-visible {yes | no}
| --local-subdir-accessible {yes | no}}...
[--verbose]
Options
--service {enable | disable}
Determines whether snapshots can be generated.
NOTE: Disabling snapshot generation might cause some OneFS operations to fail. It is
recommended that you do not disable this setting.
--autocreate {enable | disable}
Determines whether snapshots are automatically generated according to snapshot schedules.
Specifying disable does not prevent OneFS applications from generating snapshots.
--autodelete {enable | disable}
Determines whether snapshots are automatically deleted according to their expiration dates.
All snapshots that pass their expiration date while this option is disabled will immediately be deleted when the
option is enabled again.
--reserve <integer>
Specifies the percentage of the file system to reserve for snapshot usage.
Specify as a positive integer between 1 and 100.
NOTE: This option limits only the amount of space available to applications other than
SnapshotIQ. It does not limit the amount of space that snapshots are allowed to occupy.
Snapshots can occupy more than the specified percentage of system storage space.
--global-visible-accessible {yes | no}
Specifying yes causes snapshot directories and sub-directories to be visible and accessible through all protocols,
overriding all other snapshot visibility and accessibility settings. Specifying no causes visibility and accessibility
settings to be controlled through the other snapshot visibility and accessibility settings.
--nfs-root-accessible {yes | no}
Determines whether snapshot directories are accessible through NFS.
--nfs-root-visible {yes | no}
Determines whether snapshot directories are visible through NFS.
--nfs-subdir-accessible {yes | no}
Determines whether snapshot subdirectories are accessible through NFS.
--smb-root-accessible {yes | no}
Syntax
isi snapshot settings view
Options
There are no options for this command.
Syntax
isi snapshot snapshots create <path>
[--name <name>]
[--expires {<timestamp> | <duration>}]
[--alias <name>]
[--verbose]
Options
<path>
Specifies the path of the directory to include in this snapshot.
--name <name>
Specifies a name for the snapshot.
{--expires | -x} {<timestamp> | <duration>}
Specifies when OneFS will automatically delete this snapshot.
If this option is not specified, the snapshot will exist indefinitely.
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
Syntax
isi snapshot snapshots delete {--all | --snapshot <snapshot>
| --schedule <schedule> | --type <type>}
[--force]
[--verbose]
Options
--all
Deletes all snapshots.
--snapshot <snapshot>
Deletes the specified snapshot.
Specify as a snapshot name or ID.
--schedule <schedule>
Deletes all snapshots created according to the specified schedule.
Specify as a snapshot schedule name or ID.
--type <type>
Deletes all snapshots of the specified type.
The following types are valid:
{--force | -f}
Does not prompt you to confirm that you want to delete the snapshot.
{--verbose | -v}
Examples
The following command deletes newSnap1:
Syntax
isi snapshot snapshots list
[--state <state>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--state <state>
Displays only snapshots and snapshot aliases that exist in the specified state.
The following states are valid:
all Displays all snapshots and snapshot aliases that are currently occupying space on the
cluster.
active Displays only snapshots and snapshot aliases that have not been deleted.
deleting Displays only snapshots that have been deleted but are still occupying space on the
cluster. The space occupied by deleted snapshots will be freed the next time the
snapshot delete job is run.
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table output without headers.
{--no-footer | -z}
Displays table output without footers. Footers display snapshot totals, such as the total amount of storage space
consumed by snapshots.
{--verbose | -v}
Displays more detailed information.
Syntax
isi snapshot snapshots modify <snapshot>
{--name <name> | --expires {<timestamp> | <duration>}
| --clear-expires | --alias <name>}...
[--verbose]
Options
<snapshot>
Modifies the specified snapshot or snapshot alias.
Specify as the name or ID of a snapshot or snapshot alias.
--name <name>
Specifies a new name for the snapshot or snapshot alias.
Specify as any string.
{--expires | -x} {<timestamp> | <duration>}
Specifies when OneFS will automatically delete this snapshot.
Specify <timestamp> in the following format:
<yyyy>-<mm>-<dd>[T<HH>:<MM>[:<SS>]]
<integer><time>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
Syntax
isi snapshot snapshots view <snapshot>
Options
<snapshot>
Displays information about the specified snapshot.
Specify as a snapshot name or ID.
Syntax
isi snmp settings modify
[--service {yes | no}]
[--system-location <string>]
[--revert-system-location]
[--system-contact <string>]
[--revert-system-contact]
[--snmp-v1-v2c-access {yes | no}]
[--revert-snmp-v1-v2c-access]
[--read-only-community <string>]
[--revert-read-only-community]
Options
--service {yes | no}
Enables or disables the SNMP service.
--system-location <string>
The location of the SNMP system.
--revert-system-location
Sets --system-location to the system default.
--system-contact <string>
A valid email address for the system owner.
--revert-system-contact
Sets --system-contact to the system default.
--snmp-v1-v2c-access {yes | no}
Enables or disables the SNMP v1 and v2c protocols.
--revert-snmp-v1-v2c-access
Sets --snmp-v1-v2c-access to the system default.
{--read-only-community | -c} <string>
The name of the read-only community.
--revert-read-only-community
Sets --read-only-community to the system default.
--snmp-v3-access {yes | no}
Enables or disables SNMP v3.
--revert-snmp-v3-access
Sets --snmp-v3-access to the system default.
{--snmp-v3-read-only-user | -u} <string>
The read-only user for SNMP v3 read requests.
--revert-snmp-v3-read-only-user
Sets --snmp-v3-read-only-user to the system default.
{--snmp-v3-password | -p} <string>
Modify the SNMP v3 password.
--revert-snmp-v3-password
Sets --snmp-v3-password to the system default.
--set-snmp-v3-password
Specify --snmp-v3-password interactively.
Syntax
isi snmp settings view
Example
To view the currently-configured SNMP settings, run the following command:
Syntax
isi ssh settings modify
[--ciphers <string>]
[--host-key-algorithms <string>]
[--ignore-rhosts <boolean>]
[--kex-algorithms <string>]
[--login-grace-time <duration>]
[--log-level <string>]
[--macs <string>]
[--max-auth-tries <integer>]
[--max-sessions <integer>]
[--max-startups <string>]
[--permit-empty-passwords <boolean>]
[--permit-root-login <boolean>]
[--port <integer>]
[--print-motd <boolean>]
[--pubkey-accepted-key-types <string>]
[--strict-modes <boolean>]
[--subsystem <string>]
[--syslog-facility <string>]
[--tcp-keep-alive <boolean>]
[--user-auth-method (password | publickey | both | any)]
[--match <string>]
[{--verbose | -v}]
[{--help | -h}]
Options
--ciphers <string>
Specifies the ciphers allowed for protocol version 2.
Syntax
isi statistics client
[--numeric]
[--local-addresses <string>]
[--local_names <string>]
[--remote_addresses <integer>]
[--remote_names <string>]
[--user-ids <integer>]
[--user-names <string>]
[--protocols <value>]
[--classes <string>]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit]
[--long]
[--totalby <column>]
[--output <column>]
[--sort <column>]
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--numeric
If text identifiers of local hosts, remote clients, or users are in the list of columns to display (the default setting is
for them to be displayed), display the unresolved numeric equivalent of these columns.
--local-addresses <string>
Specifies local IP addresses for which statistics will be reported.
--local-names <string>
Specifies local host names for which statistics will be reported.
--remote-addresses <string>
Specifies remote IP addresses for which statistics will be reported.
--remote-names <string>
Specifies remote client names for which statistics will be reported.
--user-ids <string>
Specifies user ids for which statistics will be reported. The default setting is all users.
--user-names <string>
Specifies user names for which statistics will be reported. The default setting is all users.
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified in a comma-separated list, for
example --protocols http,papi. The following values are valid:
• all
• external
• ftp
• hdfs
• http
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
• Node
• {Proto | protocol}
• Class
• {UserId | user.id}
• {UserName | user.name}
• {LocalAddr | local_addr}
• {LocalName | local_name}
{TimeMin | Displays the minimum elapsed time taken to complete an operation. Displayed in
time_min} microseconds.
{TimeAvg | Displays the average elapsed time taken to complete an operation. Displayed in
time_avg} microseconds.
Node Displays the node on which the operation was performed.
{Proto | Displays the protocol of the operation.
protocol}
Class Displays the class of the operation.
{UserID | Displays the numeric UID of the user issuing the operation request.
user.id}
{UserName | Displays the resolved text name of the UserID. If resolution cannot be performed,
user.name} UNKNOWN is displayed.
{LocalAddr | Displays the local IP address of the user issuing the operation request.
local_addr}
{LocalName | Displays the local host name of the user issuing the operation request.
local_name}
{RemoteAddr | Displays the remote IP address of the user issuing the operation request.
remote_addr}
{RemoteName | Displays the remote client name of the user issuing the operation request.
remote_name}
--sort <column>
Specifies how rows are ordered. The following values are valid:
• {NumOps | num_operations}
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics data-reduction <action>
[--resolution <integer>]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
{--help | -h}
Displays help for this command.
Syntax
isi statistics data-reduction view
[--resolution <integer>]
[{--help | -h}]
Options
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
{--help | -h}
Displays help for this command.
Syntax
isi statistics drive
[--type <value>]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit <integer>]
[--long]
[--output <column>]
[--sort <column>]
[--format][--top]
[--no-header]
[--no-footer]
[--verbose]
Options
--type <string>
Specifies the drive types for which statistics will be reported. The default setting is all drives. The following
values are valid:
• sata
• sas
• ssd
{ --nodes | -n} <node>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list, for
example, --nodes 1,2. The default value is all. The following values are valid:
• all
• <int>
{--degraded | -d}
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--output <column>
Specifies which columns to display. The following values are valid:
• {Timestamp | time}
• {Drive | drive_id}
• {Type | }
• {BytesIn | bytes_in}
• {SizeIn | xfer_size_in}
• {OpsOut | xfers_out}
• {BytesOut | bytes_out}
• {SizeOut | xfer_size_out}
• {TimeAvg | access_latency}
• {Slow | access_slow}
• {TimeInQ | iosched_latency}
• {Queued | iosched_queue}
• {Busy | used_bytes_percent}
• {Inodes | used_inodes}
--sort <column>
Specifies how the rows are ordered. The following values are valid:
• {Timestamp | time}
• {Drive | drive_id}
• {Type | }
• {BytesIn | bytes_in}
• {SizeIn | xfer_size_in}
• {OpsOut | xfers_out}
• {BytesOut | bytes_out}
• {SizeOut | xfer_size_out}
• {TimeAvg | access_latency}
• {Slow | access_slow}
• {TimeInQ | iosched_latency}
• {Queued | iosched_queue}
• {Busy | used_bytes_percent}
• {Inodes | used_inodes}
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Syntax
isi statistics heat
[--events <string>]
[--pathdepth <integer>]
[--maxpath <integer>]
[--classes <string>]
[--numeric]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit <integer>]
[--long]
[--totalby <column>]
[--output <column>]
[--sort <column>
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--events <string>
Specifies which event types for the specified information are reported. The following values are valid:
blocked Access to the LIN was blocked waiting for a resource to be released by another
operation. Class is other.
contended A LIN is experiencing cross-node contention; it is being accessed simultaneously through
multiple nodes. Class is other.
deadlocked The attempt to lock the LIN resulted in deadlock. Class is other.
getattr A file or directory attribute has been read. Class is namespace_read.
link The LIN has been linked into the file system; the LIN associated with this event is the
parent directory and not the linked LIN. Class is namespace_write.
lock The LIN is locked. Class is other.
lookup A name is looked up in a directory; the LIN for the directory searched is the one
associated with the event. Class is namespace_read.
read A read was performed. Class is read.
rename A file or directory was renamed. The LIN associated with this event is the directory
where the rename took place for either the source directory or the destination directory,
if they differ. Class is namespace_write.
setattr A file or directory attribute has been added, modified, or deleted. Class is
namespace_write.
-pathdepth <integer>
Reduces paths to the specified depth.
--maxpath <integer>
Specifies the maximum path length to look up in the file system.
--classes <string>
Specifies which classes for the specified information will be reported. The default setting is all classes. The
following values are valid:
--numeric
If text identifiers of local hosts, remote clients, or users are in the list of columns to display (the default setting is
for them to be displayed), display the unresolved numeric equivalent of these columns.
{ --nodes | -n} <value>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list—for
example, --nodes 1,2. The default value is all. The following values are valid:
• all
• <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option also disables the display of
units within the data table.
{--interval | -I} <integer>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
--limit <integer>
Displays only the specified number of entries after totaling and ordering.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
• Node
• {Event | event_name}
• {Class | class_name}
• LIN
• Path
--output <column>
Specifies the columns to display. The following values are valid:
--sort <column>
Specifies how rows are ordered. The following values are valid:
• {Ops | operation_rate}
• Node
• {Event | event_name}
• {Class | class_name}
• LIN
• Path
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics list operations
[--limit]
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics list operations
[--protocols <value>]
[--limit]
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified in a comma-separated list, for
example --protocols http,papi. The following values are valid:
• nfs3
• smb1
• nlm
• ftp
• http
• siq
• smb2
• nfs4
• papi
• jobd
• irp
• lsass_in
• lsass_out
• hdfs
• console
• ssh
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Syntax
isi statistics protocol
[--classes <class>...]
[--protocols <protocol>...]
[--operations <operation>...]
[--zero]
[--nodes <value>]
[--degraded]
[--nohumanize]
[--interval <integer>]
[--repeat <integer>]
[--limit]
[--long]
[--totalby <column>...]
[--output <column>...]
[--nodes <value>]
[--sort <column>...]
[--format]
[--no-header]
[--no-footer]
[--verbose]
Options
--classes <class>
Specifies which operation classes to report statistics on. The following values are valid:
--protocols <value>
Specifies which protocols to report statistics on. Multiple values can be specified in a comma-separated list, for
example --protocols http,papi. The following values are valid:
• nfs3
• smb1
• nlm
• ftp
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--totalby <column>
Aggregates results according to specified fields. The following values are valid:
• Node
• {Proto | protocol}
• Class
• {Op | operation}
--output <column>
Specifies which columns to display. The following values are valid:
{timestamp | Displays the time at which the isi statistics tool last gathered data. Displayed in
time} POSIX time (number of seconds elapsed since January 1, 1970).
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
h Specifies hours
s Specifies seconds
{TimeMin | Displays the minimum elapsed time taken to complete an operation. Displayed in
time_min} microseconds.
{TimeAvg | Displays the average elapsed time taken to complete an operation. Displayed in
time_avg} microseconds.
{TimeStdDev | Displays the elapsed time taken to complete an operation as a standard deviation from
time_standard_ the mean elapsed time.
dev}
Node Displays the node on which the operation was performed.
{Proto | Displays the protocol of the operation.
protocol}
--sort <column>
Specifies how rows are ordered. The following values are valid:
• Class
• In
• InAvg | in_avg}
• InMax | in_max}
• InMin | in_min}
• InStdDev | in_standard_dev}
• Node
• NumOps | operation_count}
• Op | operation}
• Ops | operation_rate}
• Out
• OutAvg | out_avg}
• OutMax | out_max}
• OutMin | out_min}
• OutStdDev | out_standard_dev}
• Proto | protocol}
• TimeAvg | time_avg}
• TimeMax | time_max}
• TimeMin | time_min}
• TimeStamp | time}
• TimeStdDev | time_standard_dev}
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics pstat
[--protocol <protocol>]
[--degraded]
[--interval <integer>]
[--repeat <integer>]
[--format]
[--verbose]
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics query history
[--keys <string>]
[--substr]
[--raw]
[--nodes <value>]
[--degraded]
[--interval <number>]
[--repeat <number>]
[--limit]
[--long]
[--format]
[--no-header]
[--no-footer]
[--verbose]
{--limit | -l}<integer>
Limits the number of statistics to display.
--long
Displays all possible columns.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
Displays data without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi statistics query history
[--keys <string>]
[--substr]
[--begin <integer>]
[--end <integer>]
[--resolution <number>]
[--memory-only]
[--raw]
[--nodes <value>]
Options
--keys <string> ...
Specifies which statistics should be reported for requested nodes, where the value for <string> is a statistics
key. Use the isi statistics list keys command for a complete listing of statistics keys.
--substr
Matches the statistics for '.*<key> .*' for every key specified with --keys.
--begin <time>
Specifies begin time in UNIX Epoch timestamp format.
--end <time>
Specifies end time in UNIX Epoch timestamp format.
--resolution <integer>
Specifies the minimum interval between series data points in seconds.
--memory-only
Retrieves only the statistics in memory, not those persisted to disk.
--raw
Outputs complex objects as hex.
{ --nodes | -n} <node>
Specifies which nodes to report statistics on. Multiple values can be specified in a comma-separated list, for
example, --nodes 1,2. The default value is all. The following values are valid:
• all
• <int>
{--degraded | -d}
Sets the report to continue running if some nodes do not respond.
--nohumanize
Displays all data in base quantities, without dynamic conversion. If set, this option also disables the display of
units within the data table.
{--interval | -i} <float>
Reports data at the interval specified in seconds.
{--repeat | -r} <integer>
Specifies how many times to run the report before quitting.
NOTE: To set the report to run indefinitely, specify -1.
{--limit | -l}<integer>
Limits the number of statistics to display.
--format {table | json | csv | list | top}
Displays output in table, JavaScript Object Notation (JSON), comma-separated value (CSV), list format, or top-
style display where data is continuously overwritten in a single table.
NOTE: If you specify--top without --repeat, the report runs indefinitely.
{--noheader | -a}
Displays data without column headings.
{ --no-footer | -z}
isi status
Displays information about the current status of the nodes on the cluster.
Syntax
isi status
[--all-nodes | -a]
[--node | -n <integer>]
[--all-nodepools | -p]
[--nodepool | -l <string>]
[--quiet | -q]
[--verbose | -v]
Options
--all-nodes | -a
Display node-specific status for all nodes on a cluster.
--node | -n <integer>
Display node-specific status for the node specified by its logical node number (LNN).
--all-nodepools | -p
Display node pool status for all node pools in the cluster.
--nodepool | -l <string>
Display node pool status for the specified node pool.
--quiet | -q
Display less detailed information.
--verbose | -v
Display more detailed information for the --nodepool or --all-nodepools options.
Syntax
isi storagepool compatibilities active create <class-1> <class-2>
[--assess {yes|no}]
[--verbose]
[--force]
Options
<class-1>
An existing node pool class, one of S200 or X400.
<class-2>
The node class that is compatible with the existing node pool, one of S210 or X410. Note that S210 nodes are
only compatible with S200 node pools, and X410 nodes are only compatible with X400 node pools.
Examples
The following command creates a compatibility between S200 and S210 nodes without asking for confirmation:
Syntax
isi storagepool compatibilities active delete <ID>
[--assess {yes | no}]
[--verbose]
[--force]
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool compatibilities active
list command to view the ID numbers of active compatibilities.
{--assess | -a} {yes | no}
Checks the results without actually deleting the compatibility.
{--verbose | -v}
Displays more detailed information.
{--force | -f}
Performs the action without asking for confirmation.
Example
The following command provides information about the results of deleting a compatibility without actually performing the action:
Provided that a compatibility with the ID of 1 exists, OneFS displays information similar to the following example:
Deleting compatibility with id 1 is possible.
This delete will cause these nodepools to split:
1: Nodepool s200_0b_0b will be split. A tier will be created and all
resultant nodepools from this split will be incorporated into it. All
filepool policies targeted at the splitting pool will be redirected
towards this new tier. That tier's name is s200_0b_0b-tier
Syntax
isi storagepool compatibilities active list
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of compatibilities that are listed.
{--format | -f}
Lists active compatibilities in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Example
The following command lists active compatibilities:
Syntax
isi storagepool compatibilities active view <ID>
Options
<ID>
The ID number of the compatibility to view. You can use the isi storagepool compatibilities
active list command to display the ID numbers of active compatibilities.
Example
The following command displays information about an active compatibility with ID number 1:
Syntax
isi storagepool compatibilities available list <name>
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of available compatibilities that are listed.
{--format | -f}
Lists available compatibilities in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
Example
The following command lists available compatibilities:
If available compatibilities exist, command output appears similar to the following example:
Class 1 Class 2
-----------------
S200 S210
X400 X410
-----------------
Total: 2
Syntax
isi storagepool compatibilities class active create <class-1> <class-2>
[--assess {yes | no}]
[--verbose]
[--force]
Options
<class-1>
An existing node pool class, one of S200, X200, X400, or N400.
<class-2>
The node class that is compatible with the existing node pool, one of S210, X210, X410, or N410. Note that
S210, X210, X410, and NL410 nodes are compatible only with similarly configured S200, X200, X400, and NL400
node pools, respectively. Also note that, in CLI commands, NL400 and NL410 nodes are expressed as N400 and
N410.
--assess {yes | no}
Checks whether the compatibility is valid without actually creating the compatibility.
--verbose
Displays more detailed information.
--force
Performs the action without asking for confirmation.
Examples
The following command creates a compatibility between S200 and S210 nodes without asking for confirmation:
Syntax
isi storagepool compatibilities class active delete <ID>
[--assess {yes | no}]
[--verbose]
[--force]
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool compatibilities class
active list command to view the ID numbers of active compatibilities.
--assess {yes | no}
Checks the results without actually deleting the compatibility.
--verbose
Displays more detailed information.
--force
Performs the action without asking for confirmation.
Example
The following command provides information about the results of deleting a compatibility without actually performing the action:
Provided that a compatibility with the ID of 1 exists, OneFS displays information similar to the following example:
Deleting compatibility with id 1 is possible.
This delete will cause these nodepools to split:
1: Nodepool s200_0b_0b will be split. A tier will be created and all
resultant nodepools from this split will be incorporated into it. All
filepool policies targeted at the splitting pool will be redirected
towards this new tier. That tier's name is s200_0b_0b-tier
Syntax
isi storagepool compatibilities class active list
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Example
The following command lists active node class compatibilities:
NOTE: In CLI commands and output, NL400 and NL410 nodes are expressed as N400 and N410, respectively.
Syntax
isi storagepool compatibilities class active view <ID>
Options
<ID>
The ID number of the compatibility to view. You can use the isi storagepool compatibilities
class active list command to display the ID numbers of active node class compatibilities.
Syntax
isi storagepool compatibilities class available list <name>
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--limit<integer>
Limits the number of available compatibilities that are listed.
--format
Lists available compatibilities in the specified format. The following values are valid:
• table
• json
• csv
• list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists available compatibilities:
If compatibilities are available, command output similar to the following example appears:
Class 1 Class 2
-----------------
S200 S210
X400 X410
Syntax
isi storagepool compatibilities ssd active create <class-1>
[--class-2 <string>]
[--count {yes | no}]
[--assess {yes | no}]
[--verbose]
[--force]
Options
<class-1>
The node class that the SSD compatibility will be created for. For example, you can create an SSD compatibility
for S200 nodes that have larger-capacity SSDs than the nodes in an existing S200 node pool. In this way, OneFS
can autoprovision the newer S200 nodes to the existing S200 node pool. You can use the isi storagepool
compatibilities ssd available list command to display valid node class values. For example, S200.
--class-2 <string>
The second node class that will be made SSD-compatible with the first node class. For example, you can create
an SSD compatibility for S210 nodes that have larger-capacity SSDs than the nodes in an existing S200 node
pool. Because S210 nodes can be made compatible with S200 nodes, they can be autoprovisioned to an S200
node pool. However, in this case, you also need to create a node class compatibility between S200 and S210
nodes.
--count {yes | no}
Specifies whether to create an SSD count compatibility.
--assess {yes | no}
Checks whether the SSD compatibility is valid without actually creating the compatibility.
--verbose
Displays more detailed information.
--force
Performs the action without asking for confirmation.
Examples
The following command creates an SSD class compatibility and SSD count compatibility between S200 and S210 nodes:
isi storagepool compatibilities ssd active create S200 --class-2 S210 --count yes
OneFS displays an advisory message similar to the following, and requires you to confirm the operation:
You are attempting to create an SSD compatibility for node class 1. You are also attempting
to create an SSD compatibility for node class 2. Creating an SSD compatibility will merge
all automatic node pools with nodes from the compatibility's node class with the same ssd
count and hdd configuration and compatible RAM into a single node pool. This will require
all of these automatic node pools to have the same L3 setting, requested protection, and
tier membership. Any file pool policies currently targeting any of the merging node pools
will automatically be re-targeted towards the resultant merged pool. If there exists
enough unprovisioned nodes belonging to this compatibility's node class to form a node
Syntax
isi storagepool compatibilities ssd active delete <ID>
[--id-2 <integer>]
[--assess {yes | no}]
[--verbose]
[--force]
Options
<ID>
The ID number of the compatibility. You can use the isi storagepool compatibilities ssd active
list command to view the ID numbers of active SSD compatibilities.
--id-2 <integer>
The ID number of the second SSD compatibility to delete. You can use the isi storagepool
compatibilities ssd active list command to view the ID numbers of active SSD compatibilities.
The --id-2 setting is optional, unless the node pool with the SSD compatibility also has an associated node
class compatibility. In this case, the setting is required, and deleting the second SSD compatibility will unprovision
some of the nodes from the node pool.
--assess {yes | no}
Checks the results without actually deleting the SSD compatibility.
--verbose
Displays more detailed information.
--force
Performs the action without asking for confirmation.
Example
The following command provides information about the results of deleting an SSD compatibility without actually performing the action:
Provided that an SSD compatibility between ID 1 and ID 2 exists, OneFS displays information similar to the following example:
Deleting ssd compatibility with id 1 is possible.
Deleting ssd compatibility with id 2 is possible.
This delete will cause these nodepools to split:
1: Nodepool s200_9.8kb_9.8kb-ssd_0b will be split. A tier will be created and all
resultant nodepools from this split will be incorporated into it. All
filepool policies targeted at the splitting pool will be redirected
towards this new tier. That tier's name is s200_9.8kb_9.8kb-ssd_0b-tier
Syntax
isi storagepool compatibilities ssd active list
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--limit<integer>
Limits the number of SSD compatibilities that are listed.
--format
Lists active SSD compatibilities in the specified format. The following values are valid:
• table
• json
• csv
• list
--no-header
Displays table and CSV output without headers.
--no-footer
Displays table output without footers.
--verbose
Displays more detailed information.
Example
The following command lists active SSD compatibilities:
NOTE: In CLI commands and output, NL400 and NL410 nodes are expressed as N400 and N410, respectively.
Syntax
isi storagepool compatibilities ssd active view <ID>
Options
<ID>
The ID number of the SSD compatibility to view. You can use the isi storagepool compatibilities
ssd active list command to display the ID numbers of active SSD compatibilities.
Example
The following command displays information about an active compatibility with ID number 1:
Syntax
isi storagepool compatibilities ssd available list
[--limit <integer>]
[--format {table | json |
csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--limit<integer>
Limits the number of SSD compatibilities that are listed.
--format
Lists active SSD compatibilities in the specified format. The following values are valid:
• table
• json
• csv
• list
--no-header
Example
The following command lists available SSD compatibilities:
If available SSD compatibilities exist, command output similar to the following example appears:
Class 1
-----------------
S200
S210
-----------------
Total: 2
Syntax
isi storagepool health
Options
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format
Displays node pools and tiers in the specified format. The following values are valid:
table
json
Syntax
isi storagepool nodepools create <name>
[--lnns <lnns>]
[--verbose]
Options
<name>
Specifies the name for the node pool. Names must begin with a letter or an underscore and may contain only
letters, numbers, hyphens, underscores, or periods.
{--lnns <lnns> | -n <lnns>}
Specifies the nodes in this pool. Nodes can be a comma-separated list or range of LNNs—for example,
1,4,10,12,14,15 or 1-6.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool nodepools delete <name>
[--force]
[--verbose]
Options
<name>
Specifies the name of the node pool to be deleted.
{--force | -f}
Suppresses any prompts, warnings, or confirmation messages that would otherwise appear.
{--verbose | -v}
Syntax
isi storagepool nodepools list
[--limit <integer>
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Specifies the number of node pools to display.
--format
Displays tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool nodepools modify <name>
[--protection-policy <string>]
[--lnns <integer>]
[--clear-lnns]
[--add-lnns <integer>]
[--remove-lnns <integer>]
[--tier <string>]
[--clear-tier]
[--l3 {yes | no}]
[--set-name <string>]
Examples
The following command specifies that SSDs in a node pool named hq_datastore are to be used as L3 cache:
The following command adds the node pool hq_datastore to an existing tier named archive-1:
Syntax
isi storagepool nodepools view <name>
[--verbose]
Options
<name>
Specifies the name of the storage pool.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool settings modify
[--automatically-manage-protection {all | files_at_default | none}]
[--automatically-manage-io-optimization {all | files_at_default | none}]
[--protect-directories-one-level-higher {yes | no}]
[--global-namespace-acceleration-enabled {yes | no}]
[--virtual-hot-spare-deny-writes {yes | no}]
[--virtual-hot-spare-hide-spare {yes | no}]
[--virtual-hot-spare-limit-drives <integer>]
[--virtual-hot-spare-limit-percent <integer>]
[--snapshot-disk-pool-policy-id <integer>]
[--spillover-target <string>| --no-spillover | --spillover-anywhere]
[--ssd-l3-cache-default-enabled {yes | no}]
[--ssd-qab-mirrors {one | all}]
[--ssd-system-btree-mirrors {one | all}]
[--ssd-system-delta-mirrors {one | all}]
[--verbose]
Required Privileges
ISI_PRIV_SMARTPOOLS
Options
--automatically-manage-protection {all | files_at_default | none}
Specifies whether SmartPools manages files' protection settings.
--automatically-manage-io-optimization {all | files_at_default | none}
Specifies whether SmartPools manages I/O optimization settings for files.
--protect-directories-one-level-higher {yes | no}
Protects directories at one level higher.
--global-namespace-acceleration-enabled {yes | no}
Examples
The following command specifies that SSDs on newly created node pools are to be used as L3 cache:
The following command specifies that 20 percent of node resources can be used for the virtual hot spare:
Syntax
isi storagepool settings modify
[--automatically-manage-protection {all | files_at_default | none}]
[--automatically-manage-io-optimization {all | files_at_default | none}]
[--protect-directories-one-level-higher <boolean>]
[--global-namespace-acceleration-enabled <boolean>]
[--virtual-hot-spare-deny-writes <boolean>]
Required Privileges
ISI_PRIV_SMARTPOOLS
Options
--automatically-manage-protection {all | files_at_default | none}
Set whether SmartPools manages files' protection settings.
--automatically-manage-io-optimization {all | files_at_default | none}
Set whether SmartPools manages files' I/O optimization settings
--protect-directories-one-level-higher<boolean>
Protect directories at one level higher.
--global-namespace-acceleration-enabled<boolean>
Enable or disable global namespace acceleration.
--virtual-hot-spare-deny-writes<boolean>
Deny new data writes.
--virtual-hot-spare-hide-spare<boolean>
Reduce the amount of available space.
--virtual-hot-spare-limit-drives<integer>
Specify the maximum number of virtual drives.
--virtual-hot-spare-limit-percent<integer>
Limit the percent of node resources allocated to virtual hot spare.
--spillover-target<string>
Specifies the target for spillover.
--no-spillover
Globally disables spillover.
--spillover-anywhere
Globally sets spillover to anywhere.
--ssd-l3-cache-default-enabled
Enable or disable SSDs on new node pools to serve as L3 cache.
Examples
The following command specifies that SSDs on newly created node pools are to be used as L3 cache:
The following command specifies that 20 percent of node resources can be used for virtual hot spare purposes:
Syntax
isi storagepool settings view
Options
There are no options for this command.
Example
The following command displays the global SmartPools settings on your cluster:
Syntax
isi storagepool tiers create <name>
[--children <string>]
[--verbose]
Options
<name>
Specifies the name for the storage pool tier. Specify as any string.
--children <string>
Specifies a node pool to be added to the tier. For each node pool that you intend to add, include a separate --
children argument.
--verbose
Displays more detailed information.
Example
The following command creates a tier and adds two node pools to the tier:
Syntax
isi storagepool tiers delete {<name> | --all}
[--verbose]
Options
{<name> | --all}
Specifies the tier to delete. The acceptable values are the name of the tier or all.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool tiers list
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--format
Displays tiers in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
Syntax
isi storagepool tiers modify <name>
[--set-name <string>]
[--verbose]
Options
<name>
Specifies the tier to be renamed.
{--set-name | -s} <string>
Sets the new name for the tier.
{--verbose | -v}
Displays more detailed information.
NOTE: Names must begin with a letter or underscore and must contain only letters, numbers, hyphens, underscores, or
periods.
Syntax
isi storagepool tiers view <name>
Options
<name>
Specifies the name of the tier.
{--verbose | -v}
Displays more detailed information.
Syntax
isi storagepool unprovisioned view
[--limit <integer>
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Limits the number of unprovisioned nodes and drives to display.
--format
Displays the list of unprovisioned nodes and drives in the specified format. The following values are valid:
table
json
csv
list
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi swift accounts create <name> <swiftuser> <swiftgroup>
[--zone <string>]
[--users <string>]
[--verbose]
Options
<name>
Specifies the name of the Swift account.
<swiftuser>
Specifies the file system user who owns files in the Swift account.
<swiftgroup>
Syntax
isi swift accounts delete <name>
[--zone <string>]
[--verbose]
[--force]
Options
<name>
Specifies the Swift account name.
--zone <string>
Specifies the access zone that is associated with the Swift account.
{--verbose | -v}
Displays detailed information.
{--force | -f}
Does not ask for a confirmation before deletion.
Syntax
isi swift accounts list
[--zone <string>]
[--limit <integer>]
[--sort (name | zone | swiftuser | swiftgroup | users)]
[--descending]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
--zone <string>
Syntax
isi swift accounts modify <name>
[--zone <string>]
[--swiftuser <string>]
[--swiftgroup <string>]
[--users <string> | --clear-users | --add-users <string> | --remove-users <string>]
[--verbose]
Options
<name>
Specifies the name of the Swift account.
--zone <string>
Specifies the access zone that is associated with the Swift account.
--swiftuser <string>
Specifies the file system user who owns files in the Swift account.
--swiftgroup <string>
Specifies the file system group that owns files in the Swift account. <swiftgroup> is associated with the
directory that represents an account whereas the containers and objects are associated with the primary group
of the user. If an administrator wants to assign <swiftgroup> to containers and objects as well, they must specify
<swiftgroup> as the primary group of the Swift user.
--users <string>
Specifies the users who are assigned access to the Swift account. Specify --users for each additional user
who must be assigned access to the Swift account.
--clear-users
Clears the values specified for the users who are assigned access to the Swift account.
--add-users <string>
Adds users and assigns them access to the Swift account. Specify --add-users for each additional user that
you want to add.
Syntax
isi swift accounts view <name>
[--zone <string>]
Options
<name>
Specifies the name of the Swift account.
--zone <string>
Specifies the access zone that is associated with the Swift account.
Syntax
isi sync certificates peer delete <id>
[--force]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
{--force | -f}
Do not prompt for confirmation of delete.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer import <certificate-path>
[--name <string>]
Options
<certificate-path>
Local path to the TLS certificate file in PEM, DER, or PCKS#12 format. This certificate file is copied into the
system certificate store, and you can remove it after import.
--name <string>
Administrator-configured certificate identifier.
--description <string>
Description field for administrative convenience.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
The number of SyncIQ certificate peers to list.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer modify <id>
[--name <string>]
Options
<id>
System certificate identifier or certificate name.
--name <string>
Administrator-configured certificate identifier.
--description <string>
Description field for administrative convenience.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer view <id>
[--format (list | json)]
Options
<id>
System certificate identifier or certificate name.
--format (list | json)
Displays output in list (default) or JavaScript Object Notation (JSON) format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates server delete <id>
[--force]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
Syntax
isi sync certificates server import <certificate-path> <certificate-key-path>
[--name <string>]
[--certificate-key-password <string>]
[--verbose]
Options
<certificate-path>
Local path to the TLS certificate file in PEM, DER, or PCKS#12 format. This certificate file is copied into the
system certificate store, and you can remove it after import.
<certificate-key-path>
Local path to the TLS certificate key file in PEM, DER, or PCKS#12 format. This certificate key file is copied into
the system certificate store, and you should remove it after import.
--name <string>
Administrator-configured certificate identifier.
--certificate-key-password <string>
The password for the certificate key, if the private key is password encrypted.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates server list
[--limit <integer>]
[--format (table | json | csv | list)]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l}<integer>
The number of SyncIQ certificate servers to list.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Syntax
isi sync certificates server modify <id>
[--name <string>]
[--description <string>]
[--verbose]
Options
<id>
System certificate identifier or certificate name.
--name <string>
Administrator-configured certificate identifier.
--description <string>
Description field for administrative convenience.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync certificates peer view <id>
[--format (list | json)]
Options
<id>
System certificate identifier or certificate name.
--format (list | json)
Displays output in list (default) or JavaScript Object Notation (JSON) format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs cancel {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Cancels a job that was created according to the specified replication policy.
Specify as a replication policy name or ID.
--all
Cancels all currently running replication jobs.
--verbose
Displays more detailed information.
Syntax
isi sync jobs list
[--state <state>]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays information about replication jobs for all policies.
--state <state>
Displays only jobs in the specified state.
The following values are valid:
Syntax
isi sync jobs pause {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Pauses a job that was created according to the specified replication policy.
Specify as a replication policy name.
--all
Pauses all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs reports list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
Syntax
isi sync jobs reports view <policy>
Options
<policy>
Displays information about a replication job created according to the specified replication policy.
Specify as a replication policy name or ID.
Syntax
isi sync jobs resume {<policy-name> | --all}
[--verbose]
Options
<policy-name>
Resumes a paused job that was created by the specified policy.
Specify as a replication policy name.
--all
Resumes all currently running replication jobs.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync jobs start <policy-name>
[--test]
[--source-snapshot <snapshot>]
[--verbose]
Options
<policy-name>
Syntax
isi sync jobs view <policy>
Options
<policy>
Displays information about a running replication job created according to the specified policy.
Specify as a replication policy name or ID.
Syntax
isi sync policies create <name> <action>
<source-root-path> <target-host> <target-path>
[--enabled (yes | no)]
[--description <string>]
[--check-integrity (yes | no)]
[--source-include-directories <string>]
[--source-exclude-directories <string>]
[--source-subnet <subnet> | --source-pool <pool>]
[--target-snapshot-archive (on | off)]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--target-detect-modifications (on | off)]
[--source-snapshot-archive (on | off)]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing (yes | no)]
[--schedule (<schedule> | when-source-modified
| when-snapshot-taken)]
[--job-delay <duration>]
[--skip-when-source-unmodified (true | false)]
[--rpo-alert <duration>]
Options
<name>
Specifies a name for the replication policy.
Specify as any string.
<action>
Specifies the type of replication policy.
The following types of replication policy are valid:
copy Creates a copy policy that adds copies of all files from the source to the target.
sync Creates a synchronization policy that synchronizes data on the source cluster to the
target cluster and deletes all files on the target cluster that are not present on the
source cluster.
<source-root-path>
Specifies the directory on the local cluster that files are replicated from.
Specify as a full directory path.
<target-host>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
• The fully qualified domain name of any node in the target cluster.
• The host name of any node in the target cluster.
• The name of a SmartConnect zone in the target cluster.
• The IPv4 or IPv6 address of any node in the target cluster.
• localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job
connects to a dynamically allocated IP address, SmartConnect might reassign the address while
a replication job is running, which would disconnect the job and cause it to fail.
<target-path>
Specifies the directory on the target cluster that files are replicated to.
Specify as a full directory path.
--enabled (yes | no)
Determines whether the policy is enabled or disabled.
The default value is yes.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the local cluster. If you specify this
option, you must also specify --source-pool.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the local cluster. If you specify this
option, you must also specify --source-subnet.
--target-snapshot-archive {on | off}
Determines whether archival snapshots are generated on the target cluster. If this option is set to off, SyncIQ
will still maintain exactly one snapshot at a time on the target cluster to facilitate failback. You must activate a
SnapshotIQ license on the target cluster to generate archival snapshots on the target cluster.
--target-snapshot-pattern <naming-pattern>
Specifies the snapshot naming pattern for snapshots that are generated by replication jobs on the target cluster.
The default naming pattern is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to when-
snapshot-taken. The default value is asterisk (*).
--snapshot-sync-existing (yes | no)
If set to Yes, snapshot-triggered replication jobs will include replications taken before the policy creation time.
The default is No. If set to yes, set --schedule when-snapshot-taken.
{--schedule | -S} {<schedule> | when-source-modified | when-snapshot-taken}
Specifies how often data will be replicated. Specifying when-source-modified causes OneFS to replicate
data every time that the source directory of the policy is modified. Specifying when-snapshot-taken causes
OneFS to replicate data every time that a snapshot is taken of the source directory.
Specify in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--job-delay <duration>
Specifies the amount of time after the source directory is modified that SyncIQ waits before starting a
replication job. If the --schedule of this replication policy is set to when-source-modified, and the
contents of the source directory are modified, SyncIQ will wait the specified amount of time before starting a
replication job.
The default value is 0 seconds.
--skip-when-source-unmodified {true | false}
Causes the policy not to be run if the contents of the source directory have not been modified since the last time
the policy has been run. If --schedule of this replication policy is set to <schedule>, and the policy is
scheduled to run before changes have been made to the contents of the source directory, the policy will not be
run.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example, assume you
set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job starts at 3:30 PM; if
the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if --schedule is set to
<schedule>.
NOTE: This option is valid only if RPO alerts have been globally enabled through SyncIQ settings.
The events have an event ID of 400040020.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
• fatal
• error
• notice
• info
• copy
• debug
• trace
The default value is info.
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect only to
nodes in the specified zone. If off is specified, does not restrict replication jobs to specific nodes on the target
cluster.
--target-compare-initial-sync (on | off)
Determines whether the full or differential replications are performed for this policy. Full or differential
replications are performed the first time a policy is run and after a policy has been reset. If set to on, performs a
differential replication. If set to off, performs a full replication.
If differential replication is enabled the first time a replication policy is run, the policy will run slower without any
benefit.
The default value is off.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than waiting to
perform those tasks during the failback process. Performing these tasks ahead of time will increase the speed of
failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority. If set to 1, the policy is high-priority.
--cloud-deep-copy (deny | allow | force)
Determines how the policy replicates CloudPools smartlinks. If set to deny, SyncIQ replicates all CloudPools
smartlinks to the target cluster as smartlinks; if the target cluster does not support the smartlinks, the job will fail.
If set to force, SyncIQ replicates all smartlinks to the target cluster as regular files. If set to allow, SyncIQ will
attempt to replicate smartlinks to the target cluster as smartlinks; if the target cluster does not support the
smartlinks, SyncIQ will replicate the smartlinks as regular files.
--bandwidth-reservation <integer>
Syntax
isi sync policies delete {<policy> | --all}
[--local-only]
[--force]
[--verbose]
Options
<policy>
Deletes the specified replication policy.
--all
Deletes all replication policies.
--local-only
Does not break the target association on the target cluster. Not deleting a policy association on the target
cluster will cause the target directory to remain in a read-only state.
Syntax
isi sync policies disable {<policy> | --all}
[--verbose]
Options
<policy>
Disables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Disables all replication policies on the cluster.
--verbose
Displays more detailed information.
Syntax
isi sync policies enable {<policy> | --all}
[--verbose]
Options
<policy>
Enables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Enables all replication policies on the cluster.
--verbose
Displays more detailed information.
Syntax
isi sync policies list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays a table of all replication policies.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync policies modify <policy>
[--name <new-policy-name>]
[--action <policy-type>]
[--target-host <target-cluster>]
[--target-path <target-path>]
[--source-root-path <root-path>]
[--description <string>]
Options
<policy>
Identifies the policy to modify, either by current policy ID or name.
{--name | -n} <new-policy-name>
Specifies a new name for this replication policy.
--action <policy-type>
Specifies the type of replication policy.
The following types of replication policy are valid:
copy Creates a copy policy that adds copies of all files from the source to the target.
sync Creates a synchronization policy that synchronizes data on the source cluster to the
target cluster and deletes all files on the target cluster that are not present on the
source cluster.
--clear-source-include-directories
Clears the list of included directories.
--add-source-include-directories <path>
Adds the specified directory to the list of included directories.
--remove-source-include-directories <path>
Removes the specified directory from the list of included directories.
{--source-exclude-directories | -e} <path>
Does not include the specified directories in replication.
Specify as any directory path contained in the root directory. If --source-include-directories is
specified, --source-exclude-directories directories must be contained in the included directories. You
can specify multiple directories by specifying --source-exclude-directories multiple times within a
command. For example, you could specify the following:
--clear-source-exclude-directories
Clears the list of excluded directories.
--add-source-exclude-directories <path>
Adds the specified directory to the list of excluded directories.
--remove-source-exclude-directories <path>
Removes the specified directory from the list of excluded directories.
--name <value>
Selects only files whose names match the specified string.
You can include the following wildcards:
• *
• [ ]
• ?
The following options are valid only for copy policies:
--accessed-after '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that have been accessed since the specified time. This predicate is valid only for copy
policies.
--accessed-before '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that have not been accessed since the specified time. This predicate is valid only for copy
policies.
--accessed-time '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that were accessed at the specified time. This predicate is valid only for copy policies.
--birth-after '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years} ago}'
Selects files that were created after the specified time. This predicate is valid only for copy policies.
--birth-before '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that were created before the specified time. This predicate is valid only for copy policies.
--birth-time '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years} ago}'
Selects files that were created at the specified time. This predicate is valid only for copy policies.
--changed-after '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that have been modified since the specified time. This predicate is valid only for copy
policies.
--changed-before '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that have not been modified since the specified time. This predicate is valid only for copy
policies.
--changed-time '{<mm>/<dd>/<yyyy> [<HH>:<mm>] | <integer> {days | weeks | months | years}
ago}'
Selects files that were modified at the specified time. This predicate is valid only for copy policies.
--no-group
Operator Description
eq Equal. This is the default value.
ne Not equal
lt Less than
le Less than or equal to
gt Greater than
ge Greater than or equal to
not Not
You can use the following <link> values to combine and alter the options available for predicates:
--and
Selects files that meet the criteria of the options that come before and after this value.
--or
Selects files that meet either the criterion of the option that comes before this value or the criterion of
the option that follows this value.
{--schedule | -S} {<schedule> | when-source-modified}
Specifies how often data will be replicated. Specifying when-source-modified causes OneFS to replicate
data every time that the source directory of the policy is modified.
Specify <schedule>in the following format:
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
To configure a policy to be run only manually, specify the following option:
--schedule ""
NOTE: This option has been deprecated and will not be recognized if configured.
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
SIQ-%{SrcCluster}-%{PolicyName}-latest
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network {on | off}
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect only to
nodes in the specified zone. If off is specified, does not restrict replication jobs to specific nodes on the target
cluster.
--source-subnet <subnet>
Syntax
isi sync policies reset {<policy> | --all}
[--verbose]
Options
<policy>
Resets the specified replication policy.
Specify as a replication policy name or ID
--all
Resets all replication policies
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync policies resolve <policy>
[--force]
Options
<policy>
Resolves the specified replication policy.
Specify as a replication policy name or ID.
{--force | -f}
Suppresses command-line prompts and messages.
Syntax
isi sync policies view <policy>
Options
<policy>
Displays information about the specified replication policy.
Specify as a replication policy name or ID.
Syntax
isi sync recovery allow-write <policy-name>
[--revert]
[--log-level <level>]
[--workers-per-node <integer>]
[--verbose]
Options
<policy-name>
Allows writes for the target directory of the specified replication policy.
Specify as a replication policy name, a replication policy ID, or the path of a target directory.
Syntax
isi sync recovery resync-prep <policy-name>
[--verbose]
Options
<policy-name>
Targets the following replication policy.
Specify as a replication policy name or ID. The replication policy must be a synchronization policy.
--verbose
Displays more detailed information.
Syntax
isi sync reports list
[--policy-name <policy>]
[--state <state>]
[--reports-per-policy <integer>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
Options
--policy-name <policy>
Displays only replication reports that were created for the specified policy.
--state <state>
Displays only replication reports whose jobs are in the specified state.
--reports-per-policy <integer>
Displays no more than the specified number of reports per policy. The default value is 10.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication subreport.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target cluster.
duration
S orts output by how long the replication job ran.
errors
Sorts output by errors that the replication job encountered.
warnings
Sorts output by warnings that the replication job triggered.
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Syntax
isi sync reports rotate
[--verbose]
Options
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync reports subreports list <policy> <job-id>
[--limit]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Syntax
isi sync reports subreports view <policy> <job-id> <subreport-id>
Syntax
isi sync reports view <policy> <job-id>
Options
<policy>
Displays a replication report about the specified replication policy.
<job-id>
Displays a replication report about the job with the specified ID.
Syntax
isi sync rules create <type> <interval> <days> <limit>
[--description <string>]
[--verbose]
Options
<type>
Specifies the type of performance rule. The following values are valid:
file_count
Creates a performance rule that limits the number of files that can be sent by replication jobs per
second.
bandwidth
Creates a performance rule that limits the amount of bandwidth that replication jobs are allowed to
consume.
<interval>
Enforces the performance rule on the specified hours of the day. Specify in the following format:
<hh>:<mm>-<hh>:<mm>
<days>
Enforces the performance rule on the specified days of the week.
X Specifies Sunday
M Specifies Monday
T Specifies Tuesday
W Specifies Wednesday
R Specifies Thursday
F Specifies Friday
S Specifies Saturday
You can include multiple days by specifying multiple values separated by commas. You can also include a range of
days by specifying two values separated by a dash.
<limit>
Specifies the maximum number of files that can be sent or KBs that can be consumed per second by replication
jobs.
--description <string>
Specifies a description of this performance rule.
--verbose
Displays more detailed information.
Syntax
isi sync rules delete {<id> | --all | --type <type>}
[--force]
[--verbose]
Options
<id>
Deletes the performance rule of the specified ID.
--all
Deletes all performance rules.
--type <type>
Deletes all performance rules of the specified type. The following values are valid:
file_count
Deletes all performance rules that limit the number of files that can be sent by replication jobs per
second.
bandwidth
Deletes all performance rules that limit the amount of bandwidth that replication jobs are allowed to
consume.
--force
Does not prompt you to confirm that you want to delete the performance rule.
--verbose
Displays more detailed information.
Syntax
isi sync rules list
[--type <type>]
[--limit]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--type <type>
Displays only performance rules of the specified type. The following values are valid:
file_count
Displays only performance rules that limit the number of files that can be sent by replication jobs per
second.
bandwidth
Displays only performance rules that limit the amount of bandwidth that replication jobs are allowed to
consume.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync rules modify <id>
[--interval <interval>]
[--days <days>]
[--limit <integer>]
[--enabled {true | false}]
[--description <string>]
[--verbose]
Options
<id>
<hh>:<mm>-<hh>:<mm>
X Specifies Sunday
M Specifies Monday
T Specifies Tuesday
W Specifies Wednesday
R Specifies Thursday
F Specifies Friday
S Specifies Saturday
You can include multiple days by specifying multiple values separated by commas. You can also include a range of
days by specifying two values separated by a dash.
--limit <limit>
Specifies the maximum number of files that can be sent or KBs that can be consumed per second by replication
jobs.
--enabled {true | false}
Determines whether the policy is enabled or disabled.
--description <string>
Specifies a description of this performance rule.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync rules reports list
[--policy-id <string>]
[--start <integer>]
[--end <integer>]
[--sort (name | speed)]
[--descending]
Options
--policy-id <string>
A SyncIQ policy identifier.
{--start | -s} <integer>
Beginning time stamp for the bandwidth report.
{--end | -e} <integer>
Ending time stamp for the bandwidth report.
Syntax
isi sync rules reports view <policy-id>
[--start <integer>]
[--end <integer>]
Options
<policy-id>
A SyncIQ policy identifier.
{--start | -s} <integer>
Beginning time stamp for the bandwidth report.
{--end | -e} <integer>
Ending time stamp for the bandwidth report.
Syntax
isi sync rules view <id>
Options
<id>
Displays information about the replication performance rule with the specified ID.
Syntax
isi sync service policies create <name> <target-host>
[--enabled (yes | no)]
[--description <string>]
[--check-integrity (yes | no)]
[--source-subnet <subnet> | --source-pool <pool>]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--source-snapshot-pattern <naming-pattern>]
Options
<name>
Specifies a name for the replication service policy.
Specify as any string.
<target-host>
Specifies the cluster that the policy replicates data to.
Specify as one of the following:
• The fully qualified domain name of any node in the target cluster.
• The host name of any node in the target cluster.
• The name of a SmartConnect zone in the target cluster.
• The IPv4 or IPv6 address of any node in the target cluster.
• localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job
connects to a dynamically allocated IP address, SmartConnect might reassign the address while
a replication job is running, which would disconnect the job and cause it to fail.
--enabled (yes | no)
Determines whether the service policy is enabled or disabled.
The default value is yes.
--description <string>
Specifies a description of the replication service policy.
--check-integrity (yes | no}
Specifies whether to perform a checksum on each file data packet that is affected by the replication policy. If
this option is set to yes, and the checksum values do not match, SyncIQ retransmits the file data packet.
The default value is yes.
--source-subnet <subnet>
Restricts replication policies to running only on nodes in the specified subnet on the local cluster. If you specify
this option, you must also specify --source-pool.
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to when-
snapshot-taken. The default value is asterisk (*).
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example, assume you
set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job starts at 3:30 PM; if
the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if --schedule is set to
<schedule>.
NOTE: This option is valid only if RPO alerts have been globally enabled through SyncIQ settings.
The events have an event ID of 400040020.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
• fatal
• error
• notice
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect only to
nodes in the specified zone. If off is specified, does not restrict replication jobs to specific nodes on the target
cluster.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than waiting to
perform those tasks during the failback process. Performing these tasks ahead of time will increase the speed of
failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority. If set to 1, the policy is high-priority.
--bandwidth-reservation <integer>
The desired bandwidth reservation for this policy, in kb/s. This feature does not activate unless a SyncIQ
bandwidth rule is in effect.
--target-certificate-id <string>
The identifier of the target cluster certificate being used for encryption.
--ocsp-issuer-certificate-id <string>
The identifier of the certificate authority that issued the certificate whose revocation status is being checked.
--ocsp-address <string>
The address of the OCSP responder to which you want to connect.
--encryption-cipher-list <string>
The cipher list being used with cluster encryption. For SyncIQ targets, this is a list of supported ciphers. For
SyncIQ sources, the list of ciphers is used in order.
--linked-data-policies <string>...
Syntax
isi sync service policies delete <policy> | --all
[--local-only]
[--force]
[--verbose]
Options
<policy>
Deletes the specified replication service policy.
--all
Deletes all replication service policies.
--local-only
Does not break the target association on the target cluster. Not deleting a policy association on the target
cluster will cause the target directory to remain in a read-only state.
NOTE: If SyncIQ is unable to communicate with the target cluster, you must specify this option
to successfully delete the service policy.
{--force | -f}
Deletes the service policy, even if an associated job is currently running. Also, does not prompt you to confirm
the deletion.
CAUTION: Forcing a service policy to delete might cause errors if an associated replication job is
currently running.
{--verbose | -v}
Displays a confirmation message.
Syntax
isi sync service policies disable <policy> | --all
[--verbose]
Options
<policy>
Disables the specified replication policy. Specify as a replication policy name or a replication policy ID.
--all
Disables all replication policies on the cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies enable <policy> | --all
[--verbose]
Options
<policy>
Enables the specified replication service policy. Specify as a replication service policy name or ID.
--all
Enables all replication service policies on the cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies list
[--limit <integer>]
[--sort (id | name | source_root_path | enabled | target_host | target_path |
target_snapshot_pattern | target_snapshot_expiration | target_snapshot_alias |
source_snapshot_pattern | source_snaphot_expiration | snapshot_sync_pattern |
snapshot_sync_existing | schedule | rpo_alert | log_level | workers_per_node | report_max_age
| report_max_count | force_interface | restrict_target_network | expected_dataloss |
disable_fofb | disable_file_split | accelerated_failback | database_mirrored |
source_domain_marked | priority | bandwidth_reservation | last_job_state | last_started |
last_success | password_set | conflicted | has_sync_date | source_certificate_id |
Options
If no options are specified, displays a table of all replication service policies.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
{--descending | -d}
Displays output in reverse order.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service policies modify <policy>
[--name <service_policy_name>]
[--enabled (yes | no)]
[--target-host <target-cluster>]
[--description <service-policy-description>]
[--check-integrity (yes | no)]
[--source-subnet <subnet> --source-pool <pool>]
[--target-snapshot-pattern <naming-pattern>]
[--target-snapshot-expiration <duration>]
[--target-snapshot-alias <naming-pattern>]
[--source-snapshot-pattern <naming-pattern>]
[--source-snapshot-expiration <duration>]
[--snapshot-sync-pattern <pattern>]
[--snapshot-sync-existing (yes | no)]
[--schedule (<schedule> | when-source-modified | when-snapshot-taken)]
[--rpo-alert <duration>]
[--clear-rpo-alert]
[--log-level <level>]
[--workers-per-node <integer> | --clear-rpo]
[--report-max-age <duration>]
[--report-max-count <integer>]
[--restrict-target-network (on | off)]
[--accelerated-failback (yes | no)]
[--priority (0 | 1 | normal | high)]
[--bandwidth-reservation <integer>]
[--clear-bandwidth-reservation]
Options
<policy>
A replication service policy name.
{--name | -n} <service_policy_name>
Specifies a name for the replication service policy.
Specify as any string.
--enabled (yes | no)
Determines whether the service policy is enabled or disabled.
The default value is yes.
{--target-host | -C} <target-cluster>
Specifies the cluster that the service policy replicates data to.
Specify as one of the following:
• The fully qualified domain name of any node in the target cluster.
• The host name of any node in the target cluster.
• The name of a SmartConnect zone in the target cluster.
• The IPv4 or IPv6 address of any node in the target cluster.
• localhost
This will replicate data to another directory on the local cluster.
NOTE: SyncIQ does not support dynamically allocated IP address pools. If a replication job
connects to a dynamically allocated IP address, SmartConnect might reassign the address while
a replication job is running, which would disconnect the job and cause it to fail.
--description <service-policy-description>
Specifies a description of the replication service policy.
--check-integrity (yes | no}
Specifies whether to perform a checksum on each file data packet that is affected by the replication policy. If
this option is set to yes, and the checksum values do not match, SyncIQ retransmits the file data packet.
The default value is yes.
--source-subnet <subnet>
Restricts replication service policies to running only on nodes in the specified subnet on the local cluster. If you
specify this option, you must also specify --source-pool.
--source-pool <pool>
Restricts replication service policies to running only on nodes in the specified pool on the local cluster. If you
specify this option, you must also specify --source-subnet.
SIQ-%{SrcCluster}-%{PolicyName}-%Y-%m-%d_%H-%M
--target-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots on the target cluster.
If this option is not specified, archival snapshots will remain indefinitely on the target cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--target-snapshot-alias <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the target cluster.
The default alias is the following string:
SIQ-%{SrcCluster}-%{PolicyName}-latest
--source-snapshot-pattern <naming-pattern>
Specifies a naming pattern for the most recent archival snapshot generated on the source cluster.
For example, the following pattern is valid:
SIQ-source-%{PolicyName}-%Y-%m-%d_%H-%M
--source-snapshot-expiration <duration>
Specifies an expiration period for archival snapshots retained on the source cluster.
If this option is not specified, archival snapshots will exist indefinitely on the source cluster.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--snapshot-sync-pattern <string>
The naming pattern that a snapshot must match to trigger a replication job, when the schedule is set to when-
snapshot-taken. The default value is asterisk (*).
--snapshot-sync-existing (yes | no)
If set to Yes, snapshot-triggered replication jobs will include replications taken before the policy creation time.
The default is No. If set to yes, set --schedule when-snapshot-taken.
"<interval> [<frequency>]"
You can optionally append "st", "th", or "rd" to <integer>. For example, you can specify "Every 1st month"
Specify <day> as any day of the week or a three-letter abbreviation for the day. For example, both "saturday"
and "sat" are valid.
--rpo-alert <duration>
Creates a OneFS event if the specified Recovery Point Objective (RPO) is exceeded. For example, assume you
set an RPO of 5 hours; a job starts at 1:00 PM and completes at 3:00 PM; a second job starts at 3:30 PM; if
the second job does not complete by 6:00 PM, SyncIQ will create a OneFS event.
The default value is 0, which will not generate events. This option is valid only if --schedule is set to
<schedule>.
NOTE: This option is valid only if RPO alerts have been globally enabled through SyncIQ settings.
The events have an event ID of 400040020.
--clear-rpo-alert
Clears an RPO alert.
--log-level <level>
Specifies the amount of data recorded in logs.
The following values are valid, organized from least to most information:
• fatal
• error
• notice
• info
NOTE: This option has been deprecated and will not be recognized if configured.
--report-max-age <duration>
Specifies how long replication reports are retained before they are automatically deleted by SyncIQ.
Specify in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
--report-max-count <integer>
Specifies the maximum number of reports to retain for the replication policy.
--restrict-target-network (on | off)
If you specify on, and you specify the target cluster as a SmartConnect zone, replication jobs connect only to
nodes in the specified zone. If off is specified, does not restrict replication jobs to specific nodes on the target
cluster.
--accelerated-failback (enable | disable)
If enabled, SyncIQ will perform failback configuration tasks the next time that a job is run, rather than waiting to
perform those tasks during the failback process. Performing these tasks ahead of time will increase the speed of
failback operations.
--priority (0 | 1)
Determines whether the policy has priority.
The default value is 0, which means that the policy does not have priority. If set to 1, the policy is high-priority.
--bandwidth-reservation <integer>
The desired bandwidth reservation for this policy, in kb/s. This feature does not activate unless a SyncIQ
bandwidth rule is in effect.
--clear-bandwidth-reservation
Clears a bandwidth reservation for this service policy.
--target-certificate-id <string>
The identifier of the target cluster certificate being used for encryption.
--ocsp-issuer-certificate-id <string>
The identifier of the certificate authority that issued the certificate whose revocation status is being checked.
--ocsp-address <string>
The address of the OCSP responder to which you want to connect.
--encryption-cipher-list <string>
The cipher list being used with cluster encryption. For SyncIQ targets, this is a list of supported ciphers. For
SyncIQ sources, the list of ciphers is used in order.
Syntax
isi sync service policies reset <policy> | --all
[--verbose]
Options
<policy>
Syntax
isi sync service policies resolve <policy>
[--force]
Options
<policy>
Resolves the specified replication policy.
Specify as a replication policy name or ID.
{--force | -f}
Suppresses command-line prompts and messages.
Syntax
isi sync service policies view <policy>
Options
<policy>
Displays information about the specified replication service policy.
Specify as a replication service policy name or ID.
Syntax
isi sync service recovery allow-write <policy-name> <timestamp> <tgt-path>
[--log-level (fatal | error | notice | info | copy | debug | trace)]
[--skip-copy (yes | no)]
[--skip-map (yes | no)]
[--skip-failover (yes | no)]
[--verbose]
Syntax
isi sync service recovery resync-prep <policy-name>
[--verbose]
Options
<policy-name>
The policy name for the job you are preparing for re-synchronization.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target break <policy> | --target-path <path>
[--force]
[--verbose]
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
{--force | -f}
Break the target association even if a replication job is running. Do not ask for confirmation.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target cancel <policy> | --target-path <path> | --all
[--verbose]
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
--all
Cancel all running jobs targeted to this cluster.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target list
[--target-path <path>]
[--limit <integer>]
Options
--target-path <path>
Show target policies that have the specified target path.
--sort (name | source_host | target_path | last_job_state | failover_failback_state)
Sorts output displayed by the specified attribute.
{--descending | -d}
Displays output in reverse order.
--format (table | json | csv | list)
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync service target view <policy> | --target-path <path>
Options
<policy>
A target replication policy name.
<target-path>
A target path for a replication policy.
Syntax
isi sync settings modify
[--service(on | off | paused)]
[--source-subnet <string>]
[--source-pool <string>]
[--restrict-target-network <boolean>]
[--report-max-age <duration>]
Options
If no options are specified, displays current default replication report settings.
--service {on | off | paused}
Determines the state of the SyncIQ application.
--source-subnet <subnet>
Restricts replication jobs to running only on nodes in the specified subnet on the local cluster.
--source-pool <pool>
Restricts replication jobs to running only on nodes in the specified pool on the local cluster.
--restrict-target-network <boolean>
Restricts target to its nodes in the target zone name.
--report-max-age <duration>
Specifies the default maximum age of reports to retain for a replication policy.
--report-max-count <integer>
Specifies the default maximum number of reports to retain for a replication policy.
--rpo-alerts <boolean>
If disabled, no RPO alerts are generated.
--bandwidth-reservation-reserve-percentage <integer>
Specifies the percentage of SyncIQ bandwidth to reserve for policies that did not specify a bandwidth
reservation.
--bandwidth-reservation-reserve-absolute <integer>
Specifies the amount of SyncIQ bandwidth to reserve in kb/s for policies that did not specify a bandwidth
reservation. This field takes precedence over bandwidth_reservation_reserve_percentage.
--clear-bandwidth-reservation-reserve-absolute
Specifies the clear absolute bandwidth reservation.
--encryption-required <boolean>
Requires all SyncIQ policies to utilize encrypted communications, if true.
--cluster-certificate-id <string>
Specifies the ID of the cluster's certificate to be used for encryption.
--ocsp-issuer-certificate-id <string>
Specifies the ID of the certificate authority that issued the certificate whose revocation status is being checked.
--ocsp-address <string>
Specifies the address of the OCSP responder to which it is to connect.
--encryption-cipher-list <string>
Specifies the cipher list that is being used with encryption.
NOTE: For SyncIQ targets, this list serves as a list of supported ciphers. For SyncIQ sources, the
list of ciphers will be attempted to be used in order.
Syntax
isi sync settings view
Options
There are no options for this command.
Breaking a source and target association requires you to reset the replication policy before you can run the policy again.
Depending on the amount of data being replicated, a full or differential replication can take a very long time to complete.
Syntax
isi sync target break {<policy> | --target-path <path>}
[--force]
[--verbose]
Options
<policy>
Removes the association of the specified replication policy targeting this cluster.
Specify as a replication policy name, a replication policy ID, or the path of a target directory.
--target-path <path>
Removes the association of the replication policy targeting the specified directory path.
{--force | -f}
Forces the replication policy association to be removed, even if an associated job is currently running.
Syntax
isi sync target cancel {<policy> | --target-path <path> | --all}
[--verbose]
Options
<policy>
Cancels a replication job created according to the specified replication policy.
Specify as a replication policy name or ID.
--target-path <path>
Cancels a replication job targeting the specified directory.
--all
Cancels all running replication jobs targeting the local cluster.
--verbose
Displays more detailed information.
Syntax
isi sync target list
[--target-path <path>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays a table of all replication policies currently targeting the local cluster.
--target-path <path>
Displays information about the replication policy targeting the specified directory.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi sync target reports list
[--state <state>]
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
If no options are specified, displays basic information about all completed replication jobs.
--state <state>
Displays information about only replication jobs in the specified state. The following states are valid:
• scheduled
• running
• paused
• finished
• failed
• canceled
• needs_attention
• unknown
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Syntax
isi sync target reports subreports list <policy> <job-id>
[--limit]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<policy>
Displays subreports about the specified policy.
<job-id>
Displays subreports about the job of the specified ID.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
start_time
Sorts output by when the replication job started.
end_time
Sorts output by when the replication job ended.
action
Sorts output by the action that the replication job performed.
state
Sorts output by the progress of the replication job.
id
Sorts output by the ID of the replication report.
policy_id
Sorts output by the ID of the replication policy
policy_name
Sorts output by the name of the replication policy.
job_id
Sorts output by the ID of the replication job.
total_files
Sorts output by the total number of files that were modified by the replication job.
files_transferred
Sorts output by the total number of files that were transferred to the target cluster.
bytes_transferred
Sorts output by the total number of files that were transferred to the target cluster.
duration
Sorts output by how long the replication job ran.
Syntax
isi sync target reports subreports view <policy> <job-id> <subreport-id>
Options
<policy>
Displays a sub report about the specified replication policy. Specify as a replication policy name.
<job-id>
Displays a sub report about the specified replication job. Specify as a replication job ID.
<subreport-id>
Displays the subreport with the specified ID.
Syntax
isi sync target reports view <policy> <job-id>
Options
<policy>
Displays a replication report about the specified replication policy.
<job-id>
Displays a replication report about the job with the specified ID.
Syntax
isi sync target view {<policy-name> | --target-path <path>}
Options
<policy-name>
Displays information about the specified policy.
--target-path <path>
Displays information about the policy targeting the specified directory.
Syntax
isi tape delete
[--name <string>]
[--all]
[--force]
[--verbose]
Options
--name <string>
The name of the NDMP tape or media change device.
--all
Disconnects the cluster from all devices.
{--force | -f}
Skips the confirmation prompt.
{--verbose | -v}
Displays more detailed information.
Example
The following command disconnects tape001 from the cluster:
Syntax
isi tape list
[--node <lnn>]
[--tape]
[--activepath]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--node <lnn>
Displays only devices that are attached to the node of the specified logical node number (LNN).
--tape
Displays only tape devices.
--activepath
Displays only the active paths of a device.
--format {table | json | csv | list}
Displays devices in table, JSON, CSV, or list format.
{--no-header | -a}
Does not display headers in table or CSV format.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Examples
To view a list of all NDMP devices, run the following command:
Syntax
isi tape modify --name <name>
[--new-name <string>]
[--close-device]
Syntax
isi tape rename <devname> <rename>
Options
<devname>
Modifies the name of the specified NDMP device.
<rename>
Specifies a new name for the given NDMP device.
Examples
The following example renames tape003 to tape005:
Syntax
isi tape rescan
[--node <lnn>]
[--port <integer>]
[--reconcile]
Options
If no options are specified, scans all nodes and ports.
--node <lnn>
Scans only the node of the specified logical node number (LNN).
Example
To scan the entire cluster for NDMP devices, and remove entries for devices and paths that have become inaccessible, run the following
command:
Syntax
isi tape view --name <name>
[--activepath]
[--format {list | json}]
Options
<name>
The name of the tape or media changer device.
--activepath
Displays only the active paths of the device.
--format {list | json}
Displays devices in list or JSON format.
Syntax
isi upgrade cluster add-nodes <nodes>
[--yes]
Options
<nodes>
List of comma-separated (1,3,7) or dash-separated (1-7) specified logical node numbers (LNNs) to mark for
upgrade.
--yes
Automatically answer yes at the prompt.
Syntax
isi upgrade cluster add-remaining-nodes
[--yes]
Options
--yes
Automatically answer yes at the prompt.
Syntax
isi upgrade cluster archive
[--clear]
Options
--clear
Clear the upgrade after an archive is complete.
Syntax
isi upgrade cluster assess <install-image-path>
Options
<install-image-path>
The path of the upgrade install image. Must be within an /ifs or http:// source.
Syntax
isi upgrade cluster commit
[--yes]
Syntax
isi upgrade cluster firmware <action>
[--timeout <integer>]
Options
<action>
Specifies actions you can take against the firmware upgrade.
package Lists all the nodes on the cluster and shows detailed firmware package information on
the given node.
devices Lists all the nodes on the cluster and shows detailed status of the current firmware for
each node.
assess Runs upgrade checks without starting a firmware upgrade.
view Shows overview status of the current firmware upgrade activity.
start Starts upgrade processes.
NOTE: All upgrade processes take a long time to run. The return status of a command only
relates to the issuing of the command itself, not the successful completion of it.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command runs upgrade checks without starting the firmware upgrade.
Syntax
isi upgrade cluster from-version
Syntax
isi upgrade cluster nodes firmware <action>
[--timeout <integer>]
Options
<action>
Specifies reporting actions you can take regarding node firmware updates.
devices Reports devices on the nodes which are supported in the installed firmware package.
package Reports the contents of the installed firmware package.
progress Reports, in list or view format, status information regarding the firmware upgrade.
--timeout <integer>
Number of seconds for a command timeout.
Example
The following command displays the contents of the installed firmware package:
Syntax
isi upgrade cluster nodes list
Node LNN: 2
Node Upgrade State: non-responsive
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: unknown
Node OS Version: N/A
Node LNN: 3
Node Upgrade State: committed
Error Details: None
Last Upgrade Action: -
Last Action Result: -
Node Upgrade Progress: None
Node OS Version: 8.0.0.0
Syntax
isi upgrade cluster nodes view <lnn>
Options
<lnn>
The logical node number (LNN) of the node for which you want to view upgrade status.
Example
To view the upgrade status for a node with the LNN 1, run the following command:
Syntax
isi upgrade cluster retry-last-action <nodes>
Options
<nodes>
A list of comma-separated (1,3,7) or dash-separated (1-7) logical node numbers to select. You can also use all
to select all the cluster's nodes at any given time.
Syntax
isi upgrade cluster rollback
[--yes]
Options
--yes
Automatically answer yes to the confirmation prompt.
Syntax
isi upgrade cluster rolling-reboot
[--nodes <integer-range_list>]
[--force]
Options
--nodes <integer-range_list>
List of comma-specified (1,3,7...) or dash-specified (1-7) node logical node numbers (LNNs) to select. At any
given time during the reboot, you can also enter all to select all the cluster nodes.
{--force | -f}
Do not prompt for confirmation of the reboot.
Syntax
isi upgrade cluster settings
Options
There are no options for this command.
Syntax
isi upgrade cluster start <install-image-path>
[--skip-optional]
[--yes]
[--simultaneous]
[--nodes <integer_range_list>]
Options
<install-image-path>
The file path of the location of the upgrade install image. The file path must be accessible in a /ifs directory or
by an https:// URL.
--skip-optional
Skips the optional pre-upgrade checks.
--yes
Automatically answer yes to the confirmation prompt.
--simultaneous
Start a simultaneous upgrade.
--nodes <integer_range_list>
List of comma-separated (1,3,7) or dash-separated (1-7) logical node numbers (LNNs) to select for upgrade.
Syntax
isi upgrade cluster to-version
Options
There are no options for this command.
Syntax
isi upgrade cluster view
Options
There are no options for this command.
Syntax
isi upgrade patches abort
[--force]
Options
{--force | -f}
Skips the confirmation prompt for this command.
Syntax
isi upgrade patches install <patch>
[--rolling {yes | no}]
[--override]
Options
<patch>
The file path location of the patch to install. This must be an absolute path within the /ifs file system.
{--rolling | -r} {yes | no}
Performs a rolling patch install. A value of no will install simultaneously on all nodes.
{--override | -o}
Overrides the patch system validation, and forces the patch installation.
Syntax
isi upgrade patches list
[--local]
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
--local
Lists patch information only on the local node.
{--limit | -l} <integer>
The number of upgrade patches to display.
--format {table | json | csv | list}
Displays upgrade patches in table, JSON, CSV or list format.
{--no-header | -a}
Does not display headers in CSV or table formats.
{--no-footer | -z}
Does not display table summary footer information.
{--verbose | -v}
Displays more detailed information.
Syntax
isi upgrade patches uninstall <patch>
[--rolling {yes | no}]
[--override]
[--force]
Options
<patch>
The name or ID of the patch to uninstall.
{--rolling | -r} {yes | no}
Performs a rolling patch uninstall. A value of no will uninstall simultaneously on all nodes.
{--override | -o}
Overrides the patch system validation, and forces the patch uninstallation.
{--force | -f}
Skips the confirmation prompt.
Syntax
isi upgrade patches view <patch>
[--local]
Options
<patch>
The name or ID of the patch to view.
--local
Shows patch information only for the local node.
isi version
Displays cluster version information.
Syntax
isi version
[--format {list | json}]
[--verbose
Options
--format {list | json}
Displays the cluster version information in list or JSON format.
{--verbose | -v}
Displays more detailed cluster version information.
You can set the compliance clock only once. After the compliance clock has been set, you cannot modify the compliance
clock time.
Syntax
isi worm cdate set
Options
There are no options for this command.
Syntax
isi worm cdate view
Options
There are no options for this command.
Syntax
isi worm create <path>
Options
<path>
Designates the specified directory as a SmartLock directory. The specified directory must be empty.
Specify as a directory path.
Syntax
isi worm domains create <path>
[--compliance]
[--autocommit-offset <duration>]
[--override-date <timestamp>]
[{--privileged-delete {true | false}]
[--disable-privileged-delete]
[--default-retention {<duration> | forever | use_min
| use_max}]
[--min-retention {<duration> | forever}]
[--max-retention <duration>]
[--mkdir]
[--force]
[--verbose]
Options
<path>
Creates a SmartLock directory at the specified path.
Specify as a directory path.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To specify no autocommit time period, specify none. The default value is none.
{--override-date | -o} <timestamp>
Specifies an override retention date for the directory. Files committed to a WORM state are not released from a
WORM state until after the specified date, regardless of the maximum retention period for the directory or
whether a user specifies an earlier date to release a file from a WORM state.
Specify <timestamp> in the following format:
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
If you specify this option, you can never enable the privileged delete functionality for the
directory. If a file is then committed to a WORM state in the directory, you will not be able to
delete the file until the retention period has passed.
{--default-retention | -d} {<duration> | forever | use_min | use_max}
Specifies a default retention period. If a user does not explicitly assign a retention period expiration date, the
default retention period is assigned to the file when it is committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To permanently retain WORM committed files by default, specify forever. To assign the minimum retention
period as the default retention period, specify use_min. To assign the maximum retention period as the default
retention period, specify use_max.
{--min-retention | -m} {<duration> | forever}
Specifies a minimum retention period. Files are retained in a WORM state for at least the specified amount of
time.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi worm domains list
[--limit <integer>]
[--sort <attribute>]
[--descending]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--sort <attribute>
Sorts output displayed by the specified attribute.
The following values are valid:
{--descending | -d}
Displays output in reverse order.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table output without headers.
Syntax
isi worm domains modify <domain>
[--compliance]
[{--autocommit-offset <duration> | --clear-autocommit-offset}]
[{--override-date <timestamp> | --clear-override-date}]
[{--privileged-delete {true | false}]
[--disable-privileged-delete]
[{--default-retention {<duration> | forever | use_min
| use_max} | --clear-default-retention}]
[{--min-retention {<duration> | forever} | --clear-min-retention}]
[{--max-retention | -x} (<duration> | forever) | --clear-max-retention]
[{--exclude | -x} <string>]
[--set-pending-delete]
[{--force | -f}]
[{--verbose | -v}]
[{--help | -h}]
Options
<domain>
Modifies the specified SmartLock directory.
Specify as a directory path, ID, or LIN of a SmartLock directory.
{--compliance | -C}
Specifies the SmartLock directory as a SmartLock compliance directory. This option is valid only on clusters
running in SmartLock compliance mode.
{--autocommit-offset | -a} <duration>
Specifies an autocommit time period. After a file exists in a SmartLock directory without being modified for the
specified length of time, the file automatically committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
<YYYY>-<MM>-<DD>[T<hh>:<mm>[:<ss>]]
--clear-override-date
Removes the override retention date for the given SmartLock directory.
{--privileged-delete | -p} {true | false}
Determines whether files in the directory can be deleted through the isi worm files delete command.
This option is available only for SmartLock enterprise directories.
The default value is false.
--disable-privileged-delete
Permanently prevents WORM committed files from being deleted from the SmartLock directory.
NOTE:
If you specify this option, you can never enable the privileged delete functionality for the
SmartLock directory. If a file is then committed to a WORM state in the directory, you will not be
able to delete the file until the retention period expiration date has passed.
{--default-retention | -d} {<duration> | forever | use_min | use_max}
Specifies a default retention period. If a user does not explicitly assign a retention period expiration date, the
default retention period is assigned to the file when it is committed to a WORM state.
Specify <duration> in the following format:
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
To permanently retain WORM committed files by default, specify forever. To assign the minimum retention
period as the default retention period, specify use_min. To assign the maximum retention period as the default
retention period, specify use_max.
--clear-default-retention
Removes the default retention period for the given SmartLock directory.
{--min-retention | -m} {<duration> | forever}
Specifies a minimum retention period. Files are retained in a WORM state for at least the specified amount of
time.
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
<integer><units>
Y Specifies years
M Specifies months
W Specifies weeks
D Specifies days
H Specifies hours
m Specifies minutes
s Specifies seconds
Syntax
isi worm domains view <domain>
Options
<domain>
Displays information about the specified SmartLock directory.
Specify as a directory path, ID, or LIN of a SmartLock directory.
Syntax
isi worm files delete <path>
[--force]
[--verbose]
Options
<path>
Deletes the specified file. The file must exist in a SmartLock enterprise directory with the privileged delete
functionality enabled.
Specify as a file path.
--force
Does not prompt you to confirm that you want to delete the file.
--verbose
Displays more detailed information.
Syntax
isi worm files view <path>
[--no-symlinks]
Options
<path>
Displays information about the specified file. The file must be committed to a WORM state.
Syntax
isi zone restrictions create <zone> {<user> | --uid <integer>
| --group <string> | --gid <integer> | --sid <string>
| --wellknown <string>}
[--verbose]
Options
<zone>
Specifies an access zone by name.
<user>
Specifies a user by name.
--uid <integer>
Specifies a user by UID.
--group <string>
Specifies a group by name.
--gid <integer>
Specifies a group by GID.
--sid <string>
Specifies an object by user or group SID.
--wellknown <name>
Specifies a well-known user, group, machine, or account name.
{--verbose | -v}
Returns a success or fail message after running the command.
Syntax
isi zone restrictions delete <zone> {<user> | --uid <integer>
| --group <string> | --gid <integer> | --sid <string>
| --wellknown <string>}
[--force]
[--verbose]
Syntax
isi zone restrictions list <zone>
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
<zone>
Specifies an access zone by name.
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi zone zones create <name> <path>
[--map-untrusted <workgroup>]
[--auth-providers <provider-type>:<provider-name>]
[--netbios-name <string>]
[--user-mapping-rules <string>]
[--home-directory-umask <integer>]
[--skeleton-directory <string>]
[--cache-entry-expiry <duration>]
[--create-path]
[--force-overlap]
[--groupnet <groupnet>]
[--verbose]
Options
<name>
Specifies the name of the access zone.
<path>
Specifies the base directory path for the zone.
--map-untrusted <workgroup>
Maps untrusted domains to the specified NetBIOS workgroup during authentication.
--auth-providers <provider-type>:<provider-name>
Specifies one or more authentication providers, separated by commas, for authentication to the access zone.
Authentication providers are checked in the order specified. You must specify the name of the authentication
provider in the following format: <provider-type>:<provider-name>.
--netbios-name <string>
Specifies the NetBIOS name.
--user-mapping-rules <string>
Specifies one or more user mapping rules, separated by commas, for the access zone.
--home-directory-umask <integer>
Specifies the permissions to set on auto-created user home directories.
--skeleton-directory <string>
Sets the skeleton directory for user home directories.
--cache-entry-expiry <duration>
Specifies duration of time to cache a user/group.
--create-path
Specifies that the value entered as the access zone path is to be created if it does not already exist.
--force-overlap
Allows the base directory to overlap with the base directory of another access zone.
--groupnet <string>
Specifies the groupnet referenced by the access zone.
Syntax
isi zone zones delete <zone>
[--force]
[--verbose]
Options
<zone>
Specifies the name of the access zone to delete.
{--force | -f}
Suppresses command-line prompts and messages.
{--verbose | -v}
Displays the results of running the command.
Syntax
isi zone zones list
[--limit <integer>]
[--format {table | json | csv | list}]
[--no-header]
[--no-footer]
[--verbose]
Options
{--limit | -l} <integer>
Displays no more than the specified number of items.
--format {table | json | csv | list}
Displays output in table (default), JavaScript Object Notation (JSON), comma-separated value (CSV), or list
format.
{--no-header | -a}
Displays table and CSV output without headers.
{--no-footer | -z}
Displays table output without footers.
{--verbose | -v}
Displays more detailed information.
Syntax
isi zone zones modify <zone>
[--name <string>]
[--path <path>]
[--map-untrusted <string>]
[--auth-providers <provider-type>:<provider-name>]
[--clear-auth-providers]
[--add-auth-providers <provider-type>:<provider-name>]
[--remove-auth-providers <provider-type>:<provider-name>]
[--netbios-name <string>]
[--user-mapping-rules <string>]
[--clear-user-mapping-rules]
[--add-user-mapping-rules <string>]
[--remove-user-mapping-rules <string>]
[--home-directory-umask <integer>]
[--skeleton-directory <string>]
[--cache-entry-expiry <duration>]
[--revert-cache-entry-expiry]
[--create-path]
[--force-overlap]
[--verbose]
Options
<zone>
Specifies the name of the access zone to modify.
--name <string>
Specifies a new name for the access zone. You cannot change the name of the built-in System access zone.
--path <path>
Specifies the base directory path for the zone.
--map-untrusted <string>
Specifies the NetBIOS workgroup to map untrusted domains to during authentication.
--auth-providers <provider-type>:<provider-name>
Specifies one or more authentication providers, separated by commas, for authentication to the access zone.
This option overwrites any existing entries in the authentication providers list. To add or remove providers
without affecting the current entries, configure settings for --add-auth-providers or --remove-auth-
providers.
--clear-auth-providers
Removes all authentication providers from the access zone.
--add-auth-providers <provider-type>:<provider-name>
Adds one or more authentication providers, separated by commas, to the access zone.
--remove-auth-providers <provider-type>:<provider-name>
Removes one or more authentication providers, separated by commas, from the access zone.
--netbios-name <string>
Specifies the NetBIOS name.
Syntax
isi zone zones view <zone>
Options
<zone>
Specifies the name of the access zone to view.