EMC Isilon Share Configuration for Symantec Enterprise Vault

advertisement
EMC ISILON SHARE CONFIGURATION
FOR SYMANTEC ENTERPRISE VAULT
To use an EMC® Isilon® scale-out NAS cluster for storing your content archived by
Symantec Enterprise Vault (EV), you will first need to create a directory and share that
can be accessed by the EV archiving software. The method of creating the archive share
will differ, depending on whether the directory will be a SmartLock (WORM) directory or
not. To create a SmartLock directory continue below, skipping figures 5 and 6. To
create a standard directory, start at figure 5.
EMC Isilon Directory and Share Configuration
If content will not be retained for an infinite period of time in EV, the screenshot in
Figure 1 shows the basic command and output when creating a SmartLock directory
without specifying additional options; like the default, minimum, and/or maximum
retention periods, and/or autocommit time period. Regarding the warnings shown, the
default retention period and autocommit time period is not needed since EV will set and
commit files to a WORM state. If the minimum and maximum retention periods are
configured, they will override EV if files are committed to a WORM state outside of the
defined range. Note, you must first establish a secure shell (SSH) connection to any
node in the cluster and log in.
Figure 1. Create SmartLock Directory without Infinite Retention
If content will be retained for an infinite period of time in EV, the screenshot in Figure 2
shows the command and output when creating a SmartLock directory. Again, an
autocommit time period is not needed since EV will commit files to a WORM state.
Figure 2. Create SmartLock Directory with Infinite Retention
The screenshot in Figure 3 shows the two commands that can be used to verify the
SmartLock directory has been created and if any additional options are configured. This
is a continuation of the SSH connection established above.
Figure 3. Verify the SmartLock Directory and Options
The screenshot in Figure 4 shows the File System Explorer in the Isilon Web Admin
Interface. Notice the red lock icon next to the SmartLock directory “ev-worm”.
Figure 4. SmartLock Directory Verification via the File System Explorer
The screen shot in Figure 5 shows the File System Explorer in the Isilon Web Admin
Interface. To create a standard directory, instead of a SmartLock directory, select the
Add Directory button (highlighted with a blue box) at the top of the right explorer pane.
Figure 5. File System Explorer in the Isilon Web Admin Interface
The screenshot in Figure 6 shows the New Directory wizard. Enter the directory name
(it does not have to match the SMB path name in the following steps), leave the defaults
selected for now and click Submit.
Figure 6. New Directory Wizard in the Isilon Web Admin Interface
Once the directory is created, you will need to add an SMB share path to it.
The screenshot in Figure 7 shows the existing SMB shares in the Isilon Web Admin
Interface. Navigate to “Protocols”  “Windows Sharing (SMB)”, then click “Add a share”
(highlighted with a blue box).
Figure 7. SMB Shares in the Isilon Web Admin Interface
You will be presented with the “Add an SMB Share” wizard shown in Figure 8.
Figure 8. Add an SMB Share Wizard in the Isilon Web Admin Interface
Enter the Share Name and directory path, leave the Windows default ACLs selected, and
click Create. You can edit the permissions later, after the share is built.
The screenshot in Figure 9 shows the share was created successfully.
Figure 9. Successfully Create an SMB Share in the Isilon Web Admin Interface
Once you have created your share, navigate to it via Windows Explorer, right click the
share, and select “Properties” as shown in Figure 10.
Figure 10. Select “Properties” in the Share
Be sure that the EV service account/group has been granted full control over the share
(in this case the child domain administrator account).
Next, select the “Advanced” button on the Security tab for the share. You will want to
make sure that the EV service account has full NTFS permissions and that these
permissions are inherited for all subfolders as shown in Figure 11.
Figure 11. Select full NTFS permissions for the Symantec Enterprise Vault service
account
Any vault sub directories created in your share should now be usable by the EV
application. The screen shot in Figure 12 shows nine vault partition directories created
at the root of the EV share.
Figure 12. Nine vault partition directories created at the root of the Symantec Enterprise
Vault share
Symantec Enterprise Vault - Vault Storage and Partition Configuration
Either create a new Vault Store or create a new Vault Store Partition for Isilon in an
existing Vault Store. Note the “Remove Safety Copies” setting that is required for the
Vault Store and ensure that it is set appropriately for your environment (see the online
help for more information about the “Remove Safety Copies” setting). The screenshot in
Figure 13 shows the EV New Vault Store setting, “Remove safety copies”, which is set to
“After backup” in this example. Other options are “Never”, “After backup (Immediate
for Journaling)”, and “Immediately after archiving”.
Figure 13. Symantec Enterprise Vault New Vault Store Setting, Remove Safety Copies
Create a new Vault Store Partition (see “Creating vault store partitions” in the Enterprise
Vault “Installing and Configuring” guide for more information about a Vault Store
Partition) with the following configuration exceptions. The screenshot in Figure 14
shows the EV New Partition setting, “Storage type”, which must be set to “EMC Isilon
OneFS Scale Out Storage” when either a SmartLock or standard directory is used.
Figure 14. Symantec Enterprise Vault New Partition Setting, Storage Type
NOTE: This storage type includes WORM support in EV9.0.5 and later, and EV10.0.4
and later; EV10.0.2 and EV10.0.3 provides non-WORM support only. You may need to
upgrade your Symantec Enterprise Vault to an Isilon supported version listed above.
The screenshot in Figure 15 shows the EV New Partition setting, “Device stores data in
WORM mode”, that must be selected when a SmartLock directory is used. If a standard
directory is used, this option must be cleared. For the Vault Store Partition location,
enter the UNC path for the directory created in the above steps.
Figure 15. Symantec Enterprise Vault New Partition Setting, WORM Storage
When the Vault Store is configured to delete the file safety copies “After backup” or
“After backup (immediate for Journaling)”, it is important to configure how EV will check
to ensure the partition has been secured as follows:
•
•
If a SmartLock directory is used then you must choose “Check for a trigger file”
as shown in Figure 16.
o
The “Use the archive attribute” option cannot be used because the
archive bit cannot be modified on files committed to a WORM state; in
this case, by a backup application that would attempt to clear the
archive bit once the backup was successful. Instead, the backup
application or script must be able to create a special file in the root of
the Vault Store Partition (a ‘trigger file’) to indicate the backup was
successfully completed. For more details, see
http://www.symantec.com/docs/TECH35610.
o
EV checks for a trigger file when its storage service starts and backup
mode is cleared, typically by a backup application. Optionally, you can
enable the “Scan partition every” option to force additional scans at
the defined interval.
If a standard directory is used then the option selected will depend on the
requirements of your backup application (it could be either “Check for a trigger
file” or “Use the archive attribute”).
Figure 16. Symantec Enterprise Vault New Partition Setting, Trigger File
The information in this publication is provided “as is.” EMC Corporation makes no
representations or warranties of any kind with respect to the information in this
publication, and specifically disclaims implied warranties of merchantability or fitness for
a particular purpose.
Use, copying, and distribution of any EMC software described in this publication requires
an applicable software license.
EMC2, EMC, the EMC logo, Isilon, and OneFS are registered trademarks or trademarks of
EMC Corporation in the United States and other countries. All other trademarks used
herein are the property of their respective owners. © Copyright 2013 EMC Corporation.
All rights reserved. Published in the USA. 10/13 Handout H11094.1
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
Download