Computer Drive User Manual
Table Of Contents
- Chapter 1. HPSS 7.1 Configuration Overview
- Chapter 2. Security and System Access
- Chapter 3. Using SSM
- 3.1. The SSM System Manager
- 3.2. Quick Startup of hpssgui
- 3.3. Configuration and Startup of hpssgui and hpssadm
- 3.4. Multiple SSM Sessions
- 3.5. SSM Window Conventions
- 3.6. Common Window Elements
- 3.7. Help Menu Overview
- 3.8. Monitor, Operations and Configure Menus Overview
- 3.9. SSM Specific Windows
- 3.10. SSM List Preferences
- Chapter 4. Global & Subsystem Configuration
- 4.1. Global Configuration Window
- 4.2. Storage Subsystems
- 4.2.1. Subsystems List Window
- 4.2.2. Creating a New Storage Subsystem
- 4.2.3. Storage Subsystem Configuration Window
- 4.2.3.1. Create Storage Subsystem Metadata
- 4.2.3.2. Create Storage Subsystem Configuration
- 4.2.3.3. Create Storage Subsystem Servers
- 4.2.3.4. Assign a Gatekeeper if Required
- 4.2.3.5. Assign Storage Resources to the Storage Subsystem
- 4.2.3.6. Create Storage Subsystem Fileset and Junction
- 4.2.3.7. Migration and Purge Policy Overrides
- 4.2.3.8. Storage Class Threshold Overrides
- 4.2.4. Modifying a Storage Subsystem
- 4.2.5. Deleting a Storage Subsystem
- Chapter 5. HPSS Servers
- 5.1. Server List
- 5.1. Server Configuration
- 5.1.1. Common Server Configuration
- 5.1.1. Core Server Specific Configuration
- 5.1.2. Gatekeeper Specific Configuration
- 5.1.3. Location Server Additional Configuration
- 5.1.4. Log Client Specific Configuration
- 5.1.1. Log Daemon Specific Configuration
- 5.1.2. Migration/Purge Server (MPS) Specific Configuration
- 5.1.3. Mover Specific Configuration
- 5.1.3.1. Mover Specific Configuration Window
- 5.1.3.1. Additional Mover Configuration
- 5.1.3.1.1. /etc/services, /etc/inetd.conf, and /etc/xinetd.d
- 5.1.3.1.2. The Mover Encryption Key Files
- 5.1.3.1.3. /var/hpss/etc Files Required for Remote Mover
- 5.1.3.1.1. System Configuration Parameters on IRIX, Solaris, and Linux
- 5.1.3.1.1. Setting Up Remote Movers with mkhpss
- 5.1.3.1.2. Mover Configuration to Support Local File Transfer
- 5.1.1. Physical Volume Repository (PVR) Specific Configuration
- 5.1.1. Deleting a Server Configuration
- 5.1. Monitoring Server Information
- 5.1.1. Basic Server Information
- 5.1.1. Specific Server Information
- 5.1.1.1. Core Server Information Window
- 5.1.1.1. Gatekeeper Information Window
- 5.1.1.1. Location Server Information Window
- 5.1.1.2. Migration/Purge Server Information Window
- 5.1.1.3. Mover Information Window
- 5.1.1.1. Physical Volume Library (PVL) Information Window
- 5.1.1.2. Physical Volume Repository (PVR) Information Windows
- 5.1. Real-Time Monitoring (RTM)
- 5.2. Starting HPSS
- 5.1. Stopping HPSS
- 5.2. Server Repair and Reinitialization
- 5.1. Forcing an SSM Connection
- Chapter 6. Storage Configuration
- 6.1. Storage Classes
- 6.2. Storage Hierarchies
- 6.3. Classes of Service
- 6.4. Migration Policies
- 6.5. Purge Policies
- 6.6. File Families
- Chapter 7. Device and Drive Management
- Chapter 8. Volume and Storage Management
- 8.1. Adding Storage Space
- 8.2. Removing Storage Space
- 8.3. Monitoring Storage Space
- 8.4. Dealing with a Space Shortage
- 8.5. Volume Management
- 8.6. Monitoring and Managing Volume Mounts
- 8.7. New Storage Technology Insertion
- Chapter 9. Logging and Status
- Chapter 10. Filesets and Junctions
- Chapter 11. Files, Directories and Objects by SOID
- Chapter 12. Tape Aggregation
- Chapter 13. User Accounts and Accounting
- Chapter 14. User Interfaces
- Chapter 15. Backup and Recovery
- Chapter 16. Management Tools
This will cause inetd to run the executable /opt/hpss/bin/hpss_mvr_tcp under the root user ID when a
connection is detected on port 5002. The Mover process uses the /var/hpss/etc/mvr_ek file to read the
encryption key that will be used to authenticate all connections made to this Mover.
After modifying the /etc/inetd.conf file, be sure to refresh the inetd daemon using the following
commands:
% ps -ef | grep inetd
root 6450 3154 0 Apr 29 - 0:02 /usr/sbin/inetd
hpss 17852 59370 2 16:50:25 pts/18 0:00 grep inetd
% kill -1 6450
For Linux systems
A file must be added to the /etc/xinetd.d directory which defines which program to run and the arguments
to use when a connection is detected. The file will be given the same name as the service name specified
for this Mover in /etc/services. For example, for the /etc/services entry added above, the corresponding
file /etc/xinetd.d/hpss_mvr1 would be created with the following contents:
service hpss_mvr1
{
disable = no
socket_type = stream
protocol = tcp
wait = no
port = 5002
user = root
server = /opt/hpss/bin/hpss_mvr_tcp
server_args = /var/hpss/etc/mvr_ek
}
The specified port will be one greater than the port listed as the TCP Listen Port in the Mover’s type
specific configuration. For example, the port value in the example corresponds to a Mover with a TCP
Listen Port value of 5001.
This will cause inetd to run the executable /opt/hpss/bin/hpss_mvr_tcp under the root user ID when a
connection is detected on port 5002. The Mover process will use the /var/hpss/etc/mvr_ek file to read the
encryption key that will be used to authenticate all connections made to this Mover.
After modifying the file in /etc/xinetd.d, be sure to refresh xinetd daemon using the following commands:
% /sbin/service xinetd --full-restart
Stopping xinetd: [ OK ]
Starting xinetd: [ OK ]
5.1.3.1.2. The Mover Encryption Key Files
To authenticate access to the remote Mover processes, the encryption key configured in this Mover’s
specific configuration (see Section 5.1.3: Mover Specific Configuration on page 102) is read from a file
accessible from the local file system. This file contains an ASCII representation of the encryption key.
The pathname of the file is passed to the Mover executable as specified in either the /etc/inetd.conf or
HPSS Management Guide November 2009
Release 7.3 (Revision 1.0) 105