Computer Drive User Manual
Table Of Contents
- Chapter 1. HPSS 7.1 Configuration Overview
- Chapter 2. Security and System Access
- Chapter 3. Using SSM
- 3.1. The SSM System Manager
- 3.2. Quick Startup of hpssgui
- 3.3. Configuration and Startup of hpssgui and hpssadm
- 3.4. Multiple SSM Sessions
- 3.5. SSM Window Conventions
- 3.6. Common Window Elements
- 3.7. Help Menu Overview
- 3.8. Monitor, Operations and Configure Menus Overview
- 3.9. SSM Specific Windows
- 3.10. SSM List Preferences
- Chapter 4. Global & Subsystem Configuration
- 4.1. Global Configuration Window
- 4.2. Storage Subsystems
- 4.2.1. Subsystems List Window
- 4.2.2. Creating a New Storage Subsystem
- 4.2.3. Storage Subsystem Configuration Window
- 4.2.3.1. Create Storage Subsystem Metadata
- 4.2.3.2. Create Storage Subsystem Configuration
- 4.2.3.3. Create Storage Subsystem Servers
- 4.2.3.4. Assign a Gatekeeper if Required
- 4.2.3.5. Assign Storage Resources to the Storage Subsystem
- 4.2.3.6. Create Storage Subsystem Fileset and Junction
- 4.2.3.7. Migration and Purge Policy Overrides
- 4.2.3.8. Storage Class Threshold Overrides
- 4.2.4. Modifying a Storage Subsystem
- 4.2.5. Deleting a Storage Subsystem
- Chapter 5. HPSS Servers
- 5.1. Server List
- 5.1. Server Configuration
- 5.1.1. Common Server Configuration
- 5.1.1. Core Server Specific Configuration
- 5.1.2. Gatekeeper Specific Configuration
- 5.1.3. Location Server Additional Configuration
- 5.1.4. Log Client Specific Configuration
- 5.1.1. Log Daemon Specific Configuration
- 5.1.2. Migration/Purge Server (MPS) Specific Configuration
- 5.1.3. Mover Specific Configuration
- 5.1.3.1. Mover Specific Configuration Window
- 5.1.3.1. Additional Mover Configuration
- 5.1.3.1.1. /etc/services, /etc/inetd.conf, and /etc/xinetd.d
- 5.1.3.1.2. The Mover Encryption Key Files
- 5.1.3.1.3. /var/hpss/etc Files Required for Remote Mover
- 5.1.3.1.1. System Configuration Parameters on IRIX, Solaris, and Linux
- 5.1.3.1.1. Setting Up Remote Movers with mkhpss
- 5.1.3.1.2. Mover Configuration to Support Local File Transfer
- 5.1.1. Physical Volume Repository (PVR) Specific Configuration
- 5.1.1. Deleting a Server Configuration
- 5.1. Monitoring Server Information
- 5.1.1. Basic Server Information
- 5.1.1. Specific Server Information
- 5.1.1.1. Core Server Information Window
- 5.1.1.1. Gatekeeper Information Window
- 5.1.1.1. Location Server Information Window
- 5.1.1.2. Migration/Purge Server Information Window
- 5.1.1.3. Mover Information Window
- 5.1.1.1. Physical Volume Library (PVL) Information Window
- 5.1.1.2. Physical Volume Repository (PVR) Information Windows
- 5.1. Real-Time Monitoring (RTM)
- 5.2. Starting HPSS
- 5.1. Stopping HPSS
- 5.2. Server Repair and Reinitialization
- 5.1. Forcing an SSM Connection
- Chapter 6. Storage Configuration
- 6.1. Storage Classes
- 6.2. Storage Hierarchies
- 6.3. Classes of Service
- 6.4. Migration Policies
- 6.5. Purge Policies
- 6.6. File Families
- Chapter 7. Device and Drive Management
- Chapter 8. Volume and Storage Management
- 8.1. Adding Storage Space
- 8.2. Removing Storage Space
- 8.3. Monitoring Storage Space
- 8.4. Dealing with a Space Shortage
- 8.5. Volume Management
- 8.6. Monitoring and Managing Volume Mounts
- 8.7. New Storage Technology Insertion
- Chapter 9. Logging and Status
- Chapter 10. Filesets and Junctions
- Chapter 11. Files, Directories and Objects by SOID
- Chapter 12. Tape Aggregation
- Chapter 13. User Accounts and Accounting
- Chapter 14. User Interfaces
- Chapter 15. Backup and Recovery
- Chapter 16. Management Tools
Note that having encryption types other than "des-cbc-crc" first on the "default_tkt_enctypes" and
"default_tgs_enctypes" lines can cause authentication failures. Specifically, keytab files generated by the
HPSS utility programs will use the first encryption type and only "des-cbc-crc" is known to work in all
cases. Other encryption types are known to fail for some OSs and Java implementations. Also, when kinit
is used with a keytab file, it only checks the first encryption type listed on the default lines in krb5.conf.
If the keytab was generated with a different encryption type, the authentication will fail.
3.3.4. SSM Help Files (Optional)
The SSM Help Files are an HTML version of the HPSS Management Guide. Individual sections of this
guide are available from the Help menus on the SSM windows.
To access help windows from the hpssgui, the Help Files must be accessible from each client machine.
We recommend storing these files in a file system shared by the clients so that they don't need to be
installed on every SSM client machine. By default, the hpssgui script looks for the help files in
$HPSS_HELP_FILES_PATH. The default location is /var/hpss/doc and can be overridden by using the -
f option.
Help files are distributed with HPSS or can be downloaded from the HPSS web site. They should be
installed in the $HPSS_HELP_FILES_PATH location and/or the path specified by the -f option. Refer to
the HPSS Installation Guide, Section 5.5 HPSS Documentation & Manual Page Setup for instructions on
how to install the help files. See the hpssgui man page for more details.
3.3.5. SSM Desktop Client Packaging
A full installation of HPSS is not needed on machines used only for executing hpssgui or hpssadm.
These machines, referred to here as "SSM client machines", only require the proper version of Java plus
a subset of HPSS components.
It is strongly recommended that a desktop configuration be created and installed for each hpssgui user.
The hpssgui program may run very slowly if it is executed on the System Manager machine and
displayed back to the user's desktop via remote X.
There is no advantage to executing the hpssadm program on the desktop machine. It will perform just as
well when executed remotely as on the desktop. In fact, it is recommended that hpssadm be executed on
the System Manager machine rather than on the user's desktop since this simplifies the dissemination and
protection of the user keytabs. Instructions are included here, however, for packaging the hpssadm for
sites who have a need to execute it on the desktop.
If the SSM code on the System Manager machine is recompiled , or the System Manager is reconfigured,
the client package will no longer work as then it is possible for the hpss.jar file to be out of sync with the
System Manager code. Since each client will have its own copy of the hpss.jar file the hpss.jar file
should be redistributed to each client. This can be done by redistributing the entire SSM client
package or by just redistributing the hpss.jar file.
Section 3.3.5.1: Automatic SSM Client Packaging and Installation, describes how to use the hpssuser
utility to package these components. Section 3.3.5.2: Manual SSM Client Packaging and Installation,
describes how to select and package the components manually.
HPSS Management Guide November 2009
Release 7.3 (Revision 1.0) 42