W E K A
4.1
4.1
  • WEKA v4.1 documentation
  • WEKA System Overview
    • About the WEKA system
    • SSD capacity management
    • Filesystems, object stores, and filesystem groups
    • WEKA networking
    • Data lifecycle management
    • WEKA client and mount modes
    • WEKA containers architecture overview
    • Glossary
  • Getting Started with WEKA
    • Quick installation guide
    • Manage the system using the WEKA CLI
    • Manage the system using the WEKA GUI
    • Run first IOs with WEKA filesystem
    • Getting started with WEKA REST API
  • Planning and Installation
    • Prerequisites for installation
    • WEKA installation on bare metal
      • Plan the WEKA system Installation
      • Prepare the system for WEKA software installation
        • Enable the SR-IOV
      • Obtain the WEKA software installation package
      • WEKA cluster installation
        • WEKA legacy system installation process
      • Add clients
    • WEKA installation on AWS
      • Self-service portal
      • CloudFormation template generator
      • Deployment types
      • AWS outposts deployment
      • Supported EC2 instance types
      • Add clients
      • Auto scaling group
      • Troubleshooting
    • WEKA installation on Azure
    • WEKA installation on GCP
      • WEKA project description
      • Deployment on GCP using Terraform
      • GCP Terraform package description
      • Required services and supported regions
      • Supported machine types and storage
      • Auto-scale instances in GCP
      • Add clients
      • Troubleshooting
  • Performance
    • WEKA performance tests
      • Test environment details
  • WEKA Filesystems & Object Stores
    • Manage object stores
      • Manage object stores using the GUI
      • Manage object stores using the CLI
    • Manage filesystem groups
      • Manage filesystem groups using the GUI
      • Manage filesystem groups using the CLI
    • Manage filesystems
      • Manage filesystems using the GUI
      • Manage filesystems using the CLI
    • Attach or detach object store buckets
      • Attach or detach object store bucket using the GUI
      • Attach or detach object store buckets using the CLI
    • Advanced data lifecycle management
      • Advanced time-based policies for data storage location
      • Data management in tiered filesystems
      • Transition between tiered and SSD-only filesystems
      • Manual fetch and release of data
    • Mount filesystems
    • Snapshots
      • Manage snapshots using the GUI
      • Manage snapshots using the CLI
    • Snap-To-Object
      • Manage Snap-To-Object using the GUI
      • Manage Snap-To-Object using the CLI
    • Quota management
      • Manage quotas using the GUI
      • Manage quotas using the CLI
  • Additional Protocols
    • Manage the NFS protocol
      • Supported NFS client mount options
      • Manage NFS networking using the GUI
      • Manage NFS networking using the CLI
    • Manage the SMB protocol
      • Manage SMB using the GUI
      • Manage SMB using the CLI
    • Manage the S3 protocol
      • S3 cluster management
        • Manage the S3 service using the GUI
        • Manage the S3 service using the CLI
      • S3 buckets management
        • Manage S3 buckets using the GUI
        • Manage S3 buckets using the CLI
      • S3 users and authentication
        • Manage S3 users and authentication using the CLI
        • Manage S3 service accounts using the CLI
      • S3 rules information lifecycle management (ILM)
        • Manage S3 lifecycle rules using the GUI
        • Manage S3 lifecycle rules using the CLI
      • Audit S3 APIs
        • Configure audit webhook using the GUI
        • Configure audit webhook using the CLI
        • Example: How to use Splunk to audit S3
      • S3 supported APIs and limitations
      • S3 examples using boto3
  • Operation Guide
    • Alerts
      • Manage alerts using the GUI
      • Manage alerts using the CLI
      • List of alerts and corrective actions
    • Events
      • Manage events using the GUI
      • Manage events using the CLI
      • List of events
    • Statistics
      • Manage statistics using the GUI
      • Manage statistics using the CLI
      • List of statistics
    • System congestion
    • Security management
      • Obtain authentication tokens
      • KMS management
        • Manage KMS using the GUI
        • Manage KMS using the CLI
      • TLS certificate management
        • Manage the TLS certificate using the GUI
        • Manage the TLS certificate using the CLI
      • CA certificate management
        • Manage the CA certificate using the GUI
        • Manage the CA certificate using the CLI
      • Account lockout threshold policy management
        • Manage the account lockout threshold policy using GUI
        • Manage the account lockout threshold policy using CLI
      • Manage the login banner
        • Manage the login banner using the GUI
        • Manage the login banner using the CLI
    • User management
      • Manage users using the GUI
      • Manage users using the CLI
    • Organizations management
      • Manage organizations using the GUI
      • Manage organizations using the CLI
      • Mount authentication for organization filesystems
    • Expand and shrink cluster resources
      • Add a backend server in a multiple containers architecture
      • Add a backend server in a legacy architecture
      • Expand specific resources of a container
      • Shrink a cluster
    • Background tasks
    • Upgrade WEKA versions
  • Billing & Licensing
    • License overview
    • Classic license
    • Pay-As-You-Go license
  • Support
    • Prerequisites and compatibility
    • Get support for your WEKA system
    • Diagnostics management
      • Traces management
        • Manage traces using the GUI
        • Manage traces using the CLI
      • Protocols debug level management
        • Manage protocols debug level using the GUI
        • Manage protocols debug level using the CLI
      • Diagnostics data management
    • Weka Home - The WEKA support cloud
      • Local Weka Home overview
      • Local Weka Home deployment
      • Set the Local Weka Home to send alerts or events
      • Download the Usage Report or Analytics
  • Appendix
    • WEKA CSI Plugin
    • Set up the WEKAmon external monitoring
    • Set up the SnapTool external snapshots manager
  • REST API Reference Guide
Powered by GitBook
On this page
  • Configure the SMB cluster
  • Edit the SMB cluster
  • Join the SMB cluster in the Active Directory
  • Delete the SMB cluster
  • Display the SMB shares list
  • Add an SMB share
  • Edit an SMB share
  • Remove an SMB share
  1. Additional Protocols
  2. Manage the SMB protocol

Manage SMB using the GUI

This page provides procedures for setting up an SMB cluster over WEKA filesystems and managing the cluster itself, using the GUI.

PreviousManage the SMB protocolNextManage SMB using the CLI

Last updated 10 months ago

WEKAWEKAUsing the GUI, you can:

  • (not applicable for SMB-W)

Using the GUI, you can manage the SMB-W cluster, but not configure and delete it. See . When managing an SMB-W cluster using the GUI, the limitations related to SMB-W in the CLI commands also apply.

Note: Use ASCII format when configuring name fields, such as domain and shares.

Configure the SMB cluster

Define the WEKA system servers that participate in the SMB cluster (with legacy SMB only).

Procedure

  1. From the menu, select Manage > Protocols.

  2. From the Protocols pane, select SMB.

  3. On the Configuration tab, select Configure.

4. In the SMB Cluster Configuration dialog, set the following properties:

  • Name: A NetBIOS name for the SMB cluster.

  • Domain: The domain the SMB cluster joins.

  • Domain NetBIOS Name: (Optional) The domain NetBIOS name.

  • Servers: List of 3-8 WEKA system servers to participate in the SMB cluster, based on the server IDs in WEKA.

  • Encryption: Select the in-transit encryption to use in the SMB cluster: - enabled: enables encryption negotiation but doesn't turn it on automatically for supported sessions and share connections. - disabled: doesn't support encrypted connections. - desired: enables encryption negotiation and turns on data encryption on supported sessions and share connections. - required: enforces data encryption on sessions and share connections. Clients that do not support encryption will be denied access to the server.

  • IPs: (Optional) List of public IPs (comma-separated) used as floating IPs for the SMB cluster to serve the SMB over and thereby provide HA (do not assign these IPs to any server on the network). For IP range, use the following format: a.b.c.x-y.

In all cloud installations, it is not possible to set a list of SMB service addresses. The SMB service must be accessed using the primary addresses of the cluster nodes.

5. Select Save.

Once the system completes the configuration process, the server statuses change from not ready (red X icon) to ready (green V icon).

Edit the SMB cluster

You can modify the encryption and IPs settings according to your needs.

Procedure

  1. In the SMB Cluster Configuration, select the pencil icon.

2. In the Edit SMB Configuration dialog, update the encryption and IPs settings.

3. Select Save.

Join the SMB cluster in the Active Directory

To enable the organizational Active Directory to resolve the access of users and user groups to the SMB cluster, join the SMB cluster in the Active Directory (AD).

Before you begin

Enable the WEKA storage nodes to join the AD domain. On all backend servers used for SMB, set the AD servers as DNS servers in the /etc/resolv.conf file.

Procedure

  1. In the SMB Cluster Configuration, select Join.

2. In the Join to Active Directory dialog, set the following properties:

  • Username and Password: A username and password of an account that has access privileges to the Active Directory. WEKA does not save the user password. A computer account is created on behalf of the user for the SMB cluster.

  • Server: (Optional) WEKA identifies the AD server automatically based on the AD name. You do not need to set the server name. In some cases, if required, specify the AD server.

  • Computers Org. Unit: The default organization unit is the Computers directory. You can define any other directory to connect to in Active Directory, such as SMB servers or Corporate computers.

Once the SMB cluster joins in the Active Directory, the join status next to the domain changes to Joined.

To join a different Active Directory to the existing SMB cluster configuration, select Leave. To confirm the action, enter the username and password used to connect to the Active Directory.

Delete the SMB cluster

Deleting the SMB cluster resets its configuration data.

Procedure

  1. In the SMB Cluster Configuration, select the trash icon.

2. In the SMB Configuration Reset message, select Reset.

Display the SMB shares list

The Shares tab displays the list of SMB shares that are already created in the system. You can also customize the table columns of the SMB shares list.

Procedure

  1. From the menu, select Manage > Protocols.

  2. From the Protocols pane, select SMB.

  3. Select the Shares tab. You can filter the list using any column in the table.

Add an SMB share

Procedure

  1. In the Shares tab, select +Create.

2. In the Add SMB Share dialog, set the following properties:

  • Name: A meaningful and valid name for the SMB share.

    The name must meet the following requirements:

    • The share name must be no more than 80 characters in length.

    • The share name must not include the following characters: backslash (\), slash (/), colon (:), and semicolon (;).

    • Control characters in the range 0x00 through 0x1F (inclusive) are prohibited.

  • Filesystem: The filesystem name that includes the directory to share. Select one from the list. A filesystem set with required authentication cannot be used for SMB share.

  • Description: A description or purpose of the SMB share.

  • Path: A valid internal path, relative to the root, within the filesystem to expose for the SMB share.

  • Encryption: Select in-transit encryption enforcement of the share. The cluster global encryption settings can affect the actual encryption.

  • Read Only: Select if you want to set the share as read-only.

  • Hidden: Select if you want to hide the share, so it is not visible when viewing the list of system shares.

  • Allow Guest Access: Select if you want to allow guests to access without authentication.

  • Access Permissions: Define the share access permissions. If you select ON, select the access type, and the users or groups allowed to access the share (comma-separated users and groups list, add '@' as a group prefix).

  • Files/Directories POSIX Mode Mask: Set the new default file and directory permissions in a numeric (octal) format created through the share.

  • ACLs Enabled: Determines whether to enable the Windows Access-Control Lists (ACLs) on the share. Weka translates the ACLs to POSIX.

3. Select Save.

Edit an SMB share

You can update some of the SMB share settings. These include encryption, hiding the share, allowing guest access, and setting the share as read only or not.

Procedure

  1. In the Shares tab, select the three dots of the share and select Edit.

2. In the Update Share Settings dialog, update the relevant properties and select Save.

Remove an SMB share

Procedure

  1. In the Shares tab, select the three dots of the share and select Remove.

2. In the confirmation message that appears, select Confirm. The removed share no longer appears in the SMB Shares list.

Manage SMB using the CLI
Configure the SMB cluster
Edit the SMB cluster
Join the SMB cluster in the Active Directory
Delete the SMB cluster
Display the SMB shares list
Add an SMB share
Edit an SMB share
Remove an SMB share
SMB cluster configuration tab
SMB cluster configuration
SMB cluster configuration example
Edit the SMB cluster
Edit SMB configuration
Join the SMB cluster in the Active Directory
Join Active Directory dialog
Delete the SMB cluster configuration
SMB shares list
Create an SMB share
Add SMB Share dialog
Update the SMB share settings
Remove an SMB . share