FreeNas 8.2 Guide
FreeNas 8.2 Guide
FreeNas 8.2 Guide
2 Users Guide
Page 2 of 235
FreeNAS is 2011, 2012 iXsystems FreeNAS is a trademark of iXsystems and the FreeNAS logo is a registered trademark of iXsystems. FreeBSD is a registered trademark of the FreeBSD Foundation Cover art by Jenny Rosenberg
Page 3 of 235
Table of Contents
Section 1: Introduction and Installation
1 Introduction......................................................................................................................................10 1.1 Hardware Recommendations....................................................................................................11 1.1.1 Architecture.......................................................................................................................11 1.1.2 RAM..................................................................................................................................11 1.1.3 Compact or USB Flash.....................................................................................................12 1.1.4 Storage Disks and Controllers..........................................................................................12 1.1.5 Network Interfaces............................................................................................................13 1.1.6 RAID Overview................................................................................................................13 1.1.7 ZFS Overview...................................................................................................................15 1.2 What's New in 8.2.....................................................................................................................17 1.3 Features.....................................................................................................................................18 1.4 Known Issues............................................................................................................................19 2 Installing and Upgrading FreeNAS..............................................................................................20 2.1 Getting FreeNAS..................................................................................................................20 2.2 FreeNAS in a Virtual Environment......................................................................................21 2.2.1 VirtualBox.........................................................................................................................21 2.2.1.1 Creating the Virtual Machine.................................................................................... 21 2.2.1.2 Creating Devices for Storage and Installation Media............................................... 26 2.2.1.3 Configuring the Bridged Adapter..............................................................................28 2.2.1.4 Running FreeNAS from a USB Image..................................................................29 2.2.2 VMWare ESXi..................................................................................................................30 2.3 Installing from CDROM...........................................................................................................34 2.4 Burning an IMG File................................................................................................................36 2.4.1 Using xzcat and dd on a FreeBSD or Linux System........................................................37 2.4.2 Using Keka and dd on an OS X System...........................................................................37 2.4.3 Using 7-Zip and Win32DiskImager on Windows.............................................................38 2.5 Initial Setup...............................................................................................................................39 2.5.1 Console Setup Menu.........................................................................................................41 2.6 Upgrading FreeNAS ...........................................................................................................42 2.6.1 Preparing for the Upgrade.................................................................................................43 2.6.2 Using the ISO....................................................................................................................43 2.6.3 From the GUI ...................................................................................................................46 2.6.3.1If Something Goes Wrong..........................................................................................47
3.1.8 Start Applicable Service(s)...............................................................................................50 3.1.9 Test Configuration from Client.........................................................................................50 3.1.10 Backup the Configuration...............................................................................................51 3.2 Account Configuration .............................................................................................................51 3.2.1 Admin Account.................................................................................................................51 3.2.2 Groups...............................................................................................................................52 3.2.3 Users.................................................................................................................................55 4 System Configuration.......................................................................................................................57 4.1 Cron Jobs..................................................................................................................................58 4.2 NTP Servers..............................................................................................................................60 4.3 Reporting..................................................................................................................................61 4.4 Rsync Tasks..............................................................................................................................62 4.4.1 Creating an Rsync Task.....................................................................................................63 4.4.2 Configuring Rsync Module Mode Between Two FreeNAS Systems...........................65 4.4.3 Configuring Rsync over SSH Mode Between Two FreeNAS Systems........................67 4.5 S.M.A.R.T. Tests.......................................................................................................................69 4.6 Settings....................................................................................................................................70 4.6.1 General Tab.......................................................................................................................70 4.6.2 Advanced Tab...................................................................................................................71 4.6.2.1Autotune.....................................................................................................................74 4.6.3 Email Tab..........................................................................................................................74 4.6.4 SSL Tab.............................................................................................................................76 4.7 Sysctls.......................................................................................................................................77 4.8 System Information..................................................................................................................78 4.9 Tunables....................................................................................................................................79 4.9.1 Recovering From Incorrect Tunables................................................................................80 5 Network Configuration.....................................................................................................................81 5.1 Global Configuration................................................................................................................82 5.2 Interfaces...................................................................................................................................83 5.3 Link Aggregations....................................................................................................................84 5.4 Network Summary....................................................................................................................88 5.5 Static Routes.............................................................................................................................89 5.6 VLANs......................................................................................................................................89 6 Storage Configuration......................................................................................................................90 6.1 Periodic Snapshot Tasks...........................................................................................................90 6.2 Replication Tasks......................................................................................................................94 6.2.1 Configure PULL...............................................................................................................94 6.2.2 Configure PUSH...............................................................................................................95 6.2.3 Troubleshooting Replication.............................................................................................98 6.3 Volumes....................................................................................................................................98 6.3.1 Auto Importing Volumes...................................................................................................99 6.3.2 Importing Volumes..........................................................................................................100 6.3.3 Volume Manager.............................................................................................................101 6.3.4 Using Volume Manager After a Volume Has Been Created...........................................103 6.3.5 Creating ZFS Datasets....................................................................................................104 6.3.6 Creating a zvol................................................................................................................106 6.3.7 Viewing Volumes............................................................................................................107 FreeNAS 8.2 Users Guide Page 5 of 235
6.3.8 Viewing Disks.................................................................................................................110 6.3.9 Setting Permissions.........................................................................................................111 6.3.10 Viewing Multipaths.......................................................................................................112 6.3.11 Replacing a Failed Drive...............................................................................................113 6.4 ZFS Scrubs..............................................................................................................................114 7 Sharing Configuration....................................................................................................................115 7.1 Apple (AFP) Shares................................................................................................................116 7.1.1 Creating AFP Shares.......................................................................................................116 7.1.2 Connecting to AFP Shares As Guest...............................................................................118 7.1.3 Using Time Machine.......................................................................................................121 7.2 Unix (NFS) Shares..................................................................................................................123 7.2.1 Creating NFS Shares.......................................................................................................123 7.2.2 Sample NFS Share Configuration...................................................................................124 7.2.3 Connecting to the NFS Share..........................................................................................125 7.2.3.1 From BSD or Linux Clients.................................................................................... 125 7.2.3.2 From Microsoft Clients...........................................................................................126 7.2.3.3 From Mac OS X Clients..........................................................................................127 7.2.4 Troubleshooting..............................................................................................................128 7.3 Windows (CIFS) Shares.........................................................................................................128 7.3.1 Creating CIFS Shares......................................................................................................129 7.3.2 Configuring Anonymous Access.....................................................................................131 7.3.3 Configuring Local User Access......................................................................................134 7.3.4 Configuring Shadow Copies...........................................................................................136 7.3.4.1Prerequisites............................................................................................................. 136 7.3.4.2Configuration Example............................................................................................ 136 8 Services Configuration...................................................................................................................138 8.1 Control Services......................................................................................................................139 8.2 Active Directory......................................................................................................................140 8.2.1 Troubleshooting Tips......................................................................................................142 8.3 AFP.........................................................................................................................................143 8.4 CIFS........................................................................................................................................144 8.4.1 Troubleshooting Tips......................................................................................................146 8.5 Dynamic DNS.........................................................................................................................147 8.6 FTP........................................................................................................................................148 8.6.1 Anonymous FTP.............................................................................................................150 8.6.2 Specified User Access in chroot.....................................................................................152 8.6.3 Encrypting FTP...............................................................................................................152 8.6.4 Troubleshooting..............................................................................................................153 8.7 iSCSI.......................................................................................................................................153 8.7.1 Authorized Accesses.......................................................................................................154 8.7.2 Extents.............................................................................................................................155 8.7.2.1 Adding a Device Extent...........................................................................................156 8.7.2.2 Adding a File Extent................................................................................................156 8.7.3 Initiators..........................................................................................................................157 8.7.4 Portals.............................................................................................................................159 8.7.5 Target Global Configuration..........................................................................................160 8.7.6 Targets.............................................................................................................................162 FreeNAS 8.2 Users Guide Page 6 of 235
8.7.7 Target/Extents.................................................................................................................164 8.7.8 Connecting to iSCSI Share.............................................................................................164 8.8 LDAP......................................................................................................................................165 8.9 NFS.........................................................................................................................................166 8.10 Plugins .................................................................................................................................167 8.10.1 Installing the Plugins Jail .............................................................................................168 8.10.2 Managing the Plugins Jail.............................................................................................170 8.10.2.1 Mount Points......................................................................................................... 170 8.10.2.2 Jail Settings........................................................................................................... 170 8.10.2.3 Accessing the Plugins Jail..................................................................................... 172 8.10.3 Installing Software Using an Existing Plugin PBI........................................................173 8.10.4 Popular PBIs.................................................................................................................175 8.10.4.1 Firefly....................................................................................................................175 8.10.4.2 MiniDLNA............................................................................................................177 8.10.4.3 Transmission..........................................................................................................179 8.10.5 Installing non-PBI Software.........................................................................................181 8.10.5.1 Installing FreeBSD Packages with pkg_add......................................................... 181 8.10.5.2 Compiling FreeBSD Ports with make...................................................................183 8.10.5.3 Configuring and Starting the Software..................................................................186 8.10.6 Creating your own FreeNAS PBIs............................................................................187 8.10.6.1 Introduction to PBI Modules.................................................................................187 8.10.6.2 Download Ports and Create the PBI Module Directory........................................189 8.10.6.3 Create the Module Components............................................................................190 8.11 Rsync....................................................................................................................................193 8.11.1 Rsync Modules..............................................................................................................193 8.12 S.M.A.R.T.............................................................................................................................195 8.13 SNMP...................................................................................................................................196 8.14 SSH.......................................................................................................................................197 8.14.1 Chrooting SFTP users ..................................................................................................198 8.14.2 Troubleshooting SSH Connections...............................................................................201 8.15 TFTP.....................................................................................................................................201 8.16 UPS.......................................................................................................................................203 9 Additional Options.........................................................................................................................204 9.1 Display System Processes.......................................................................................................204 9.2 Shell........................................................................................................................................205 9.3 Reboot.....................................................................................................................................206 9.4 Shutdown................................................................................................................................207 9.5 Help........................................................................................................................................207 9.6 Log Out...................................................................................................................................207 9.7 Alert........................................................................................................................................207
10.5 Forums..................................................................................................................................210 10.6 Instructional Videos..............................................................................................................211 10.7 Professional Support.............................................................................................................212 11 Useful Command Line Utilities....................................................................................................212 11.1 Iperf.......................................................................................................................................213 11.2 Netperf..................................................................................................................................216 11.3 IOzone...................................................................................................................................217 11.4 arcstat....................................................................................................................................219 11.4.1 Using the Scripts...........................................................................................................220 11.5 XDD......................................................................................................................................224 11.6 tw_cli....................................................................................................................................227 11.7 MegaCli................................................................................................................................228 11.8 IPMItool................................................................................................................................228 11.9 freenas-debug........................................................................................................................229 11.10 tmux....................................................................................................................................229
FreeNAS is a trademark of iXsystems and the FreeNAS logo is a registered trademark of iXsystems. FreeBSD and the FreeBSD logo are registered trademarks of the FreeBSD Foundation. 3ware and LSI are trademarks or registered trademarks of LSI Corporation. Active Directory is a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Apple, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. Chelsio is a registered trademark of Chelsio Communications. Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Django is a registered trademark of Django Software Foundation. Facebook is a registered trademark of Facebook Inc. FreeBSD is a registered trademark of the FreeBSD Foundation. Fusion-io is a trademark or registered trademark of Fusion-io, Inc. Intel, the Intel logo, Pentium Inside, and Pentium are trademarks of Intel Corporation in the U.S. and/or other countries. LinkedIn is a registered trademark of LinkedIn Corporation. Linux is a registered trademark of Linus Torvalds. Marvell is a registered trademark of Marvell or its affiliates. m0n0wall is a registered trademark of Manuel Kasper, Kasper Systems. OpenMediaVault is Copyright 2009-2011 by Volker Theile. SourceForge.net is a registered trademark or trademark of Geeknet, Inc., in the United States and other countries. Geeknet is a trademark of Geeknet, Inc. Twitter is a trademark of Twitter, Inc. in the United States and other countries. UNIX is a registered trademark of The Open Group. VirtualBox is a registered trademark of Oracle. VMWare is a registered trademark of VMWare, Inc. Wikipedia is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
Typographic Conventions
The FreeNAS 8.2 Guide uses the following typographic conventions: bold text: represents a command written at the command line. In usage examples, the font is changed to Courier 10 with any command output displayed in unbolded text. italic text: used to represent device names, file name paths, or text that is input into a GUI field.
Page 9 of 235
Introduction
FreeNAS is an embedded open source network-attached storage (NAS) system based on FreeBSD and released under a BSD license. A NAS provides an operating system that has been optimized for file storage and sharing. The FreeNAS Project was originally founded by Olivier Cochard-Labb in 2005 and was based on m0n0wall, an embedded firewall based on FreeBSD. It was PHP based, easy-to-use, and had lots of features. In December of 2009, Olivier announced that the .7 branch would be placed in maintenanceonly mode as he no longer had time to devote to further FreeNAS development. Volker Theile, a FreeNAS developer who also develops on Debian in his day job, decided to start the OpenMediaVault project, which would be a rewrite of FreeNAS based on Debian Linux and released under the terms of the GpLv3 license. Many FreeNAS users were not pleased about the change of license and the loss of kernel-based ZFS support due to GPL incompatibilities with the CDDL license. iXsystems, a provider of FreeBSD-based hardware solutions and professional support, took the initiative to continue the development of a BSD licensed FreeNAS solution based on FreeBSD. After analyzing the positives (lots of cool features) and negatives (monolithic, everything-but-the-kitchensink design that was difficult to maintain and support), it was decided that the next version would be rewritten from scratch using a modular design that would provide a basic core NAS with a modular plugin architecture for adding non-core features. This would allow FreeNAS to have a small footprint that was easy to support while allowing users to just install the plugins for the features they desired. It would have the added benefit of allowing users to create and contribute plugins for niche features, allowing usage cases to grow according to users' needs. Work on the new design began in 2010 when the 8.x branch was created to differentiate the new design from the original .7 branch. In late 2011, the .7 branch was considered to be EOL (end-of-life) and it was removed from the SourceForge site in mid-2012 when the legacy .7 branch was rebranded as NAS4Free. Users of the .7 branch should upgrade to either NAS4Free or to the latest release of FreeNAS 8.x. Table 1a lists the 8.x releases and provides links to the release notes for each released version: Table 1a: FreeNAS 8.x Releases Version Release Date 8.0 8.0.1 8.0.2 8.0.3 8.0.4 Release Notes http://sourceforge.net/projects/freenas/files/FreeNAS-8/ReleaseNotesMay 2, 2011 8.0-RELEASE.txt http://sourceforge.net/projects/freenas/files/FreeNASSeptember 30, 2011 8.0.1/ReleaseNotes-8.0.1-RELEASE.txt http://sourceforge.net/projects/freenas/files/FreeNASOctober 13, 2011 8.0.2/ReleaseNotes-8.0.2.RELEASE.txt http://support.freenas.org/export/10359/freenas/tags/8.0.3January 3, 2012 RELEASE/ReleaseNotes http://support.freenas.org/export/10359/freenas/tags/8.0.4February 29, 2012 RELEASE/ReleaseNotes Page 10 of 235
Version Release Date 8.2 8.3 July 20, 2012 expected Q2 2012 and will be based on FreeBSD 8.3
Except for the upcoming 8.3 release, each release in the 8.x branch is based on FreeBSD 8.2. Once the 8.x branch has reached the end of its development cycle, the 9.x branch will be created. This is expected to occur when FreeBSD 9.1 is released, in late 2012.
1.1
Hardware Recommendations
Since FreeNAS 8.2 is based on FreeBSD 8.2, it supports the same hardware found in the amd64 and i386 sections of the FreeBSD 8.2 Hardware Compatibility List. Actual hardware requirements will vary depending upon what you are using your FreeNAS system for. This section provides some guidelines to get you started. You should also skim through the FreeNAS Hardware Forum for performance tips from other FreeNAS users. The Hardware Forum is also an excellent place to post questions regarding your hardware setup or the hardware best suited to meet your requirements. 1.1.1 Architecture
While FreeNAS is available for both 32-bit and 64-bit architectures, 64-bit hardware is recommended for speed and performance. A 32-bit system can only address up to 4GB of RAM, making it poorly suited to the RAM requirements of ZFS. If you only have access to a 32-bit system, consider using UFS instead of ZFS. 1.1.2 RAM
The best way to get the most out of your FreeNAS system is to install as much RAM as possible. If your RAM is limited, consider using UFS until you can afford better hardware. ZFS typically requires a minimum of 6 GB of RAM in order to provide good performance; in practical terms (what you can actually install), this means that the minimum is really 8 GB. The more RAM, the better the performance, and the FreeNAS Forums provide anecdotal evidence from users on how much performance is gained by adding more RAM. For systems with large disk capacity (greater than 6 TB), a general rule of thumb is 1GB of RAM for every 1TB of storage. NOTE: by default, ZFS disables pre-fetching (caching) for systems containing less than 4 GB of usable RAM. Not using pre-fetching can really slow down performance. 4 GB of usable RAM is not the same thing as 4 GB of installed RAM as the operating system resides in RAM. This means that the practical pre-fetching threshold is 6 GB, or 8 GB of installed RAM. You can still use ZFS with less RAM, but performance will be effected. If you use Active Directory with FreeNAS, add an additional 2 GB of RAM for winbind's internal cache. FreeNAS 8.2 Users Guide Page 11 of 235
If you are installing FreeNAS on a headless system, disable the shared memory settings for the video card in the BIOS. 1.1.3 Compact or USB Flash
The FreeNAS operating system is a running image. This means that it should not be installed onto a hard drive, but rather to a USB or compact flash device that is at least 2 GB in size. If you don't have compact flash, you can instead use a USB thumb drive that is dedicated to the running image and which stays inserted in the USB slot. While technically you can install FreeNAS onto a hard drive, this is discouraged as you will lose the storage capacity of the drive. In other words, the operating system will take over the drive and will not allow you to store data on it, regardless of the size of the drive. The FreeNAS installation will partition the operating system drive into two ~1GB partitions. One partition holds the current operating system and the other partition is used when you upgrade. This allows you to safely upgrade to a new image or to revert to an older image should you encounter problems. 1.1.4 Storage Disks and Controllers
The Disk section of the FreeBSD Hardware List lists the supported disk controllers. In addition, support for 3ware 6gbps RAID controllers has been added along with the CLI utility tw_cli for managing 3ware RAID controllers. FreeNAS supports hot pluggable drives. Make sure that AHCI is enabled in the BIOS. If you have some money to spend and wish to optimize your disk subsystem, consider your read/write needs, your budget, and your RAID requirements. For example, moving the the ZIL (ZFS Intent Log) to a dedicated SSD only helps performance if you have synchronous writes, like a database server. SSD cache devices only help if your working set is larger than system RAM, but small enough that a significant percentage of it will fit on the SSD. If you have steady, non-contiguous writes, use disks with low seek times. Examples are 10K or 15K SAS drives which cost about $1/GB. An example configuration would be six 15K SAS drives in a RAID 10 which would yield 1.8 TB of usable space or eight 15K SAS drives in a RAID 10 which would yield 2.4 TB of usable space. 7200 RPM SATA disks are designed for single-user sequential I/O and are not a good choice for multiuser writes. If you have the budget and high performance is a key requirement, consider a Fusion-I/O card which is optimized for massive random access. These cards are expensive and are suited for high end systems that demand performance. A Fusion-I/O can be formatted with a filesystem and used as direct storage; when used this way, it does not have the write issues typically associated with a flash device. A FusionI/O can also be used as a cache device when your ZFS dataset size is bigger than your RAM. Due to the increased throughput, systems running these cards typically use multiple 10 GigE network interfaces. If you will be using ZFS, Disk Space Requirements for ZFS Storage Pools recommends a minimum of 16 GB of disk space. Due to the way that ZFS creates swap, you can not format less than 3GB of space with ZFS. However, on a drive that is below the minimum recommended size you lose a fair amount of storage space to swap: for example, on a 4 GB drive, 2GB will be reserved for swap. FreeNAS 8.2 Users Guide Page 12 of 235
If you are new to ZFS and are purchasing hardware, read through ZFS Storage Pools Recommendations first. 1.1.5 Network Interfaces
The FreeBSD Ethernet section of the Hardware Notes indicates which interfaces are supported by each driver. While many interfaces are supported, FreeNAS users have seen the best performance from Intel and Chelsio interfaces, so consider these brands if you are purchasing a new interface. At a minimum you will want to use a GigE interface. While GigE interfaces and switches are affordable for home use, it should be noted that modern disks can easily saturate 110 MB/s. If you require a higher network throughput, you can "bond" multiple GigE cards together using the LACP type of Link Aggregation. However, any switches will need to support LACP which means you will need a more expensive managed switch rather than a home user grade switch. If network performance is a requirement and you have some money to spend, use 10 GigE interfaces and a managed switch. If you are purchasing a managed switch, consider one that supports LACP and jumbo frames as both can be used to increase network throughput. NOTE: at this time the following are not supported: InfiniBand, FibreChannel over Ethernet, or wireless interfaces. If network speed is a requirement, consider both your hardware and the type of shares that you create. On the same hardware, CIFS will be slower than FTP or NFS as Samba is single-threaded. If you will be using CIFS, use a fast CPU. 1.1.6 RAID Overview
Data redundancy and speed are important considerations for any network attached storage system. Most NAS systems use multiple disks to store data, meaning you should decide what type of RAID to use before installing FreeNAS. This section provides an overview of RAID types to assist you in deciding which type best suits your requirements. RAID 0: provides optimal performance and allows you to add disks as needed. Provides zero redundancy, meaning if one disk fails, all of the data on all of the disks is lost. The more disks in the RAID 0, the more likely the chance of a failure. RAID 1: provides redundancy as data is copied (mirrored) to two or more drives. Provides good read performance but may have slower write performance, depending upon how the mirrors are setup and the number of ZILs and L2ARCs. RAID 5: requires a minimum of 3 disks and can tolerate the loss of one disk without losing data. Disk reads are fast but write speed can be reduced by as much as 50%. If a disk fails, it is marked as degraded but the system will continue to operate until the drive is replaced and the RAID is rebuilt. However, should another disk fail before the RAID is rebuilt, all data will be lost. If your FreeNAS system will be used for steady writes, RAID 5 is a poor choice due to the slow write speed. RAID 6: requires a minimum of 4 disks and can tolerate the loss of 2 disks without losing data. Benefits from having many disks as performance, fault tolerance, and cost efficiency are all improved relatively with more disks. The larger the failed drive, the longer it takes to rebuild the array. Reads are very fast but writes are slower than a RAID 5.
Page 13 of 235
RAID 10: requires a minimum of 4 disks and number of disks is always even as this type of RAID mirrors striped sets. This type of RAID can survive the failure of any one drive. If you lose a second drive from the same mirrored set, you will lose the array. However, if you lose a second drive from a different mirrored set, the array will continue to operate in a degraded state. RAID 10 significantly outperforms RAIDZ2, especially on writes. RAID 60: requires a minimum of 8 disks. Combines RAID 0 striping with the distributed double parity of RAID 6 by striping 2 4-disk RAID 6 arrays. RAID 60 rebuild times are half that of RAID 6. RAIDZ1: ZFS software solution that is equivalent to RAID5. Its advantage over RAID 5 is that it avoids the write-hole and doesn't require any special hardware, meaning it can be used on commodity disks. If your FreeNAS system will be used for steady writes, RAIDZ is a poor choice due to the slow write speed. RAIDZ2: double-parity ZFS software solution that is similar to RAID-6. Its advantage over RAID 5 is that it avoids the write-hole and doesn't require any special hardware, meaning it can be used on commodity disks. RAIDZ2 allows you to lose 1 drive without any degradation as it basically becomes a RAIDZ1 until you replace the failed drive and restripe. At this time, RAIDZ2 on FreeBSD is slower than RAIDZ1. RAIDZ3: triple-parity ZFS software solution. RAIDZ3 offers three parity drives and can operate in degraded mode if up to three drives fail with no restrictions on which drives can fail. RAIDZ3 support will begin with FreeNAS version 8.3. NOTE: It isn't recommended to mix ZFS RAID with hardware RAID. It is recommended that you place your hardware RAID controller in JBOD mode and let ZFS handle the RAID. According to Wikipedia: ZFS can not fully protect the user's data when using a hardware RAID controller, as it is not able to perform the automatic self-healing unless it controls the redundancy of the disks and data. ZFS prefers direct, exclusive access to the disks, with nothing in between that interferes. If the user insists on using hardware-level RAID, the controller should be configured as JBOD mode (i.e. turn off RAIDfunctionality) for ZFS to be able to guarantee data integrity. Note that hardware RAID configured as JBOD may still detach disks that do not respond in time; and as such may require TLER/CCTL/ERCenabled disks to prevent drive dropouts. These limitations do not apply when using a non-RAID controller, which is the preferred method of supplying disks to ZFS. When determining the type of RAIDZ to use, consider whether your goal is to maximum disk space or maximum performance: RAIDZ1 maximizes disk space and generally performs well when data is written and read in large chunks (128K or more). RAIDZ2 offers better data availability and significantly better mean time to data loss (MTTDL) than RAIDZ1. A mirror consumes more disk space but generally performs better with small random reads. For better performance, a mirror is strongly favored over any RAIDZ, particularly for large, uncacheable, random read loads. When determining how many disks to use in a RAIDZ, the following configurations provide optimal performance. Array sizes beyond 12 disks are not recommended. Start a RAIDZ1 at at 3 or 5 disks. FreeNAS 8.2 Users Guide Page 14 of 235
Start a RAIDZ2 at 4, 6, or 10 disks. Start a RAIDZ3 at 5, 7, or 11 disks. The recommended number of disks per group is between 3 and 9. If you have more disks, use multiple groups. The following resources can also help you determine the RAID configuration best suited to your storage needs: What is the Best RAIDZ Configuration Getting the Most out of ZFS Pools RAIDZ Configuration Requirements and Recommendations What number of drives are allowed in a RAIDZ config? NOTE: NO RAID SOLUTION PROVIDES A REPLACEMENT FOR A RELIABLE BACKUP STRATEGY. BAD STUFF CAN STILL HAPPEN AND YOU WILL BE GLAD THAT YOU BACKED UP YOUR DATA WHEN IT DOES. See section 6.1 Periodic Snapshot Tasks and section 6.2 Replication Tasks if you would like to use ZFS snapshots and rsync as part of your backup strategy. 1.1.7 ZFS Overview
While ZFS isn't hardware, an overview is included in this section as the decision to use ZFS may impact on your hardware choices and whether or not to use hardware RAID. If you are new to ZFS, the Wikipedia entry on ZFS provides an excellent starting point to learn about its features. These resources are also useful to bookmark and refer to as needed: ZFS Evil Tuning Guide FreeBSD ZFS Tuning Guide ZFS Best Practices Guide ZFS Administration Guide Becoming a ZFS Ninja (video) ZFS Troubleshooting Guide ZFS version numbers change as features are introduced and are incremental, meaning that a version includes all of the features introduced by previous versions. Table 1.1a summarizes various ZFS versions, the features which were added by that ZFS version, and in which version of FreeNAS that ZFS version was introduced. Recent versions of FreeNAS .7.x use ZFS version 13 which is why you can't downgrade a ZFS volume from FreeNAS 8.x to FreeNAS .7.x. FreeNAS 8.2 uses ZFS version 15, meaning that it includes all of the features that were introduced between versions 13 to 15. Table 1.1a: Summary of ZFS Versions ZFS Version Features Added 10 cache devices 11 improved scrub performance FreeNAS 8.2 Users Guide FreeNAS Version .7.x .7.x Page 15 of 235
ZFS Version 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 30
Features Added snapshot properties snapused property passthrough-x aclinherit property user and group space accounting STMF property support RAIDZ3 snapshot user holds log device removal compression using zle (zero-length encoding) deduplication received properties deferred update (slim ZIL) system attributes improved scrub stats improved snapshot deletion performance improved snapshot creation performance multiple vdev replacements encryption
FreeNAS Version .7.x .7.x 8.0.x 8.0.x 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 8.3 Oracle has not released as open source
The following is a glossary of terms used by ZFS: Pool: a collection of devices that provides physical storage and data replication managed by ZFS. This pooled storage model eliminates the concept of volumes and the associated problems of partitions, provisioning, wasted bandwidth and stranded storage. Thousands of file systems can draw from a common storage pool, each one consuming only as much space as it actually needs. The combined I/O bandwidth of all devices in the pool is available to all file systems at all times. The Storage Pools Recommendations of the ZFS Best Practices Guide provides detailed recommendations for creating the storage pool. Dataset: once a pool is created, it can be divided into datasets. A dataset is similar to a folder in that it supports permissions. A dataset is also similar to a filesystem in that you can set properties such as quotas and compression. Zvol: ZFS storage pools can provide volumes for applications that need raw-device semantics such as swap devices or iSCSI device extents. In other words, a zvol is a virtual block device in a ZFS storage pool. Snapshot: a read-only point-in-time copy of a file system. Snapshots can be created quickly and, if little data changes, new snapshots take up very little space. For example, a snapshot where no files have changed takes 0MB of storage, but if you change a 10GB file it will keep a copy of both the old and the new 10GB version. Snapshots provide a clever way of keeping a history of files, should you need to recover an older copy or even a deleted file. For this reason, many administrators take snapshots often FreeNAS 8.2 Users Guide Page 16 of 235
(e.g. every 15 minutes), store them for a period of time (e.g. for a month), and store them on another system. Such a strategy allows the administrator to roll the system back to a specific time or, if there is a catastrophic loss, an off-site snapshot can restore the system up to the last snapshot interval (e.g. within 15 minutes of the data loss). Snapshots can be cloned or rolled back, but the files on the snapshot cannot be accessed independently. Clone: a writable copy of a snapshot which can only be created on the same ZFS volume. Clones provide an extremely space-efficient way to store many copies of mostly-shared data such as workspaces, software installations, and diskless clients. Clones do not inherit the properties of the parent dataset, but rather inherit the properties based on where the clone is created in the ZFS pool. Because a clone initially shares all its disk space with the original snapshot, its used property is initially zero. As changes are made to the clone, it uses more space. ZIL: (ZFS Intent Log) is effectively a filesystem journal that manages writes. If you are using VMWare, the speed of the ZIL device is essentially the write performance bottleneck when using NFS. In this scenario, iSCSI will perform better than NFS. If you decide to create a dedicated cache device to speed up NFS writes, it can be half the size of system RAM as anything larger than that is unused capacity. Mirroring the ZIL device won't increase the speed, but it will help performance and reliability if one of the devices fails. L2ARC: on-disk cache used to manage reads. Losing an L2ARC device will not affect the integrity of the storage pool, but may have an impact on read performance, depending upon the workload and the ratio of dataset size to cache size. You can learn more about how L2ARC works here. Scrub: similar to ECC memory scrubbing, all data is read to detect latent errors while they're still correctable. A scrub traverses the entire storage pool to read every data block, validates it against its 256-bit checksum, and repairs it if necessary.
1.2
BitTorrent, DLNA/uPNP, and iTunes plugins are available and instructions for creating your own plugins are in section 8.10.6 Creating your own FreeNAS PBIs. Built-in DAAP, DLNA, and torrent support. An informational icon indicates which graphical fields contain a tooltip. ZFS is now integrated in that any ZFS operations that are performed at the command line are now reflected in the GUI. This means that you can now create pools, datasets, snapshots, and zvols in either the command line or the GUI and they will stay in sync with each other. Support for multipath devices on systems containing dual expander SAS backplanes, SAS drives, or dual expander JBODs with SAS drives. Such hardware will be automatically configured for multipath. The GUI now includes Shell which allows you to access a root shell from within a web browser.
Page 17 of 235
"Create Volume" was renamed to "Volume Manager". Extending existing ZFS pools is more intuitive. Creating a volume now uses a multiselect widget instead of checkboxes to improve ease of use. When you create or import a ZFS volume, a periodic scrub task is automatically created to run every 35 days. These tasks can be managed in Storage -> ZFS Scrubs. An autotuning script is now available and disabled by default. It sets various tunables and sysctls based on system resources and components. The predetermined values are exposed through the GUI from the Sysctls and Tunables panes. GUI is now compatible with Android and iOS mobile devices. iSCSI target reload is now supported for adding and removing (but not changing) targets on the fly. Since the Logical Unit Controller (LUC) enables this functionality, reload will not function if the LUC is not enabled. FreeNAS can now be configured as an iSCSI initiator (from the command line). A more responsive service state detection mechanism was added to improve FreeNAS interoperability in virtualization software such as VMWare or VirtualBox.
1.3
Features
supports AFP, CIFS, FTP, NFS, SSH (including SFTP), and TFTP as file sharing mechanisms supports exporting file or device extents via iSCSI supports Active Directory or LDAP for user authentication supports UFS2 based volumes, including gmirror, gstripe, and graid3 supports ZFS, enabling many features not available in UFS2 such as quotas, snapshots, compression, replication, and datasets for sharing subsets of volumes upgrade procedure saves the current operating system to an inactive partition, allowing for an easy reversal of an undesirable upgrade system notifications are automatically mailed to the root user account Django-driven graphical user interface rsync configuration through the graphical interface cron management through the graphical interface menu localization multiple IPs can be specified per iSCSI portal ssh daemon logs to /var/log/auth.log ZFS hot spare cutover helper application within GUI Page 18 of 235
SMART monitoring in GUI UPS management in GUI USB 3.0 support support for Windows ACLs and UNIX file system permissions periodic ZFS snapshots are visible in Windows as shadow copies includes tmux, a BSD-licensed utility similar to GNU screen includes dmidecode which can provide very useful hardware diagnostic information netatalk (AFP) is compatible with OS X 10.7
1.4
Known Issues
UPGRADES FROM FreeNAS 0.7x ARE UNSUPPORTED. The system has no way to import configuration settings from 0.7x versions of FreeNAS. However, the volume importer should be able to import volumes created with FreeNAS 0.7x. The operating system drive can not be used as a component for a volume, nor can it be partitioned for sharing. The ZFS upgrade procedure is non-reversible. Do not upgrade your ZFS version unless you are absolutely sure that you will never want to go back to the previous version. There is no reversing a zpool upgrade, and there is no way for a system with an older version of ZFS to access pools that have been upgraded. The available space reported in the parent zpool doesn't necessarily reflect reality and can be confusing because the available space represented by datasets or zvols can exceed that of the parent zpool. Disks with certain configurations can get probed by GEOM and become essentially unwritable without manual intervention. For instance, if you use disks that previously had a gmirror on them, the system may pick that up and the disks will be unavailable until the existing gmirror is stopped and destroyed. Some Atom-based systems with Realtek GigE interfaces have network performance issues with FreeBSD 8.2. USB 3.0 support is disabled by default as it panics some motherboards. To enable support, create a tunable with a variable of xhci_load and a value of YES.
Before installing FreeNAS you should be aware of the following known issues:
Before installing, it is important to remember that the FreeNAS operating system must be installed on a separate device from the drive(s) that will hold the storage data. In other words, if you only have one disk drive you will be able to use the FreeNAS graphical interface but won't be able to store any data, which after all, is the whole point of a NAS system. If you are a home user who is experimenting FreeNAS 8.2 Users Guide Page 19 of 235
with FreeNAS, you can install FreeNAS on an inexpensive USB thumb drive and use the computer's disk(s) for storage. This section describes the following: Getting FreeNAS Installing in a Virtual Environment Installing from CDROM Burning an IMG File Initial Setup Upgrading FreeNAS
2.1
Getting FreeNAS
FreeNAS 8.2 can be downloaded from the FreeNAS-8.2.0 Sourceforge page. FreeNAS is available for 32-bit (x386) and 64-bit (x64) architectures. You should download the architecture type that matches your CPU's capabilities.. The download page contains the following types of files: GUI_upgrade.xz: this is a compressed firmware upgrade image and requires a previous installation of FreeNAS 8.x. If your intent is to upgrade FreeNAS, download the correct .xz file for your architecture and see section 2.6 Upgrading FreeNAS. .img.xz: this is a compressed image that needs to be written to a USB or compact flash device. Section 2.4 Burning an IMG File describes how to write the image. The format changed in 8.2.0-BETA3 from xz to txz. This means that you should download the .txz version if you are upgrading from 8.2.0-BETA3 or higher. If you are upgrading from any version prior to 8.2.0BETA3, use the .xz file. .iso: this is a bootable image that can be written to CDROM. This is described in more detail in section 2.3 Installing from CDROM.
The download directory also contains the Release Notes for that version of FreeNAS. This file contains the changes introduced by that release, any known issues, and the SHA256 checksums of the files in the download directory. The command you use to verify the checksum varies by operating system: on a BSD system use the command sha256 name_of_file on a Linux system use the command sha256sum name_of_file on a Mac system use the command shasum -a 256 name_of_file on a Windows system or Mac system, you can install a utility such as HashCalc or HashTab
2.2
In order to install or run FreeNAS within a virtual environment, you will need to create a virtual machine that meets the following minimum requirements: FreeNAS 8.2 Users Guide Page 20 of 235
512 MB base memory size a virtual disk at least 4 GB in size to hold the operating system and swap at least one more virtual disk at least 2 GB in size to be used as data storage a bridged adapter This section demonstrates how to create and access a virtual machine within the VirtualBox and VMWare EXSi environments. 2.2.1 VirtualBox
VirtualBox is an open source virtualization program originally created by Sun Microsystems. VirtualBox runs on Windows, BSD, Linux, Macintosh, and OpenSolaris. It can be configured to install FreeNAS from a downloaded .iso or to run it from a burned .img.xz file, and makes a good testing environment for practicing configurations or learning how to use the features provided by FreeNAS.
2.2.1.1 Creating the Virtual Machine
To create the virtual machine, start VirtualBox and click the New button, seen in Figure 2.2a, to start the new virtual machine wizard. Figure 2.2a: Initial VirtualBox Screen
Click the Next button to see the screen in Figure 2.2b. Enter a name for the virtual machine, then click the Operating System drop down menu and select BSD which will automatically change the Version to FreeBSD. Click Next to see the screen in Figure 2.2c. FreeNAS 8.2 Users Guide Page 21 of 235
Figure 2.2b: Type in a Name and Select the Operating System for the New Virtual Machine
Figure 2.2c: Select the Amount of Memory Reserved for the Virtual Machine
Page 22 of 235
Figure 2.2d: Select Whether to Use an Existing or Create a New Virtual Disk
The base memory size must be changed to at least 512 MB. If your system has enough memory, select at least 4096 MB so that you can use ZFS. When finished, click Next to see the screen in Figure 2.2d. This screen is used to create the virtual hard disk to install FreeNAS into. Click Next to launch the "Create New Virtual Disk Wizard". Click the Next button again to see the screen in Figure 2.2e. The wizard can be used to create the following types of virtual disk formats: VDI: Virtual Disk Image is the format used by VirtualBox. Select this option if you downloaded the ISO. VMDK: Virtual Machine Disk is the format used by VMWare. Select this option if you converted the .img file to VMDK format using the instructions in section 2.2.1.4 Running FreeNAS from a USB Image. VHD: Virtual Hard Disk is the format used by Windows Virtual PC. HDD: is the format used by Parallels. Once you make a selection, click the Next button to see the screen in Figure 2.2f.
Page 23 of 235
Figure 2.2f: Select the Storage Type for the Virtual Disk
Page 24 of 235
You can now choose whether you want "Dynamically expanding storage" or "Fixed-size storage". The first option uses disk space as needed until it reaches the maximum size that you will set in the next screen. The second option creates a disk the same size as that specified amount of disk space, whether it is used or not. Choose the first option if you are worried about disk space; otherwise, choose the second option as it allows VirtualBox to run slightly faster. Once you select Next, you'll see the screen in Figure 2.2g. Figure 2.2g: Select the File Name and Size of the Virtual Disk
This screen is used to set the size (or upper limit) of the virtual machine. Increase the default size to 4 GB. Use the folder icon to browse to a directory on disk with sufficient space to hold the virtual machine. Once you make your selection and press Next, you will see a summary of your choices. Use the Back button to return to a previous screen if you need to change any values. Otherwise, click Finish to finish using the wizard. The virtual machine will be listed in the left frame, as seen in the example in Figure 2.2h.
Page 25 of 235
2.2.1.2
Next, create the virtual disk(s) to be used for storage. Click the Storage hyperlink in the right frame to access the storage screen seen in Figure 2.2i. Click the Add Attachment button, select Add Hard Disk from the pop-up menu, then click the Create New Disk button. This will launch the Create New Virtual Disk Wizard (seen in Figures 2.2e and 2.2f). Since this disk will be used for storage, create a size appropriate to your needs, making sure that it is at least 2GB in size. If you will be using ZFS, make sure that it is at least 3GB in size. If you wish to practice RAID configurations, create as many virtual disks as you need. You will be able to create 2 disks on the IDE controller. If you need additional disks, click the Add Controller button to create another controller to attach disks to. Next, create the device for the installation media. If you will be installing from an ISO, highlight the word Empty, then click the CD icon as seen in Figure 2.2j. Click Choose a virtual CD/DVD disk file... to browse to the location of the .iso file. Alternately, if you have burned the .iso to disk, select the detected Host Drive.
Page 26 of 235
Page 27 of 235
NOTE: Depending upon the extensions available in your CPU, you may or may not be able to use a 64-bit ISO on a 64-bit system. If you receive the error "your CPU does not support long mode" when you try to boot a 64-bit ISO, your CPU either does not have the required extension or AMD-V/VT-x is disabled in the system BIOS. You can still use the 32-bit version of the ISO, but ZFS performance will be reduced.
2.2.1.3 Configuring the Bridged Adapter
To configure the network adapter, go to Settings -> Network. In the Attached to drop-down menu select Bridged Adapter, then select the name of the physical interface from the Name drop-down menu. In the example shown in Figure 2.2k, the Intel Pro/1000 Ethernet card is attached to the network and has a device name of re0. You are now ready to install FreeNAS as described in section 2.3 Installing from CDROM. Once FreeNAS is installed, press F12 to access the boot menu in order to select the primary hard disk as the boot option. You can permanently boot from disk by removing the CD/DVD device in Storage or by unchecking CD/DVD-ROM in the Boot Order section of System. Figure 2.2k: Configuring a Bridged Adapter in VirtualBox
Page 28 of 235
2.2.1.4
If you will be running FreeNAS from an .img file instead of installing it from the ISO, you must first download and install the Oracle VM VirtualBox Extension Pack that matches your version of VirtualBox. The extension pack enables USB support. Next, burn the FreeNAS .img using the instructions at section 2.4 Burning an Image File. Once the image is burned to the USB device, leave the device inserted. The VirtualBox GUI does not automatically provide a way to select a USB device to boot from. However, you can use a command line utility to link the USB device to a .vdmk file so that it can be selected as a boot device. To do this on a Windows system, open a command prompt in administrative mode (right-click cmd from the Run menu and select Run as administrator), and run the commands shown in Figure 2.2l. Before running these commands, verify the physical drive number from Start menu -> right-click Computer -> Manage -> Storage -> Disk Management. If the USB drive is different than Disk 1, change the number in \\.\PhysicalDrive1 to match the disk number. You can also specify where to save the .vdmk file. Make sure that the security tab of the saved file gives Full control permissions to Users so that the file can be accessed by VirtualBox. Figure 2.2l: Creating the vmdk File in Windows
Once you have a .vdmk file, create a new virtual machine while the USB stick is inserted. When you get to Figure 2.2e, select Use existing hard disk and browse to your .vdmk file. Click Next, then Create. This will create the virtual machine and bring you to Figure 2.2h. You can then create your storage disks and bridged adapter as usual. When finished, start the virtual machine and it will boot directly into FreeNAS.
Page 29 of 235
2.2.2
VMWare ESXi
ESXi is is a "bare-metal" hypervisor architecture created by VMware Inc. Commercial and free versions of the VMWare Vsphere Hypervisor operating system (ESXi) are available from the VMWare website. Once the operating system is installed on supported hardware, use a web browser to connect to its IP address. The welcome screen will provide a link to download the VMware vSphere client which is used to create and manage virtual machines. Once the VMware vSphere client is installed, use it to connect to the ESXi server. To create a new virtual machine, click File -> New -> Virtual Machine. The New Virtual Machine Wizard will launch as seen in Figure 2.2m. Click Next and input a name for the virtual machine. Click Next and highlight a datastore. An example is shown in Figure 2.2n. Click Next. In the screen shown in Figure 2.2o, click Other then select a FreeBSD architecture that matches the FreeNAS architecture. Click Next and create a virtual disk file of 4GB to hold the FreeNAS operating system, as shown in Figure 2.2p. Click Next then Finish. Your virtual machine will be listed in the left frame. Right-click the virtual machine and select Edit Settings to access the screen shown in Figure 2.2q. Figure 2.2m: New Virtual Machine Wizard
Page 30 of 235
Page 31 of 235
Increase the Memory Configuration to at least 512 MB . Under CPUs, make sure that only 1 virtual processor is listed, otherwise you will be unable to start any FreeNAS services. To create a storage disk, click "Hard disk 1" -> Add. In the Device Type menu, highlight Hard Disk and click Next. Select "Create a new virtual disk" and click Next. In the screen shown in Figure 2.2r, select the size of the disk. If you would like the size to be dynamically allocated as needed, check the box "Allocate and commit space on demand (Thin Provisioning)". Click Next, then Next, then Finish to create the disk. Repeat to create the amount of storage disks needed to meet your requirements.
Page 32 of 235
Page 33 of 235
2.3
If you prefer to install FreeNAS using a menu-driven installer, download the ISO image that matches the architecture of the system you will install onto (32 or 64 bit) and burn it to a CDROM. NOTE: the installer on the CDROM will recognize if a previous version of FreeNAS 8.x is already installed, meaning the CDROM can also be used to upgrade FreeNAS. However, the installer can not perform an upgrade from a FreeNAS .7 system. Insert the CDROM into the system and boot from it. Once the media has finished booting, you will be presented with the console setup menu seen in Figure 2.3a. NOTE: if the installer does not boot, check that the CD drive is listed first in the boot order in the BIOS. Some motherboards may require you to connect the CD-ROM to SATA0 (the first connector) in order to boot from CD-ROM. If it stalls during boot, check the SHA256 hash of your ISO against that listed in the Release Notes; if the hash does not match, re-download the file. If the hash is correct, try FreeNAS 8.2 Users Guide Page 34 of 235
Press enter to select the default option of 1 Install/Upgrade to hard drive/flash device, etc.. The next menu, seen in Figure 2.3b, will list all available drives, including any inserted USB thumb drives which will begin with da. In this example, the user is installing into VirtualBox and has created a 4GB virtual disk to hold the operating system. NOTE: at this time, the installer does not check the size of the install media before attempting an installation. A 2 GB device is required, but the install will appear to complete successfully on smaller devices, only to fail at boot. Figure 2.3b: Selecting Which Drive to Install Into
Page 35 of 235
Use your arrow keys to highlight the USB or compact flash device then tab to OK and press enter. FreeNAS will issue the warning seen in Figure 2.3c, reminding you not to install on a hard drive. Figure 2.3c: FreeNAS Warning to Install onto USB Flash Drive
Press enter and FreeNAS will extract the running image from the ISO and transfer it to the device. Once the installation is complete, you should see a message similar to Figure 2.3d. Figure 2.3d: FreeNAS Installation Complete
Press enter to return to the first menu, seen in Figure 2.3a. Highlight 3 Reboot System and press enter. Remove the CDROM. If you installed onto a USB thumb drive, leave the thumb drive inserted. Make sure that the device you installed to is listed as the first boot entry in the BIOS so that the system will boot from it. FreeNAS should now be able to boot into the Console setup menu described in section 2.5 Initial Setup.
2.4
If your system does not have a CDROM or you prefer to manually write the running image, download the img.xz file. This file will need to be uncompressed and then written to a compact flash card or USB thumbdrive that is 2GB or larger. NOTE: any data currently saved on the specified device will be erased. If you are writing the image to a compact flash card, make sure that it is MSDOS formatted. DANGER! The dd command is very powerful and can destroy any existing data on the specified device. Be very sure that you know the device name to write to and that you do not typo the device name when using dd! If you are uncomfortable writing the image yourself, download the .iso file instead and use the instructions in section 2.3 Installing from CDROM. Once you have a running image, make sure the boot order in the BIOS is set to boot from the device FreeNAS 8.2 Users Guide Page 36 of 235
containing the image and boot the system. It should boot into the Console setup menu described in section 2.5 Initial Setup. NOTE: if the image does not boot, check the BIOS and change the USB emulation from CD/DVD/floppy to hard drive. If it still will not boot, check to see if the card/drive is UDMA compliant. Some users have also found that some cheap 2GB USB sticks do not work as they are not really 2GB in size, but changing to a 4GB stick fixes the problem. 2.4.1 Using xzcat and dd on a FreeBSD or Linux System
On a FreeBSD or Linux system, the xzcat and dd commands can be used to uncompress and write the .xz image to an inserted USB thumb drive or compact flash device. Example 2.4a demonstrates writing the image to the first USB device (/dev/da0) on a FreeBSD system. Substitute the filename of your ISO and the device name representing the device to write to on your system. Example 2.4a: Writing the Image to a USB Thumb Drive
xzcat FreeNAS-8.2.0-RELEASE-p1-x64-img.xz | dd of=/dev/da0 bs=64k 0+244141 records in 0+244141 records out 2000000000 bytes transferred in 326.345666 secs (6128471 bytes/sec)
When using the dd command: of= refers to the output file; in our case, the device name of the flash card or removable USB drive. You may have to increment the number in the name if it is not the first USB device. On Linux, use /dev/sda to refer to the first USB device. bs= refers to the block size 2.4.2 Using Keka and dd on an OS X System
On an OS X system, you can download and install Keka to uncompress the image. In FINDER, navigate to the location where you saved the downloaded .xz file. Right-click the .xz file and select 'Open With Keka'. After a few minutes you will have a large file with the same name, but no extension. Insert the USB thumb drive and go to Launchpad -> Utilities -> Disk Utility. Unmount any mounted partitions on the USB thumb drive. Check that the USB thumb drive has only one partition, otherwise you will get GPT partition table errors on boot. If needed, use Disk Utility to setup one partition on the USB drive; selecting "free space" when creating the partition works fine. Next, determine the device name of the inserted USB thumb drive. From TERMINAL, navigate to your Desktop then type this command:
diskutil list /dev/disk0 #: TYPE NAME 0: GUID_partition_scheme 1: EFI 2: Apple_HFS Macintosh HD 3: Apple_Boot Recovery HD /dev/disk1 #: TYPE NAME
GB MB GB MB
Page 37 of 235
0: 1:
*8.0 GB 8.0 GB
disk1 disk1s1
This will show you which devices are available to the system. Locate your USB stick and record the path. If you are not sure which path is the correct one for the USB stick, remove the device, run the command again, and compare the difference. Once you are sure of the device name, navigate to the Desktop from TERMINAL, unmount the USB stick, and use the dd command to write the image to the USB stick. In Example 2.4b, the USB thumb drive is /dev/disk1. Substitute the name of your uncompressed file and the correct path to your USB thumb drive. Example 2.4b: Using dd on an OS X System
diskutil unmountDisk /dev/disk1 Unmount of all volumes on disk1 was successful dd if=FreeNAS-8.2.0-RELEASE-p1-x64 of=/dev/disk1 bs=64k
NOTE: If you get the error "Resource busy" when you run the dd command, go to Applications -> Utilities -> Disk Utility, find your USB thumb drive, and click on its partitions to make sure all of them are unmounted. The dd command will take some minutes to complete. Wait until you get a prompt back and a message that displays how long it took to write the image to the USB drive.
2.4.3
Windows users will need to download a utility that can uncompress .xz files (such as 7-Zip) and a utility that can create a USB bootable image from the uncompressed .img file (such as Win32DiskImager). When downloading Win32DiskImager, download the latest version that ends in -binary.zip and use a utility such as WinZip or 7zip to unzip the executable. Launch the 7-Zip File Manager and browse to the location containing your downloaded .img.xz file, as seen in Figure 2.4a. Click the Extract button, browse to the path to extract to, and click OK. The extracted image will end in .img and is now ready to be written to a USB device using Win32DiskImager. Next, launch Win32DiskImager, shown in Figure 2.4b. Use the browse button to browse to the location of the .img file. Insert a USB thumb drive and select its drive letter (in this example, drive E). Click the Write button and the image will be written to the USB thumb drive.
Page 38 of 235
2.5
Initial Setup
The first time you reboot into FreeNAS, you will be presented with the Console Setup screen shown in Figure 2.5a. This menu is described in more detail in the next section. NOTE: if you receive a boot error, check your BIOS settings to make sure that the device you installed FreeNAS to is listed first in the boot order. Also check the settings for that device. For example, a BIOS may require you to change from floppy emulation mode to hard disk mode. If your BIOS is too FreeNAS 8.2 Users Guide Page 39 of 235
old to support a USB boot device, see if a BIOS update is available. If you receive a "primary GPT is corrupt" error, you will need to use the dd command to remove both partition tables as described in this forum post. You should then be able to reinstall FreeNAS and successfully boot into the new installation. FreeNAS will automatically try to connect to a DHCP server on any live interfaces. If it successfully receives an IP address, it will display what IP address can be used to access the graphical console. In the example seen in Figure 2.5a, the FreeNAS system is accessible from http://10.0.2.15. Figure 2.5a: FreeNAS Console Setup Menu
If your FreeNAS server is not connected to a network with a DHCP server, you will need to manually configure the interface as seen in Example 2.5a. In this example, the FreeNAS system has one network interface (em0). Example 2.5a: Manually Setting an IP Address from the Console Menu
Enter an option from 1-11: 1 1) em0 Select an interface (q to quit): 1 Delete existing config? (y/n) n Configure interface for DHCP? (y/n) n Configure IPv4? (y/n) y Interface name: (press enter as can be blank) Several input formats are supported Example 1 CIDR Notation: 192.168.1.1/24 Example 2 IP and Netmask separate: IP: 192.168.1.1
Page 40 of 235
Netmask: 255.255.255.0, or /24 or 24 IPv4 Address: 192.168.1.108/24 Saving interface configuration: Ok Configure IPv6? (y/n) n Restarting network: ok You may try the following URLs to access the web user interface: http://192.168.1.108
From another system with a graphical web browser, input the IP address for your FreeNAS installation. The administrative GUI, shown in Figure 2.5b should be displayed. If it does not appear, check that your browser configuration does not have any proxy settings enabled. If it does, disable them and try again. Also, IE9 has known issues. If you can't login using Internet Explorer, use Firefox instead. Figure 2.5b: FreeNAS Graphical Configuration Menu
If you click the flashing Alert icon in the upper right corner, it will alert you that you should immediately change the password for the admin user as currently no password is required to login. Section 3.1.2 Admin Account describes how to set the name and password for the account that is used to access the administrative interface.
Page 41 of 235
2.5.1
If you have access to the the FreeNAS system's keyboard and monitor, the Console Setup menu shown in Figure 2.5a can be used to administer the system should the administrative GUI become inaccessible. This menu provides the following options: 1) Configure Network Interfaces: use the configuration wizard as described in the previous section to configure the system's network interfaces. 2) Configure Link Aggregation: allows you to either create a new link aggregation or to delete an existing link aggregation. 3) Create VLAN Interface: used to create a VLAN interface. 4) Configure Default Route: used to set the IPv4 or IPv6 default gateway. When prompted, input the IP address of the default gateway. 5) Configure Static Routes: will prompt for the destination network and the gateway IP address. Re-enter this option for each route you need to add. 6) Configure DNS: will prompt for the name of the DNS domain then the IP address of the first DNS server. To input multiple DNS servers, press enter to input the next one. When finished, press enter twice to leave this option. 7) Reset WebGUI login credentials: if you are unable to login to the graphical administrative interface, select this option. It will reset the system to not require a username and password to login. Don't forget to immediately set the administrative username and password once you enter the GUI. 8) Reset to factory defaults: if you wish to delete all of the configuration changes made in the administrative GUI, select this option. Once the configuration is reset, the system will reboot. You will need to go to Storage -> Volumes -> Auto Import Volume to re-import your volume. 9) Shell: enters a shell in order to run FreeBSD commands. To leave the shell, type exit. 10) Reboot: reboots the system. 11 Shutdown: halts the system.
2.6
Upgrading FreeNAS
FreeNAS provides two methods for performing an upgrade: using an ISO or from within the graphical administrative interface. Unless you are upgrading from a version that requires an ISO upgrade, you can select to use either method. Both methods are described in this section. Before performing an upgrade, always backup your configuration file and your data. When upgrading, be aware of the following caveats: Neither upgrade method can be used when migrating from FreeNAS 0.7x. Instead, you will need to install FreeNAS and either auto-import supported software RAID (described in section 6.3.1) or import supported disks (described in section 6.3.2). You will need to recreate your configuration as the install process will not import 0.7 configuration settings. Page 42 of 235
Upgrades from versions prior to 8.0.1-BETA3 to any later 8.x version must be done using the ISO. For example, upgrading from 8.0-RELEASE to 8.0.3-RELEASE using the GUI will not work as the image size increased from 1GB to 2GB between 8.01-BETA2 and 8.0.1-BETA3. The format of the file used by the GUI upgrade process changed in 8.2.0-BETA3 from .xz to .txz. This means that you should download the .txz version if you are upgrading from 8.2.0BETA3 or higher. If you are upgrading from any version prior to 8.2.0-BETA3, use the .xz file.
FreeNAS supports two operating systems on the operating system device: the current running operating system and, if you have performed an upgrade, your previous version of the operating system. When you upgrade, FreeNAS automatically preserves a copy of the current operating system. This means that it is easy to rollback to the previous version should you experience a problem with the upgraded version. The upgrade automatically configures the system to boot from the new operating system; a rollback configures the system to boot from the previous operating system. Should you ever be unable to boot into a newly upgraded operating system, simply select the other option (typically F2) at the FreeNAS console when you see the following options at the very beginning of the boot process. In this example, Boot: F1 refers to the default option (the newly upgraded version), so pressing F2 will boot into the previous version.
F1 FreeBSD F2 FreeBSD Boot: F1
2.6.1
Before upgrading the system, perform the following steps: 1. Depending upon the type of upgrade method, download either the .iso or the .GUI_Upgrade.* file that matches the system's architecture. Download the file to the computer that you use to access the FreeNAS system. 2. Locate and confirm the SHA256 hash for the file that you downloaded in the Release Notes for the version that you are upgrading to. 3. Backup the FreeNAS configuration in System -> Settings -> General -> Save Config. 4. Warn users that the FreeNAS shares will be unavailable during the upgrade; you should schedule the upgrade for a time that will least impact users. 5. Stop all services in Services -> Control Services. 2.6.2 Using the ISO
To upgrade using this method, download the latest version of the ISO image that matches the architecture of the system (32 or 64 bit) and burn it to a CDROM. Insert the CDROM into the system and boot from it. Once the media has finished booting into the installation menu, press enter to select the default option of "1 Install/Upgrade to hard drive/flash device, etc." As with a fresh install, the installer will present a screen showing all available drives; select the drive FreeNAS is installed into and press enter. FreeNAS 8.2 Users Guide Page 43 of 235
The installer will recognize that an earlier version of FreeNAS is installed on the drive and will present the message shown in Figure 2.6a. Figure 2.6a: Upgrading a FreeNAS Installation
NOTE: if you select No at this screen, the installer will do a fresh install of the version on the CD rather than upgrade the current version. This means that you will have to re-import your disks and restore the backup of your configuration. To upgrade, press enter to accept the default of Yes. Again, the installer will remind you that the operating system should be installed on a thumb drive. Press enter to start the upgrade. Once the installer has finished unpacking the new image, you will see the menu shown in Figure 2.6b. The database file that is preserved and migrated contains your FreeNAS configuration settings. Press enter and FreeNAS will indicate that the upgrade is complete and that you should reboot, as seen in Figure 2.6c.
Page 44 of 235
Page 45 of 235
2.6.3
To perform the upgrade using this method, go to System -> Settings -> Advanced -> Firmware Update as shown in Figure 2.6d. Figure 2.6d: Upgrading FreeNAS From the GUI
Use the drop-down menu to select a volume to temporarily place the firmware file during the upgrade, then click the Apply Update button. You will be prompted to browse to the location of the downloaded .xz file and to paste its SHA256 sum. When finished, click the Apply Update button to begin the upgrade progress. Behind the scenes, the following steps are occurring: the SHA256 hash is confirmed and an error will display if it does not match; if you get this error, double-check that you pasted the correct checksum and try pasting again the new image is uncompressed and written to the USB compact or flash drive; this can take a few minutes so be patient once the new image is written, you will momentarily lose your connection as the FreeNAS system will automatically reboot into the new version of the operating system FreeNAS will actually reboot twice: once the new operating system loads, the upgrade process applies the new database schema and reboots again assuming all went well, the FreeNAS system will receive the same IP from the DHCP server; FreeNAS 8.2 Users Guide Page 46 of 235
refresh your browser after a moment to see if you access the system
2.6.3.1 If Something Goes Wrong
If the FreeNAS system does not become available after the upgrade, you will need physical access to the system to find out what went wrong. From the console menu you can determine if it received an IP address and use option "1) Configure Network Interfaces" if it did not. If this does not fix the problem, go into option "9) Shell" and read the system log with this command:
more /var/log/messages
If the problem is not obvious or you are unsure how to fix it, see section 10 FreeNAS Support Resources. If the system remains inaccessible and you wish to revert back to the previous installation, type reboot from the shell or select "10) Reboot" from the console menu. Watch the boot screens and press F2 when you see this menu:
F1 FreeBSD F2 FreeBSD Boot: F1
NOTE: if a previously working FreeNAS system hangs after a FreeNAS upgrade, check to see if there is a BIOS/BMC firmware upgrade available as that may fix the issue.
This section contains a Quick Start Guide to get you started with your FreeNAS configuration. It is followed by the account section of the GUI which allows you to change the administrative password and manage users and groups.
3.1
This section demonstrates the initial preparation that should be performed before you start to configure FreeNAS 8.2 Users Guide Page 47 of 235
the FreeNAS system. It then provides an overview of the configuration workflow along with pointers to the section in the 8.2 Users Guide that contains the details and configuration examples for each step in the configuration workflow. 3.1.1 Set Administrative Access
By default no password is required to access the FreeNAS administrative interface using the built-in admin account. For security reasons, you should immediately change the default administrative account name and set a password for that account using the instructions in section 3.2.1 Admin Account. 3.1.2 Set the Administrative Email Address
FreeNAS provides an Alert icon in the upper right corner to provide a visual indication of events that warrant administrative attention. The alert system automatically emails the root user account when an alert is issued. FreeNAS also sends a daily email to the root user which should be read in order to determine the overall health of the system. To set the email address for the root account, go to Account Users View Users. Click the Change E-mail button associated with the root user account and input the email address of the person to receive the administrative emails. 3.1.3 Enable Console Logging
To view system messages within the graphical administrative interface, go to System -> Settings Advanced. Check the box Show console messages in the footer and click Save. The output of tail -f /var/log/messages will now be displayed at the bottom of the screen. If you click the console messages area, it will pop-up as a window, allowing you to scroll through the output and to copy its contents. You are now ready to start configuring the FreeNAS system. Typically, the configuration workflow will use the following steps in this order: 3.1.4 Configure Volumes
FreeNAS supports the creation of both UFS and ZFS volumes; however, ZFS volumes are recommended to get the most out of your FreeNAS system. When creating a volume, you have several choices depending upon your storage requirements and whether or not data already exists on the disk(s). You can choose from one of the following options: 1. Auto-import an existing UFS gstripe (RAID0), gmirror (RAID1), or graid3 (RAID3) in Storage -> Volumes -> Auto-import. 2. Auto-import an existing ZFS stripe, mirror, RAIDZ1 or RAIDZ2 in Storage -> Volumes -> Auto-import. Auto-importing is described in more detail in section 6.3.1 Auto Importing Volumes. 3. Import a disk that is formatted with UFS, NTFS, MSDOS, or EXT2 in Storage -> Volumes -> Import. This is described in more detail in section 6.3.2 Importing Volumes. 4. Format disk(s) with UFS and optionally create a gstripe (RAID0), gmirror (RAID1), or graid3 (RAID3) in Storage -> Volumes -> Volume Manager. FreeNAS 8.2 Users Guide Page 48 of 235
5. Format disk(s) with ZFS and optionally create a stripe, mirror, ZRAID1, or ZRAID2 in Storage -> Volumes -> Volume Manager. Formatting disks is described in more detail in section 6.3.3 Volume Manager. If you format your disk(s) with ZFS, additional options are available: 1. Dedicate a disk(s) to the ZFS log or cache as described in section 6.3.4 Using Volume Manager After a Volume Has Been Created. 2. Divide the ZFS pool into datasets to provide more flexibility when configuring user access to data. Dataset creation is described in section 6.3.5 Creating ZFS Datasets. 3. Create a Zvol to be used when configuring iSCSI. Zvol creation is described in section 6.3.6 Creating a zvol. 3.1.5 Create Users/Groups or Integrate with AD/LDAP
FreeNAS supports a variety of user access scenarios: the use of an anonymous or guest account that everyone in the network uses to access the stored data the creation of individual user accounts where each user has access to their own ZFS dataset the addition of individual user accounts to groups where each group has access to their own volume or ZFS dataset the import of existing accounts from an OpenLDAP or Active Directory server When configuring your FreeNAS system, select one of the following, depending upon whether or not the network has an existing OpenLDAP or Active Directory domain. 1. Manually create users and groups. User management is described in section 3.2.3 Users and group management is described in section 3.2.2 Groups. 2. Import existing Active Directory account information using the instructions in section 8.2 Active Directory. 3. Import existing OpenLDAP account information using the instructions in section 8.8 LDAP. 3.1.6 Configure Permissions
Setting permissions is an important aspect of configuring access to storage data. The graphical administrative interface is meant to set the initial permissions in order to make a volume or dataset accessible as a share. Once a share is available, the client operating system should be used to fine-tune the permissions of the files and directories that are created by the client. Configured volumes and datasets will appear in Storage -> Volumes. Each volume and dataset will have its own Configure Permissions option, allowing for greater flexibility when providing access to data. Before creating your shares, determine which users should have access to which data. This will help you to determine if multiple volumes, datasets, and/or shares should be created to meet the permissions needs of your environment.
Page 49 of 235
3.1.7
Configure Sharing
Once your volumes have been configured with permissions, you are ready to configure the type of share or service that you determine is suitable for your network. FreeNAS supports several types of shares and sharing services for providing storage data to the clients in a network. It is recommended that you select only one type of share per volume or dataset in order to prevent possible conflicts between different types of shares. The type of share you create depends upon the operating system(s) running in your network, your security requirements, and expectations for network transfer speeds. The following types of shares and services are available: Apple (AFP): FreeNAS uses Netatalk to provide sharing services to Apple clients. This type of share is a good choice if all of your computers run Mac OS X. Configuration examples can be found in section 7.1. Unix (NFS): this type of share is accessible by Mac OS X, Linux, BSD, and professional/enterprise versions of Windows. It is a good choice if there are many different operating systems in your network. Configuration examples can be found in section 7.2. Windows (CIFS): FreeNAS uses Samba to provide the SMB/CIFS sharing service. This type of share is accessible by Windows, Mac OS X, Linux, and BSD computers, but it is slower than an NFS share. If your network contains only Windows systems, this is a good choice. Configuration examples can be found in section 7.3. FTP: this service provides fast access from any operating system, using a cross-platform FTP and file manager client application such as Filezilla. FreeNAS supports encryption and chroot for FTP. Configuration examples can be found in section 8.6. SSH: this service provides encrypted connections from any operating system using SSH command line utilities or the graphical WinSCP application for Windows clients. Configuration examples can be found in section 8.14. iSCSI: FreeNAS uses istgt to export virtual disk drives that are accessible by clients running iSCSI initiator software. Configuration examples can be found in section 8.7. 3.1.8 Start Applicable Service(s)
Once you have configured your share or service you will need to start its associated service(s) in order to implement the configuration. By default, all services are off until you start them. The status of services is managed using Services -> Control Services. To start a service, click its red OFF button. After a second or so, it will change to a blue ON , indicating that the service has been enabled. Watch the console messages as the service starts to determine if there are any error messages. 3.1.9 Test Configuration from Client
If the service successfully starts, try to make a connection to the service from a client system. For example, use Windows Explorer to try to connect to a CIFS share, use an FTP client such as Filezilla to try to connect to an FTP share, or use Finder on a Mac OS X system to try to connect to an AFP share. If the service starts correctly and you can make a connection but receive permissions errors, check that the user has permissions to the volume/dataset being accessed.
Page 50 of 235
3.1.10
Once you have tested your configuration, be sure to back it up. Go to System -> Settings and click the Save Config button. Your browser will provide an option to save a copy of the configuration database. You should backup your configuration whenever you make configuration changes and always before upgrading FreeNAS.
3.2
Account Configuration
This section describes how to manage the administrative account and how to create users and groups using the FreeNAS GUI. 3.2.1 Admin Account
By default no password is required to access the FreeNAS administrative interface using the built-in admin account. For security reasons, you should immediately change the default administrative account name and set a password for that account. To change the administrative account name, go to Account -> Admin Account -> Change Admin User. This will open the screen shown in Figure 3.2a. Figure 3.2a: Changing the FreeNAS Administrative Account
Replace admin with the name of the account that will be used to login to the FreeNAS graphical administrative interface. The First and Last name fields are optional. Click the Change Admin User button to save your changes. FreeNAS 8.2 Users Guide Page 51 of 235
NOTE: in FreeNAS the administrative account is not the same as the root user account. The administrative account is used to access the graphical administrative interface. This separation makes it possible to disable root logins while maintaining the ability of logging into the graphical administrative interface. To change the password of the administrative account, click on Account -> Admin Account -> Change Password. This will open the screen shown in Figure 3.2b. Figure 3.2b: Setting the FreeNAS Administrative Password
Type in and confirm the password which will be used when accessing the graphical administrative interface. If you wish to allow root logins using the same password, leave the "Change root password as well" box checked. If you wish to use a different root password, uncheck this box and set the root password in Account -> Users -> View Users -> root -> Change Password. 3.2.2 Groups
The Groups interface allows you to manage UNIX-style groups on the FreeNAS system. NOTE: if Active Directory or OpenLDAP is running on your network, you do not need to recreate the network's users or groups. Instead, import the existing account information into FreeNAS using Services -> Active Directory (described in section 8.2) or Services -> LDAP (described in section 8.8). This section describes how to create a group and assign it user accounts. The next section will describe how to create user accounts. Section 6.3 Volumes describes how to create volumes/datasets and set their permissions. FreeNAS 8.2 Users Guide Page 52 of 235
If you click Groups -> View Groups, you will see a screen similar to Figure 3.2c. Figure 3.2c: FreeNAS Groups Management
All groups that came with the operating system will be listed and the screen will indicate if any additional groups have been defined by the administrator. Each group has an entry indicating the group ID and group name; click the group's Members button to view and modify that group's membership. f you click the Add New Group button, you will see the screen shown in Figure 3.2d. Table 3.2a summarizes the available options when creating a group. Figure 3.2d: Creating a New Group
Page 53 of 235
Table 3.2a: Options When Creating a Group Setting Group ID Group Name Allow repeated GIDs Value string Description the next available group ID will be suggested for you; by convention, UNIX groups containing user accounts have an ID greater than 1000 and groups required by a service have an ID equal to the default port number used by the service (e.g. the sshd group has an ID of 22) mandatory allows multiple groups to share the same group id; this is useful when a GID is already associated with the UNIX permissions for existing data
string checkbox
Once the group and users are created, you can assign users as members of a group. Click on View Groups then the Members button for the group you wish to assign users to. Highlight the user in the Member users list (which shows all user accounts on the system) and click the >> to move that user to the right frame. The user accounts which appear in the right frame will be added as members of that group. In the example shown in Figure 3.2e, the data1 group has been created and the user1 user account has been created with a primary group of user1. The Members button for the data1 group has been selected and user1 has been added as a member of that group. Figure 3.2e: Assigning a User as a Member of a Group
Page 54 of 235
3.2.3
Users
FreeNAS supports users, groups, and permissions, allowing great flexibility in configuring which users have access to the data stored on FreeNAS. Before you can assign permissions which will be used by shares, you will need to do one of the following: 1. Create one guest account that all users will use. 2. Create a user account for every user in the network where the name of each account is the same as a logon name used on a computer. For example, if a Windows system has a login name of bobsmith, you should create a user account with the name bobsmith on FreeNAS. If your intent is to assign groups of users different permissions to shares, you will need to also create groups and assign users to the groups. 3. If your network uses Active Directory to manage user accounts and permissions, enable the Active Directory service as described in section 8.2. 4. If your network uses an OpenLDAP server to manage user accounts and permissions, enable the LDAP service as described in section 8.8. User accounts can be given permissions to volumes or datasets. If you wish to use groups to manage permissions, you should create the user accounts first, then assign the accounts as members of the groups. This section demonstrates how to create a user account. NOTE: if Active Directory or OpenLDAP is running on your network, you do not need to recreate the network's users or groups. Instead import the existing account information into FreeNAS using Services -> Active Directory or Services -> LDAP. Account -> Users -> View Users provides a listing of all of the system accounts that were installed with the FreeNAS operating system, as shown in Figure 3.2f. The accounts that you create will be listed above the system accounts. A "No users defined" message will be displayed in this area if you have not created any user accounts. Figure 3.2f: Managing User Accounts
Each account entry indicates the account ID, account name, default group, home directory, and default shell. Each account also provides the following buttons: FreeNAS 8.2 Users Guide Page 55 of 235
Change Password: provides fields to enter and confirm the new password. Modify User: used to modify the account's settings, as listed in Table 3.2b. Auxiliary Groups: used to make the account a member of additional groups. Change E-mail: used to change the email address associated with the account. NOTE: it is important to set the email address for the built-in root user account as important system messages are sent to the root user. For security reasons, password logins are disabled for the root account and changing this setting is highly discouraged. Every account that came with the FreeNAS operating system, except for the root user, is a system account. Each system account is used by a service and should not be available for use as a login account. For this reason, the default shell is nologin(8). For security reasons, and to prevent breakage of system services, you should not modify the system accounts. To create a user account, click the Add New User button to open the screen shown in Figure 3.2g. Table 3.2b summarizes the options which are available when you create or modify a user account. Figure 3.2g: Adding or Editing a User Account
Table 3.2b: User Account Configuration Setting User ID Value integer Description greyed out if user already created; when creating an account, the next numeric ID will be suggested; by convention, user accounts have an ID greater than 1000 and system accounts have an ID equal to the default port number used by the service Page 56 of 235
Value
Primary Group
Home Directory Home Directory Mode Shell Full Name E-mail Password Password confirmation
Description greyed out if user already created; maximum 16 characters, can string include numerals but can not include a space by default, a primary group with the same name as the user will be created; uncheck this box to select a different primary group name checkbox (NOTE: in Unix, a primary group is not the same as a secondary/auxiliary group) must uncheck "Create a new primary group" in order to access this menu; for security reasons, FreeBSD will not give a user su drop-down permissions if wheel is their primary group--if your intent is to menu give a user su access, add them to the wheel group in the Auxiliary groups section leave as /nonexistent for system accounts, otherwise browse to the browse button name of an existing volume or dataset that the user will be assigned permission to access checkboxes drop-down menu string string string string sets default permissions of user's home directory if creating a system account, choose nologin; if creating a user account, select shell of choice mandatory, may contain spaces email address associated with the account mandatory unless check box to disable password logins must match Password check this box for system accounts and for user accounts who aren't allowed to login to the FreeNAS system using password authentication paste the user's public key to be used for SSH key authentication (do not paste the private key!) a checked box prevents user from logging in until the account is unlocked (box is unchecked) highlight the group(s) you wish to add the user to and use the >> button to add the user to the highlighted groups
Disable password checkbox logins SSH Public Key Lock user Auxiliary groups string checkbox mouse selection
System Configuration
Cron Jobs: provides a graphical front-end to crontab(5) NTP Servers: used to configure NTP server settings Reporting: provides reports and graphs monitoring the system's CPU, disk capacity and other metrics
Page 57 of 235
Rsync Tasks: allows you to schedule rsync tasks S.M.A.R.T. Tests: allows you to schedule which S.M.A.R.T. tests to run on a per-disk basis Settings: used to configure system wide settings such as timezone, email setup, HTTPS access, and firmware upgrades Sysctls: provides a front-end for tuning the FreeNAS system by interacting with the underlying FreeBSD kernel System Information: provides general FreeNAS system information such as hostname, operating system version, platform, and uptime Tunables: provides a front-end to load additional kernel modules at boot time Each of these is described in more detail in this section.
4.1
Cron Jobs
cron(8) is a daemon that runs a command or script on a regular schedule as a specified user. Typically, the user who wishes to schedule a task manually creates a crontab(5) using syntax that can be perplexing to new Unix users. The FreeNAS GUI makes it easy to schedule when you would like the task to occur. NOTE: due to a limitation in FreeBSD, users with account names that contain spaces or exceed 17 characters are unable to create cron jobs. Figure 4.1a shows the screen that opens when you click System -> Cron Jobs -> Add Cron Job. Figure 4.1a: Creating a Cron Job
Page 58 of 235
Table 4.1a summarizes the configurable options when creating a cron job. Table 4.1a: Cron Job Options Setting User Command Short description Value drop-down menu string string Description make sure the selected user has permission to run the specified command or script the full path to the command or script to be run; if it is a script, test it at the command line first to make sure that it works as expected optional
slider or if use the slider, cron job occurs every N minutes; if use minute Minute minute selections, cron job occurs at the highlighted minutes selections slider or hour if use the slider, cron job occurs every N hours; if use hour selections, Hour selections cron job occurs at the highlighted hours slider or if use the slider, cron job occurs every N days; if use hour selections, Day of month month cron job occurs on the highlighted days each month selections Month checkboxes cron job occurs on the selected months Day of week checkboxes cron job occurs on the selected days Redirect Stderr checkbox disables emailing standard output to the root user account Redirect Stderr checkbox disables emailing errors to the root user account Enabled checkbox uncheck if you would like to disable the cron job without deleting it
4.2
NTP Servers
The network time protocol (NTP) is used to synchronize the time on the computers in a network. Accurate time is necessary for the successful operation of time sensitive applications such as Active Directory. By default, FreeNAS is pre-configured to use 3 public NTP servers. If your network is using Active Directory, ensure that the FreeNAS system and the Active Directory Domain Controller have been configured to use the same NTP servers. Figure 4.2a shows the default NTP configuration for FreeNAS. If you wish to change a default server to match the settings used by your network's domain controller, click an entry's Edit button. Alternately, you can delete the default NTP servers and click Add NTP Server to create your own. Figure 4.2b shows the Add NTP Server screen and Table 4.2a summarizes the options when adding or editing an NTP server. ntp.conf(5) explains these options in more detail.
Page 59 of 235
Table 4.2a: NTP Server Options Setting Address Burst IBurst Value string Description name of NTP server recommended when Max. Poll is greater than 10; only use on your own servers checkbox i.e. do not use with a public NTP server checkbox speeds the initial synchronization (seconds instead of minutes) Page 60 of 235
Setting
Description should only be used for NTP servers that are known to be highly accurate, such Prefer checkbox as those with time monitoring hardware Min. Poll integer power of 2 in seconds; can not be lower than 4 or higher than Max. Poll Max. Poll integer power of 2 in seconds; can not be higher than 17 or lower than Min. Poll Force checkbox forces the addition of the NTP server, even if it is currently unreachable
Value
4.3
Reporting
System -> Reporting displays several graphs, as seen in the example in Figure 4.3a. The graphs will display the current interface traffic (for each configured interface), CPU usage, physical memory utilization, system load, processes, swap utilization, and disk space (for each configured volume). Reporting data is saved, allowing you to view and monitor usage trends hourly, daily, weekly, monthly, and yearly. Reporting data is preserved across system upgrades and at shutdown. Figure 4.3a: Reporting Graphs
4.4
Rsync Tasks
Rsync is a utility that automatically copies specified data from one system to another over a network. Once the initial data is copied, rsync reduces the amount of data sent over the network by sending only the differences between the source and destination files. Rsync can be used for backups, mirroring data on multiple systems, or for copying files between systems. FreeNAS 8.2 Users Guide Page 61 of 235
To configure rsync, you need to configure both ends of the connection: the rsync server: this system pulls (receives) the data. This system is referred to as PULL in the configuration examples. the rsync client: this system pushes (sends) the data. This system is referred to as PUSH in the configuration examples. FreeNAS can be configured as either an rsync client or an rsync server. The opposite end of the connection can be another FreeNAS system or any other system running rsync. In FreeNAS terminology, an rysnc task defines which data is synchronized between the two systems. If you are synchronizing data between two FreeNAS systems, create the rsync task on the rsync client. FreeNAS supports two modes of rsync operation: rsync module mode: exports a directory tree, and its configured settings, as a symbolic name over an unencrypted connection. This mode requires that at least one module be defined on the rsync server. It can be defined in the FreeNAS GUI under Services -> Rsync -> Rsync Modules. In other operating systems, the module is defined in rsyncd.conf(5). rsync over SSH: synchronizes over an encrypted connection. Requires the configuration of SSH user and host public keys. This section summarizes the options when creating an Rsync Task. It then provides a configuration example between two FreeNAS systems for each mode of rsync operation.
4.4.1
Figure 4.4a shows the screen that appears when you click System -> Rsync Tasks -> Add Rsync Task. Table 4.4a summarizes the options that can be configured when creating an rsync task.
Page 62 of 235
Table 4.4a: Rsync Configuration Options Setting Path Remote Host Rsync mode Value browse button string drop-down menu Description browse to the volume/dataset/directory that you wish to copy IP address or hostname of the remote system that will store the copy choices are Rsync module or Rsync over SSH when using Rsync module mode, at least one module must be defined in rsyncd.conf(5) of rsync server or in Services -> Rsync -> Rsync Modules of another FreeNAS system; when using Rsync over SSH mode, input the path on the remote host to push or pull (e.g. /mnt/volume) choices are Push or Pull; default is to push from the FreeNAS system to a remote host optional if use the slider, sync occurs every N minutes; if use minute selections, sync occurs at the highlighted minutes
Remote Module Name / Remote string Path Direction Short Description Minute drop-down menu string slider or minute selections
Page 63 of 235
Value slider or hour selections slider or day selections checkboxes checkboxes drop-down menu checkbox checkbox checkbox
Archive
checkbox
Delete Quiet Preserve permissions Preserve extended attributes Extra options Enabled
Description if use the slider, sync occurs every N hours; if use hour selections, sync occurs at the highlighted hours if use the slider, sync occurs every N days; if use day selections, sync occurs on the highlighted days task occurs on the selected months task occurs on the selected days of the week specified user must have permission to write to the specified directory on the remote system; due to a limitation in FreeBSD, the user name can not contain spaces or exceed 17 characters if checked, copy will include all subdirectories of the specified volume preserve modification times of files recommended on slow connections as reduces size of data to be transmitted equivalent to -rlptgoD (recursive, copy symlinks as symlinks, preserve permissions, preserve modification times, preserve group, preserve owner (super-user only), and preserve device files (superuser only) and special files) delete files in destination directory that don't exist in sending directory suppresses informational messages from the remote server preserves original file permissions; useful if User is set to root both systems must support extended attributes
string checkbox
rsync(1) options not covered by the GUI uncheck if you would like to disable the rsync task without deleting it
If the rysnc server requires password authentication, input --password-file=/PATHTO/FILENAME in the "Extra options" box, replacing /PATHTO/FILENAME with the appropriate path to the file containing the value of the password.
4.4.2
This configuration example will configure rsync module mode between the two following FreeNAS systems: 192.168.2.2 has existing data in /mnt/local/images. It will be the rsync client, meaning that an rsync task needs to be defined. It will be referred to as PUSH. FreeNAS 8.2 Users Guide Page 64 of 235
192.168.2.6 has an existing volume named /mnt/remote. It will be the rsync server, meaning that it will receive the contents of /mnt/local/images. An rsync module needs to be defined on this system and the rsyncd service needs to be started. It will be referred to as PULL. On PUSH, an rsync task is defined in System -> Rsync Tasks -> Add Rsync Task as shown in Figure 4.4b. In this example: the Path points to /usr/local/images, the directory to be copied the Remote Host points to 192.168.2.6, the IP address of the rsync server the Rsync Mode is Rsync module the Remote Module Name is backups; this will need to be defined on the rsync server the Direction is Push the rsync is scheduled to occur every 15 minutes the User is set to root so it has permission to write anywhere the Preserve Permissions checkbox is checked so that the original permissions are not overwritten by the root user On PULL, an rsync module is defined in Services -> Rsync Modules -> Add Rsync Module, shown in Figure 4.4c. In this example: the Module Name is backups; this needs to match the setting on the rsync client the Path is /mnt/remote; a directory called images will be created to hold the contents of /usr/local/images the User is set to root so it has permission to write anywhere Hosts allow is set to 192.168.2.2, the IP address of the rsync client Descriptions of the configurable options can be found in section 8.11.1 Rsync Modules. To finish the configuration, start the rsync service on PULL in Services -> Control Services. If the rsync is successful, the contents of /mnt/local/images/ will be mirrored to /mnt/remote/images/.
Page 65 of 235
Page 66 of 235
4.4.3
SSH replication mode does not require the creation of an rsync module or for the rsync service to be running on the rsync server. It does require SSH to be configured before creating the rsync task: a public/private key pair for the rsync user account (typically root) must be generated on PUSH and the public key copied to the same user account on PULL to mitigate the risk of man-in-the-middle attacks, the public host key of PULL must be copied to PUSH the SSH service must be running on PULL To create the public/private key pair on PUSH, open Shell. The / filesystem must first be mounted as read-write. In the following example, the root user is generating an ECDSA type of public/private key pair. When creating the key pair, do not enter the passphrase as the key is meant to be used for an automated task.
mount -o rw / ssh-keygen -t ecdsa Generating public/private ecdsa key pair. Enter file in which to save the key (/root/.ssh/id_ecdsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_ecdsa. Your public key has been saved in /root/.ssh/id_ecdsa.pub. The key fingerprint is: a8:ed:da:f1:02:36:b9:10:06:40:02:9f:00:2e:da:dc [email protected] The key's randomart image is: +--[ECDSA 256]---+ |@. | |+o . | |.oo | |ooo. . | |..o.E.. S | | . =o | | o.+o | | .o.o | | ..o.. | +-----------------+
NOTE: FreeNAS supports the following types of SSH keys: ECDSA, DSA, and RSA. When creating the key, specify the type you wish to use or, if you are generating the key on another operating system, select a type of key the key generation software supports. Next, view and copy the contents of the generated public key:
more .ssh/id_ecdsa.pub ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGN8gxT0 V81KblGNhv2VPRX/9QcUNReQWG0Rc9HMgmxo1LfMyEDEBiRjCr3vs2oIE8AF6y2wgus18G7ghfJWEFQ=
Go to PULL and paste (or append) the copied key into the SSH Public Key field of Account -> Users -> View Users -> root -> Modify User. The paste for the above example is shown in Figure 4.4d. When pasting the key, ensure that it is pasted as one long line and, if necessary, remove any extra spaces representing line breaks. FreeNAS 8.2 Users Guide Page 67 of 235
While on PULL, verify that the SSH service is running in Services -> Control Services and start it if it is not. Next, copy the host key of PULL using Shell on PUSH. The following command copies the ECDSA host key of the PULL server used in our previous example. Be sure to include the double bracket >> to prevent overwriting any existing entries in the known_hosts file.
ssh-keyscan -t ecdsa 192.168.2.6 >> /root/.ssh/known_hosts
You are now ready to create the rsync task on PULL. To configure rsync SSH mode using the systems in our previous example, the configuration would be as follows: the Path points to /mnt/local/images, the directory to be copied the Remote Host points to 192.168.2.6, the IP address of the rsync server the Rsync Mode is Rsync over SSH the rsync is scheduled to occur every 15 minutes the User is set to root so it has permission to write anywhere; the public key for this user must be generated on PUSH and copied to PULL the Preserve Permissions checkbox is checked so that the original permissions are not overwritten by the root user Once you save the rsync task, the rsync will automatically occur according to your schedule. In this example, the contents of /mnt/local/images/ will automatically appear in /mnt/remote/images/ after 15 minutes. If the content does not appear, use Shell on PULL to read /var/log/messages. If the message indicates a \n (newline character) in the key, remove the space in your pasted key--it will be after the character that appears just before the \n in the error message.
Page 68 of 235
4.5
S.M.A.R.T. Tests
S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) is a monitoring system for computer hard disk drives to detect and report on various indicators of reliability. When a failure is anticipated by S.M.A.R.T., the drive should be replaced. Most modern ATA, IDE and SCSI-3 hard drives support S.M.A.R.T.--refer to your drive's documentation if you are unsure. Figure 4.5a shows the configuration screen that appears when you click System -> S.M.A.R.T. Tests -> Add S.M.A.R.T. Test. The tests that you create will be listed under View S.M.A.R.T. Tests. After creating your tests, check the configuration in Services -> S.M.A.R.T., then click the slider to ON for the S.M.A.R.T. service in Services -> Control Services. NOTE: the S.M.A.R.T. service will not start if you have not created any volumes. Figure 4.5a: Adding a S.M.A.R.T. Test
Table 4.5a summarizes the configurable options when creating a S.M.A.R.T. test. Table 4.5a: S.M.A.R.T. Test Options Setting Disk Type Value list Description highlight disk(s) to monitor select type of list to run; see smartctl(8) for a description of each drop-down menu type of test (note that some test types will degrade performance or take disk(s) offline) Page 69 of 235
Value string slider or hour selections slider or day selections checkboxes checkboxes
Description optional if use the slider, test occurs every N hours; if use hour selections, test occurs at the highlighted hours if use the slider, test occurs every N days; if use day selections, test occurs on the highlighted days select the months when you wish the test to occur select the days of the week when you wish the test to occur
4.6
Settings
The Settings tab, shown in Figure 4.6a, contains 4 tabs: General, Advanced, Email, and SSL. Figure 4.6a: General Tab of Settings
4.6.1
General Tab
Table 4.6a summarizes the settings that can be configured using the General tab.
Page 70 of 235
Table 4.6a: General Tab's Configuration Settings Setting Protocol Value Description protocol to use when connecting to the administrative GUI from a browser; if drop-down you change the default of HTTP to HTTPS, an unsigned RSA certificate will menu be generated and you will be logged out in order to accept the certificate choose from a list of recent IP addresses to limit the one to use when drop-down accessing the administrative GUI; the built-in HTTP server will automatically menu bind to the wildcard address of 0.0.0.0 (any address) and will issue an alert if a specified address becomes unavailable allows you to configure a non-standard port for accessing the administrative integer GUI drop-down select the localization from the drop-down menu; requires a browser reload; menu you can view the status of localization at pootle.freenas.org drop-down select the keyboard layout menu drop-down select the timezone from the drop-down menu menu string IP address or hostname of remote syslog server to send FreeNAS logs to
WebGUI Address WebGUI Port Language Console Keyboard Map Timezone Syslog server
If you make any changes, click the Save button. This tab also contains the following buttons: Factory Restore: replaces current configuration with the factory default. This means that all of your customizations will be erased, but can be handy if you mess up your system or wish to return a test system to the original configuration. Save Config: used to create a backup copy of the current configuration database in the format hostname-version-architecture. Always save the configuration after making changes and verify that you have a saved configuration before performing an upgrade. Upload Config: allows you to browse to location of saved configuration file in order to restore that configuration.
4.6.2
Advanced Tab
The Advanced tab, shown in Figure 4.6b, allows you to set some miscellaneous settings on the FreeNAS system. The configurable settings are summarized in Table 4.6b.
Page 71 of 235
Table 4.6b: Advanced Tab's Configuration Settings Setting Enable Console Menu Use Serial Console Enable screen saver Enable powerd (Power Saving Daemon) Swap size Value checkbox checkbox checkbox checkbox non-zero integer representing GB Description unchecking this box removes the console menu shown in Figure 2.5a do not check this box if your serial port is disabled enables/disables the console screen saver (see ticket 566) powerd(8) is used to monitor ACPI power control settings; this forum post demonstrates how to determine if a drive has spun down affects new disks only will display console messages in real time at bottom of browser; click the console to bring up a scrollable screen; check the "Stop refresh" box in the scrollable screen to pause updating and uncheck the box to continue to watch the messages as they occur provides a pop-up of diagnostic information when a fatal error occurs Page 72 of 235
Show console messages in checkbox the footer Show tracebacks in case of checkbox fatal errors FreeNAS 8.2 Users Guide
Value checkbox
checkbox string
Description several GUI menus provide an Advanced Mode button to access additional features; enabling this shows these features by default enables the autotune script which attempts to optimize the system depending upon the hardware which is installed input the message you wish to be seen when user logs in via SSH
If you make any changes, click the Save button. This tab also contains the following buttons: Rebuild LDAP/AD Cache: click if you add a user to Active Directory who needs immediate access to FreeNAS; otherwise this occurs automatically once a day as a cron job. Save Debug: used to generate a text file of diagnostic information. In the screen shown in Figure 4.6c, check the box(es) for the information that you wish to generate then click the Save button to be prompted for the location to save the generated ASCII text file. Firmware Update: used to Upgrade FreeNAS. See section 2.6.3 Upgrading FreeNAS From the GUI for details. Figure 4.6c: Save Debug Screen
Page 73 of 235
4.6.2.1
Autotune
FreeNAS provides an autotune script to attempt to optimize the system depending upon the hardware which is installed. For example, if a ZFS volume exists on a system with limited RAM, the autotune script will automatically adjust some ZFS sysctl values in an attempt to minimize ZFS memory starvation issues. The "Enable autotune" checkbox in System -> Settings -> Advanced is unchecked by default; check it if you would like the autotuner to run at boot time. If you would like the script to run immediately, reboot the system. If autotuner finds any settings that need adjusting, the changed values will appear in System -> Sysctls (for sysctl.conf values) and in System -> Tunables (for loader.conf values). If you do not like the changes, you can modify the values that are displayed in the GUI and your changes will override the values that were created by the autotune script. However, if you delete a sysctl or tunable that was created by autotune, it will be recreated at next boot. This is because autotune only creates values that do not already exist. If you are trying to increase the performance of your FreeNAS system and suspect that the current hardware may be limiting performance, try enabling autotune. If you wish to read the script to see which checks are performed, the script is located in /usr/local/bin/autotune.
4.6.3
Email Tab
The Email tab, shown in Figure 4.6d, is used to configure the email settings on the FreeNAS system. Table 4.6c summarizes the settings that can be configured using the Email tab. NOTE: it is important to configure the system so that it can successfully send emails. An automatic script send a nightly email to the root user account containing important information such as the health of the disks. Alert events are also emailed to the root user account.
Page 74 of 235
Table 4.6c: Email Tab's Configuration Settings Setting From email Outgoing mail server Port to connect to TLS/SSL Use SMTP Authentication Username Password Send Test Mail Value string Description the From email address to be used when sending email notifications
string or IP address hostname or IP address of SMTP server integer drop-down menu checkbox string string button SMTP port number, typically 25, 465 (secure SMTP), or 587 (submission) encryption type; choices are Plain, SSL, or TLS enables/disables SMTP AUTH using PLAIN SASL used to authenticate with SMTP server used to authenticate with SMTP server click to check that configured email settings are working; this will fail if you do not set the To email address by clicking the Change E-mail button for the root account in Accounts -> Users -> View Users
Page 75 of 235
4.6.4
SSL Tab
When you change the Protocol value to HTTPS in System -> Settings -> General, an unsigned RSA certificate and key are auto-generated. Once generated, the certificate and key will be displayed in the SSL Certificate field in System -> Settings -> SSL, shown in Figure 4.6e. If you already have your own signed certificate that you wish to use for SSL/TLS connections, replace the values in the SSL certificate field with a copy/paste of your own key and certificate. The certificate can be used to secure the HTTP connection (enabled in the Settings -> General Tab) to the FreeNAS system, as well as to secure FTP connections (described in section 8.6.3 Encrypting FTP). Table 4.6d summarizes the settings that can be configured using the SSL tab. This howto shows how to generate a certificate using OpenSSL and provides some examples for the values shown in Table 4.6d. Figure 4.6e: SSL Tab
Table 4.6d: SSL Tab's Configuration Settings Setting Organization Organizational Unit Email Address Locality State Country Common Name SSL Certificate Value string string string string string string string Description optional optional optional optional optional optional optional paste the RSA private key and string certificate into the box Page 76 of 235
4.7
Sysctls
sysctl(8) is an interface that is used to make changes to the underlying FreeBSD kernel running on a FreeNAS system. It can be used to tune the system in order to meet the specific needs of a network. Over five hundred system variables can be set using sysctl(8). Each variable is known as a MIB as it is comprised of a dotted set of components. Since these MIBs are specific to the kernel feature that is being tuned, descriptions can be found in many FreeBSD man pages (e.g. sysctl(3), tcp(4) and tuning(7)) and in many sections of the FreeBSD Handbook. DANGER! changing the value of a sysctl MIB is an advanced feature that immediately affects the kernel of the FreeNAS system. Do not change a MIB on a production system unless you understand the ramifications of that change. A badly configured MIB could cause the system to become unbootable, unreachable via the network, or can cause the system to panic under load. Certain changes may break assumptions made by the FreeNAS software. This means that you should always test the impact of any changes on a test system first. FreeNAS provides a graphical interface for managing sysctl MIBs. To add a sysctl, go to System -> Sysctls -> Add Sysctl, shown in Figure 4.7a. Figure 4.7a: Adding a Sysctl
Table 4.7a summarizes the options when adding a sysctl. Table 4.7a: Adding a Sysctl Setting Variable Value string integer or Value string Comment string Enabled checkbox Description must be in dotted format e.g. kern.ipc.shmmax value to associate with MIB; do not make this up, refer to the suggested values in a man page, FreeBSD Handbook page, or tutorial optional, but a useful reminder for the reason behind using this MIB/value uncheck if you would like to disable the sysctl without deleting it
As soon as you add or edit a sysctl, the running kernel will change that variable to the value you specify. As long as the sysctl exists, that value will persist across reboots and upgrades. Any MIBs that you add will be listed in System -> Sysctls -> View Sysctls. To change the value of a FreeNAS 8.2 Users Guide Page 77 of 235
MIB, click its Edit button. To remove a MIB, click its Delete button. At this time, the GUI does not display the sysctl MIBs that are pre-set in the installation image. 8.2 ships with the following MIBs set:
debug.debugger_on_panic=0 kern.metadelay=3 kern.dirdelay=4 kern.filedelay=5 kern.coredump=0
Do not add or edit the default MIBS as sysctls as doing so will overwrite the default values which may render the system unusable
4.8
System Information
System -> System Information displays general information about the FreeNAS system. The information includes the hostname, the build version, type of CPU (platform), the amount of memory, the current system time, the system's uptime, the current load average, and the IP address being used for connections to the administrative GUI. An example is seen in Figure 4.8a: Figure 4.8a: System Information Tab
Page 78 of 235
4.9
Tunables
When a FreeBSD-based system boots, loader.conf(5) is read to determine if any parameters should be passed to the kernel or if any additional kernel modules (such as drivers) should be loaded. Since loader values are specific to the kernel parameter or driver to be loaded, descriptions can be found in the man page for the specified driver and in many sections of the FreeBSD Handbook. FreeNAS provides a graphical interface for managing loader values. This advanced functionality is intended to make it easier to load additional kernel modules at boot time. A typical usage would be to load a FreeBSD hardware driver that does not automatically load after a FreeNAS installation. The default FreeNAS image does not load every possible hardware driver. This is a necessary evil as some drivers conflict with one another or cause stability issues, some are rarely used, and some drivers just don't belong on a standard NAS system. If you need a driver that is not automatically loaded, you need to add a tunable. DANGER! adding a tunable is an advanced feature that could adversely effect the ability of the FreeNAS system to successfully boot. It is very important that you do not have a typo when adding a tunable as this could halt the boot process. Fixing this problem requires physical access to the FreeNAS system and knowledge of how to use the boot loader prompt as described in section 4.9.1 Recovering From Incorrect Tunables. This means that you should always test the impact of any changes on a test system first. To add a tunable, go to System -> Tunables -> Add Tunable, as seen in Figure 4.9a. Figure 4.9a: Adding a Tunable
Table 4.9a summarizes the options when adding a tunable. Table 4.9a: Adding a Tunable Setting Variable Value string integer or Value string Comment string Description typically the name of the driver to load, as indicated by its man page value to associate with variable; typically this is set to YES to enable the driver specified by the variable optional, but a useful reminder for the reason behind adding this tunable
Page 79 of 235
Setting Enabled
Value checkbox
Description uncheck if you would like to disable the tunable without deleting it
The changes you make will not take effect until the system is rebooted as loader settings are only read when the kernel is loaded at boot time. As long as the tunable exists, your changes will persist at each boot and across upgrades. Any tunables that you add will be listed alphabetically in System -> Tunables -> View Tunables. To change the value of a tunable, click its Edit button. To remove a tunable, click its Delete button. At this time, the GUI does not display the tunables that are pre-set in the installation image. 8.2 ships with the following tunables set:
autoboot_delay="2" loader_logo="freenas" kern.cam.boot_delay=30000 fuse_load="YES" geom_mirror_load="YES" geom_stripe_load="YES" geom_raid3_load="YES" geom_raid5_load=YES geom_gate_load="YES" geom_multipath_load=YES debug.debugger_on_panic=1 hw.hptrr.attach_generic=0
Do not add or edit the default tunables as doing so will overwrite the default values which may render the system unusable.
4.9.1
If a tunable is preventing the system from booting, you will need physical access to the FreeNAS system. Watch the boot messages and press the number 6 key to select "6. Escape to loader prompt" when you see the FreeNAS boot menu shown in Figure 4.9b. The boot loader prompt provides a minimal set of commands described in loader(8). Once at the prompt, use the unset command to disable a problematic value, the set command to modify the problematic value, or the unload command to prevent the problematic driver from loading.
Page 80 of 235
Example 4.9a demonstrates several examples using these commands at the boot loader prompt. The first command disables the current value associated with the kern.ipc.nmbclusters MIB and will fail with a "no such file or directory" error message if a current tunable does not exist to set this value. The second command disables ACPI. The third command instructs the system not to load the fuse driver. When finished, type boot to continue the boot process. Example 4.9a: Sample Commands at the Boot Loader Prompt
Type '?' for a list of commands, 'help' for more detailed help. OK unset kern.ipc.nmbclusters OK set hint.acpi.0.disabled=1 OK unload fuse OK boot
Any changes made at the boot loader prompt only effect the current boot. This means that you need to edit or remove the problematic tunable in System -> Tunables -> View Tunables to make your change permanent and to prevent future boot errors.
Network Configuration
Global Configuration: used to to set non-interface specific network settings. Interfaces: used to configure a specified interface's network settings. Link Aggregations: used to configure link aggregation and link failover. Page 81 of 235
The Network section of the administrative GUI contains the following components for viewing and configuring the FreeNAS system's network settings:
Network Summary: provides an overview of the current network settings. Static Routes: used to add static routes. VLANs: used to configure IEEE 802.1q tagging.
5.1
Global Configuration
Network -> Global Configuration, shown in Figure 5.1a, allows you to set non-interface specific network settings. Figure 5.1a: Global Configuration Screen
Table 5.1a summarizes the settings that can be configured using the Global Configuration tab. The hostname and domain will be pre-filled for you, as seen in Figure 5.1a, but can be changed to meet the local network's requirements. The other settings are optional and can reduce the security of the FreeNAS system (by making it Internet accessible) if it is not protected by a properly configured firewall.
Page 82 of 235
Table 5.1a: Global Configuration Settings Setting Hostname Domain Value string string Description system host name system domain name typically not set to prevent NAS from being accessible from the Internet typically not set primary DNS server (typically in Windows domain) secondary DNS server tertiary DNS server
IPv4 Default Gateway IP address IPv6 Default Gateway Nameserver 1 Nameserver 2 Nameserver 3 IP address IP address IP address IP address
5.2
Interfaces
Network -> Interfaces is used to view which interfaces have been configured, to add an interface to configure, and to edit an interface's current configuration. Figure 5.2a shows the screen that opens when you click Interfaces -> Add Interface. Table 5.2a summarizes the configuration options when you Add an interface or Edit an already configured interface. Figure 5.2a: Adding or Editing an Interface
Page 83 of 235
Table 5.2a: Interface Configuration Settings Setting Description select the FreeBSD device name; will be read-only field when edit NIC drop-down menu an interface Interface Name string description of interface DHCP checkbox requires manual IPv4 or IPv6 configuration if unchecked IPv4 Address IP address set if DHCP unchecked IPv4 Netmask drop-down menu set if DHCP unchecked Auto configure if checked, use rtsold(8) to configure the interface; requires manual checkbox IPv6 configuration if unchecked and wish to use IPv6 IPv6 Address IPv6 address must be unique on network IPv6 Prefix drop-down menu match the prefix used on network Length additional parameters from ifconfig(8), one per line; for example: Options string mtu 9000 will increase the MTU for interfaces that support jumbo frames This screen also allows you to configure an alias for the interface. If you wish to set multiple aliases, click the "Add extra alias" link for each alias you wish to configure. Value
5.3
Link Aggregations
FreeNAS uses FreeBSD's lagg(4) interface to provide link aggregation and link failover. The lagg interface allows aggregation of multiple network interfaces into a single virtual lagg interface, providing fault-tolerance and high-speed multi-link throughput. The aggregation protocols supported by lagg determine which ports are used for outgoing traffic and whether a specific port accepts incoming traffic. Lagg's interface link state is used to validate if the port is active or not. Aggregation works best on switches supporting LACP, which distributes traffic bi-directionally while responding to failure of individual links. FreeNAS also supports active/passive failover between pairs of links. The LACP, FEC and load-balance modes select the output interface using a hash that includes the Ethernet source and destination address, VLAN tag (if available), IP source and destination address, and flow label (IPv6 only). The benefit can only be observed when multiple clients are transferring files from your NAS. The flow entering into your NAS depends on the Ethernet switch load-balance algorithm. NOTE: LACP and other forms of link aggregation generally do not work well with virtualization solutions. In a virtualized environment, consider the use of iSCSI MPIO through the creation of an iSCSI Portal as demonstrated in section 8.7.4. This allows an iSCSI initiator to recognize multiple links to a target, utilizing them for increased bandwidth or redundancy. This how-to contains instructions for configuring MPIO on ESXi. FreeNAS 8.2 Users Guide Page 84 of 235
The lagg driver currently supports the following aggregation protocols: Failover: the default protocol. Sends traffic only through the active port. If the master port becomes unavailable, the next active port is used. The first interface added is the master port; any interfaces added after that are used as failover devices. By default, received traffic is only accepted when received through the active port. This constraint can be relaxed, which is useful for certain bridged network setups, by setting net.link.lagg.failover_rx_all to a non-zero value in System -> Sysctls -> Add Sysctl. FEC: supports Cisco EtherChannel. This is a static setup and does not negotiate aggregation with the peer or exchange frames to monitor the link. LACP: supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP) and the Marker Protocol. LACP will negotiate a set of aggregable links with the peer into one or more link aggregated groups (LAGs). Each LAG is composed of ports of the same speed, set to full-duplex operation. The traffic will be balanced across the ports in the LAG with the greatest total speed; in most cases there will only be one LAG which contains all ports. In the event of changes in physical connectivity, link aggregation will quickly converge to a new configuration. LACP must be configured on the switch as well. Load Balance: balances outgoing traffic across the active ports based on hashed protocol header information and accepts incoming traffic from any active port. This is a static setup and does not negotiate aggregation with the peer or exchange frames to monitor the link. The hash includes the Ethernet source and destination address, VLAN tag (if available), and IP source and destination address. Requires a switch which supports IEEE 802.3ad static link aggregation. Round Robin: distributes outgoing traffic using a round-robin scheduler through all active ports and accepts incoming traffic from any active port. This mode can cause unordered packet arrival at the client. This has a side effect of limiting throughput as reordering packets can be CPU intensive on the client. Requires a switch which supports IEEE 802.3ad static link aggregation. None: this protocol disables any traffic without disabling the lagg interface itself. NOTE: The FreeNAS system must be rebooted after configuring the lagg device and TCP access will be lost during reboot. The interfaces used in the lagg device should not be configured before creating the lagg device. Figure 5.3a shows the configuration options when adding a lagg interface using Network -> Link Aggregations -> Create Link Aggregation. NOTE: if interfaces are installed but do not appear in the Physical NICs in the LAGG list, check that a FreeBSD driver for the interface exists here. Select the desired aggregation protocol, highlight the interface(s) to associate with the lagg device, and click the OK button. Once the lagg device has been created, it will be listed in the tree under an entry which indicates the type of protocol. As seen in Figure 5.3b, it will also appear in View Link Aggregations.
Page 85 of 235
Each link aggregation entry provides buttons to edit the LAGG interface, edit its member interfaces, or to delete the link aggregation. Figure 5.3c shows the Edit Interface configuration screen and Table 5.3a describes the options in this screen.
Page 86 of 235
Table 5.3a describes the options in this screen: Table 5.3a: Configurable Options for a lagg Interface Setting NIC Value string Description read-only as automatically assigned next available numeric ID by default same as device (NIC) name, can be changed to a more descriptive value check if the lagg device gets its IP address info from DHCP server mandatory if DHCP is left unchecked mandatory if DHCP is left unchecked check only if DHCP server available to provide IPv6 address info optional required if input IPv6 address additional ifconfig(8) options
Interface Name string DHCP IPv4 Address IPv4 Netmask Auto configure IPv6 IPv6 Address IPv6 Prefix Length Options checkbox string drop-down menu checkbox string drop-down menu string
Page 87 of 235
This screen also allows you to configure an alias for the lagg interface. If you wish to set multiple aliases, click the "Add extra Alias" link for each alias you wish to configure. If you click an entry's Edit Members button, the interfaces within the link aggregation will be listed. Each interface entry will have an Edit and a Delete button. Figure 5.3d shows the configuration screen that appears when you click the Edit button of a member interface. The configurable options are summarized in Table 5.3b. Figure 5.3d: Editing a Member Interface
Table 5.3b: Configuring a Member Interface Setting LAGG Interface group Value Description drop-down menu select the member interface to configure order of selected interface within the lagg; configure LAGG Priority Number integer a failover to set the master interface to 0 and the other interfaces to 1, 2, etc. Physical NIC drop-down menu physical interface of the selected member Options string additional parameters from ifconfig(8) NOTE: options can be set at either the lagg level or the individual parent interface level. Do not set the option at both levels as each level automatically inherits its options from the other. Typically, changes are made at the lagg level (Figure 5.3b) as each interface member will inherit from the lagg. If you instead configure the interface level (Figure 5.3c), you will have to repeat the configuration for each interface within the lagg. However, some lagg options can only be set by editing the parent interface. For instance, the MTU of a lagg is inherited from the parent. To set an MTU of 9000 on a lagg, set all the parent interfaces to MTU 9000.
5.4
Network Summary
Network -> Network Summary allows you to quickly view the addressing information of every configured interface. For each interface name, the configured IP address(es), DNS server(s), and default gateway will be displayed. FreeNAS 8.2 Users Guide Page 88 of 235
5.5
Static Routes
For security reasons, no static routes are defined on the FreeNAS system. Should you need a static route to reach portions of your network, add the route using Network -> Static Routes -> Add Static Route, shown in Figure 5.5a. Figure 5.5a: Adding a Static Route
The destination network and gateway fields are mandatory; the description field is optional. If you add any static routes, they will show in View Static Routes. Each route will have an action of Edit or Delete.
5.6
VLANs
FreeNAS uses FreeBSD's vlan(4) interface to demultiplex frames with IEEE 802.1q tags. This allows nodes on different VLANs to communicate through a layer 3 switch or router. A vlan interface must be assigned a parent interface and a numeric VLAN tag. A single parent can be assigned to multiple vlan interfaces provided they have different tags. If you click Network -> VLANs -> Add VLAN, you will see the screen shown in Figure 5.6a. NOTE: VLAN tagging is the only 802.1Q feature that is implemented. Additionally, not all Ethernet interfaces support full VLAN processingsee the HARDWARE section of vlan(4) for details. Table 5.6a describes the various fields.
Page 89 of 235
Table 5.6a: Adding a VLAN Setting Virtual Interface Description use the format vlanX where X is a number representing the vlan string interface usually an Ethernet card connected to a properly configured switch Parent Interface drop-down menu port VLAN Tag integer should match a numeric tag set up in the switched network Description string optional Value
Storage Configuration
Periodic Snapshot Tasks: used to schedule the automatic creation of ZFS snapshots. Replication Tasks: used to schedule the replication of snapshots over an encrypted connection. Volumes: used to create and manage storage volumes. ZFS Scrubs: used to schedule ZFS scrubs as part of ongoing disk maintenance.
The Storage section of the graphical interface allows you to configure the following:
6.1
A periodic snapshot task allows you to schedule the creation of read-only versions of ZFS volumes and datasets at a given point in time. Snapshots can be created quickly and, if little data changes, new snapshots take up very little space. For example, a snapshot where no files have changed takes 0MB of storage, but if you change a 10GB file it will keep a copy of both the old and the new 10GB version. Snapshots provide a clever way of keeping a history of files, should you need to recover an older copy FreeNAS 8.2 Users Guide Page 90 of 235
or even a deleted file. For this reason, many administrators take snapshots often (e.g. every 15 minutes), store them for a period of time (e.g. for a month), and store them on another system (e.g. using Replication Tasks). Such a strategy allows the administrator to roll the system back to a specific time or, if there is a catastrophic loss, an off-site snapshot can restore the system up to the last snapshot interval. Before you can create a snapshot, you need to have an existing ZFS volume. How to create a volume is described in section 6.3.3 Volume Manager. To create a periodic snapshot task, click Storage -> Periodic Snapshot Tasks -> Add Periodic Snapshot which will open the screen shown in Figure 6.1a. NOTE: if you just need a one-time snapshot, instead use Storage -> Volumes -> View Volumes and click the Create Snapshot button for the volume or dataset that you wish to snapshot. Figure 6.1a: Creating a ZFS Periodic Snapshot
Table 6.1a summarizes the fields in this screen: Table 6.1a: Options When Creating a Periodic Snapshot Setting Value Description select an existing ZFS volume or dataset; if you select a volume, separate snapshots will also be created for each of its datasets recursive snapshots are created as one atomic operation across descendent file systems, meaning that the snapshot data is taken at one consistent time Page 91 of 235
Value integer and drop-down menu drop-down menu drop-down menu drop-down menu checkboxes
Description how long to keep the snapshot do not create snapshots before this time of day do not create snapshots after this time of day how often to take snapshot between Begin and End times which days of the week to take snapshots
Once you click the OK button, a snapshot will be taken and this task will be repeated according to your settings. An entry for the snapshot task will be added to View Periodic Snapshot Tasks. As seen in Figure 6.1b, this entry provides an overview of the snapshot tasks' configuration as well as Modify and Delete buttons. Figure 6.1b: View Periodic Snapshot Tasks
If you click the ZFS Snapshots tab (above the Add Periodic Snapshot button), you can review the listing of available snapshots. In the example shown in Figure 6.1c, volume1 was selected when the periodic snapshot task was created and this volume contains two datasets named software and jail. The most recent snapshot for a volume or dataset will be listed last and will have 3 icons instead of 2. The icons associated with a snapshot allow you to: Clone Snapshot: will prompt you for the name of the clone to create. The clone will be a writable copy of the snapshot and can only be created on the same ZFS volume. Clones do not inherit the properties of the parent dataset, but rather inherit the properties based on where the clone is created in the ZFS pool. Because a clone initially shares all its disk space with the original snapshot, its used property is initially zero. As changes are made to the clone, it uses more space. Destroy Snapshot: a pop-up message will ask you to confirm this action. Chile clones must be destroyed before their parent snapshot can be destroyed. Rollback Snapshot: a pop-up message will ask if you are sure that you want to rollback to this snapshot state. If you click Yes, any files that have changed since the snapshot was taken will be reverted back to their state at the time of the snapshot.
Page 92 of 235
NOTE: rollback is a potentially dangerous operation and will cause any configured replication tasks to fail as the replication system uses the existing snapshot when doing an incremental backup. If you do need to restore the data within a snapshot, the recommended steps are: 1. Clone the desired snapshot. 2. Share the clone with the share type or service running on the FreeNAS system. 3. Once users have recovered the needed data, destroy the clone. This approach will never destroy any on-disk data and has no impact on replication. Alternatively, periodic snapshots will appear as shadow copies in newer versions of Windows Explorer. Users can access the files in the shadow copy using Explorer without requiring any interaction with the FreeNAS graphical administrative interface. Shadow copies are described in more detail in section 7.3.4. The ZFS Snapshots screen allows you to create filters to view snapshots by selected criteria. To create a filter, click the Define filter icon (near the text No filter applied). When creating a filter: select the column or leave the default of Any Column. select the condition. Possible conditions are: contains (default), is, starts with, ends with, does not contain, is not, does not start with, does not end with, and is empty. input a value that meets your view criteria. click the Filter button to save your filter and exit the define filter screen. Alternately, click the + button to add another filter.
If you create multiple filters, select the filter you wish to use before leaving the define filter screen. Once a filter is selected, the No filter applied text will change to Clear filter. If you click Clear filter, a pop-up message will indicate that this will remove the filter and all available snapshots will be listed.
Page 93 of 235
6.2
Replication Tasks
A replication task allows you to automate the copy of ZFS snapshots to another system over an encrypted connection. This allows you to create an off-site backup of a ZFS dataset or pool. This section will refer to the system generating the ZFS snapshots as PUSH and the system to receive a copy of the ZFS snapshots as PULL. Before you can configure a replication task, the following pre-requisites must be met: a ZFS volume must exist on both PUSH and PULL. a periodic snapshot task must be created on PUSH. You will not be able to create a replication task before the first snapshot exists. the SSH service must be enabled on PULL. The first time the service is enabled, it will generate the required SSH keys. A replication task uses the following keys: /data/ssh/replication.pub: the public key used for authenticating the PUSH replication user. This key needs to be copied to the root user account on PULL. /etc/ssh/ssh_host_dsa_key.pub: the host public key of PULL used to authenticate the receiving side in order to prevent a man-in-the-middle attack. This key needs to be copied to the replication task on PUSH. This section will demonstrate how to configure a replication task between the following two FreeNAS systems: 192.168.2.2 will be referred to as PUSH. This system has a periodic snapshot task for the ZFS dataset /mnt/local/data. 192.168.2.6 will be referred to as PULL. This system has an existing ZFS volume named /mnt/remote which will store the pushed snapshots. 6.2.1 Configure PULL
A copy of the public key for the replication user on PUSH needs to be pasted to the public key of the root user on the PULL system. To obtain a copy of the replication key: on PUSH go to Storage -> View Replication Tasks. Click the View Public Key button and copy its contents. An example is shown in Figure 6.2a. Go to PULL and click Account -> Users -> View Users. Click the Modify User button for the root user account. Paste the copied key into the "SSH Public Key" field and click OK. If a key already exists, append the new text after the existing key. On PULL, ensure that the SSH service is enabled in Services -> Control Services. Start it if it is not already running.
Page 94 of 235
6.2.2
Configure PUSH
On PUSH, verify that a periodic snapshot task has been created and that at least one snapshot is listed in Storage -> Periodic Snapshot Tasks -> View Periodic Snapshot Tasks -> ZFS Snapshots. To create the replication task, click Storage -> Replication Tasks -> Add Replication Task. Figure 6.2b shows the required configuration for our example: the Filesystem/Volume is local/data the Remote ZFS filesystem is remote the Remote hostname is 192.168.2.6 once the Remote hostname is input, click the SSH Key Scan button; assuming the address is reachable and the SSH service is running on PULL, its key will automatically be populated to the Remote hostkey box Table 6.2a summarizes the available options in the Add Replication Task screen.
Page 95 of 235
Table 6.2a: Adding a Replication Task Setting Filesystem/Volume Remote ZFS filesystem Recursively replicate Initialize remote side Remote hostname Remote port Remote hostkey Value drop-down menu string checkbox checkbox string string string Description the ZFS volume on PUSH containing the snapshots to be replicated; the drop-down menu will be empty if a snapshot does not already exist the ZFS volume on PULL that will store the snapshots; /mnt/ is assumed and should not be included in the path if checked will replicate child datasets and replace previous snapshot stored on PULL does a reset once operation which destroys the replication data on PULL before reverting to normal operation; use this option if replication gets stuck IP address or DNS name of PULL must match port being used by SSH service on PULL use the SSH Key Scan button to retrieve the public key of PULL
Once the replication task is created, it will appear in the View Replication Tasks of PUSH, as seen in Figure 6.2c. Buttons are provided to delete and to edit the replication task. FreeNAS 8.2 Users Guide Page 96 of 235
PUSH will immediately attempt to replicate its latest snapshot to PULL. If the replication is successful, the snapshot will appear in the Storage -> Periodic Snapshot Tasks -> View Periodic Snapshot Tasks -> ZFS Snapshots tab of PULL, as seen in Figure 6.2d. Figure 6.2d: Verifying the Snapshot was Replicated
If the snapshot is not replicated, see the next section for troubleshooting tips.
Page 97 of 235
6.2.3
Troubleshooting Replication
If you have followed all of the steps above and have PUSH snapshots that are not replicating to PULL, check to see if SSH is working properly. On PUSH, open Shell and try to ssh into PULL. Replace hostname_or_ip with the value for PULL:
ssh -vv -i /data/ssh/replication hostname_or_ip
This command should not ask for a password. If it asks for a password, SSH authentication is not working. Go to Storage -> Replication Tasks -> View Replication Tasks and click the "View Host Key" button. Make sure that it matches the value of /etc/ssh/ssh_host_dsa_key.pub on PULL. Also check /var/log/auth.log on PULL to see if it gives an indication of the error. If the key is correct and replication is still not working, try deleting all snapshots on PULL except for the most recent one. In Storage -> Periodic Snapshot Tasks -> View Periodic Snapshot Tasks -> ZFS Snapshots check the box next to every snapshot except for the last one (the one with 3 icons instead of 2), then click the global Destroy button at the bottom of the screen. Once you have only one snapshot, open Shell on PUSH and use the zfs send command. To continue out example, the ZFS snapshot on the local/data dataset of PUSH is named auto-20110922.1753-2h, the IP address of PULL is 192.168.2.6, and the ZFS volume on PULL is remote. Note that the @ is used to separate the volume/dataset name from the snapshot name.
zfs send local/[email protected] | ssh -i 192.168.2.6 zfs receive local/[email protected] /data/ssh/replication
NOTE: if this command fails with the error "cannot receive new filesystem stream: destination has snapshots", check the box "initialize remote side for once" in the replication task and try again. If the zfs send command still fails, you will need to open Shell on PULL and use the zfs destroy -R volume_name@snapshot_name command to delete the stuck snapshot. You can then use the zfs list -t snapshot on PULL to confirm if the snapshot successfully replicated. After successfully transmitting the snapshot, recheck again after the time period between snapshots lapses to see if the next snapshot successfully transmitted. If it is still not working, you can manually send an incremental backup of the last snapshot that is on both systems to the current one with this command:
zfs send local/[email protected] | ssh -i 192.168.2.6 zfs receive local/[email protected] /data/ssh/replication \
6.3
Volumes
Since the storage disks are separate from the FreeNAS operating system, you don't actually have a NAS (network-attached storage) system until you configure your disks into at least one volume. FreeNAS supports the creation of both UFS and ZFS volumes; however, ZFS volumes are recommended to get the most out of your FreeNAS system. This section demonstrates how to perform the following actions: If your disks are using an existing UFS or ZFS software RAID, see section 6.3.1 Auto Importing Volumes.
Page 98 of 235
If your disks are already formatted with UFS, NTFS, MSDOS, or EXT2, see section 6.3.2 Importing Volumes. If you wish to format your disks into a UFS volume or ZFS pool, see section 6.3.3 Volume Manager. If you wish to grow the size of an existing ZFS pool, see section 6.3.4 Using Volume Manager After a Volume Has Been Created. If you wish to divide an existing ZFS pool into datasets, see section 6.3.5 Creating ZFS Datasets. If you wish to create a ZFS block device to use as an iSCSI device extent, see section 6.3.6 Creating a zvol. If you wish to view and manage volumes, see section 6.3.7 Viewing Volumes. If you wish to view or configure disk properties, see section 6.3.8 Viewing Disks. If you wish to control user/group access to an existing UFS volume, ZFS pool, or ZFS dataset, see section 6.3.9 Setting Permissions. If your hardware supports multipath, FreeNAS will automatically configure this for you. You can verify the configuration as described in section 6.3.10 Viewing Multipaths. If you need to replace a failed ZFS drive, see section 6.3.11 Replacing a Failed Drive. 6.3.1 Auto Importing Volumes
If you click Storage -> Volumes -> Auto Import Volume, you can configure FreeNAS to use an existing software UFS or ZFS RAID volume. Supported volumes are UFS GEOM stripes (RAID0), UFS GEOM mirrors (RAID1), UFS GEOM RAID3, as well as existing ZFS pools. UFS RAID5 is not supported as it is an unmaintained summer of code project which was never integrated into FreeBSD. NOTE: versions of FreeNAS up to and including 0.7.2 are based on ZFSv13. You can import these pools, but this is a one-way street. In other words, once you import a ZFSv13 volume, you can not revert back. NAS4Free and FreeNAS version 0.7.5.9496 are based on ZFSv28 and can not be imported. FreeNAS 8.2 does not support deduplication, compatibility with Nexenta pools, or Linux fuse-zfs. Existing software RAID volumes should be available for selection from the drop-down menu. In the example shown in Figure 6.3a, the FreeNAS system has an existing ZFS volume named test. Once the volume is selected, click the "Import Volume" button. NOTE: FreeNAS will not import a dirty volume. If an existing UFS RAID does not show in the drop-down menu, you will need to fsck the volume. If an existing ZFS pool does not show in the dropdown menu, run zpool import from Shell to import the pool. If you suspect that your hardware is not being detected, run camcontrol devlist from Shell. If the disk does not appear in the output, check to see if the controller driver is supported or if it needs to be loaded by creating a tunable.
Page 99 of 235
6.3.2
Importing Volumes
The Volume -> Import Volume screen, shown in Figure 6.3b, is used to import a single disk or partition that has been formatted with a supported filesystem. FreeNAS supports the import of disks that have been formatted with UFS, NTFS, MSDOS, or EXT2. Figure 6.3b: Importing a Volume
Input a name for the volume, use the drop-down menu to select the disk or partition that you wish to import, and select the type of filesystem on the disk. Before importing a disk, be aware of the following caveats: FreeNAS will not import a dirty filesystem. If a supported filesystem does not show in the drop-down menu, you will need to fsck or run a disk check on the filesystem. earlier versions of FreeNAS 8 had a bug that prevented the successful import of NTFS drives. Don't try to import NTFS if you are running a version earlier than FreeNAS 8.0.1-RC1. FreeNAS can not import dynamic NTFS volumes at this time. A future version of FreeBSD may address this issue.
6.3.3
Volume Manager
If you have unformatted disks or wish to overwrite the filesystem (and data) on your disks, use the Volume Manager to format the desired disks as a UFS volume or a ZFS pool. If you click on Storage -> Volume Manager, you will see a screen similar to the example shown in Figure 6.3c. Figure 6.3c: Creating a ZFS Pool Using Volume Manager
Use the mouse to select the disk(s) to be formatted. To select multiple disks, highlight the first disk, then hold the shift key as you highlight the last disk. The options available in the Group type differ depending upon the selected filesystem and the number of highlighted disks: if you select one disk, you can only choose to format with UFS or ZFS if you select two disks, you can create a UFS or ZFS mirror or stripe if you select three disks, you can create a UFS or ZFS stripe, a UFS RAID3, or a ZFS RAIDZ1 if you select four disks, you can create a UFS or ZFS mirror or stripe, or a ZFS RAIDZ1 or RAIDZ2
An overview of the various RAID levels can be found in section 1.1.6 RAID Overview. Table 6.3a summarizes the configuration options of this screen.
Table 6.3a: Options When Creating a Volume Setting Volume name Value string Description ZFS volumes must conform to these naming conventions; it is recommended to choose a name that will stick out in the logs (e.g. not data or freenas) highlight desired number of disks from list of available disks select either UFS or ZFS only available when select UFS; useful for creating a /var for persistent log storage only available when Specify custom path is checked; must be full name of volume (e.g. /mnt/var) and if no path is provided, it will append the Volume name to /mnt FreeNAS always uses 4K sectors for UFS and uses 4K sectors for ZFS if the underlying hard drive is detected as being advanced format; note that the auto-detector is not bullet proof so you should refer to the disk manual to determine if the disk supports 4k; checking this option forces 4K which is useful in a RAIDZ that contains a mix of older and advanced format drives; note that you can not change this setting once the volume is created unless you destroy the volume and recreate it (which deletes the data on the volume) options vary by filesytem type and number of disks selected; may include mirror, stripe, RAID3, RAIDZ1, RAIDZ2 only available when select ZFS; choices are None, Log, Cache, Spare; see below for descriptions of each option
Member list disks Filesystem bullet type Specify checkbox custom path Path string
The Add Volume button warns that creating a volume destroys all existing data on selected disk(s). Depending upon the size and number of disks, the type of controller, the group type, and the type of filesystem, creating the volume may take a few minutes. Since UFS volume creation will format the disks, it may take as long as 10 or 15 minutes for a number of large disks. Once the volume is created, the screen will refresh and the new volume will be listed under Storage -> Volumes. The ZFS extra options can be used to create a log, cache, or spare device. When creating the volume, if you leave some disks/SSDs unchecked, they will appear as available within the ZFS extra section. The following options are available: None: disk(s) are still available to be selected for formatting. Log: selected disk will be dedicated for storing the ZIL (ZFS Intent Log). See the Separate Log Devices section of the ZFS Best Practices Guide for size recommendations. When two or more log devices are specified, FreeNAS will mirror them. This is a prevention measure because losing the ZIL could lead to disastrous results such as making the entire pool inaccessible. Even once ZFS v28 is implemented in FreeNAS, losing the ZIL can still cause the loss of in-flight writes. FreeNAS 8.2 Users Guide Page 102 of 235
Putting the ZIL on high speed devices can improve performance for certain workloads, especially those requiring synchronous writes such as NFS clients connecting to FreeNAS running on VMWare ESXi. In such cases, a dedicated ZIL will make a big difference in performance. Applications that do not do a lot of synchronous writes are less likely to benefit from having dedicated ZIL devices. For VMWare, if a high speed ZIL device is not an option, using iSCSI instead of NFS is a workaround to achieve better performance. Cache: selected device, typically an SSD, will be dedicated to L2ARC on-disk cache. See the Separate Cache Devices section of the ZFS Best Practices Guide for size recommendations. Losing an L2ARC device will not affect the integrity of the storage pool, but may have an impact on read performance, depending upon the workload and the ratio of dataset size to cache size. Spare: will create a hot spare that is only used when another disk fails. Hot spares speed up healing in the face of hardware failures and are critical for high mean time to data loss (MTTDL) environments. One or two spares for a 40-disk pool is a commonly used configuration. Use this option with caution as there is a known bug in the current FreeBSD implementation. This will be fixed by zfsd which will be implemented once it is committed to FreeBSD. 6.3.4 Using Volume Manager After a Volume Has Been Created
Once a volume exists, an extra Volume to extend field will be added to Storage -> Volumes -> Volume Manager, as seen in Figure 6.3d. This field is mutually exclusive with the "Volume name" field in that you can only use one or the other. Figure 6.3d: Volume to Extend Field
This screen can be used to perform the following tasks: 1. Create another UFS or ZFS volume. Input a "volume name" and create a volume as usual. 2. Add a ZFS log or cache device to an existing ZFS volume. Select the volume name using the FreeNAS 8.2 Users Guide Page 103 of 235
drop-down menu, select the device to add, then select Log or Cache from the ZFS Extra field. 3. Extend an existing ZFS volume as described below. NOTE: you can not extend an existing UFS volume. When extending a volume, ZFS supports the addition of virtual devices (vdevs) to an existing volume (ZFS pool). A vdev can be a single disk, a stripe, a mirror, a RAIDZ1, or a RAIDZ2. Once a vdev is created, you can not add more drives to that vdev ; however, you can stripe a new vdev (and its disks) with the same type of existing vdev in order to increase the overall size of ZFS the pool. In other words, when you extend a ZFS volume, you are really striping vdevs. Here are some examples: to extend a ZFS stripe, add one or more disks. Since there is no redundancy, you do not have to add the same amount of disks as the existing stripe. to extend a ZFS mirror, add the same number of drives. The resulting striped mirror is a RAID 10. to extend a three drive RAIDZ1, add three additional drives. The result is a RAIDZ+0, similar to RAID 50 on a hardware controller. to extend a RAIDZ2 requires a minimum of four additional drives. The result is a RAIDZ2+0, similar to RAID 60 on a hardware controller. In the Volume to extend section, select the existing volume that you wish to stripe with. This will grey out the Volume name field and select ZFS as the filesystem type. Highlight the required number of additional disk(s), select the same type of RAID used on the existing volume, and click Add Volume.
6.3.5
An existing ZFS volume can be divided into datasets. Permissions, compression, and quotas can be set on a per dataset basis, allowing more granular control over access to storage data. A dataset is similar to a folder in that you can set permissions; it is also similar to a filesystem in that you can set properties such as quotas and compression as well as create snapshots. NOTE: ZFS provides thick provisioning using quotas and thin provisioning using reserved space. If you select an existing ZFS volume -> Create ZFS Dataset, you will see the screen shown in Figure 6.3e. Table 6.3b summarizes the options available when creating a ZFS dataset. Once a dataset is created, you can click on that dataset and select Create ZFS Dataset, thus creating a nested dataset, or a dataset within a dataset. When creating datasets, double-check that you are using the Create ZFS Dataset option for the intended volume or dataset. If you get confused when creating a dataset on a volume, click all existing datasets to close them--the remaining Create ZFS Dataset will be for the volume.
Table 6.3b: ZFS Dataset Options Setting Dataset Name Description mandatory choose from: Inherit, Off, lzjb (optimized for performance while drop-down providing decent data compression), gzip level 6, gzip fastest (level Compression Level menu 1), gzip maximum (level 9, best compression but discouraged due to performance impact); see NOTE below controls whether the access time for files is updated when they are Inherit, On, read; turning this property off avoids producing write traffic when Enable atime or Off reading files and can result in significant performance gains, though it might confuse mailers and other utilities such as make default of 0 is off; can specify M (megabyte), G (gigabyte), or T Quota for this integer (terabyte) as in 20G for 20 GB, can also include a decimal point (e.g. dataset 2.8G) Quota for this default of 0 is off; can specify M (megabyte), G (gigabyte), or T dataset and integer (terabyte) as in 20G for 20 GB children Reserved space for default of 0 is unlimited (besides hardware); can specify M integer this dataset (megabyte), G (gigabyte), or T (terabyte) as in 20G for 20 GB Reserved space for default of 0 is unlimited (besides hardware); can specify M this dataset and integer (megabyte), G (gigabyte), or T (terabyte) as in 20G for 20 GB children Value string
NOTE on compression: most media (e.g. .mp3, .mp4, .avi) is already compressed, meaning that you'll increase CPU utilization for no gain if you store these files on a compressed dataset. However, if you have raw .wav rips of CDs or .vob rips of DVDs, you'll see a performance gain using a compressed dataset. 6.3.6 Creating a zvol
A zvol (ZFS volume) is a feature of ZFS that creates a device block over ZFS. This allows you to use a zvol as an iSCSI device extent. To create a zvol, select an existing ZFS volume -> Create ZFS Volume which will open the screen shown in Figure 6.3f. Figure 6.3f: Creating a zvol
The configuration options are described in Table 6.3c: Table 6.3c: zvol Configuration Options Setting ZFS Volume Name Size Compression Level Value string integer drop-down menu Description input a name for the zvol specify size and value such as 10G default of Inherit means it will use the same compression level as the existing zpool used to create the zvol Page 106 of 235
6.3.7
Viewing Volumes
If you click Storage -> Volumes -> View Volumes, you can view and further configure existing volumes and datasets, as seen in the example shown in Figure 6.3g. Figure 6.3g: Viewing Volumes
The icons towards the top of the right frame allow you to: access Volume Manager, import a volume, auto import a volume, and view disks. If the system has multipath-capable hardware, an extra button will be added to view multipaths. The eight icons associated with a ZFS volume are used to: Detach Volume: allows you to either detach a disk before removing it from the system (also known as a ZFS export) or to delete the contents of the volume, depending upon the choice you make in the screen that pops up when you click this button. The pop-up message, seen in Figure 6.3h, will show the current used space, provide the check box "Mark the disks as new (destroy data), prompt you to make sure that you want to do this, warn you if the volume has any associated shares and ask if you wish to delete them, and the browser will turn red to alert you that you are about to do something that will make the data inaccessible. If you do not check the box to mark the disks as new, the volume will be exported (ZFS volumes only). This means that the data is not destroyed and the volume can be re-imported at a later time. If you will be moving a ZFS drive from one system to another, perform this export action first. This operation flushes any unwritten data to disk, writes data to the disk indicating that the export was done, and removes all knowledge of the pool from the system. If you do check the box to mark the disks as new, the volume and all of its data will be destroyed and the underlying disks will be returned to their raw state.
Scrub Volume: ZFS scrubs and how to schedule them are described in more detail in section 6.4 ZFS Scrubs. This button allows you to manually initiate a scrub. A scrub is I/O intensive and can negatively impact performance, meaning that you should not initiate one while the system is busy. A cancel button is provided should you need to cancel a scrub. NOTE: if you do cancel a scrub, the next scrub will start over from the beginning, not where the cancelled scrub left off. Edit ZFS Options: allows you to edit the volume's compression level, atime setting, dataset quota, and reserved space for quota. Create ZFS Dataset: allows you to create a dataset. Create ZFS Volume: allows you to create a zvol to use as an iSCSI device extent. Change Permissions: allows you to edit the volume's user, group, Unix rwx permissions, type of ACL, and to enable recursive permissions on the volume's subdirectories. Create Snapshot: allows you to configure the snapshot's name and whether or not it is recursive before manually creating a one-time snapshot. If you wish to schedule the regular creation of snapshots, instead create a periodic snapshot task. Volume Status: as seen in the example in Figure 6.3i, this screen shows the device name and status of each disk in the ZFS pool. For each disk, buttons are provided to edit the disk's options (shown in Figure 6.3j), replace the disk (as described in section 6.3.11 Replacing a Failed Drive), or to offline the disk.
If you click a disk's Edit button in Volume Status, you'll see the screen shown in Figure 6.3j: Figure 6.3j: Editing a Disk
Table 6.3d summarizes the configurable options. Table 6.3d: Disk Options Setting Name Serial Value string string Description read-only value showing FreeBSD device name for disk read-only value showing the disk's serial number Page 109 of 235
Setting Description HDD Standby Advanced Power Management Acoustic Level Enable S.M.A.R.T S.M.A.R.T. extra options
Value string drop-down menu drop-down menu drop-down menu checkbox string
Description optional indicates the time of inactivity (in minutes) before the drive enters standby mode in order to conserve energy; the default is Always On default is Disabled, can select a power management profile from the menu default is Disabled, can be modified for disks that understand AAM enabled by default if the disk supports S.M.A.R.T. smartctl(8) options
A ZFS dataset only has five icons as the scrub volume, create ZFS volume, and volume status buttons only apply to volumes. In a dataset, the Detach Volume button is replaced with the Destroy Dataset button. If you click the Destroy Dataset button, the browser will turn red to indicate that this is a destructive action. The pop-up warning message will warn that destroying the dataset will delete all of the files on that dataset. 6.3.8 Viewing Disks
Storage -> Volumes -> View Disks allows you to view all of the disks recognized by the FreeNAS system. An example is shown in Figure 6.3k. Figure 6.3k: Viewing Disks
For each device, the current configuration of the options described in Table 6.3d is displayed. Click a disk's Edit button to change its configuration. The Wipe button is used to blank a disk and will provide a progress bar of the wipe's status. Use this option before discarding a disk.
6.3.9
Setting Permissions
Setting permissions is an important aspect of configuring volumes. The graphical administrative interface is meant to set the initial permissions for a volume or dataset in order to make it available as a share. Once a share is available, the client operating system should be used to fine-tune the permissions of the files and directories that are created by the client. Section 7 Sharing contains configuration examples for several types of permission scenarios. This section provides an overview of the screen that is used to set permissions. Once a volume or dataset is created, it will be listed by its mount point name in Storage -> Volumes -> View Volumes. If you click the Change Permissions icon for a specific volume/dataset, you will see the screen shown in Figure 6.3l. Table 6.3e summarizes the options in this screen. Figure 6.3l: Changing Permissions on a Volume or Dataset
Table 6.3e: Options When Changing Permissions Setting Value Description drop-down user to control the volume/dataset; users which were manually created or Owner (user) menu imported from Active Directory or LDAP will appear in drop-down menu drop-down group to control the volume/dataset; groups which were manually created Owner (group) menu or imported from Active Directory or LDAP will appear in drop-down Mode checkboxes check the desired Unix permissions for user, group, and other FreeNAS 8.2 Users Guide Page 111 of 235
Description Unix and Windows ACLs are mutually exclusive, this means that you must select the correct type of ACL to match the share; see the paragraph below the Table for more details if checked, permissions will also apply to subdirectories of the volume or dataset; if data already exists on the volume/dataset, it is recommended to instead change the permissions recursively on the client side to prevent a performance lag on the FreeNAS system
When in doubt, or if you have a mix of operating systems in your network, select Unix ACLs as all clients understand them. Windows ACLs are appropriate when the network contains only Windows clients and are the preferred option within an Active Directory domain. Windows ACLs add a superset of permissions that augment those provided by Unix ACLs. While Windows clients also understand Unix ACLs, they won't benefit from the extra permissions provided by Active Directory and Windows ACLs when Unix ACLs are used. NOTE: if you change your mind about the type of ACL, you do not have to recreate the volume. That is, existing data is not lost if the type of ACL is changed. However, if you change from Windows ACLs to Unix ACLs, the extended permissions provided by Windows ACLs will be removed from the existing files. 6.3.10 Viewing Multipaths
FreeNAS uses gmultipath(8) to provide multipath I/O support on systems containing hardware that is capable of multipath. An example would be a dual SAS expander backplane in the chassis or an external JBOD. Multipath hardware adds fault tolerance to a NAS as the data is still available even if one disk I/O path has a failure. FreeNAS automatically detects detects active/active and active/passive multipath-capable hardware. Any multipath-capable devices that are detected will be placed in multipath units with the parent devices hidden. The configuration will be displayed in Storage -> Volumes -> View Multipaths, as seen in the example in Figure 6.3m. Note that this option will not be displayed in the Storage -> Volumes tree on systems that do not contain multipath capable hardware. Figure 6.3m: Viewing Multipaths
Figure 6.3m provides an example of a system with a SAS ZIL and a SAS hard drive. The ZIL device is capable of active/active writes, whereas the hard drive is capable of active/read. 6.3.11 Replacing a Failed Drive
If you are using any form of redundant RAID, you should replace a failed drive as soon as possible to repair the degraded state of the RAID. Depending upon the capability of your hardware, you may or may not need to reboot in order to replace the disk. AHCI capable hardware does not require a reboot. NOTE: a stripe (RAID0) does not provide redundancy. If you lose a disk in a stripe, the data on the stripe is lost. Before physically removing the disk, go to Storage -> Volumes -> View Volumes -> Volume Status and locate the failed disk. Once you have located the failed disk in the GUI, perform the following steps: 1. If the disk is formatted with ZFS, click the disk's Offline button in order to change its status to OFFLINE. This step is needed to properly remove the device from the ZFS pool and to prevent swap issues. If your hardware supports hot-pluggable disks, click the disk's Offline button, pull the disk, then skip to step 3. 2. If the hardware is not AHCI capable, shutdown the system in order to physically replace the disk. When finished, return to the GUI and locate the OFFLINE disk. 3. Once the disk is showing as OFFLINE, click the disk's Replace button. Select the replacement disk from the drop-down menu and click the Replace Disk button. If the disk is being added to a ZFS pool, it will start to resilver. You can use the zpool status command in Shell to monitor the status of the resilvering. 4. If the replaced disk continues to be listed after resilvering is complete, use the Detach button to remove the disk from the list. In the example shown in Figure 6.3n, failed disk ada0 is being replaced by disk ada3. Figure 6.3n: Replacing a Failed Disk
6.4
ZFS Scrubs
Storage -> ZFS Scrubs allows you to schedule and manage scrubs on a ZFS volume. Performing a ZFS scrub on a regular basis helps to identify data integrity problems, detect silent data corruptions caused by transient hardware issues, and to provide early alerts to disk failures. If you have consumer-quality drives, consider a weekly scrubbing schedule. If you have datacenter-quality drives, consider a monthly scrubbing schedule. NOTE: depending upon the amount of data, a scrub can take a long time. Scrubs are I/O intensive and can negatively impact performance. They should be scheduled for evenings or weekends to minimize the impact to users. When you create a volume that is formatted with ZFS, a ZFS scrub is automatically scheduled for you. An entry of the same volume name is added to Storage -> ZFS Scrubs and a summary of this entry can be viewed in Storage -> ZFS Scrubs -> View ZFS Scrubs. Figure 6.4a displays the default settings for the volume named volume1. Table 6.4a summarizes the options in this screen. Figure 6.4a: Viewing a Volume's Default Scrub Settings
Table 6.4a: ZFS Scrub Options Setting Volume Threshold days Value Description drop-down menu select ZFS volume to scrub number of days between scrubs; the default is a multiple of 7 to integer ensure the scrub always occurs on the same day of the week
Setting Description
Value string slider or minute Minute selections slider or hour Hour selections slider or month Day of Month selections Month checkboxes Day of week checkboxes Enabled checkbox
Description optional if use the slider, scrub occurs every N minutes; if use minute selections, scrub starts at the highlighted minutes if use the slider, scrub occurs every N hours; if use hour selections, scrub occurs at the highlighted hours if use the slider, scrub occurs every N days; if use month selections, scrub occurs on the highlighted days of the selected months scrub occurs on the selected months scrub occurs on the selected days; default is Sunday to least impact users uncheck to disable the scheduled scrub without deleting it
You should review the default selections and, if necessary, modify them to meet the needs of your environment. While a delete button is provided, deleting a scrub is not recommended as it provides an early indication of disk issues that could lead to a disk failure. If you find that a scrub is too intensive for your hardware, consider disabling the scrub as a temporary measure until the hardware can be upgraded. If you do delete a scrub, you can create a new scrub task by clicking Storage -> Volumes -> ZFS Scrubs -> Add ZFS Scrub.
Sharing Configuration
Once you have a volume, create at least one share so that the storage is accessible by the other computers in your network. The type of share you create depends upon the operating system(s) running in your network, your security requirements, and expectations for network transfer speeds. The following types of shares and services are available: Apple (AFP) Shares: the Apple File Protocol (AFP) type of share is the best choice if all of your computers run Mac OS X. Unix (NFS) Shares: the Network File System (NFS) type of share is accessible by Mac OS X, Linux, BSD, and the professional/enterprise versions (not the home editions) of Windows. It is a good choice if there are many different operating systems in your network. Depending upon the operating system, it may require the installation or configuration of client software on the desktop. Windows (CIFS) Shares: the Common Internet File System (CIFS) type of share is accessible by Windows, Mac OS X, Linux, and BSD computers, but it is slower than an NFS share due to the singlethreaded design of Samba. It provides more configuration options than NFS and is a good choice on a network containing only Windows systems. However, it is a poor choice if the CPU on the FreeNAS system is limited; if your CPU is maxed out, you need to upgrade the CPU or consider another type of share. If you are looking for a solution that allows fast access from any operating system, consider FreeNAS 8.2 Users Guide Page 115 of 235
configuring the FTP service instead of a share and use a cross-platform FTP and file manager client application such as Filezilla. Secure FTP can be configured if the data needs to be encrypted. If data security is a concern and your network's users are familiar with SSH command line utilities or WinSCP, consider configuring the SSH service instead of a share. It will be slower than unencrypted FTP due to the overhead of encryption, but the data passing through the network will be encrypted. NOTE: while the GUI will let you do it, it is a bad idea to share the same volume using multiple types of access methods. Different types of shares and services use different file locking methods. For example, if the same volume is configured to use both NFS and FTP, NFS will lock a file for editing by an NFS user, but a FTP user can simultaneously edit or delete that file. This will result in lost edits and confused users. Another example: if a volume is configured for both AFP and CIFS, Windows users may be confused by the extra filenames used by Mac files and delete the ones they don't understand; this will corrupt the files on the AFP share. In other words, pick the one type of share or service that makes the most sense for the types of clients that will access that volume, and configure that volume for that one type of share or service. If you need to support multiple types of shares, divide the volume into datasets and use one dataset per share. This section will demonstrate how to create AFP, NFS, and CIFS shares. FTP and SSH configurations are described in section 8 Services Configuration.
7.1
FreeNAS uses the Netatalk AFP server to share data with Apple systems. Configuring AFP shares is a multi-step process that requires you to create or import users and groups, set volume/dataset permissions, create the AFP share(s), configure the AFP service, then enable the AFP service in Services -> Control Services. This section describes the configuration screen for creating the AFP share. It then provides configuration examples creating a guest share, configuring Time Machine to backup to a dataset on the FreeNAS system, and for connecting to the share from a Mac OS X client.
7.1.1
If you click Sharing -> Apple (AFP) Shares Add Apple (AFP) Share, you will see the screen shown in Figure 7.1a. Some settings are only available in Advanced Mode. To see these settings, either click the Advanced Mode button or configure the system to always display this mode by default by checking the box Show advanced fields by default in System -> Settings -> Advanced. Table 7.1a summarizes the available options when creating an AFP share. Note that some settings are only available in Advanced Mode. Refer to Chapter 3. Setting up Netatalk for a more detailed explanation of the available options. Once you press the OK button when creating the AFP share, a pop-up menu will ask "Would you like to enable this service?" Click Yes and Services -> Control Services will open and indicate whether or not the AFP service successfully started.
Table 7.1a: AFP Share Configuration Options Setting Description volume name that will appear in the Mac computer's connect to Name string server dialogue; limited to 27 characters and can not contain a period Share Comment string optional Path browse button browse to the volume/dataset to share Share password string recommended; maximum of 8 characters Share Character only available in Advanced Mode; examples include UTF8 and ISO string Set 8859-15 comma delimited list of allowed users and/or groups where Allow List string groupname begins with a @ comma delimited list of denied users and/or groups where Deny List string groupname begins with a @ comma delimited list of users and/or groups who only have read Read-only Access string access where groupname begins with a @ Read-write comma delimited list of users and/or groups who have read and write string Access access where groupname begins with a @ Disk Discovery checkbox enable if there is no DNS record for the FreeNAS system FreeNAS 8.2 Users Guide Page 117 of 235 Value
Description choices are Default or Time Machine (Apple's backup utility) specify the path to store the CNID databases used by AFP (default is the root of the volume); the path must be writable only available in Advanced Mode; if checked, AFP uses the ID information stored in AppleDouble header files to reduce database load; do not set this option if the volume is modified by non-AFP clients (e.g. NFS or CIFS) if checked, AFP automatically converts Macintosh line breaks into Unix ones; may break some older programs if checked, forces 8.3 filename restrictions imposed by older versions of Windows; it is not recommended for volumes mainly used by Macs as it breaks some some applications (e.g. OfficeX) should only be unchecked when the network contains no Mac clients only available in Advanced Mode; enable when the device number is not constant across a reboot only available in Advanced Mode; if enabled, AFP will not advertise createfileid, resolveid, and deleteid calls only available in Advanced Mode; if this box is checked, AFP disables :hex translations for anything except dot files; this option makes the / character illegal only available in Advanced Mode; if checked, provides compatibility with Apple II clients only available in Advanced Mode; if checked, AFP won't stat the volume path when enumerating the volumes list; useful for automounting or volumes created by a preexec script only available in Advanced Mode; enables Unix privileges supported by OSX 10.5 and higher; do not enable if the network contains Mac OS X 10.4 clients or lower as they do not support these only works with Unix ACLs; new files created on the share are set with the selected permissions only works with Unix ACLs; new directories created on the share are set with the selected permissions
Cache CNID
checkbox
Translate CR/LF checkbox Windows File Names Enable .AppleDouble Zero Device Numbers Disable File ID Disable :hex Names ProDOS No Stat AFP3 UNIX Privs checkbox checkbox checkbox checkbox checkbox checkbox checkbox
checkbox
7.1.2
AFP supports guest logins, meaning that all of your Mac OS X users can access the AFP share without requiring their user accounts to first be created on or imported into the the FreeNAS system. In this configuration example, the AFP share has been configured for guest access as follows: FreeNAS 8.2 Users Guide Page 118 of 235
1. A ZFS volume named /mnt/data has its permissions set to the built-in nobody user account and nobody group. 2. An AFP share has been created with the following attributes: Name: freenas (this is the name that will appear to Mac OS X clients) Path: /mnt/data Share Password: the password that will be used to access the share has been input and confirmed Allow List: set to nobody Read-write Access: set to nobody Disk Discovery: checkbox has been checked Server Name: freenas Guest Access: checkbox is checked nobody is selected in the Guest account drop-down menu
Once the AFP service has been started in Services -> Control Services, Mac OS X users can connect to the AFP share by clicking Go -> Connect to Server. In the example shown in Figure 7.1b, the user has input afp:// followed by the IP address of the FreeNAS system. Figure 7.1b: Connect to Server Dialogue
Click the Connect button and a login box, seen in Figure 7.1c, will appear. Since a password has been configured for this AFP share, the user must input the share password (i.e. not their own password). FreeNAS 8.2 Users Guide Page 119 of 235
Once connected, Finder will automatically open. The name of the AFP share will be displayed in the SHARED section in the left frame and the contents of the share will be displayed in the right frame. In the example shown in Figure 7.1d, /mnt/data has one folder named images. The user can now copy files to and from the share. To disconnect from the volume, click the eject button in the Shared sidebar.
Figure 7.1d: Viewing the Contents of the Share From a Mac System
7.1.3
Mac OS X includes the Time Machine application which can be used to schedule automatic backups. In this configuration example, Time Machine will be configured to backup to an AFP share on a FreeNAS system. To configure the AFP share on the FreeNAS system: 1. A ZFS dataset named /mnt/data/backup_user1 with a quota of 60G was created in Storage -> Volumes -> Create ZFS Dataset. 2. A user account was created as follows: Username: user1 Home Directory: /mnt/data/backup_user1 the Full Name, E-mail, and Password fields were set where the Username and Password match the values for the user on the Mac OS X system Path: /mnt/data/backup_user1 Allow List: set to user1 Read-write Access: set to user1 Disk Discovery: checkbox has been checked
3. An AFP share with a Name of backup_user1 has been created with the following attributes:
Disk Discovery mode: set to Time Machine Server Name: freenas Guest Access: checkbox is unchecked
5. The AFP service has been started in Services -> Control Services. To configure Time Machine on the Mac OS X client, go to System Preferences -> Time Machine which will open the screen shown in Figure 7.1e. Click ON and a pop-up menu should show the FreeNAS system as a backup option. In our example, it is listed as backup_user1 on "freenas". Highlight the entry representing the FreeNAS system and click the Use Backup Disk button. A connection bar will open and will prompt for the user account's password--in this example, the password for the user1 account. Figure 7.1e: Configuring Time Machine on Mac OS X Lion
Time Machine will create a full backup after waiting two minutes. It will then create a one hour incremental backup for the next 24 hours, and then one backup each day, each week and each month. Since the oldest backups are deleted when the ZFS dataset becomes full, make sure that the quota size you set is sufficient to hold the backups. Note that a default installation of Mac OS X is ~21GB in size.
If you receive a "Time Machine could not complete the backup. The backup disk image could not be created (error 45)" error when backing up to the FreeNAS system, you will need to create a sparsebundle image using these instructions.
7.2
FreeNAS supports the Network File System (NFS) for sharing volumes over a network. Once the NFS share is configured, clients use the mount command to mount the share. Once mounted, the share appears as just another directory on the client system. Some Linux distros require the installation of additional software in order to mount an NFS share. On Windows systems, enable Services for NFS in the Ultimate or Enterprise editions or install an NFS client application. NOTE: for performance reasons, iSCSI is preferred to NFS shares when FreeNAS is installed on ESXi. If you are considering creating NFS shares on ESXi, read through the performance analysis at Running ZFS over NFS as a VMware Store. Configuring NFS is a multi-step process that requires you to create NFS share(s), configure NFS in Services -> NFS, then start NFS in Services -> Control Panel. It does not require you to create users or groups as NFS uses IP addresses to determine which systems are allowed to access the NFS share. This section demonstrates how to create an NFS share, provides a configuration example, demonstrates how to connect to the share from various operating systems, and provides some troubleshooting tips. 7.2.1 Creating NFS Shares
To create an NFS share, click Sharing -> Unix (NFS) Shares -> Add Unix (NFS) Share, shown in Figure 7.2a. Figure 7.2a: Creating an NFS Share
Once you press the OK button when creating the NFS share, a pop-up menu will ask "Would you like to enable this service?" Click Yes and Services -> Control Services will open and indicate whether or not the NFS service successfully started. Table 7.2a summarizes the options in this screen. Table 7.2a: NFS Share Options Setting Comment Path Value string browse button Description optional select volume/dataset/directory to share; this will be the name of the share comma delimited list of allowed IP addresses and/or network addresses in the form 1.2.3.0/24 where the number after the slash is a CIDR mask; if you need to input network addresses with different CIDR masks, create multiple shares pointing to the same volume/dataset, one for each mask allows the client to mount at any point within the volume or dataset; note that each dataset is considered to be its own filesystem and that NFS is not able to cross filesystem boundaries prohibits writing to the share inhibits some syslog diagnostics which can be useful to avoid some annoying error messages; see exports(5) for examples if a user is selected, the root user is limited to that user's permissions if a group is selected, the root user will also be limited to that group's permissions the specified user's permissions are used by all clients the specified group's permission are used by all clients
Maproot User drop-down menu Maproot Group drop-down menu Mapall User drop-down menu Mapall Group drop-down menu
NOTE: the Maproot and Mapall options are exclusive, meaning you can only use one or the other--the GUI will not let you use both. The Mapall options supersede the Maproot options. If you only wish to restrict the root user's permissions, set the Maproot option. If you wish to restrict the permissions of all users, set the Mapall option. 7.2.2 Sample NFS Share Configuration
By default the Mapall options shown in Figure 7.2a show as N/A. This means that when a user connects to the NFS share, they connect with the permissions associated with their user account. This is a security risk if a user is able to connect as root as they will have root access to the share. A better scenario is to do the following: 1. Specify the built-in nobody account to be used for NFS access. 2. In the permissions of the volume/dataset that is being shared, change the owner and group to nobody and set the permissions according to your specifications. FreeNAS 8.2 Users Guide Page 124 of 235
3. Select nobody in the Mapall User and Mapall Group drop-down menus for the share in Sharing -> Unix (NFS) Shares. With this configuration, it does not matter which user account connects to the NFS share, as it will be mapped to the nobody user account and will only have the permissions that you specified on the volume/dataset. For example, even if the root user is able to connect, it will not gain root access to the share. 7.2.3 Connecting to the NFS Share
In the following examples, an NFS share on a FreeNAS system with the IP address of 192.168.2.2 has been configured as follows: 1. A ZFS volume named /mnt/data has its permissions set to the nobody user account and the nobody group. 2. A NFS share has been created with the following attributes:
7.2.3.1
Path: /mnt/data Authorized Network: 192.168.2.0/24 MapAll User and MapAll Group are both set to nobody the All Directories checkbox has been checked
To make this share accessible on a BSD or a Linux system, run the following command as the superuser (or with sudo) from the client system (repeat for each client that needs access to the NFS share):
mount -t nfs 192.168.2.2:/mnt/data /mnt
The mount command uses the following options: -t nfs: specifies the type of share. 192.168.2.2: replace with the IP address of the FreeNAS system /mnt/data: the name of the NFS share /mnt: a mount point on the client system. This must be an existing, empty directory. The data in the NFS share will be made available to the client in this directory. The mount command should return the superuser to the command prompt without any error messages, indicating that the share was successfully mounted. Once mounted, this configuration allows users on the client system to copy files to and from /mnt (the mount point) and all files will be owned by nobody:nobody. Any changes to /mnt will be saved to the FreeNAS system's /mnt/data volume. Should you wish to make any changes to the NFS share's settings or wish to make the share inaccessible, first unmount the share on the client as the superuser:
umount /mnt
7.2.3.2
Enterprise versions of Windows systems can connect to NFS shares using Services for NFS. Connecting to NFS shares is often faster than connecting to CIFS shares due to the single-threaded limitation of Samba. Instructions for connecting from an Enterprise version of Windows 7 can be found at Mount Linux NFS Share on Windows 7. NOTE: Services for NFS is only available in the Ultimate or Enterprise editions of Windows. If your Windows client is running a Home Edition of Windows 7, Nekodrive provides an open source graphical NFS client. To use this client, you will need to install the following on the Windows system: 7zip to extract the Nekodrive download files NFSClient and NFSLibrary from the Nekodrive download page; once downloaded, extract these files using 7zip .NET Framework 4.0 Once everything is installed, run the NFSClient executable to start the GUI client. In the example shown in Figure 7.2b, the user has connected to the example /mnt/data share of the FreeNAS system at 192.168.2.2. Figure 7.2b: Using the Nekodrive NFSClient from Windows 7 Home Edition
7.2.3.3
To mount the NFS volume from a Mac OS X client, click on Go -> Connect to Server. In the Server Address field, input nfs:// followed by the IP address of the FreeNAS system and the name of the volume/dataset being shared by NFS. The example shown in Figure 7.2c continues with our example of 192.168.2.2:/mnt/data. Figure 7.2c: Mounting the NFS Share from Mac OS X
Once connected, Finder will automatically open. The IP address of the FreeNAS system will be displayed in the SHARED section in the left frame and the contents of the share will be displayed in the right frame. In the example shown in Figure 7.2d, /mnt/data has one folder named images. The user can now copy files to and from the share.
7.2.4
Troubleshooting
Some NFS clients do not support the NLM (Network Lock Manager) protocol used by NFS. You will know that this is the case if the client receives an error that all or part of the file may be locked when a file transfer is attempted. To resolve this error, add the option -o nolock when running the mount command on the client in order to allow write access to the NFS share. If you receive an error about a "time out giving up" when trying to mount the share from a Linux system, make sure that the portmapper service is running on the Linux client and start it if it is not. If portmapper is running and you still receive timeouts, force it to use TCP by including -o tcp in your mount command. If you receive an error "RPC: Program not registered", upgrade to the latest version of FreeNAS and restart the NFS service after the upgrade in order to clear the NFS cache.
7.3
FreeNAS uses Samba to share volumes using Microsoft's CIFS protocol. CIFS is built into the Windows and Mac OS X operating systems and most Linux and BSD systems pre-install the Samba FreeNAS 8.2 Users Guide Page 128 of 235
client which provides support for CIFS. If your distro did not, install the Samba client using your distro's software repository. Configuring CIFS shares is a multi-step process that requires you to set permissions, create CIFS share(s), configure the CIFS service in Services -> CIFS, then enable the CIFS service in Services -> Control Services. If your Windows network has a Windows server running Active Directory, you will also need to configure the Active Directory service in Services -> Active Directory. Depending upon your authentication requirements, you may also need to create or import users and groups. This section will demonstrate some common configuration scenarios: If you would like an overview of the configurable parameters, see section 7.3.1 Creating CIFS Shares. If you would like an example of how to configure access that does not require authentication, see section 7.3.2 Configuring Anonymous Access. If you would like each user to authenticate before accessing the share, see section 7.3.3 Configuring Local User Access. If you would like to use Shadow Copies, see section 7.3.4 Configuring Shadow Copies. If you are having problems accessing your CIFS share, see section 8.4.1 Troubleshooting Tips.
7.3.1
Figure 7.3a shows the configuration screen that appears when you click Sharing -> Windows (CIFS Shares) -> Add Windows (CIFS) Share. Some settings are only available in Advanced Mode. To see these settings, either click the Advanced Mode button or configure the system to always display this mode by checking the box Show advanced fields by default in System -> Settings -> Advanced. Table 7.3a summarizes the options when creating a CIFS share. smb.conf(5) provides more details for each configurable option. Once you press the OK button when creating the CIFS share, a pop-up menu will ask "Would you like to enable this service?" Click Yes and Services -> Control Services will open and indicate whether or not the CIFS service successfully started.
Table 7.3a: Options for a CIFS Share Setting Name Comment Path Export Read Only Browsable to Network Clients Inherit Owner Value string string browse button checkbox checkbox checkbox Description mandatory; name of share optional description select volume/dataset/directory to share prohibits write access to the share enables Windows clients to browse the shared directory using Windows Explorer if checked, ownership for new files and directories is inherited from parent directory rather than from the user if checked, permissions on new files and directories are inherited from parent directory; this can be useful on large systems with many users as it allows a single homes share to be used flexibly by each user; do not check if Type of ACL is set to Windows in the Volume's permissions deleted files are moved to a recycle directory instead of being deleted if enabled, will display filenames that begin with a dot (Unix hidden files) Page 130 of 235
checkbox
checkbox
Value checkbox
string
string
Description if checked, no password is required to connect to the share and all users share the permissions of the guest user defined in Services -> CIFS requires "Allow guest access" to also be checked; forces guest access for all connections only available in Advanced Mode; comma, space, or tab delimited list of allowed hostnames or IP addresses only available in Advanced Mode; comma, space, or tab delimited list of denied hostnames or IP addresses; allowed hosts take precedence so can use ALL in this field and specify allowed hosts in Hosts Allow only available in Advanced Mode; add additional [share] smb.conf parameters not covered by other option fields
If you wish some files on a shared volume to be hidden and inaccessible to users, put a veto files= line in the Auxiliary Parameters field. The syntax for this line and some examples can be found here. 7.3.2 Configuring Anonymous Access
To share a volume without requiring users to input a password, configure anonymous CIFS sharing. This type of share can be configured as follows: 1. Create a guest user account to be used for anonymous access in Account -> Users -> Add User with the following attributes: Username: guest Home Directory: browse to the volume to be shared check the Disable logins box
2. Associate the guest account with the volume in Storage -> Volumes. Expand the volume's name then click Change Permissions. Select guest as the Owner(user) and Owner(group) and check that the permissions that are appropriate for the share. If non-Windows systems will be accessing the CIFS share, leave the type of permissions as Unix. Only change the type of permissions to Windows if the share is only accessed by Windows systems. 3. Create a CIFS share in Sharing -> Windows (CIFS) Shares -> Add Windows (CIFS) Share with the following attributes: Name: freenas Path: browse to the volume to be shared check the boxes Allow Guest Access and Only Allow Guest Access Hosts Allow: add the addresses which are allowed to connect to the share; acceptable formats are the network or subnet address with CIDR mask (e.g. 192.168.2.0/24 or 192.168.2.32/27) or specific host IP addresses, one address per line Page 131 of 235
4. Configure the CIFS service in Services -> CIFS with the following attributes: Authentication Model: Anonymous Guest Account: guest check the boxes boxesAllow Empty Password and Enable Home Directories Home Directories: browse to the volume to be shared
5. Start the CIFS service in Services -> Control Services. Click the click the red OFF button next to CIFS. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 6. Test the share. To test the share from a Windows system, open Explorer, click on Network and you should see an icon named FREENAS. Since anonymous access has been configured, you should not be prompted for a username or password in order to see the share. An example is seen in Figure 7.3b. Figure 7.3b: Accessing the CIFS Share from a Windows Computer
If you click on the FREENAS icon, you can view the contents of the CIFS share. To prevent Windows Explorer from hanging when accessing the share, map the share as a network drive. To do this, right-click the share and select "Map network drive..." as seen in Figure 7.3c.
Choose a drive letter from the drop-down menu and click the Finish button as shown in Figure 7.3d.
7.3.3
If you would like each user to authenticate before accessing the CIFS share, configure local user access as follows: 1. If you are not using Active Directory or LDAP, create a user account for each user in Account -> Users -> Add User with the following attributes: Username and Password: matches the username and password on the client system Home Directory: browse to the volume to be shared Repeat this process to create a user account for every user that will need access to the CIFS share
2. If you are not using Active Directory or LDAP, create a group in Account -> Groups -> Add Group. Once the group is created, click its Members button and add the user accounts that you FreeNAS 8.2 Users Guide Page 134 of 235
created in step 1. 3. Give the group permission to the volume in Storage -> View Volumes. When setting the permissions: set Owner(user) to nobody set the Owner(group) to the one that created in Step 2 Mode: check the write checkbox for the Group as it is unchecked by default
4. Create a CIFS share in Sharing -> CIFS Shares -> Add CIFS Share with the following attributes: Name: input the name of the share Path: browse to the volume to be shared keep the Browsable to Network Clients box checked
NOTE: be careful about unchecking the Browsable to Network Clients box. When this box is checked (the default), other users will see the names of every share that exists using Windows Explorer, but they will receive a permissions denied error message if they try to access someone else's share. If this box is unchecked, even the owner of the share won't see it or be able to create a drive mapping for the share in Windows Explorer. However, they can still access the share from the command line. Unchecking this option provides limited security and is not a substitute for proper permissions and password control. 5. Configure the CIFS service in Services -> CIFS as follows: Authentication Model: if you are not using Active Directory or LDAP, select Local User Workgroup: if you are not using Active Directory or LDAP, set to the name being used on the Windows network; unless it has been changed, the default Windows workgroup name is WORKGROUP 6. Start the CIFS service in Services -> Control Services. Click the click the red OFF button next to CIFS. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 7. Test the share. To test the share from a Windows system, open Explorer, and click on Network. For this configuration example, a system named FREENAS should appear with a share named backups. If you click on backups, a Windows Security pop-up screen should prompt for the user's username and password. Once authenticated the user can copy data to and from the CIFS share. NOTE: since the share is group writable, any authenticated user can change the data in the share. If you wish to setup shares where a group of users have access to some folders but only individuals have access to other folders (where all these folders reside on the same volume), create these directories and set their permissions at using Shell. Instructions for doing so can be found at the forum post Set Permission to allow users to share a common folder & have private personal folder.
7.3.4
Shadow Copies, also known as the Volume Shadow Copy Service (VSS) or Previous Versions, is a Microsoft service that allows for the automatic backup of files. Shadow copies allow you to easily restore previous versions of files from within Windows Explorer. Shadow Copy support is built into Vista and Windows 7. Windows XP or 2000 users need to download the Shadow Copy client. When you create a periodic snapshot task on a ZFS volume that is configured as a CIFS share in FreeNAS, it is automatically configured to support shadow copies.
7.3.4.1 Prerequisites
Before using shadow copies with FreeNAS, be aware of the following caveats: if the Windows system is not fully patched to the latest service pack, Shadow Copies may not work. If you are unable to see any previous versions of files to restore, use Windows Update to make sure that the system is fully up-to-date. at this time, shadow copy support only works for ZFS pools or datasets. This means that the CIFS share must be configured on a volume or dataset, not on a directory. Directory support will be added in a future version of FreeNAS. at this time, there must be a one-to-one mapping between the periodic snapshot task and the CIFS share. In practical terms, this means that you can either share a ZFS volume to be shared by all users, or you can create a dataset plus an associated CIFS share for each user. Since directories can not be shadow copied at this time, if you configure "Enable home directories" on the CIFS service, any data stored in the user's home directory will not be shadow copied. shadow copies will not work with a manual snapshot, you must create a periodic snapshot task for the pool or dataset being shared by CIFS. At this time, if multiple snapshot tasks are created for the same pool/dataset being shared by CIFS, shadow copies will only work on the last executed task at the time the CIFS service started. A future version of FreeNAS will address this limitation. the periodic snapshot task should be created and at least one snapshot should exist before creating the CIFS share. If you created the CIFS share first, restart the CIFS service in Services -> Control Services. Windows ACLs and appropriate permissions must be configured on the volume/dataset being shared by CIFS. users can not delete shadow copies on the Windows system due to the way Samba works. Instead, the administrator can remove snapshots from the FreeNAS administrative GUI. The only way to disable shadow copies completely is to remove the periodic snapshot task and delete all snapshots associated with the CIFS share.
7.3.4.2 Configuration Example
In this example, a Windows 7 computer has two users: user1 and user2. To configure FreeNAS to provide shadow copy support: 1. For the ZFS volume named /mnt/data, create two ZFS datasets in Storage -> Volumes -> FreeNAS 8.2 Users Guide Page 136 of 235
/mnt/data -> Create ZFS Dataset. The first dataset is named /mnt/data/user1 and the second dataset is named /mnt/data/user2. 2. If you are not using Active Directory or LDAP, create two users, user1 and user2 in Account -> Users -> Add User. Each user has the following attributes: Username and Password: matches that user's username and password on the Windows system Home Directory: browse to the dataset created for that user
3. Set the permissions on /mnt/data/user1 so that the Owner(user) and Owner(group) is user1. Set the permissions on /mnt/data/user2 so that the Owner(user) and Owner(group) is user2. For each dataset's permissions, enable Windows ACLs and tighten the Mode so that Other can not read or execute the information on the dataset. 4. Create two periodic snapshot tasks in Storage -> Periodic Snapshot Tasks -> Add Periodic Snapshot, one for each dataset. Before continuing to the next step, confirm that at least one snapshot for each dataset is displayed in the ZFS Snapshots tab. When creating your snapshots, keep in mind how often your users need to access modified files and during which days and time of day they are likely to make changes. 5. Create two CIFS shares in Sharing -> Windows (CIFS) Shares -> Add Windows (CIFS) Share. The first CIFS share was named user1 and has a Path of /mnt/data/user1; the second CIFS share was named user2 and has a Path of /mnt/data/user2. When creating the first share, click the No button when the pop-up button asks if the CIFS service should be started. When the last share is created, click the Yes button when the pop-up button prompts to start the CIFS service. Verify that the CIFS service is set to ON in Services -> Control Services. 6. From a Windows system, login as user1 and open Windows Explorer -> Network -> FREENAS. Two shares should appear, named user1 and user2. Due to the permissions on the datasets, user1 should receive an error if they click on the user2 share. Due to the permissions on the datasets, user1 should be able to create, add, and delete files and folders from the user1 share. Figure 7.3e provides an example of using shadow copies while logged in as user1. In this example, the user right-clicked modified file and selected "Restore previous versions" from the menu. This particular file has three versions: the current version, plus two previous versions stored on the FreeNAS system. The user can choose to open one of the previous versions, copy a previous version to the current folder, or restore one of the previous versions, which will overwrite the existing file on the Windows system.
Services Configuration
Active Directory AFP CIFS Dynamic DNS FTP
The Services section of the GUI allows you to configure, start, and stop the various services that ship with the FreeNAS system. FreeNAS supports the following services:
iSCSI LDAP NFS Plugins Rsync S.M.A.R.T. SNMP SSH TFTP UPS
This section describes the configuration options for each of these services, as well as how to start a FreeNAS service.
8.1
Control Services
Services -> Control Services, shown in Figure 8.1a, allows you to quickly determine which services are currently running, to start and stop services, and to configure services. By default, all services are off until you start them. Figure 8.1a: Control Services
In order to provide a separation between the services that were installed with FreeNAS, and are considered to be core to the NAS, and those third-party services which were installed into the Plugins Jail, this screen is divided into two tabs: Core: lists the services that are installed with FreeNAS. Plugins: lists the services which were installed using Plugins. To enable/disable a service, click its on/off icon. A service is stopped if its icon is a red OFF. A service is running if its icon is a blue ON. To start or stop a service, click its ON/OFF icon. To configure a core service, click the wrench icon associated with the service or click the name of the service in the Services section of the tree menu. The configuration options for each service are described in the rest of this section. If a service does not start, go to System -> Settings -> Advanced and check the box Show console messages in the footer. Console messages will now show at the bottom of your browser. If you click the console messages area, it will pop-up as a window, allowing you to scroll through the output and to copy messages. Watch these messages for errors when you stop and start the problematic service. If you would like to read the system logs to get more information about a service failure, open Shell and type more /var/log/messages. NOTE: if you are unable to start any core services within ESXi, make sure that you only have one vcpu. If that is not the issue, create a Tunable called kern.hz with a value of 100.
8.2
Active Directory
Active Directory (AD) is a service for sharing resources in a Windows network. AD can be configured on a Windows server that is running Windows Server 2000 or higher or on a Unix-like operating system that is running Samba version 4. Since AD provides authentication and authorization services for the users in a network, you do not have to recreate these user accounts on the FreeNAS system. Instead, configure the Active Directory service so that it can import the account information and imported users can be authorized to access the CIFS shares on the FreeNAS system. NOTE: many changes and improvements have been made to Active Directory support within FreeNAS. If you are not running FreeNAS 8.2-RELEASE, it is strongly recommended that you upgrade before attempting Active Directory integration. Before configuring the Active Directory service , ensure name resolution is properly configured by pinging the domain name of the Active Directory domain controller from Shell on the FreeNAS system. If the ping fails, check the DNS server and default gateway settings in Network -> Global Configuration on the FreeNAS system. Next, add a DNS record for the FreeNAS system on the Windows server and verify that you can ping the hostname of the FreeNAS system from the domain controller. Active Directory relies on Kerberos, which is a time sensitive protocol. This means that the time on both the FreeNAS system and the Active Directory Domain Controller can not be out of sync by more than a few minutes. The best way to ensure that the same time is running on both systems is to configure both systems to: FreeNAS 8.2 Users Guide Page 140 of 235
use the same NTP server (set in System -> NTP Servers on the FreeNAS system) have the same timezone be set to either localtime or universal time at the BIOS level Figure 8.2a shows the Active Directory Configuration screen and Table 8.2a describes the configurable options. Figure 8.2a: Configuring Active Directory
Table 8.2a: Active Directory Configuration Options Setting Domain Controller Name Domain Name NetBIOS Name Workgroup Name Value string string string string Description IP address or hostname of Windows PDC name of Active Directory domain (e.g. example.com) or child domain (e.g. sales.example.com) hostname of FreeNAS system name of Windows server's workgroup (for older Microsoft clients) should only be enabled if network has active domain/forest trusts and you need to manage files on multiple domains; use with caution as it will generate more winbindd traffic, slowing down the ability to filter through user/group information name of the Active Directory Administrator account
Administrator Name
string
NOTE: Active Directory places restrictions on which characters are allowed in Domain and NetBIOS names. If you are having problems connecting to the realm, verify that your settings do not include any disallowed characters. Also, the Administrator Password cannot contain the $ character. If a $ exists in the domain administrator's password, kinit will report a "Password Incorrect" error and ldap_bind will report an "Invalid credentials (49)" error. Once you have configured the Active Directory service, start it in Services -> Control Services. It may take a few minutes for the Active Directory information to be populated to the FreeNAS system. Once populated, the AD users and groups will be available in the drop-down menus of the permissions screen of a volume/dataset. For performance reasons, every available user may not show in the listing. However, it will autocomplete all applicable users if you start typing in a username. You can verify which Active Directory users and groups have been imported to the FreeNAS system by using these commands within the FreeNAS Shell:
wbinfo -u wbinfo -g
In addition, wbinfo -t will test the connection and, if successful, will give a message similar to:
checking the trust secret for domain YOURDOMAIN via RPC calls succeeded
If no users or groups are listed in the output of those commands, these commands will provide more troubleshooting information:
getent passwd getent group
8.2.1
Troubleshooting Tips
If you are running AD in a 2003/2008 mixed domain, see this forum post for instructions on how to prevent the secure channel key from becoming corrupted. The LDAP code uses DNS to determine the location of the domain controllers and global catalog servers in the network. Use the host -t srv _ldap._tcp.domainname.com command to determine the network's SRV records and, if necessary, change the weight and/or priority of the SRV record to reflect the fastest server. More information about SRV records can be found in the Technet article How DNS Support for Active Directory Works. The realm that is used depends upon the priority in the SRV DNS record, meaning that DNS can FreeNAS 8.2 Users Guide Page 142 of 235
override your Active Directory settings. If you are unable to connect to the correct realm, check the SRV records on the DNS server. This article describes how to configure KDC discovery over DNS and provides some examples of records with differing priorities. If the cache becomes out of sync due to an AD server being taken off and back online, resync the cache using System -> Settings -> Advanced -> Rebuild LDAP/AD Cache.
8.3
AFP
The Apple Filing Protocol (AFP) is a network protocol that offers file services for Mac computers. Before configuring this service, you should first create your AFP Shares in Sharing -> Apple (AFP) Shares -> Add Apple (AFP) Share. After configuring this service, go to Services -> Control Panel to start the service. The AFP shares will not be available on the network if this service is not running. Enabling this service will open the following ports on the FreeNAS system: * TCP 548 (afpd) * TCP 4799 (cnid_metadata) * UDP 5353 and a random UDP port (avahi) Figure 8.3a shows the configuration options which are described in Table 8.3a: Figure 8.3a: AFP Configuration
Table 8.3a: AFP Configuration Options Setting Server Name Guest Access Guest Account Value string checkbox drop-down menu Description server name that will appear to Mac clients; by default it is freenas if checked, clients will not be prompted to authenticate before accessing the AFP share select account to use for guest access; the selected account must have permissions to the volume/dataset being shared maximum number of simultaneous connections
8.4
CIFS
The Common Internet File System (CIFS) is a network protocol that offers file services for (typically) Windows computers. Unix-like systems that provide a CIFS client can also connect to CIFS shares. Before configuring this service, you should first create your Windows (CIFS) Shares. After configuring this service, go to Services -> Control Services to start the service. The CIFS shares will not be available on the network if this service is not running. NOTE: after starting the CIFS service, it may take several minutes for the master browser election to occur and for the FreeNAS system to become available in Windows Explorer. Starting this service will open the following ports on the FreeNAS system: TCP 139 (smbd) TCP 445 (smbd) UDP 137 (nmbd) UDP 138 (nmbd)
Figure 8.4a shows the configuration options which are described in Table 8.4a. This configuration screen is really a front-end to smb.conf. Figure 8.4a: Configuring CIFS
Table 8.4a: CIFS Configuration Options Setting Authentication Model Value drop-down menu Description choices are Anonymous or Local User; this setting is ignored if the Active Directory or LDAP service is running Page 144 of 235
Setting NetBIOS Name Workgroup Description DOS Charset UNIX Charset Log Level
Value string string string drop-down menu drop-down menu drop-down menu checkbox
Description must be lowercase and should be same as the hostname on the FreeNAS system must match Windows workgroup name; this setting is ignored if the Active Directory or LDAP service is running optional the character set Samba uses when communicating with DOS and Windows 9x/Me clients; default is CP437 default is UTF-8 which supports all characters in all languages choices are Minimum, Normal, Full, or Debug determines whether or not the FreeNAS system participates in a browser election; should be disabled when network contains an AD or LDAP server and is not necessary if Windows Vista/7 machines are present determines whether or not the FreeNAS system advertises itself as a time server to Windows clients; should be disabled when network contains an AD or LDAP server account to be used for guest access; that account must have permission to access the shared volume/dataset overrides default file creation mask of 0666 which creates files with read and write access for everybody overrides default directory creation mask of 0777 which grants directory read, write and execute access for everybody determines whether or not the FreeNAS system supports 64k streaming read/write requests introduced with Windows 2000 and which can improve performance by 10% with Windows 2000 clients newer Windows versions support the more efficient sendfile system call which makes Samba faster enables extended attributes allows a user who has write access to a file to modify the permissions, even if not the owner of the file if checked, users can just press enter when prompted for a password; requires that the username/password be the same for the FreeNAS user account and the Windows user account smb.conf options not covered elsewhere in this screen; see the Samba Guide for additional settings if checked, a folder with the same name as the user account will be created for each user Page 145 of 235
Local Master
Time Server for Domain Guest Account File mask Directory mask
Large RW support Send files with sendfile(2) EA Support Support DOS File Attributes Allow Empty Password Auxiliary parameters Enable home directories
checkbox
Setting Value Enable home checkbox directories browsing browse Home directories button Homes auxiliary string parameters Unix Extensions Enable AIO checkbox checkbox
Description users can browse (but not write to) other users' home directories select volume/dataset where the home directories will be created options specific to the [homes] section of smb.conf allows non-Windows CIFS clients to access symbolic links and hard links, has no affect on Windows clients enables asynchronous I/O in FreeNAS versions 8.0.3-RELEASE and higher; enabling this reduces CIFS speed in some networks default is 4096 bytes; Samba will read asynchronously when size of request is bigger than this value default is 4096 bytes; Samba will write asynchronously when size of request is bigger than this value enable if Mac clients will be connecting to the CIFS share
Minimum AIO read integer size Minimum AIO write integer size Zeroconf share checkbox discovery
Beginning with FreeNAS versions 8.0.3-RELEASE, changes to CIFS settings and CIFS shares take effect immediately. For previous versions, changes will not take effect until you manually stop and start the CIFS service. NOTE: do not set the directory name cache size as an auxiliary parameter. Due to differences in how Linux and BSD handle file descriptors, directory name caching is disabled on BSD systems in order to improve performance. 8.4.1 Troubleshooting Tips
Compared to other networking protocols, CIFS is not fast. Enabling the following checkboxes may help to increase network throughput: Large RW support, Send files with sendfile(2), and Enable AIO. Adjusting the Minimum AIO read and write size settings to better fit your networking infrastructure may improve or degrade performance. Samba's "write cache" parameter has been reported to improve write performance in some configurations and can be added to the Auxiliary Parameters field. Use an integer value which is a multiple of _SC_PAGESIZE (typically 4096) to avoid memory fragmentation. This will increase Samba's memory requirements and should not be used on systems with limited RAM. If you wish to increase network performance, read the Samba section on socket options. It indicates which options are available and recommends that you experiment to see which are supported by your clients and improve your network's performance. Windows automatically caches file sharing information. If you make changes to a CIFS share or to the permissions of a volume/dataset being shared by CIFS and are no longer able to access the share, try logging out and back into the Windows system.
Where possible, avoid using a mix of case in filenames as this may cause confusion for Windows users. Representing and resolving filenames with Samba explains this in more detail. The Common Errors section of the Samba documentation contains additional troubleshooting tips.
8.5
Dynamic DNS
Dynamic DNS (DDNS) is useful if your FreeNAS system is connected to an ISP that periodically changes the IP address of the system. With dynamic DNS, the system can automatically associate its current IP address with a domain name, allowing you to access the FreeNAS system even if the IP address changes. DDNS requires you to register with a DDNS service such as DynDNS. Figure 8.5a shows the DDNS configuration screen and Table 8.5a summarizes the configuration options. The values you need to input will be given to you by the DDNS provider. After configuring DDNS, don't forget to start the DDNS service in Services -> Control Services. Figure 8.5a: Configuring DDNS
Table 8.5a: DDNS Configuration Options Setting Provider Domain name Value Description several providers are supported; if your provider is not listed, leave this drop-down field blank and specify the custom provider in the Auxiliary parameters menu field fully qualified domain name (e.g. yourname.dyndns.org); if you are string using freedns.afraid.org, see this forum post Page 147 of 235
Setting Username Password Update period Forced update period Auxiliary parameters
integer
string
Description username to logon to the provider and update the record password used to logon to the provider and update the record in seconds; be careful with this setting as the provider may block you for abuse if this setting occurs more often than the IP changes in seconds so be careful with this setting as the provider may block you for abuse; issues a DDNS update request even when the address has not changed, so that the service provider knows that the account is still active additional parameters passed to the provider during record update; an example of specifying a custom provider is dyndns_system [email protected]
8.6
FTP
FreeNAS uses the proftpd FTP server to provide FTP services. Once the FTP service is configured and started, clients can browse and download data using a web browser or FTP client software. The advantage of FTP is that easy-to-use cross-platform utilities are available to manage uploads to and downloads from the FreeNAS system. The disadvantage of FTP is that it is considered to be an insecure protocol, meaning that it should not be used to transfer sensitive files. If you are concerned about sensitive data, see section 8.6.3 Encrypting FTP. This section provides an overview of the FTP configuration options. It then provides examples for configuring anonymous FTP, specified user access within a chroot environment, encrypting FTP connections, and troubleshooting tips. Figure 8.6a shows the configuration screen for Services -> FTP. Some settings are only available in Advanced Mode. To see these settings, either click the Advanced Mode button or configure the system to always display this mode by checking the box Show advanced fields by default in System -> Settings -> Advanced. Table 8.6a summarizes the available options when configuring the FTP server.
Table 8.6a: FTP Configuration Options Setting Port Clients Connections Login Attempts Timeout Allow Root Login Allow Anonymous Login Path Allow Local User Login Banner File Permission Directory Permission Value integer integer Description port to use for connection requests maximum number of simultaneous clients maximum number of connections per IP address where 0 integer means unlimited maximum number of attempts before client is integer disconnected; increase this if users are prone to typos maximum client idle time in seconds before client is integer disconnected checkbox discouraged as increases security risk checkbox allows anyone to browse the data root directory of FTP server; must point to the browse button volume/dataset being shared or connections will fail checkbox required if Anonymous Login is disabled message users see when they access the FTP server, if left string empty it will show the version of proftpd checkboxes sets default permissions for newly created files checkboxes sets umask for newly created directories
Value checkbox
Allow Transfer Resumption checkbox Always Chroot Require IDENT Authentication checkbox checkbox
Require Reverse DNS for IP checkbox Masquerade address Minimum passive port Maximum passive port Local user upload bandwidth Local user download bandwidth Anonymous user upload bandwidth Anonymous user download bandwidth Enable SSL/TLS Auxiliary parameters string integer integer integer integer integer integer checkbox string
Description sets default permissions for newly created directories if transfer is interrupted, server will resume transfer at last known point forces users to stay in their home directory (always true for Anonymous Login) will result in timeouts if identd is not running on the client will result in timeouts if there isn't a DNS record for the client's hostname IP address or hostname; set if FTP clients can not connect through a NAT device to be used by clients in PASV mode, default of 0 means any port above 1023 to be used by clients in PASV mode, default of 0 means any port above 1023 in KB/s, default of 0 means unlimited in KB/s, default of 0 means unlimited in KB/s, default of 0 means unlimited in KB/s, default of 0 means unlimited enables encrypted connections; you will need to configure the certificate in System -> Settings SSL include proftpd(8) parameters not covered elsewhere in this screen
The following example demonstrates the auxiliary parameters that will prevent all users from performing the FTP DELETE command:
<Limit DELE> DenyAll </Limit>
8.6.1
Anonymous FTP
Anonymous FTP may be appropriate for a small network where the FreeNAS system is not accessible from the Internet and everyone in your internal network needs easy access to the stored data. Anonymous FTP does not require you to create a user account for every user. In addition, passwords are not required so you don't have to manage changed passwords on the FreeNAS system.
To configure anonymous FTP: 1. Give the built-in ftp user account permissions to the volume/dataset to be shared in Storage -> Volumes as follows: Owner(user): select the ftp user in the drop-down menu Owner(group): select the ftp group Mode: review that the permissions are appropriate for the share
NOTE: for FTP, the type of client does not matter when it comes to the type of ACL. This means that you always use Unix ACLs, even if Windows clients will be accessing FreeNAS via FTP. 2. Configure anonymous FTP in Services -> FTP by setting the following attributes: check the box Allow Anonymous Login Path: browse to the volume/dataset/directory to be shared
3. Start the FTP service in Control Services. Click the red OFF button next to FTP. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 4. Test the connection from a client using a utility such as Filezilla. In the example shown in Figure 8.6b, a user has input the following information into the Filezilla client: IP address of the FreeNAS server: 192.168.1.113 Username: anonymous Password: the email address of the user Figure 8.6b: Connecting Using Filezilla
The messages within the client indicate that the FTP connection is successful. The user can now navigate the contents of the root folder on the remote sitethis is the volume/dataset that was specified in the FTP service configuration. The user can also transfer files between the local site (their system) and the remote site (the FreeNAS system).
8.6.2
If you require your users to authenticate before accessing the data on the FreeNAS system, you will need to either create a user account for each user or import existing user accounts using Active Directory or LDAP. If you then create a ZFS dataset for each user, you can chroot each user so that they are limited to the contents of their own home directory. Datasets provide the added benefit of configuring a quota so that the size of the user's home directory is limited to the size of the quota. To configure this scenario: 1. Create a ZFS dataset for each user in Storage -> Volumes. Click an existing ZFS volume -> Create ZFS Dataset and set an appropriate quota for each dataset. Repeat this process to create a dataset for every user that will need access to the FTP service. 2. If you are not using AD or LDAP, create a user account for each user in Account -> Users -> Add User. For each user, browse to the dataset created for that user in the Home Directory field. Repeat this process to create a user account for every user that will need access to the FTP service, making sure to assign each user their own dataset. 3. Set the permissions for each dataset in Storage -> Volumes. Click the Change Permissions button for a dataset to assign a user account as Owner of that dataset and to set the desired permissions for that user. Repeat for each dataset. NOTE: for FTP, the type of client does not matter when it comes to the type of ACL. This means that you always use Unix ACLs, even if Windows clients will be accessing FreeNAS via FTP. 4. Configure FTP in Services -> FTP with the following attributes: Path: browse to the parent volume containing the datasets make sure the boxes for Allow Anonymous Login and Allow Root Login are unchecked check the box Allow Local User Login check the box Always Chroot
5. Start the FTP service in Control Services. Click the red OFF button next to FTP. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 6. Test the connection from a client using a utility such as Filezilla. To test this configuration in Filezilla, use the IP address of the FreeNAS system, the Username of a user that has been associated with a dataset, and the Password for that user. The messages should indicate that the authorization and the FTP connection are successful. The user can now navigate the contents of the root folder on the remote sitethis time it is not the entire volume but the dataset that was created for that user. The user should be able to transfer files between the local site (their system) and the remote site (their dataset on the FreeNAS system). 8.6.3 Encrypting FTP
During installation, an RSA certificate and key are auto-generated for you. You can view these or cut/paste your own signed certificate and key in System -> Settings -> SSL. To configure any FTP scenario to use encrypted connections: 1. Enable SSL/TLS in Services -> FTP. Check the box Enable SSL/TLS. Once you press OK, FreeNAS 8.2 Users Guide Page 152 of 235
proftpd will automatically restart and be configured to use the certificate stored in the SSL tab. 2. Specify secure FTP when accessing the FreeNAS system. For example, in Filezilla input ftps://IP_address (for an implicit connection) or ftpes://IP_address (for an explicit connection) as the Host when connecting. The first time a user connects, they should be presented with the certificate of the FreeNAS system. Click OK to accept the certificate and negotiate an encrypted connection. 8.6.4 Troubleshooting
The FTP service will not start if it can't resolve the system's hostname to an IP address using DNS. To see if the FTP service is running, open Shell and issue the command:
sockstat -4p 21
If there is nothing listening on port 21, proftpd isn't running. To see the error message that occurs when FreeNAS tries to start the FTP service, go to System -> Settings Advanced, check the box Show console messages in the footer and click Save. Next, go to Services -> Control Services and switch the FTP service off then back on in the GUI. Watch the console messages at the bottom of the browser for errors. If the error refers to DNS, either create an entry in your local DNS server with the FreeNAS system's hostname and IP address, or make an entry containing that information in /etc/hosts on the FreeNAS server.
8.7
iSCSI
iSCSI is a protocol standard for the consolidation of storage data. iSCSI allows FreeNAS to act like a storage area network (SAN) over an existing Ethernet network. Specifically, it exports disk devices over an Ethernet network that iSCSI clients (called initiators) can attach to and mount. Traditional SANs operate over fibre channel networks which require a fibre channel infrastructure such as fibre channel HBAs, fibre channel switches, and discrete cabling. iSCSI can be used over an existing Ethernet network, although dedicated networks can be built for iSCSI traffic in an effort to boost performance. iSCSI also provides an advantage in an environment that uses Windows shell programs; these programs tend to filter "Network Location" but iSCSI mounts are not filtered. FreeNAS uses istgt to provide iSCSI. Before configuring the iSCSI service, you should be familiar with the following iSCSI terminology: CHAP: an authentication method which uses a shared secret and three-way authentication to determine if a system is authorized to access the storage device and to periodically confirm that the session has not been hijacked by another system. In iSCSI, the initiator (client) performs the CHAP authentication. Mutual CHAP: a superset of CHAP in that both ends of the communication authenticate to each other. Initiator: a client which has authorized access to the storage data on the FreeNAS system. The client requires initiator software to connect to the iSCSI share. Target: a storage resource on the FreeNAS system. Extent: the storage unit to be shared. It can either be a file or a device.
LUN: stands for logical unit number and represents a logical SCSI device. An initiator negotiates with a target to establish connectivity to a LUN; the result is an iSCSI connection that emulates a connection to a SCSI hard disk. Initiators treat iSCSI LUNs the same way as they would a raw SCSI or IDE hard drive; rather than mounting remote directories, initiators format and directly manage filesystems on iSCSI LUNs. In order to configure iSCSI: 1. Decide if you will use authentication, and if so, whether it will be CHAP or mutual CHAP. If using authentication, create an authorized access. 2. Create either a device extent or a file extent to be used as storage. 3. Determine which hosts are allowed to connect using iSCSI and create an initiator. 4. Create at least one portal. 5. Review the target global configuration parameters. 6. Create a target. 7. Associate a target with an extent. 8. Start the iSCSI service in Services -> Control Services. The rest of this section describes these steps in more detail. 8.7.1 Authorized Accesses
If you will be using CHAP or mutual CHAP to provide authentication, you must create an authorized access in Services ISCSI Authorized Accesses Add Authorized Access. This screen is shown in Figure 8.7a. NOTE: CHAP does not work with GlobalSAN initiators on Mac OS X. Figure 8.7a: Adding an iSCSI Authorized Access
Table 8.7a summarizes the settings that can be configured when adding an authorized access: Table 8.7a: Authorized Access Configuration Settings Setting Value Description allows different groups to be configured with different authentication Group ID integer profiles; for instance, all users with a Group ID of 1 will inherit the authentication profile associated with Group 1 name of user account that will be created on the FreeNAS device for User string CHAP authentication with the user on the remote system; many initiators default to using the initiator name as the user Secret password to be associated with the User; the iSCSI standard requires that string Secret (Confirm) this be at least 12 characters long only input for mutual CHAP user; in most cases it will need to be the same Peer User string value as the User Initiator Secret the mutual secret password which must be different than the Secret; Initiator Secret string required if the Peer User field is set (Confirm) As authorized accesses are added, they will be listed under View Authorized Accesses. In the example shown in Figure 8.7b, three users (test1, test2, and test3) and two groups (1 and 2) have been created, with group 1 consisting of one CHAP user and group 2 consisting of one mutual CHAP user and one CHAP user. Each authorized access entry provides an Edit and a Delete button. Figure 8.7b: Viewing Authorized Accesses
8.7.2
Extents
In iSCSI, you don't share a volume; instead you export either a device extent or a file extent: Device extent: allows an unformatted disk, a zvol, or an existing HAST device to be exported via FreeNAS 8.2 Users Guide Page 155 of 235
iSCSI. The advantage of a device extent is that it is faster than a file extent. The disadvantage is that the entire volume is exported. If you only want to share a portion of a volume using iSCSI, either create a zvol on an existing ZFS volume or use a file extent. File extent: allows you to export a portion of a volume. When creating a file extent, you can specify either a non-existing file name or an existing ZFS dataset. The advantage of file extents is that you can create multiple exports per volume. The disadvantage is that they are slower than device extents.
8.7.2.1 Adding a Device Extent
To add a device extent, go to Services ISCSI Device Extents Add Device Extent. In the example shown in Figure 8.7c, the device extent is using the export zvol that was previously created from the /mnt/shared volume. Figure 8.7c: Adding an iSCSI Device Extent
Table 8.7b summarizes the settings that can be configured when creating a device extent: Table 8.7b: Device Extent Configuration Settings Setting Value Extent Name string Comment string Disk device
8.7.2.2
Description required optional select the unformatted disk, previously created zvol, or existing drop-down menu HAST device
File extents are created in Services ISCSI File Extents Add File Extent. In the example shown in Figure 8.7d, a file extent named data with a maximum size of 20 GB will be created on the ZFS FreeNAS 8.2 Users Guide Page 156 of 235
dataset /mnt/shared. Note that file extent creation will fail if you do not append the name of the file to be created to the volume/dataset name. Figure 8.7d: Adding an iSCSI File Extent
Table 8.7c summarizes the settings that can be configured when creating a file extent: Table 8.7c: File Extent Configuration Settings Setting Extent Name Path to the extent Extent size Comment Value string browse button integer string Description name of file extent; if the Extent size is not 0, it can not be an existing file within the volume/dataset either browse to an existing file and use 0 as the Extent size, or browse to the volume or dataset, click the Close button, append the Extent name to the path, and specify a value in Extent size if the size is specified as 0, the file must already exist and the actual file size will be used; otherwise specifies the size of the file to create optional
8.7.3
Initiators
The next step is to configure authorized initiators, or the systems which are allowed to connect to the iSCSI target on the FreeNAS system. To configure which systems can connect, use Services -> ISCSI -> Initiators -> Add Initiator, shown in Figure 8.7e.
NOTE: beginning with 8.2, FreeNAS contains iscontrol(8). This utility allows the FreeNAS system to act as an initiator (rather than a target) and must be run from the command line. If you create a custom configuration for iscontrol, back it up as it will not survive a reboot of the system. Table 8.7d summarizes the settings that can be configured when adding an initiator. Table 8.7d: Initiator Configuration Settings Setting Initiators Authorized network Comment Value Description use ALL keyword or a list of initiator hostnames separated by commas with string no space use ALL keyword or a network address with CIDR mask such as string 192.168.2.0/24 string optional description
In the example shown in Figure 8.7f, two groups have been created. Group 1 allows connections from any initiator on any network; Group 2 allows connections from any initiator on the 10.10.1.0/24 network. Figure 8.7f: Sample iSCSI Initiator Configuration
NOTE: if you delete an initiator, a warning will indicate if any targets or target/extent mappings depend upon the initiator. If you confirm the delete, these will be deleted as well. 8.7.4 Portals
A portal specifies the IP address and port number to be used for iSCSI connections. Services -> ISCSI -> Portals -> Add Portal will bring up the screen shown in Figure 8.7g: Figure 8.7g: Adding an iSCSI Portal
Table 8.7e summarizes the settings that can be configured when adding a portal. If you need to assign additional IP addresses to the portal, click the link Add extra Portal IP. Table 8.7e: Portal Configuration Settings Setting Comment Portal IP address Port Value string drop-down menu integer Description optional description; portals are automatically assigned a numeric group ID select the IP address associated with an interface or the wildcard address of 0.0.0.0 (any interface) TCP port used to access the iSCSI target; default is 3260
FreeNAS systems with multiple IP addresses or interfaces can use a portal to provide services on different interfaces or subnets. This can be used to configure multi-path I/O (MPIO). MPIO is more efficient than a link aggregation. If the FreeNAS system has multiple configured interfaces, portals can be also used to provide network access control. For example, assume a system with the following four interfaces. 192.168.1.1/24 192.168.2.1/24 192.168.3.1/24 192.168.4.1/24
You could create a portal containing the first two IP addresses (group ID 1) and a portal containing the remaining two IP addresses (group ID 2). You could then create a target named A with a Portal Group ID of 1 and a second target named B with a Portal Group ID of 2. In this scenario, istgt would listen on all four interfaces, but connections to target A would be limited to the first two networks and connections to target B would be limited to the last two networks. Another scenario would be to create a portal which includes every IP address except for the one used by a management interface. This would prevent iSCSI connections to the management interface. 8.7.5 Target Global Configuration
Services -> iSCSI -> Target Global Configuration, shown in Figures 8.7h, contains settings that apply to all iSCSI shares. Figure 8.7h: iSCSI Target Global Configuration Variables
Table 8.7f summarizes the settings that can be configured in the Target Global Configuration screen. The integer values in the table are used to tune network performance; most of these values are described in RFC 3720. LUC (Logical Unit Controller) is an API provided by istgt to control removable media by providing functions to list targets, load or unload a media to a unit, change media file, or reset a LUN. In order to dynamically add or remove targets without restarting the iSCSI service, which can disrupt iSCSI initiators, set the following options: check the Enable LUC box leave the Controller IP address and Control Authorized Network at their default values FreeNAS 8.2 Users Guide Page 160 of 235
change the Controller Auth Method to None NOTE: the following operations are not supported at this time: changing a target on the fly, adding LUNs, or changing the size of an existing LUN. Table 8.7f: Target Global Configuration Settings Setting Description see the Constructing iSCSI names using the iqn. format section Base Name string of RFC 3721 if you are unfamiliar with this format configures the authentication level required by the target for Discovery Auth drop-down discovery of valid devices, where None will allow anonymous Method menu discovery, CHAP and Mutual CHAP require authentication, and Auto lets the initiator decide the authentication scheme depends on Discovery Auth Method setting: required if set to drop-down Discovery Auth Group CHAP or Mutual CHAP, optional if set to Auto, and not needed menu if set to None integer sets the limit on how long an I/O can be outstanding before an I/O Timeout representing error condition is returned; values range from 0-300 with a seconds default of 30 integer how often the target sends a NOP-IN packet to keep a discovered NOPIN Interval representing session alive; values range from 0-300 with a default of 20 seconds limits the number of sessions the target portal will create/accept Max. Sessions integer from initiator portals; values range from 1-64 with a default of 16 the number of connections a single initiator can make to a single Max. Connections integer target; values range from 1-64 with a default of 8 Max. pre-send R2T integer values range from 1-255 with a default of 32 the maximum number of ready to receive packets (R2Ts) the target can have outstanding for a single iSCSI command, where larger values should yield performance increases until MaxOutstandingR2T integer MaxOutstandingR2T exceeds the size of the largest Write I/O divided by MaxBurstLength; values range from 1-255 with a default of 16 maximum amount in bytes of unsolicited data an iSCSI initiator First burst length integer may send to the target during the execution of a single SCSI command; values range from 1- 2^32 with a default of 65,536 maximum write size in bytes the target is willing to receive Max burst length integer between R2Ts; values range from 1-2^32 with a default of 262,144 Max receive data integer in bytes; values range from 1-2^32 with a default of 262,144 segment length FreeNAS 8.2 Users Guide Page 161 of 235 Value
Setting DefaultTime2Wait
Value integer
DefaultTime2Retain
integer
Description minimum time in seconds to wait before attempting a logout or an active task reassignment after an unexpected connection termination or reset; values range from 1-300 with a default of 2 maximum time in seconds after Time2Wait before which an active task reassignment is still possible after an unexpected connection termination or reset; values range from 1-300 with a default of 60 check if you need to dynamically add and remove targets; if checked, the next three fields are activated and required keep the default value of 127.0.0.1 possible values range from 1024-65535 with a default value of 3261 keep the default value of 255.0.0.0 choices are None, Auto, CHAP, or Mutual CHAP required if Controller Auth Method is set to CHAP or Mutual CHAP, optional if set to Auto, and not needed if set to None
Controller Authorized subnet mask netmask Controller Auth drop-down Method menu drop-down Controller Auth Group menu
Before modifying any integer values, refer to the iSCSI initiator's documentation. For example, the following modifications are recommended if the iSCSI initiator is running on Xenserver: 8.7.6 Max. pre-send R2T: 255 MaxOutstandingR2T: 64 First burst length: 262,144 Max burst length: 2,097,152 Targets
Next, create a Target using Services ISCSI Targets Add Target, as shown in Figure 8.7i. A target combines a portal ID, allowed initiator ID, and an authentication method. NOTE: multiple computers can not connect to the same iSCSI target as iSCSI acts like a physical disk rather than a share. If you need to support multiple clients to the same data, use CIFS or NFS instead of iSCSI or create multiple iSCSI targets (one per client). Table 8.7g summarizes the settings that can be configured when creating a Target.
Table 8.7g: Target Settings Setting Target Name Target Alias Serial Target Flags Value string string string Description required value; base name will be appended automatically if it does not start with iqn optional user-friendly name unique ID for target to allow for multiple LUNs; the default is generated from the system's MAC address choices are read-write or read-only leave empty or select number of existing portal to use select which existing initiator group has access to the target choices are None, Auto, CHAP, or Mutual CHAP None or integer representing number of existing authorized access see this post for an explanation of the math involved; values are 0255 where 0 is disabled and default is 32 Page 163 of 235
drop-down menu drop-down Portal Group ID menu drop-down Initiator Group ID menu drop-down Auth Method menu Authentication drop-down Group number menu Queue Depth integer
Setting
Value
Description should only be changed to emulate a physical disk's size or to increase the block size to allow for larger filesystems on an operating system limited by block count; default is 512
8.7.7
Target/Extents
The last step is associating an extent to a target within Services ISCSI Target/Extents Add Target/Extent. This screen is shown in Figure 8.7j. Use the drop-down menus to select the existing target and extent. Figure 8.7j: Associating iSCSI Targets/Extents
Table 8.7h summarizes the settings that can be configured when associating targets and extents: Table 8.7h: Target/Extents Configuration Settings Setting Value Target drop-down menu Extent drop-down menu Description select the pre-created target select the pre-created extent
It is recommended to always associate extents to targets in a 1:1 manner, even though the software will allow multiple extents to be associated with the same target. Once iSCSI has been configured, don't forget to start it in Services -> Control Services. Click the red OFF button next to iSCSI. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 8.7.8 Connecting to iSCSI Share
In order to access the iSCSI target, clients will need to use iSCSI initiator software. An iSCSI Initiator client is pre-installed with Windows 7. A detailed how-to for this client can be found here. A client for Windows 2000, XP, and 2003 can be found here. Mac OS X does not include an initiator. This how-to demonstrates how to use globalSAN, a free and easy-to-use Mac initiator. BSD systems provide command line initiators: iscontrol(8) comes with FreeBSD, iscsi-initiator(8) FreeNAS 8.2 Users Guide Page 164 of 235
comes with NetBSD, and iscsid(8) comes with OpenBSD. Some Linux distros provide the command line utility iscsiadm from Open-iSCSI. Google to see if a package exists for your distribution should the command not exist on your Linux system. Instructions for connecting from a VMware ESXi Server can be found at How to configure FreeNAS 8 for iSCSI and connect to ESX(i). Note that the requirements for booting vSphere 4.x off iSCSI differ between ESX and ESXi. ESX requires a hardware iSCSI adapter while ESXi requires specific iSCSI boot firmware support. The magic is on the booting host side, meaning that there is no difference to the FreeNAS configuration. See the iSCSI SAN Configuration Guide for details.
8.8
LDAP
FreeNAS includes an OpenLDAP client for accessing information from an LDAP server. An LDAP server provides directory services for finding network resources such as users and their associated permissions. Examples of LDAP servers include Microsoft Server (2000 and newer), Mac OS X Server, Novell eDirectory, and OpenLDAP running on a BSD or Linux system. If an LDAP server is running on your network, you should configure the FreeNAS LDAP service so that the network's users can authenticate to the LDAP server and thus be provided authorized access to the data stored on the FreeNAS system. Figure 8.8a shows the LDAP Configuration screen that is seen when you click Services -> LDAP. Figure 8.8a: Configuring LDAP
Table 8.8a summarizes the available configuration options. If you are new to LDAP terminology, skim through the OpenLDAP Software 2.4 Administrator's Guide. FreeNAS 8.2 Users Guide Page 165 of 235
After configuring the LDAP service, start it in Services -> Control Services. If the service will not start, refer to the Common errors encountered when using OpenLDAP Software for common errors and how to fix them. Table 8.8a: LDAP Configuration Options Setting Hostname Base DN Allow Anonymous Binding Root bind DN Root bind password Password Encryption User Suffix Group Suffix Password Suffix Machine Suffix Encryption Mode Self signed certificate Auxiliary Parameters Value string string checkbox string string drop-down menu string string string string drop-down menu string string Description hostname or IP address of LDAP server top level of the LDAP directory tree to be used when searching for resources (e.g. dc=test,dc=org) instructs LDAP server to not provide authentication and to allow read/write access to any client name of administrative account cn=Manager,dc=test,dc=org) password for Root bind DN select a type supported by the LDAP server, choices are: clear (unencrypted), crypt, md5, nds, racf, ad, exop optional, can be added to name when user account added to LDAP directory (e.g. dept. or company name) optional, can be added to name when group added to LDAP directory (e.g. dept. or company name) optional, can be added to password when password added to LDAP directory optional, can be added to name when system added to LDAP directory (e.g. server, accounting) choices are Off, SSL, or TLS used to verify the certificate of the LDAP server if SSL connections are used; paste the output of the command openssl s_client -connect server:port -showcerts ldap.conf(5) options, one per line, not covered by other options in this screen on LDAP server (e.g.
NOTE: FreeNAS automatically appends the root DN. This means that you should not include the scope and root DN when inputting the user, group, password, and machine suffixes.
8.9
NFS
Network File System (NFS) is a protocol for sharing files on a network. Before configuring this service, you should first create your NFS Shares in Sharing -> Unix (NFS) Shares -> Add Unix (NFS) Share. After configuring this service, go to Services -> Control Panel to start the service. FreeNAS 8.2 Users Guide Page 166 of 235
Starting this service will open the following ports on the FreeNAS system: TCP and UDP 111 (used by rpcbind) TCP 2049 (used by nfsd)
Additionally, mountd and rpcbind will each bind to a randomly available UDP port. Figure 8.9a shows the configuration screen and Table 8.9a summarizes the configuration options for the NFS service. Figure 8.9a: Configuring NFS
Table 8.9a: NFS Configuration Options Setting Description run sysctl -n kern.smp.cpus from Shell to determine the number; do Number of servers integer not exceed the number listed in the output of that command speeds up data access but may result in corruption if a transfer is Asynchronous mode checkbox interrupted; see RFC 1813 for details Value
8.10 Plugins
The FreeNAS plugin system uses a FreeBSD jail to provide an environment for the installation of additional software. In FreeNAS, this jail is referred to as the plugins jail. The jail itself and the installation of software within the jail are managed from Services -> Plugins. A FreeBSD jail provides operating system-level virtualization which essentially allows the creation of independent FreeBSD operating systems running on the same hardware. This means that any software and configurations within a jail are isolated from the FreeNAS operating system. The FreeNAS implementation includes the vimage jail add-on which provides the plugins jail with its own, independent networking stack. This allows the Plugins Jail to do its own IP broadcasting, which is required by some PBIs. Once the plugins jail is installed, the FreeNAS plugin architecture supports the installation and configuration of PBIs using the FreeNAS GUI. PBIs were created by the PC-BSD project to provide a graphical installation wrapper to software which has been ported to FreeBSD. FreeNAS PBIs extend this functionality by providing a graphical front-end to the application's configuration file and by allowing the service to be started and stopped within the FreeNAS GUI.
Since the plugins jail is essentially a FreeBSD installation running within FreeNAS, you can also install software using FreeBSD ports and packages. This is convenient when a PBI is not yet available for the software that you need. However, installing manually within the jail means that you also have to configure the software manually within the jail (i.e. its configuration options will not show up in the FreeNAS GUI). This section demonstrates how to install the plugins jail, how to find, install, and configure PBIs, and then provides an overview of the PBIs which are available with FreeNAS 8.2.0-RELEASE. It then explains the plugin architecture, how to create your own PBIs, and how to install non-PBI software using the FreeBSD ports and packages collections. 8.10.1 Installing the Plugins Jail
The Plugins Jail can be installed to a UFS or ZFS filesystem. While it can be installed into a directory, it is recommended to instead create two ZFS datasets: one to hold the FreeBSD operating system and one to hold the software that you install. This section describes a sample configuration that uses 2 ZFS datasets. NOTE: if you plan on using Mount Points be aware that path size within the Plugins Jail is limited to 88 characters. Make sure that the length of your volume name, dataset name, and jail name will not exceed this limit. 1. Create two ZFS datasets: one for the jail itself and one to hold the installed software. In this example, a volume named /mnt/volume1 has a dataset named jail, which will hold the jail itself, and a second dataset named software, which will hold the installed software. NOTE: do not create a dataset less than 2GB in size. If you set a quota on the dataset, make sure that the size will be sufficient to hold the FreeBSD operating system (2GB), the software you intend to install, and any logs and data used by the applications that you install. 2. Download the plugins_jail PBI located in the plugins folder for your architecture from the 8.2.0 Sourceforge page. 3. Create the jail using Services -> Plugins -> Management -> Settings. The initial pop-up message will ask where you would like to temporarily place the jail PBI file. Use the dropdown menu to select a volume (in this example, /mnt/volume1), then press OK to see the screen shown in Figure 8.10a. In this example, the Plugins jail path is /mnt/volume1/jail, the Jail name is software, the Jail IP address is reachable by the FreeNAS system, the Jail IP Netmask associated with the Jail IP address has been selected, and the Plugins Path is /mnt/volume1/software. Table 8.10a summarizes these options. NOTE: the Plugins Jail will not work and installed PBIs will not show up in the GUI if the Jail IP Address is not pingable from the FreeNAS system. An incorrect Jail IP Netmask can make the IP address unreachable. On systems with multiple interfaces there is currently no way to specify which interface is used as the Plugins Jail chooses the interface with the default route. At this time, IPv6 is not supported within the Plugins Jail.
Table 8.10a: Jail Configuration Options Setting Description browse to the directory or ZFS dataset where the jail will be Plugins jail path browse button installed Jail name string mandatory; can only contain letters and numbers input an IP address that is reachable by the FreeNAS Jail IP address string system and which is unique on the network Jail IP Netmask drop-down menu select the subnet mask associated with the Jail IP address browse to the directory or ZFS dataset where the software Plugins archive path: browse button will be installed Once you complete the fields and click the Upload Jail PBI button, you will be prompted to browse to the Plugins Jail PBI that you downloaded. Press the Upload Jail PBI button again and the plugins jail will be installed. FreeNAS 8.2 Users Guide Page 169 of 235 Value
4. Start the plugins service. The plugins jail and any installed software will not be available whenever this service is not enabled. In Services -> Control Services, click the red OFF button next to Plugins in the Core tab. After a second or so, it will change to a blue ON, indicating that the jail has been enabled and is now available for use. 5. Decide how you wish to install software. If a plugin is available for the software that you need, use the instructions in section 8.10.3 Installing Software Using an Existing Plugin PBI. If a plugin is not available or you prefer to manually install from the command line, use the instructions in section 8.10.5 Installing non-PBI Software. If a plugin is not available and you wish to create your own PBI, use the instructions in section 8.10.6 Creating your own FreeNAS PBIs. 8.10.2 Managing the Plugins Jail
Once the Plugins Jail is installed and started, you can manage mount points, change the jail's settings, delete the jail, import the jail, or update the jail.
8.10.2.1 Mount Points
Services -> Plugins -> Management -> Mount Points allows you to add and manage mount points which can be used by PBIs that store a large amount of data. An example would be transmission, which stores torrents. Mount points use mount_nullfs(8) to "link" data that resides outside of the jail as a mount point within the jail. To add a mount point, click Services -> Plugins -> Management -> Mount Points -> Add Mount Point. You will be prompted to browse to the Source and Destination, where: Source: is the directory on the FreeNAS system. This directory resides outside of the jail and will provide storage (e.g. for transmission's torrents). Destination: is the mount /mnt/volume1/jail/plugins/mnt. point within the jail. An example would be
The GUI will not let you create a mount point where the Source is recursive. For example, if the jail is installed into /mnt/volume1/jail, using a Source beginning with /mnt/volume1/jail would fail, whereas a Source of /mnt/volume1/someotherdir/somedir will work.
8.10.2.2 Jail Settings
If you click Services -> Plugins -> Settings, you will see a screen similar to Figure 8.10b. This screen allows you to view the settings for the Plugins Jail and to modify the jail's IP address and subnet mask. This screen also provides the following buttons: Delete: if you delete the Plugins Jail, it will also delete all of the PBIs that you installed. Should you choose to delete the Plugins Jail, your browser colour will change to red to indicate that you have selected an option that could negatively impact users of the FreeNAS system. The pop-up message shown in Figure 8.10c will also be displayed.
Since deleting the jail also deletes any installed software, you must first check the box indicating that you are sure that you want to delete the jail before FreeNAS will perform this operation. Import Plugins Jail: if you import or auto-import a disk that already contains a Plugins Jail (e.g. after a fresh install or lost configuration), you do not need to reinstall the Plugins Jail. Instead you can import the jail, which will add it back to the Services -> Plugins tree of the GUI. NOTE: at this time, it is not possible to export a jail or save the jail's configurations from the GUI.
The Import Plugins Jail button, shown in Figure 8.10d, will prompt for the plugins jail path, the IP address and subnet mask of the jail, and the plugins archive path. Once the import is complete, start the Plugins service in Services -> Control Services. Figure 8.10d: Importing a Plugins Jail
Update Plugins Jail: should a newer version of the Plugins Jail become available, use the Update Plugins Jail button to upgrade to the latest version. Before beginning the upgrade, you must first stop the Plugins service or the upgrade will fail. This means that you should upgrade at a time that will least impact users of the services installed within the Plugins Jail. To start the upgrade, click the Update Plugins Jail button; the resulting pop-up window will prompt for the dataset to temporarily place the PBI file. Click the OK button and you will be prompted to browse to the location of the new Plugins Jail PBI. Click the Upload Jail PBI button to perform the upgrade. When the upgrade is complete, don't forget to restart the Plugins service in Services -> Control Services.
If you need to administer the contents of the plugins jail, make sure that the Plugins service is showing as ON in Services -> Control Services, then open Shell. To determine the ID being used by the jail, use the jls command: FreeNAS 8.2 Users Guide Page 172 of 235
jls JID 1
IP Address -
Hostname software
Path /mnt/volume1/jail/software
In this example, the jail ID is 1 and the IP Address is listed as "-", which is to be expected. To access the jail, provide its jail ID and the shell that you would like to use to the jexec command:
jexec 1 /bin/tcsh software#
The software# prompt (hostname of the jail) indicates that you are now inside the plugins jail. NOTE: do not use ssh to access the plugins jail! The FreeNAS plugins jail is a specialized jail that does not listen for SSH connections. It is intended to only be accessed through Shell. 8.10.3 Installing Software Using an Existing Plugin PBI
Existing PBIs are available for download from the plugins folder for your architecture at the 8.2.0 Sourceforge page. PBIs end in a .pbi extension. Each plugin has a sha256 checksum, which can be found in its .pbi.sha256.txt file. To install a PBI, go to Services -> Control Services -> Plugins tab -> Install Plugin. Use the Browse button to locate the downloaded PBI and click the Upload button to install the PBI. In the example shown in Figure 8.10e, the user has browsed to the location of the downloaded transmission PBI. Figure 8.10e: Installing a PBI
Once installed, an entry for the plugin will be added to the Services -> Control Services -> Plugins tab, as seen in the example shown in Figure 8.10f. Each entry indicates the name of the plugin, the software version, the name of the PBI (which includes the architecture), the status of the service, and buttons to Update or Delete the PBI. An entry for each plugin will also be added to the tree in Services -> Plugins, as seen in Figure 8.10f. Click that entry to open that plugin's configuration options. These options are discussed in more detail in the next section. NOTE: if an entry is not added to the Services -> Plugins tree, there is a problem with the IP address and/or subnet mask configured for the Plugins Jail. Check that these values are correct and reachable by the FreeNAS system in Services -> Plugins -> Settings. Figure 8.10f: Viewing Installed PBIs
To start the application associated with the entry, click its red OFF button. If the service successfully starts, it will change to a blue ON. NOTE: always review a PBI's configuration options before attempting to start it in Services -> Control Services. Some PBIs have options that need to be set before their service will successfully start. The available options will vary by PBI; the configuration options for the Firefly, MiniDLNA, and Transmission PBIs are described in the next section.
8.10.4
Popular PBIs
This section will summarize the configuration options for the PBIs that are available with FreeNAS 8.2.0-RELEASE. Over time, as more PBIs become available, the most popular PBIs will be added to this section. This section is meant to be a guide to get you started with configuring installed software. It is not meant to provide an exhaustive how-to for each software that is available as a PBI. Whenever you configure any software for the first time, refer to the documentation provided by the software, and when none exists, expect to spend some time researching the software's capabilities.
8.10.4.1 Firefly
Firefly Media Server is an open source media server used to serve media files for Roku and iTunes. It was formerly called mt-daapd which is why the binary is mt-daapd and the configuration file is mtdaapd.conf. Once configured and started, the firefly service provides its own web administrative interface for configuring playlists and forcing index scans. NOTE: the firefly project is no longer maintained. Another fork, forked-daapd, has not been ported to FreeBSD yet. The port request is here. Once the firefly PBI is installed, its options can be configured in Services -> Plugins -> Management -> Firefly. Figure 8.10g shows the configuration screen for firefly and Table 8.10b summarizes the configuration options. Figure 8.10g: Firefly Configuration Screen
Table 8.10b: Firefly Configuration Options Setting Port Admin pw Value integer string Description defaults to 3689, the default iTunes port mandatory; the password to access the web administration interface the name of the server as advertised via rendezvous and the name of the database exported via DAAP; default displays the version number (%v) and the system's hostname (%h) comma separated list (no spaces) of the file extensions that will be indexed and served mandatory; browse to the location that will store the shared mp3 files browse to the location within the Plugins Jail to store the firefly log file
Servername string Extensions MP3 directory Log file string browse button browse button
how often to check to see if any mp3 files have been added or removed; empty or 0 disables background scanning, though a a scan can still be Rescan integer forced from the "status" page of the administrative web interface; interval automated scanning may waste CPU and increase connection times to the server if left unchecked, background rescans of the filesystem at each "Rescan interval" are disabled unless clients are connected, in order to allow the Always scan checkbox drives to spin down when not in use; checking this box will scan every "Rescan interval" sets how aggressively mp3 files should be scanned to determine file length; Normal scans the first mp3 frame to try and calculate size and should be accurate for most files except for VBR files without a Xing tag; Aggressive drop-down checks the bitrates of 10 frames in the middle of the song and will still be Scan type menu inaccurate for VBR files without a Xing tag; Painfully aggressive walks through the entire song, counting the number of frames, which will be accurate, takes the most time, but will only occur the first time the file is indexed Process checkbox whether or not to process playlists playlists Process checkbox whether or not to process iTunes iTunes Process m3u checkbox whether or not to process m3u additional parameters not covered by other option fields; these are Auxiliary string described in the file /usr/local/etc/mt-daapd.conf.sample which is installed parameters with the Firefly PBI within the Plugins Jail Once you have saved your configuration values, start the firefly service using Services -> Control Services -> Plugins tab.
If you wish to access the firefly's built-in administrative GUI, use a web browser to input the IP address of your plugins jail followed by a colon and the "Port" number you configured (the default is 3689). It will prompt for a username and password: input admin as the username and use the value you configured for "Admin pw" as the password. The firefly administrative interface is shown in Figure 8.10h. In this example, the PBI jail address is 10.0.0.1, the port is 3689, and the smart playlists configuration screen is open. Figure 8.10h: Firefly Web Administrative Interface
8.10.4.2 MiniDLNA
MiniDLNA is an open source DLNA server that uses UPnP for media management, discovery and control. The MiniDNLA daemon serves media files such as music, pictures, and video to clients on a network. Example clients include applications such as totem and xbmc, and devices such as portable media players, smartphones, and televisions. Unlike firely, it does not provide a web interface for administration. Once the MiniDLNA PBI is installed, its options can be configured in Services -> Plugins -> Management -> MiniDLNA. Figure 8.10i shows the configuration screen for MiniDLNA and Table 8.10c summarizes the configuration options.
Table 8.10c: MiniDLNA Configuration Options Setting Value Description optional; set this if you want to customize the name that shows up on your clients mandatory; browse to the location of the directory to store the media files HTTP port for descriptions, SOAP, and media transfer traffic; default is 8200 how often MiniDLNA broadcasts its availability on the network; default is every 895 seconds if checked will strictly adhere to DLNA standards which will allow server-side downscaling of very large JPEG images and may hurt JPEG serving performance on Sony DLNA products model number the daemon will report to clients in its XML description; default is 1 serial number the daemon will report to clients in its XML description; default is 12345678 whether or not the media files are scanned when the MiniDLNA is started or restarted Page 178 of 235
Friendly name string Media directory Port Discover interval Strict DLNA browse button integer integer checkbox
Value string
Description additional parameters available in minidlna.conf(5) and not covered by other option fields
Once you have saved your configuration values, start the MiniDLNA service using Services -> Control Services -> Plugins tab.
8.10.4.3 Transmission
Transmission is an open source BitTorrent client. Its features include encryption, a web interface, peer exchange, magnet links, DHT, TP, UPnP and NAT-PMP port forwarding, webseed support, watch directories, tracker editing, global and per-torrent speed limits. Once the Transmission PBI is installed, its options can be configured in Services -> Plugins -> Management -> Transmission. Figure 8.10j shows the configuration screen for Transmission and Table 8.10d summarizes the available configuration options. Figure 8.10j: Transmission Edit Screen
Table 8.10d: Transmission Configuration Options Setting Value browse Watch Directory button Configuration browse Directory button Download browse Directory button Allowed Blocklist Logfile RPC/WebUI Enabled RPC Port RPC Auth Required RPC Username RPC Password RPC Whitelist Enabled RPC Whitelist string string browse button checkbox integer checkbox string string checkbox string Description browse to the directory transmission will watch for new torrent files browse to the directory where transmission will store its configuration files browse to the directory where files will be downloaded to comma-delimited list of allowed IP addresses; supports wildcards (e.g. 127.0.0.1,192.168.*.*) comma-delimited list of blocklists stored in the blocklists subdirectory of Configuration Directory; if you add a new blocklist, restart the transmission service browse to the directory within the Plugins Jail to store the transmission log file uncheck this box to disable the transmission web administrative interface port to listen for RPC requests on; default is 9091 if enabled, clients are required to authenticate; requires "Username" and "Password" fields to be configured mandatory if "RPC auth required" checked; username to use for authentication mandatory if "RPC auth required" checked; password to use for authentication if checked, only the addresses listed in RPC Whitelist will be granted remote access comma-delimited list of IP addresses from which remote control is permitted when enabled, the DHT protocol is used to track peers downloading torrents without the use of a standard tracker; the protocol stores lists of other nodes/peers which can be used to locate new peers enables the discovery of BitTorrent peers located on the same LAN enables BitTorrent over UDP port to listen on for incoming peer connections; default is 51413 enable this to allow other peers to connect to you; instructions for allowing transmission through firewalls/routers are here maximum number of connected peers; default is 240
Distributed Hash checkbox Table (DHT) Local Peer checkbox Discovery (LPD) Micro Transport checkbox Protocol (uTP) Peer port integer Portmap Max number of peers checkbox integer
Setting Value Max number of integer peers per torrent Encryption drop-down menu
integer
Description maximum number of connected peers for an individual torrent; default is 60 choices are: Prefer unencrypted (encryption will not be used unless the client requires it), Prefer encrypted (encryption will be used if the client supports it), Require encrypted (clients must support encryption) how much youve downloaded v.s. how much youve uploaded; all torrents, unless overridden by a per-torrent setting, should seed until specified ratio; default is 2
Once you have saved your configuration values, start the transmission service using Services -> Control Services -> Plugins tab. If you wish to access transmission's built-in administrative GUI, use a web browser to input the IP address of your plugins jail followed by a colon and the "RPC port" number you configured (the default is 9091). It will prompt for a username and password and by default you can just press enter to access the interface. If you checked the "RPC auth required" box, input the "RPC username" and "RPC password" that you specified in your configuration. The transmission website has a screenshot of the administrative interface here. A Transmission Support Forum is also available. 8.10.5 Installing non-PBI Software
If a PBI is not available for the software that you wish to install, you can still install and configure the application from the command line using either the FreeBSD ports or packages collection. This section will describe both methods of software installation. You should skim through the entire section first to determine which method of software installation best meets your needs. The commands demonstrated in this section need to be executed from within the plugins jail.
8.10.5.1 Installing FreeBSD Packages with pkg_add
The quickest and easiest way to install software inside the jail is to install a FreeBSD package. A FreeBSD package is pre-compiled, meaning that it contains all the binaries and dependencies required for the software to run on a FreeBSD system. A lot of software has been ported to FreeBSD (currently over 23,680 applications) and most of that software is available as a package. The best way to find FreeBSD software is to use FreshPorts.org. A firefox FreshPorts search plugin is also available for quickly finding software. Figure 8.10k shows the search results for openvpn; the search was performed using the firefox plugin. The search indicates that 7 ports are currently available. Each port includes the name of the software, the version, a description, the category (e.g. security), the email address of the port's maintainer, a CVSWeb link containing the details of the port, and a link to the software's main website. Each entry includes the command used to compile the port (as described in the next section) and the pkg_add -r command used to install the package. FreeNAS 8.2 Users Guide Page 181 of 235
For example, to install openvpn 2.2.2, use the command that FreshPorts indicates to add the package:
pkg_add -r openvpn Fetching ftp://ftp.freebsd.org/pub/FreeBSD/ports/amd64/packages-8.2 release/Latest/openvpn.tbz... Done. Fetching ftp://ftp.freebsd.org/pub/FreeBSD/ports/amd64/packages-8.2release/All/lzo2-2.04.tbz... Done. ### -----------------------------------------------------------------------### Edit /etc/rc.conf[.local] to start OpenVPN automatically at system ### startup. See /usr/local/etc/rc.d/openvpn for details. ### -----------------------------------------------------------------------### For compatibility notes when interoperating with older OpenVPN ### versions, please, see <http://openvpn.net/relnotes.html> ### -----------------------------------------------------------------------software#
The installation messages indicate that the package and its dependency (lzo2) successfully downloaded. This port provides a post-installation message indicating how to start the service at boot time. You can confirm that the installation was successful by querying the package database:
pkg_info -ox openvpn Information for openvpn-2.1.4: Origin: security/openvpn
/usr/local/sbin/openvpn /usr/local/lib/openvpn-auth-pam.so /usr/local/lib/openvpn-down-root.so /usr/local/share/doc/openvpn/AUTHORS /usr/local/share/doc/openvpn/COPYING /usr/local/share/doc/openvpn/COPYRIGHT.GPL /usr/local/share/doc/openvpn/ChangeLog /usr/local/share/doc/openvpn/INSTALL /usr/local/share/doc/openvpn/PORTS /usr/local/share/doc/openvpn/README /usr/local/share/doc/openvpn/README.openvpn-auth-pam <snip output>
Note that in FreeBSD, third-party software is always stored in /usr/local to differentiate it from the software that came with the operating system. Binaries are almost always located in a subdirectory called bin or sbin and configuration files in a subdirectory called etc. You can also research ahead of time which files will be installed with a package by clicking the CVSWeb link for the software at FreshPorts. Click the version number for the pkg-plist file. Here is a portion of the pkg-plist for openvpn:
sbin/openvpn lib/openvpn-auth-pam.so lib/openvpn-down-root.so %%PORTDOCS%%%%DOCSDIR%%/AUTHORS %%PORTDOCS%%%%DOCSDIR%%/COPYING
Note that pkg-plist always assumes /usr/local. For example, when reading sbin/openvpn, think /usr/local/sbin/openvpn. %%PORTDOCS%%%%DOCSDIR%% is a substitution for /usr/local/share/doc/name_of_package, as you can see from the pkg_info -Lx output.
8.10.5.2 Compiling FreeBSD Ports with make
Typically, software is installed using the pkg_add command. Occasionally you may prefer to compile the port yourself. Compiling the port offers the following advantages: not every port has an available package. This is usually due to licensing restrictions or known, unaddressed security vulnerabilities. sometimes the package is out-of-date (as seen in the example openvpn package installation in the previous section) and you need a feature that became available in the newer version. some ports provide compile options that aren't available in the pre-compiled package. These options are used to add additional features or to strip out the features you do not need. Compiling the port yourself has the following dis-advantages: it takes time. Depending upon the size of the application, the amount of dependencies, the amount of CPU and RAM on the system, and the current load on the FreeNAS system, the amount of time can range from a few minutes to a few hours or even to a few days. NOTE: if the port doesn't provide any compile options, you are better off saving your time and the FreeNAS system's resources by using the pkg_add command instead. You can determine if the port has any configurable compile options by clicking on its CVSWeb link in FreeNAS 8.2 Users Guide Page 183 of 235
FreshPorts. To continue the example shown in Figure 8.10k, Figure 8.10l shows the results when the CVSWeb link is clicked for openvpn 2.2.2. Figure 8.10l: Reading a Port's CVSWeb in FreshPorts
In FreeBSD, a Makefile is used to provide the compiling instructions to the make command. CVSWeb keeps a history of every version of the port. For example, if you click the hyperlink for "Makefile" you will see a history of all of that port's Makefiles, as well as their commit descriptions. To read the contents of the current Makefile, instead click on the version number (in this example, 1.59). The Makefile is in ascii text, fairly easy to understand, and documented in bsd.port.mk. If the port has any configurable compile options, they will be listed under OPTIONS. This Makefile contains the following OPTIONS:
OPTIONS= PW_SAVE "Interactive passwords may be read from a file" off \ PKCS11 "Use security/pkcs11-helper" off
FreeBSD packages always use the default OPTIONS. In this example, the two options are disabled, meaning that those features won't be available unless you compile the port yourself. When you compile the port, those options will be presented to you in a menu, allowing you to change their default settings. Before you can compile a port, you must install the ports collection. This can be done using the portsnap utility.
portsnap fetch && portsnap extract
This command will download the ports collection and extract it to the /usr/ports/ directory. NOTE: if you install additional software at a later date, you should make sure that the ports collection is up-to-date using this command:
portsnap update Ports tree is already up to date.
To compile a port, you will cd into a subdirectory of /usr/ports/. The following example will compile the openvpn 2.2.2 port shown in Figures 8.10k and 8.10l. FreshPorts provides the location to cd into and the make command to run:
cd /usr/ports/security/openvpn
Since this port's Makefile includes OPTIONS, we will see the configure screen shown in Figure 8.10m when the make command is issued:
make install clean
To change an option's setting, use the arrow keys to highlight the option, then press the spacebar to toggle the selection. Once you are finished, tab over to OK and press enter. The port will begin to compile and install. NOTE: if you change your mind, the configuration screen will not be displayed again should you stop and restart the build. Type make config && make install clean if you need to change your selected options. If the port has any dependencies with options, their configuration screens will be displayed and the compile will pause until it receives your input. It is a good idea to keep an eye on the compile until it finishes and you are returned to the command prompt. If you need to perform other configuration tasks, click the x in the upper right corner of Shell. This will detach from the jail without pausing the compile process--when you click Shell again you will be returned to the jail and can view the current progress of the compile. Once the port is installed, it is registered in the same package database that manages packages. This FreeNAS 8.2 Users Guide Page 185 of 235
means that you can use pkg_info to determine what was installed, as described in the previous section.
8.10.5.3 Configuring and Starting the Software
Once the package or port is installed, you will need to configure and start it. If you are familiar with how to configure the software, look for its configuration file in /usr/local/etc or a subdirectory thereof. Many FreeBSD packages contain a sample configuration file to get you started. If you are unfamiliar with the software, you will need to spend some time at the software's website to learn which configuration options are available and which configuration file(s) need to be edited. Most FreeBSD packages that contain a startable service include a startup script which is automatically installed to /usr/local/etc/rc.d/. Once your configuration is complete, you can test that the service starts by running the script with the onestart option. These commands will run the openvpn startup script and verify that the service started:
/usr/local/etc/rc.d/openvpn onestart Starting openvpn. /usr/local/etc/rc.d/openvpn onestatus openvpn is running as pid 45560. sockstat -4 USER COMMAND root openvpn
Run tail /var/log/messages to see if any error messages hint at the problem. Most startup failures are related to a mis-configuration: either a typo or a missing option in a configuration file. Once you have verified that the service starts and is working as intended, add a line to /etc/rc.conf to ensure that the service automatically starts whenever the plugins jail service starts. The line to start a service always ends in _enable="YES" and typically starts with the name of the software. For example, this is the entry for the openvpn service:
openvpn_enable="YES"
When in doubt, the startup script will tell you which line to put in /etc/rc.conf. This is the description in /usr/local/etc/rc.d/openvpn:
# # # # # # # # # # This script supports running multiple instances of openvpn. To run additional instances link this script to something like % ln -s openvpn openvpn_foo and define additional openvpn_foo_* variables in one of /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d /openvpn_foo Below NAME should be substituted with the name of this script. By default it is openvpn, so read as openvpn_enable. If you linked the script to openvpn_foo, then read as openvpn_foo_enable etc.
# # # # #
The following variables are supported (defaults are shown). You can place them in any of /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d/NAME NAME_enable="NO" # set to YES to enable openvpn
The startup script will also indicate if any additional parameters can be added for when the service starts:
# # # # # # # # # # # NAME_if= # driver(s) to load, set to "tun", "tap" or "tun tap" # it is OK to specify the if_ prefix.
# optional: NAME_flags= # additional command line arguments NAME_configfile="/usr/local/etc/openvpn/NAME.conf" # --config file NAME_dir="/usr/local/etc/openvpn" # --cd directory You also need to set NAME_configfile and NAME_dir, if the configuration file and directory where keys and certificates reside differ from the above settings.
8.10.6
If a FreeNAS PBI does not already exist for the software that you need, you can create your own PBI. This section describes the PBI architecture, then provides an example of creating a PBI.
8.10.6.1 Introduction to PBI Modules
The PBI (push button installer) architecture was created by Kris Moore for the PC-BSD project. It provides a mechanism for converting existing FreeBSD packages or ports (which are installed through the command line) into self-contained software packages that can be installed through a graphical interface. The FreeNAS PBI architecture extends this functionality by integrating PBIs into the FreeNAS graphical interface: making it easy to install, configure, and manage the installed software from a web browser. In order to create a PBI, the software must already be ported to FreeBSD. The easiest way to confirm whether or not a FreeBSD port exists is to search for the software at FreshPorts.org. If a port does not exist, you can issue a port request at the PC-BSD Port Requests forum using these instructions. Alternately, if you have ported software before, the Porters Handbook contains detailed instructions for porting software to FreeBSD. A table of outstanding PBI requests can be found here. NOTE: at this time, PC-BSD PBIs are based on FreeBSD 9.0 and FreeNAS PBI's are based on FreeBSD 8.2. Due to ABI (application binary interface) differences between the FreeBSD 8.x and 9.x series, you can not convert an existing PC-BSD PBI into a FreeNAS PBI. This will change once FreeNAS is based on FreeBSD 9.0, which is expected to occur in late 2012. Each PBI is based upon a module. A PBI module is simply a collection of files which control the contents of the PBI and how it integrates into the FreeNAS GUI. Existing PBI modules can be found in the Plugins Examples page of the FreeNAS code repository. Table 8.10e summarizes the function of the files which are found in a FreeNAS PBI module. In addition to these files, the resources/ directory of a PBI may contain additional files specific to the FreeNAS 8.2 Users Guide Page 187 of 235
configuration of that PBI. Table 8.10e: FreeNAS PBI Module Components File Name Description this script is used to start, stop, and get the status of the service; it also controls resources/control other files that define the configuration options that appear in the FreeNAS GUI resources/default.png the icon used in the tree of the FreeNAS GUI resources/tweakadds or removes the plugin entry in /etc/rc.conf so that the service will rcconf automatically start if the FreeNAS system is rebooted scripts/post-install.sh script run immediately after the extraction of PBI contents to disk optional; script run after the port compile is finished but before the PBI is scripts/postpackaged; typically used to add extra plugins or to compile additional ports not portmake.sh included in the port's Makefile optional; script run to check conditions before the installation of the PBI (e.g. scripts/pre-install.sh check for minimum FreeNAS version) optional; script run before deletion of the PBI file; typically used to make sure scripts/pre-remove.sh the service has been stopped, to remove log or temporary files used by the software, or to delete a system account used by the software being deinstalled similar to a FreeBSD port's Makefile, this file contains the instructions for pbi.conf compiling the PBI; the variables in this file are documented in the PBI Module Builder Guide Once you have verified that a FreeBSD port exists, you can create the PBI module from within a FreeNAS plugins jail. If this is your first PBI module, it is recommended that you install an existing PBI and compare the configuration options that you see in the FreeNAS GUI with the files in that PBI's module. This will give you an idea of how to edit the files to match the needs of the software that you are creating a PBI for. A summary of the steps needed to create a PBI is as follows: 1. If you haven't already, install and start the plugins jail. The rest of the commands in this section need to be executed from within the jail. 2. Download the FreeBSD ports tree. 3. Create the directory structure to contain the PBI module. 4. Download the plugin example files (recommended). 5. Create the files used by the PBI module. 6. Run the pbi_makeport command. 7. Install the PBI to verify that it installs, contains the desired configuration options in the GUI, and that the service is able to start. The next section will demonstrate steps 2-7. When creating your own PBI, modify the example to match the needs of the specific application. FreeNAS 8.2 Users Guide Page 188 of 235
Since a PBI is based on a FreeBSD port (an application that has been ported to FreeBSD), you will need to install the FreeBSD ports collection before you can build your PBI. The following commands are used to determine the plugins jail ID, enter the jail, and install the ports collection:
jls JID 1 IP Address Hostname software Path /mnt/volume1/jail/software
jexec 1 /bin/tcsh software# portsnap fetch extract Fetching public key from portsnap.FreeBSD.org... done. Fetching snapshot tag from portsnap.FreeBSD.org... done. Fetching snapshot metadata... done. Fetching snapshot generated at Tue Jul 17 00:01:37 UTC 2012: <snip> Building new INDEX files... done.
Next, create the directory structure to contain the PBI module. When making your directory structure, use the name of the port that you are converting to a PBI. For example, if you are creating a PBI for bacula-bat, create a directory called bacula-bat. A good place to make this directory is in a subdirectory of /usr/local. In this example, all PBI modules are created in /usr/local/my_pbis/, /usr/local/my_pbis/openvpn/ holds the files used by the openvpn PBI module, and -p is used to make any missing subdirectories in the path to the directory.
mkdir -p /usr/local/my_pbis/openvpn/resources mkdir -p /usr/local/my_pbis/openvpn/scripts
Next, create the files listed in Table 8.10e. The easiest way to do this is to modify the files in an existing PBI module to meet the needs of the software being converted into a PBI. You can find existing PBI modules here. As each file is reviewed in this example, the sections of text that should be modified are listed in red text. NOTE: at this time, it is not possible to cut/paste into the plugins jail. For this reason, we recommend that you download the existing example plugins so that you can refer to them and copy existing files into your PBI's directory structure in order to edit them for the PBI that you are creating. The easiest way to obtain the most current copy of the example plugins directory is to use the svn co command. This command requires you to install the subversion port. The following example installs the port then copies the example plugins directory structure into /usr/local/my_pbis/.
cd /usr/ports/devel/subversion make install clean (press tab then enter whenever a configuration menu is displayed) rehash cd /usr/local/my_pbis svn co https://freenas.svn.sourceforge.net/svnroot/freenas/branches/8.2.0/nanobsd/plugins/ Error validating server certificate for 'https://freenas.svn.sourceforge.net:443': - The certificate is not issued by a trusted authority. Use the fingerprint to validate the certificate manually! Certificate information: - Hostname: *.svn.sourceforge.net - Valid: from Sat, 25 Feb 2012 23:58:41 GMT until Sun, 31 Mar 2013 19:51:44 GMT
- Issuer: GeoTrust, Inc., US - Fingerprint: 0b:11:76:de:db:4c:74:72:cb:01:49:7d:13:70:c2:f1:13:7b:cb:bf (R)eject, accept (t)emporarily or accept (p)ermanently? p <snip download> Checked out revision 11909.
If you repeat the above cd and svn co commands whenever you create a new PBI, you will always have a copy of the latest plugin examples.
8.10.6.3 Create the Module Components
This section describes how to edit the module components required by any PBI. Depending upon the application's needs, you may also want to create some of the optional files listed in Table 8.10e. Start by creating the mandatory components, then decide if you wish to tweak the PBI further after testing it. 1. post-install.sh Save this file in the scripts subdirectory of your PBI module. The following example uses a copy of the firefly file with descriptive comments added. When creating your file, replace any text in red with the name of the PBI.
cp /usr/local/my_pbis/plugins/firefly_pbi/scripts/post-install.sh /usr/local/my_pbis/openvpn/scripts/ more /usr/local/my_pbis/openvpn/scripts
The following line is optional, depending upon the needs of the software.
# use if the service requires that the specified system account be created pw user add daapd -d ${firefly_pbi_path}
Some PBIs require the creation of directories with specific permissions set. The post-install.sh for the transmission and minidlna PBIs provide examples. If you receive permission errors when testing your PBI, research the permission and ownership required by those directories, add that information to this file, then rebuild the PBI and test it again. 2. tweak-rcconf This file is used to add an entry to /etc/rc.conf when the PBI is installed and to remove that entry when the PBI is uninstalled. On a FreeBSD system, rc.conf is used to determine which services to start at boot time. An entry in this file is a requirement in order to start the PBI using Services -> Control Services as the GUI sends the start option to the service's startup script. Save this file in the the resources subdirectory for the PBI module, changing the text in red to the name FreeNAS 8.2 Users Guide Page 190 of 235
of the service.
#!/bin/sh firefly_path=/usr/pbi/firefly-$(uname -m) tmpfile=$(mktemp /tmp/.XXXXXX) grep -v 'firefly_' /etc/rc.conf > ${tmpfile} cat ${fireflyy_path}/etc/rc.conf >> ${tmpfile} mv ${tmpfile} /etc/rc.conf
3. pbi.conf pbi.conf is a shell script that contains the information needed to build the PBI. Typically this file only requires you to modify a few variables, such as the name of the program, its website, and its location in the ports tree. Sometimes you will need to set a few additional variables in order to make sure that required dependencies are included in the PBI. This file should be created in the root of your PBI module directory. The following example is from the firefly PBI; edit the text in red to match the information for your PBI. You can determine the correct values by searching for the FreeBSD port at FreshPorts.org. Note that your file should not include the PBI_BUILDKEY or PBI_AB_PRIORITY variables as these are only used by the FreeNAS build server.
#!/bin/sh # Program Name PBI_PROGNAME="firefly" # Program Website PBI_PROGWEB="http://www.fireflymediaserver.org/" # Program Author / Vendor PBI_PROGAUTHOR="Firefly" # Default Icon (Relative to %%PBI_APPDIR%% or resources/) PBI_PROGICON="default.png" # The target port we are building PBI_MAKEPORT="audio/firefly" # Additional options for make.conf PBI_MAKEOPTS="PACKAGE_BUILDING=Y" # Ports to build before / after PBI_MKPORTBEFORE="" PBI_MKPORTAFTER="www/py-django devel/py-jsonrpclib databases/py-south databases/pysqlite3 www/py-dojango devel/py-jsonrpclib www/py-flup net/py-oauth2" # Exclude List PBI_EXCLUDELIST="./include ./share/doc"" export PBI_PROGNAME PBI_PROGWEB PBI_PROGAUTHOR PBI_PROGICON PBI_MAKEPORT PBI_MAKEOPTS PBI_MKPORTBEFORE PBI_MKPORTAFTER PBI_EXCLUDELIST
Table 8.10f summarizes the variables which can be included in this file. Table 8.10f: pbi.conf Variables Variable PBI_PROGNAME= Description mandatory; should be the same value as PORTNAME= in the port's Makefile mandatory unless does not exist; should be the same value as WWW= in the PBI_PROGWEB= port's pkg-descr mandatory; often found in the port's pkg-descr or at the website for the PBI_PROGAUTHOR= application FreeNAS 8.2 Users Guide Page 191 of 235
Variable
Description specified icon must exist in resources/ of PBI module; must be a 64x64 .png PBI_PROGICON= file with a transparent background PBI_PROGREVISION bump up a PBI's revision number; useful when rebuilding a port with new = PBI specific options PBI_MAKEPORT= mandatory; the path to the port under /usr/ports/ optional; set this to the options that you want saved into make.conf for the PBI_MAKEOPTS= port building process (e.g. WITH_CUPS=YES) PBI_MKPORTBEFOR optional; port(s) to build before starting the build for the target port E= PBI_MKPORTAFTER optional; additional port(s) to build after building the target port = should not be included; this variable is used on the PBI build server to force PBI_BUILDKEY= the rebuild of a PBI that has failed to build PBI_REQUIRESROOT set to to YES to require this app to be installed as root; default is NO which = allows it to be installed as a regular user list of files or directories to exclude from the final archive, such as ./include PBI_EXCLUDELIST= or ./share should only be set by build server administrator; a higher number indicates a PBI_AB_PRIORITY= greater priority and will be built before lower priority PBIs export mandatory; followed by a list of all of the variables used in the file 4. default.png This icon file will be used when the entry for the installed PBI is added to the FreeNAS tree. The name of the icon is specified with the PBI_PROGICON= variable and that file must exist in the resources/ directory of the PBI module. If you decide to make your own icon, it must be a 64x64 .png file with a transparent background. Otherwise, copy the default.png file from the firefly PBI. 5. control The FreeNAS PBI API uses control to initialize the web interface for the installed plugin. The FreeNAS GUI communicates with plugins using FastCGI; the role of the control file is to setup the FastCGI server. The FastCGI API supports many programming languages, including Python and PHP. If you are comfortable using a supported programming language, you can create your own control file and use control as the wrapper pointing to your file. For example, the creator of the Transmission PBI created control.py in Python to setup WSGI, the Python FastCGI interface. The creator of the MiniDLNA PBI had his control file point to php-fpm.conf in order to configure php-fpm, the PHP FastCGI interface. If you are familiar with either of those languages, examine that PBI's control file and the rest of the files under that PBI's resources/ directory, comparing the content of those files to the resulting FreeNAS screens shown in Popular PBIs. The supported language bindings are listed here. Before selecting a language, you will need to research which bindings are required and build those FreeBSD ports with your PBI. For example, the firefly PBI FreeNAS 8.2 Users Guide Page 192 of 235
NOTE: if you are not familiar with any of the supported programming languages and their bindings, you can still create a PBI without a control file. However, you will have to manually install it using the pbi_add command and it will not integrate into the FreeNAS GUI. You may find it easier to install software using its FreeBSD packages or port, unless your goal is to practice creating PBI software.
8.11 Rsync
Services -> Rsync is used to configure an rsync server when using rsync module mode. See section 4.4.2 Configuring Rsync Module Mode for a configuration example. This section describes the configurable options for the rsyncd service and rsync modules. Figure 8.11a shows the rsyncd configuration screen which is accessed from Services -> Rsync -> Configure Rsyncd. Figure 8.11a: Rsyncd Configuration
Table 8.11a summarizes the options that can be configured for the rsync daemon: Table 8.11a: Rsync Configuration Options Setting Value Description TCP Port integer port for rsyncd to listen on, default is 873 Auxiliary parameters string additional parameters from rsync(1)
8.11.1
Rsync Modules
Figure 8.11b shows the configuration screen that appears when you click Services -> Rsync -> Rsync Modules -> Add Rsync Module. Table 8.11b summarizes the options that can be configured when creating a rsync module.
Table 8.11b: Rsync Module Configuration Options Setting Module name Comment Path Access Mode Maximum connections User Value string string browse button drop-down menu integer Description mandatory; needs to match the setting on the rsync client optional description of volume/dataset to hold received data choices are Read and Write, Read-only, or Write-only 0 is unlimited select user that file transfers to and from that module should take place as select group that file transfers to and from that module should take place as see rsyncd.conf(5) for allowed formats see rsyncd.conf(5) for allowed formats additional parameters from rsyncd.conf(5)
drop-down menu drop-down Group menu Hosts allow string Hosts deny string Auxiliary parameters string
8.12 S.M.A.R.T.
FreeNAS uses the smartd(8) service to monitor disk S.M.A.R.T. data for disk health. To fully configure S.M.A.R.T. you need to: 1. Schedule when to run the S.M.A.R.T. tests in System -> S.M.A.R.T. Tests -> Add S.M.A.R.T. Test. 2. Enable or disable S.M.A.R.T. for each disk member of a volume in Volumes -> View Volumes. By default, this is already enabled on all disks that support S.M.A.R.T. 3. Check the configuration of the S.M.A.R.T. service as described in this section. 4. Start the S.M.A.R.T. service in Services -> Control Services Figure 8.12a shows the configuration screen that appears when you click Services -> S.M.A.R.T. Figure 8.12a: S.M.A.R.T Configuration Options
NOTE: smartd will wake up at every Check Interval you configure in Figure 8.12a. It will check the times you configured in your tests (described in Figure 4.5a) to see if any tests should be run. Since the smallest time increment for a test is an hour (60 minutes), it does not make sense to set a check interval value higher than 60 minutes. For example, if you set the check interval for 120 minutes and the smart test to every hour, the test will only be run every 2 hours since the daemon only wakes up every 2 hours. Table 8.12a summarizes the options in the S.M.A.R.T Configuration screen. Table 8.12a: S.M.A.R.T Configuration Options Setting Description in minutes, how often to wake up smartd to check to see if any Check interval integer tests have been configured to run can override that the configured test is not performed depending Power mode drop-down menu upon the power mode; choices are: Never, Sleep, Standby, or Idle FreeNAS 8.2 Users Guide Page 195 of 235 Value
Setting
Description default of 0 disables this check, otherwise reports if the integer in degrees Difference temperature of a driver has changed by N degrees Celsius since Celsius last report default of 0 disables this check, otherwise will message with a log integer in degrees Informal level of LOG_INFO if the temperature is higher than N degrees Celsius Celsius default of 0 disables this check, otherwise will message with a log integer in degrees Critical level of LOG_CRIT and send an email if the temperature is Celsius higher than N degrees Celsius email address of person to receive S.M.A.R.T. alert; separate Email to report string multiple email recipients with a comma and no space
Value
8.13 SNMP
SNMP (Simple Network Management Protocol) is a protocol used to monitor network-attached devices for conditions that warrant administrative attention. FreeNAS can be configured as a bsnmpd(8) server using FreeBSD's simple and extensible SNMP daemon. If you enable SNMP, the following port will be enabled on the FreeNAS system: UDP 161 (bsnmpd listens here for SNMP requests) Figure 8.13a shows the SNMP configuration screen and Table 8.13a summarizes the configuration options: Figure 8.13a: Configuring SNMP
Table 8.13a: SNMP Configuration Options Setting Location Contact Value string string Description optional description of FreeNAS system's location optional email address of FreeNAS administrator
Setting
Description password used on the SNMP network, default is public and should Community string be changed for security reasons only available in Advanced Mode; a trap is an event notification Send SNMP Traps checkbox message Auxiliary Parameters string additional bsnmpd(8) options not covered in this screen, one per line
Value
8.14 SSH
Secure Shell (SSH) allows for files to be transferred securely over an encrypted network. If you configure your FreeNAS system as an SSH server, the users in your network will need to use SSH client software in order to transfer files using SSH. This section shows the FreeNAS SSH configuration options, demonstrates an example configuration that restricts users to their home directory, and provides some troubleshooting tips. Figure 8.14a shows the Services -> SSH configuration screen and Table 8.14a summarizes the configuration options. Once you have configured SSH, don't forget to start it in Services -> Control Services. Figure 8.14a: SSH Configuration
Table 8.14a: SSH Configuration Options Setting TCP Port Login as Root with password Allow Password Authentication Allow TCP Port Forwarding Compress Connections Host Private Key Extra Options Value integer Description port to open for SSH connection requests, 22 by default for security reasons, root logins are discouraged and disabled by checkbox default; if enabled, password must be set for root user in Account -> Users -> View Users if unchecked, key based authentication for all users is required; checkbox requires additional setup on both the SSH client and server allows users to bypass firewall restrictions using SSH's port checkbox forwarding feature checkbox may reduce latency over slow networks string string allows you to paste a specific host key as the default key is changed with every installation additional sshd_config(5) options not covered in this screen, one per line; these options are case-sensitive and mis-spellings may prevent the SSH service from starting
A few sshd_config(5) options that are useful to input in the Extra Options field include: 8.14.1 ClientAliveInterval: increase this number if ssh connections tend to drop ClientMaxStartup: defaults to 10; increase if you have more users Chrooting SFTP users
By default when you configure SSH, users can use the ssh command to login to the FreeNAS system. A user's home directory will be the volume/dataset specified in the Home Directory field of their user account on the FreeNAS system. Users can also use the scp and sftp commands to transfer files between their local computer and their home directory on the FreeNAS system. While these commands will default to the user's home directory, users are able to navigate outside of their home directory which can pose a security risk. SSH supports using a chroot to confine users to only the sftp command and to be limited to the contents of their own home directory. To configure this scenario on FreeNAS, perform the following steps. 1. Create a ZFS dataset for each user requiring sftp access in Storage -> Volumes. I 2. If you are not using Active Directory or LDAP, create a user account for each user in Account -> Users -> Add User. In the Home Directory field, browse to the location of the dataset you created for that user. Repeat this process to create a user account for every user that will need access to the SSH service. 3. Set permissions for each dataset in Storage -> Volume -> View Volumes. SSH chroot is very specific with regards to the required permissions (see the ChrootDirectory keyword in sshd_config(5) for details). Your configuration will not work if the permissions on the datasets used by SSH chroot users differ from those shown in Figure 8.14b. FreeNAS 8.2 Users Guide Page 198 of 235
4. Create a home directory within each dataset using Shell. Due to the permissions required by SSH chroot, the user will not have permissions to write to the root of their own dataset until you do this. Since your intention is to limit them to the contents of their home directory, manually create a home directory for each user within their own dataset and change the ownership of the directory to the user. Example 8.14a demonstrates the commands used to create a home directory called user1 for the user account user1 on dataset /mnt/volume1/user1: Example 8.14a: Creating a User's Home Directory
mkdir /mnt/volume1/user1/user1 chown user1:user1 /mnt/volume1/user1/user1
5. Configure SSH in Services -> SSH. Add these lines to the Extra Options section:
Match Group sftp ChrootDirectory %h ForceCommand internal-sftp AllowTcpForwarding no
6. Start the SSH service in Control Services. Click the red OFF button next to SSH. After a second or so, it will change to a blue ON , indicating that the service has been enabled. 7. Test the connection from a client using a utility such as WinSCP. In the example shown in Figure 8.14c, user1 is connecting to a FreeNAS server with an IP address of 192.168.2.9. The password matches the one set in their user account on the FreeNAS system and SFTP has been selected as the File protocol for the connection. Once connected, the user can see the files on their Windows system in the left frame and the files on the FreeNAS system in the right frame, as shown in Figure 8.14d.
Notice that the directory structure on the FreeNAS system starts at <root>. If the user clicks on <root>, they can not navigate to a higher folder. If the user tries to copy a file from the Windows system to <root>, the operation will fail. However, if the user clicks on their home folder (in this example, user1), they will enter that folder and can copy files to/from the Windows system within that folder.
8.14.2
If you add any Extra Options in the SSH configuration screen, be aware that the keywords listed in sshd_config(5) are case sensitive. This means that your configuration will fail to do what you intended if you don't match the upper and lowercase letters of the keyword. When configuring SSH, you should always test your configuration as an SSH user account to ensure that the user is limited to what you have configured and that they have permission to transfer files within the intended directories. If the user account is experiencing problems, the SSH error messages are usually pretty specific to what the problem is. Type the following command within Shell to read these messages as they occur:
tail -f /var/log/messages
8.15 TFTP
Trivial File Transfer Protocol (TFTP) is a light-weight version of FTP usually used to transfer configuration or boot files between machines, such as routers, in a local environment. TFTP provides an extremely limited set of commands and provides no authentication. If the FreeNAS system will be used to store images and configuration files for the network's devices, configure and start the TFTP service. Starting the TFTP service will open UDP port 69. NOTE: the current TFTP implementation is limited to a maximum file size of 32MB. A future version of FreeNAS may extend that limit to 4GB. Figure 8.15a shows the TFTP configuration screen and Table 8.15a summarizes the available options:
Table 8.15a: TFTP Configuration Options Setting Directory Allow New Files Port Username Umask Extra options Value Description browse to the directory to be used for storage; some devices require a browse button specific directory name, refer to the device's documentation for details enable if network devices need to send files to the FreeNAS system checkbox (e.g. backup their config) integer UDP port to listen for TFTP requests, 69 by default drop-down account used for tftp requests; must have permission to the Directory menu umask for newly created files, default is 022 (everyone can read, integer nobody can write); some devices require a less strict umask string additional tftpd(8) options not shown in this screen, one per line
8.16 UPS
FreeNAS uses NUT (Network UPS Tools) to provide UPS support. If the FreeNAS system is connected to a UPS device, configure the UPS service then start it in Control Services -> Services. Figure 8.16a shows the UPS configuration screen. Table 8.16a summarizes the options in the UPS Configuration screen. Figure 8.16a: UPS Configuration Screen
Table 8.16a: UPS Configuration Options Setting Identifier Driver Port Auxiliary Parameters Description Shutdown mode FreeNAS 8.2 Users Guide Value string drop-down menu drop-down menu string string drop-down menu Description can contain alphanumeric, period, comma, hyphen, and underscore characters supported UPS devices are listed at http://www.networkupstools.org/stable-hcl.html list of available serial (e.g. /dev/cuau#) or USB ports (e.g. /dev/ugen.X.X) UPS is plugged into (see NOTE below) additional options from ups.conf(5) optional choices are UPS goes on battery and UPS reaches low battery Page 203 of 235
Setting
Description in seconds; will initiate shutdown after this many seconds Shutdown timer integer after UPS enters Shutdown mode, unless power is restored default is known value fixmepass and should be changed; UPS Master User Password string can not contain a space or # defines the accounts that have administrative access; see Extra users string upsd.users(5) for examples if enabled, be aware that the default is to listen on all Remote monitor checkbox interfaces and to use the known values user upsmon and password fixmepass Send Email Status Updates checkbox if checked, activates the To email field if Send Email box checked, email address of person to To email email address receive status updates Email subject string if send Email Box checked, subject of email updates NOTE: for USB devices, the easiest way to determine the correct device name is to check the box "Show console messages" in System -> Settings -> Advanced. Plug in the USB device and the console messages will give the name of the /dev/ugenX.X device; where the X's are the numbers that show on the console. upsc(8) can be used to get status variables from the UPS Daemon such as the current charge and input voltage. It can be run from Shell using the following syntax. The man page gives some other usage examples.
upsc ups@localhost
Value
Additional Options
This section covers the remaining miscellaneous options available from the FreeNAS graphical administrative interface.
9.1
If you click Display System Processes, a screen will open showing the output of top(1). An example is shown in Figure 9.1a. The display will automatically refresh itself. Simply click the X in the upper right corner to close the display when you are finished. Note that the display is read-only, meaning that you won't be able to issue a kill command within it.
9.2
Shell
Beginning with version 8.2.0, the FreeNAS GUI provides a web shell, making it easy to run command line tools from the web browser as the root user. In previous versions of FreeNAS, you either had to have physical access to a keyboard attached to the FreeNAS console, or you had to enable the SSH service, add a user to the wheel group, and set a password for root in order to access a root console shell. Both of those access methods could be considered security risks in some environments. The link to Shell is the third entry from the bottom of the menu tree. In Figure 9.2a, the link has been clicked and Shell is open. The prompt indicates that the current user is root, the hostname is freenas, and the current working directory is ~ (root's home directory). While you are in Shell, you will not have access to any of the other GUI menus. If you are using Shell for troubleshooting purposes and need to leave the Shell in order to modify a configuration, click the x in the window's upper right corner. The next time you enter Shell, you will return to your last session. When you are finished using Shell, type exit to leave the session completely. Shell provides history (use your up arrow to see previously entered commands and press enter to repeat the currently displayed command) and tab completion (type a few letters and press tab to complete a command name or filename in the current directory).
NOTE: not all of Shell's features render correctly in Chrome. Firefox is the recommended browser for using Shell. Due to the embedded nature of FreeNAS, some FreeBSD components are missing and noticeable in Shell. For example, man pages are not included; however, FreeBSD man pages can be read online. Most FreeBSD command line utilities should also be available in Shell. Additional troubleshooting utilities that are provided by FreeNAS are described in section 11: Useful Command Line Utilities.
9.3
Reboot
If you click Reboot, you will receive the warning message shown in Figure 9.3a and your browser color will change to red to indicate that you have selected an option that will negatively impact users of the FreeNAS system. Figure 9.3a: Reboot Warning Message
Click the Cancel button if you wish to cancel the reboot request. Otherwise, click the Reboot button to reboot the system. Rebooting the system will disconnect all clients, including the web administration GUI. The URL in your web browser will change to add /system/reboot/ to the end of the IP address. FreeNAS 8.2 Users Guide Page 206 of 235
Wait a few minutes for the system to boot, then use your browser's back button to return to the FreeNAS system's IP address. If all went well, you should receive the GUI login screen. If the login screen does not appear, you will need physical access to the FreeNAS system's monitor and keyboard so that you can determine what problem is preventing the system from resuming normal operation.
9.4
Shutdown
If you click Shutdown, you will receive the warning message shown in Figure 9.4a and your browser color will change to red to indicate that you have selected an option that will negatively impact users of the FreeNAS system. Figure 9.4a: Shutdown Warning Message Click the Cancel button if you wish to cancel the shutdown request. Otherwise, click the Shutdown button to halt the system. Shutting down the system will disconnect all clients, including the web administration GUI, and will power off the FreeNAS system. You will need physical access to the FreeNAS system in order to turn it back on.
9.5
Help
The Help button in the upper right corner provides hyperlinks to the various FreeNAS resources, including: the community forum, mailing lists, IRC channel, bug tracker, and this documentation. These resources are discussed in more detail in the next section. It also displays the currently installed FreeNAS version and revision number.
9.6
Log Out
To log out of the FreeNAS GUI, simply click the Log Out button in the upper right corner. You will immediately be logged out. An informational message will indicate that you are logged out and will provide a hyperlink which you can click on to log back in.
9.7
Alert
FreeNAS provides an alert system to provide a visual warning of any conditions that require administrative attention. The Alert button in the far right corner will flash red when there is an outstanding alert. For example, the first time you access the administrative GUI, the alert button will be flashing. If you click the icon, you will see the screen shown in Figure 9.7a: Figure 9.7a: Example Alert Message Behind the scenes, an alert script checks for various alert conditions, such as volume and disk status, and writes the current conditions to /var/tmp/alert. A javascript retrieves the current alert status every 5 minutes and will change the solid green alert icon (if there are no current alert conditions) to flashing red (if a new alert is detected).
Some of the conditions that trigger an alert include: Plugins Jail IP address is unreachable non-optimal multipath states UPS ONBATT/LOWBATT event ZFS pool status changes from HEALTHY the system is unable to bind to the WebGUI Address set in System -> Settings -> General the system can not find an IP address configured on an iSCSI portal
10.3 IRC
If you wish to ask a question in real time, you can try the #freenas channel on IRC Freenode. Depending upon the time of day (and your time zone), a FreeNAS developer or other FreeNAS users may be available to assist you. If you don't get an answer right away, remain on the channel as other users tend to read the channel history in order to answer questions as they are able to. You will need an IRC client in order to access the #freenas channel. To get the most out of the IRC channel, keep the following points in mind: don't ask "can anyone help me?"; instead, just ask your question. If someone knows the answer, they will try to assist you. don't ask a question and then leave. Users who know the answer can't help you if you disappear. don't take it personally if no one answers or demand that someone answers your question. Maybe no one who knows the answer is available, maybe your question is really hard, or maybe it is a question that has already been answered many times in the other support resources. Try asking again in a few hours or research the other resources to see if you've missed anything. Don't post error messages in the channel as the IRC software will probably kick you out. Instead, use a pasting service such as pastebin and refer to the URL on channel. If you prefer to paste an image of your error, you can upload it to a temporary screenshot hosting service such as Upload Screenshot and post the URL to your uploaded image.
freenas-testing: FreeNAS developers are subscribed to this list. Technical questions about the upcoming FreeNAS release and feedback on testing snapshots can be posted here. freenas-translations: This list is for discussion regarding FreeNAS localization and translating FreeNAS documentation. Archives of the mailing lists are available from Gmane which allows you to read the archives in various formats (blog style, news reader style) and to subscribe to RSS feeds for the lists.
10.5 Forums
Another information source for FreeNAS is the Forums. Forums contain user-contributed tips and guides which have been categorized, making it an ideal resource if you wish to learn more about a certain aspect of FreeNAS. A searchbar is included should you wish to search by keyword; alternately, you can click a category to browse through the threads that exist for that topic. The following categories are available under Help and Support: FreeNAS 4 N00bs: post here if you are new to FreeNAS and are unsure which category best matches your question. Feature Requests: for the discussion of upcoming features and to request features not listed on the Roadmap. Bug Reporting: do you think you have found a bug in FreeNAS and want to discuss it before creating a support ticket? Hardware: for the discussion of hardware and tips for getting the most out of your hardware. User Authentication: LDAP and Active Directory. Sharing: AFP, CIFS, NFS, and iSCSI. Storage: replication, snapshots, volumes, and ZFS. Networking: networking hardware, performance, link aggregation, VLANs, DDNS, FTP, SNMP, SSH, and TFTP. Installation: installing help or advice before performing the installation. Plugins: provides a discussion area for creating and troubleshooting PBIs and the plugins jail. The following categories are available under Development: FreeNAS: general development discussion. nanobsd: the embedded operating system FreeNAS is based upon. Django: the web framework used by the FreeNAS graphical administrative interface. Dojo Toolkit: the javascript toolkit used to create widgets and handle client side processing. The following categories are available under How-To Guides: Hacking: undocumented tricks for getting the most out of your FreeNAS system. Installation: specific installation scenarios (hardware and/or software). FreeNAS 8.2 Users Guide Page 210 of 235
Configuration: specific configuration scenarios (e.g. software or client configuration). Hardware: instructions for setting up specific hardware. There is also an Announcements forum. As new testing snapshots become available and new software versions are released, they are announced in this forum. The following categories are available under Community Forum: Off-topic: want to discuss something of interest to FreeNAS users but which is not necessarily related to FreeNAS? This is your place. Resources: blogs, reviews, and other sources of FreeNAS information not listed at freenas.org. Introductions: FreeNAS Community meet 'n greet - introduce yourself and let us know who we are chatting with. The following language-specific categories are available under International, allowing FreeNAS users to interact with each other in their native language: Dutch - Nederlands German - Deutsch French - Francais Italian - Italiano Spanish Espanol Turkish - Trke If you wish to ask a question on the forum, you will need to click the Register link to create an account and login using that account. When asking a question on the forum, it is important that you: first check to see if the question has already been asked. If you find a similar question, don't create a new thread. Instead use the "Reply to Thread" button to add your comments to the existing thread. review the available categories to see which one is most closely related to your question. Click on that category and use the "Post New Thread" button to open the editor. After typing your post and before you click the "Submit New Thread" button, make sure the "Subscribe to this thread and notify me of changes" box is checked. That way you will be notified whenever anyone answers your question.
FreeNAS 8.0.1: Shares Overview FreeNAS 8.0.1: Network Configuration Overview FreeNAS 8.0.1: iSCSI In-depth FreeNAS 8.0.1: All in One FreeNAS 8.0.1: LAGG and VLAN FreeNAS 8.0.1: Backups in Depth FreeNAS 8.0.3: FTP Configuration NOTE: videos are version-specific, meaning that some details of the tasks demonstrated may have changed in more recent versions of FreeNAS. When in doubt, refer to the documentation specific to your version of FreeNAS. The Too Smart Guys show also has a series of videos: Building a FreeNAS 8 Box - Part 1 Hardware FreeNAS 8 - Build and Install FreeNAS 8 EP3 Configuration FreeNAS 8 Part 4 - FTP Server Setup FreeNAS 8.2 Step by Step setup in about 15min!
The following utilities are specific to RAID controllers: tw_cli: used to monitor and maintain 3ware RAID controllers MegaCli: used to configure and manage LSI MegaRAID SAS family of RAID controllers IPMItool: used to manage and configure IPMI devices This section also describes the following utilities: freenas-debug: the backend used to dump FreeNAS debugging information tmux: a terminal multiplexer similar to GNU screen
11.1 Iperf
Iperf is a utility for measuring maximum TCP and UDP bandwidth performance. It can be used to chart network throughput over time. For example, you can use it to test the speed of different types of shares to determine which type best performs on your network. FreeNAS includes the Iperf server. To perform network testing, you will need to install an Iperf client on a desktop system that has network access to the FreeNAS system. This section will demonstrate how to use the xjperf GUI client as it works on Windows, Mac OS X, Linux, and BSD systems. Since this client is java based, you will also need to install the appropriate JRE for the client operating system. Linux and BSD users will also need to install the iperf package using their operating system's package management system. To start xjperf on Windows: unzip the downloaded file, start Command Prompt in Run as administrator mode, cd to the unzipped folder, and run jperf.bat. To start xjperf on Mac OS X, Linux, or BSD, unzip the downloaded file, cd to the unzipped directory, type chmod u+x jperf.sh, and run ./jperf.sh. Once the client is ready, you need to start the Iperf server on FreeNAS. To see the available server options, open Shell and type:
iperf --help | more Usage: iperf [-s|-c host] [options] iperf [-h|--help] [-v|--version] Client/Server: -f, --format [kmKM] format to report: Kbits, Mbits, KBytes, MBytes -i, --interval # seconds between periodic bandwidth reports -l, --len #[KM] length of buffer to read or write (default 8 KB) -m, --print_mss print TCP maximum segment size (MTU - TCP/IP header) -o, --output <filename> output the report or error message to this specified file -p, --port # server port to listen on/connect to -u, --udp use UDP rather than TCP -w, --window #[KM] TCP window size (socket buffer size) -B, --bind <host> bind to <host>, an interface or multicast address -C, --compatibility for use with older versions does not sent extra msgs -M, --mss # set TCP maximum segment size (MTU - 40 bytes)
-N, --nodelay -V, --IPv6Version Server specific: -s, --server -U, --single_udp -D, --daemon Client specific: -b, --bandwidth #[KM]
set TCP no delay, disabling Nagle's Algorithm Set the domain to IPv6
run in server mode run in single threaded UDP mode run the server as a daemon
for UDP, bandwidth to send at in bits/sec (default 1 Mbit/sec, implies -u) -c, --client <host> run in client mode, connecting to <host> -d, --dualtest Do a bidirectional test simultaneously -n, --num #[KM] number of bytes to transmit (instead of -t) -r, --tradeoff Do a bidirectional test individually -t, --time # time in seconds to transmit for (default 10 secs) -F, --fileinput <name> input the data to be transmitted from a file -I, --stdin input the data to be transmitted from stdin -L, --listenport # port to receive bidirectional tests back on -P, --parallel # number of parallel client threads to run -T, --ttl # time-to-live, for multicast (default 1) -Z, --linux-congestion <algo> set TCP congestion control algorithm (Linux only) Miscellaneous: -x, --reportexclude [CDMSV] exclude C(connection) D(data) M(multicast) S(settings) V(server) reports -y, --reportstyle C report as a Comma-Separated Values -h, --help print this message and quit -v, --version print version information and quit [KM] Indicates options that support a K or M suffix for kilo- or megaThe TCP window size option can be set by the environment variable TCP_WINDOW_SIZE. Most other options can be set by an environment variable IPERF_<long option name>, such as IPERF_BANDWIDTH.
For example, to perform a TCP test and start the server in daemon mode (so that you get your prompt back), type:
iperf -sD -----------------------------------------------------------Server listening on TCP port 5001 TCP window size: 64.0 KByte (default) -----------------------------------------------------------Running Iperf Server as a daemon The Iperf daemon process ID: 4842
NOTE: if you close Shell, the daemon process will stop. Have your environment setup (e.g. shares configured and started) before starting the iperf process. From your desktop, open the client. Input the IP of address of the FreeNAS system, specify the running time for the test under Application layer options -> Transmit (the default test time is 10 seconds), and click the Run Iperf! button. Figure 11.1a shown an example of the client running on a Windows system while an SFTP transfer is occurring on the network. FreeNAS 8.2 Users Guide Page 214 of 235
Depending upon the traffic being tested (e.g. the type of share running on your network), you may need to test UDP instead of TCP. To start the iperf server in UDP mode, use /usr/local/bin/iperf -sDu as the u specifies UDP; the startup message should indicate that the server is listening for UDP datagrams. If you are not sure if the traffic that you wish to test is UDP or TCP, run this command to determine which services are running on the FreeNAS system:
sockstat USER root root www www www root root root root root root root root -4 | more COMMAND iperf iperf nginx nginx nginx sshd python mountd mountd rpcbind rpcbind rpcbind nginx PID 4870 4842 4827 4827 4827 3852 2503 2363 2363 2359 2359 2359 2044 FD 6 6 3 5 7 5 5 7 8 9 10 11 7 PROTO udp4 tcp4 tcp4 tcp4 tcp4 tcp4 udp4 udp4 tcp4 udp4 udp4 tcp4 tcp4 LOCAL ADDRESS *:5001 *:5001 127.0.0.1:15956 192.168.2.11:80 *:80 *:22 *:* *:812 *:812 *:111 *:886 *:111 *:80 FOREIGN ADDRESS *:* *:* 127.0.0.1:9042 192.168.2.26:56964 *:* *:* *:* *:* *:* *:* *:* *:* *:*
3 4 7 20 22 25 6
When you are finished testing, either type killall iperf or close Shell to terminate the iperf server process.
11.2 Netperf
Netperf is a benchmarking utility that can be used to measure the performance of unidirectional throughput and end-to-end latency. Before you can use the netperf command, you must start its server process using this command:
netserver Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC
The following command will display the available options for performing tests with the netperf command. The Netperf Manual describes each option in more detail and explains how to perform many types of tests. It is the best reference for understanding how each test works and how to interpret your results. When you are finished with your tests, type killall netserver to stop the server process.
netperf -h |more Usage: netperf [global options] -- [test options] Global options: -a send,recv Set the local send,recv buffer alignment -A send,recv Set the remote send,recv buffer alignment -B brandstr Specify a string to be emitted with brief output -c [cpu_rate] Report local CPU usage -C [cpu_rate] Report remote CPU usage -d Increase debugging output -D [secs,units] * Display interim results at least every secs seconds using units as the initial guess for units per second -f G|M|K|g|m|k Set the output units -F fill_file Pre-fill buffers with data from fill_file -h Display this text -H name|ip,fam * Specify the target machine and/or local ip and family -i max,min Specify the max and min number of iterations (15,1) -I lvl[,intvl] Specify confidence level (95 or 99) (99) and confidence interval in percentage (10) -j Keep additional timing statistics -l testlen Specify test duration (>0 secs) (<0 bytes|trans) -L name|ip,fam * Specify the local ip|name and address family -o send,recv Set the local send,recv buffer offsets -O send,recv Set the remote send,recv buffer offset -n numcpu Set the number of processors for CPU util -N Establish no control connection, do 'send' side only -p port,lport* Specify netserver port number and/or local port -P 0|1 Don't/Do display test headers -r Allow confidence to be hit on result only -s seconds Wait seconds between test setup and test start
-S -t -T -v -W -v -V
Set SO_KEEPALIVE on the data connection Specify test to perform Request netperf/netserver be bound to local/remote cpu Specify the verbosity level Set the number of send,recv buffers Set the verbosity level (default 1, min 0) Display the netperf version and exit
For those options taking two parms, at least one must be specified; specifying one value without a comma will set both parms to that value, specifying a value with a leading comma will set just the second parm, a value with a trailing comma will set just the first. To set each parm to unique values, specify both and separate them with a comma.
* For these options taking two parms, specifying one value with no comma will only set the first parms and will leave the second at the default value. To set the second value it must be preceded with a comma or be a comma-separated pair. This is to retain previous netperf behaviour.
11.3 IOzone
IOzone is a disk and filesystem benchmarking tool. It can be used to test file I/O performance for the following operations: read, write, re-read, re-write, read backwards, read strided, fread, fwrite, random read, pread ,mmap, aio_read, and aio_write. FreeNAS ships with IOzone, meaning that it can be run from Shell. When using IOzone on FreeNAS, cd to a directory in a volume that you have permission to write to, otherwise you will get an error about being unable to write the temporary file. Before using IOzone, read through the IOzone documentation PDF as it describes the tests, the many command line switches, and how to interpret your results. If you have never used this tool before, these resources provide good starting points on which tests to run, when to run them, and how to interpret the results: How To Measure Linux Filesystem I/O Performance With iozone Analyzing NFS Client Performance with IOzone 10 iozone Examples for Disk I/O Performance Measurement on Linux You can receive a summary of the available switches by typing the following command.
iozone -h | more iozone: help mode Usage: iozone[-s filesize_Kb] [-r record_size_Kb] [-f [path]filename] [-h] [-i test] [-E] [-p] [-a] [-A] [-z] [-Z] [-m] [-M] [-t children] [-l min_number_procs] [-u max_number_procs] [-v] [-R] [-x] [-o] [-d microseconds] [-F path1 path2...] [-V pattern] [-j stride] [-T] [-C] [-B] [-D] [-G] [-I] [-H depth] [-k depth] [-U mount_point] [-S cache_size] [-O] [-L cacheline_size] [-K] [-g maxfilesize_Kb] [-n minfilesize_Kb] [-N] [-Q] [-P start_cpu] [-e] [-c] [-b Excel.xls] [-J milliseconds] [-X write_telemetry_filename] [-w] [-W] [-Y read_telemetry_filename] [-y minrecsize_Kb] [-q maxrecsize_Kb] [-+u] [-+m cluster_filename] [-+d] [-+x multiplier] [-+p # ]
[-+r] [-+t] [-+X] [-+Z] [-+w percent dedupable] [-+y percent_interior_dedup] [-+C percent_dedup_within] -a Auto mode -A Auto2 mode -b Filename Create Excel worksheet file -B Use mmap() files -c Include close in the timing calculations -C Show bytes transferred by each child in throughput testing -d # Microsecond delay out of barrier -D Use msync(MS_ASYNC) on mmap files -e Include flush (fsync,fflush) in the timing calculations -E Run extension tests -f filename to use -F filenames for each process/thread in throughput test -g # Set maximum file size (in Kbytes) for auto mode (or #m or #g) -G Use msync(MS_SYNC) on mmap files -h help -H # Use POSIX async I/O with # async operations -i # Test to run (0=write/rewrite, 1=read/re-read, 2=random-read/write 3=Read-backwards, 4=Re-write-record, 5=stride-read, 6=fwrite/re-fwrite 7=fread/Re-fread, 8=random_mix, 9=pwrite/Re-pwrite, 10=pread/Re-pread 11=pwritev/Re-pwritev, 12=preadv/Re-preadv) -I Use VxFS VX_DIRECT, O_DIRECT,or O_DIRECTIO for all file operations -j # Set stride of file accesses to (# * record size) -J # milliseconds of compute cycle before each I/O operation -k # Use POSIX async I/O (no bcopy) with # async operations -K Create jitter in the access pattern for readers -l # Lower limit on number of processes to run -L # Set processor cache line size to value (in bytes) -m Use multiple buffers -M Report uname -a output -n # Set minimum file size (in Kbytes) for auto mode (or #m or #g) -N Report results in microseconds per operation -o Writes are synch (O_SYNC) -O Give results in ops/sec. -p Purge on -P # Bind processes/threads to processors, starting with this cpu -q # Set maximum record size (in Kbytes) for auto mode (or #m or #g) -Q Create offset/latency files -r # record size in Kb or -r #k .. size in Kb or -r #m .. size in Mb or -r #g .. size in Gb -R Generate Excel report -s # file size in Kb or -s #k .. size in Kb or -s #m .. size in Mb or -s #g .. size in Gb -S # Set processor cache size to value (in Kbytes) -t # Number of threads or processes to use in throughput test -T Use POSIX pthreads for throughput tests -u # Upper limit on number of processes to run -U Mount point to remount between tests -v version information -V # Verify data pattern write/read -w Do not unlink temporary file
-W Lock file when reading or writing -x Turn off stone-walling -X filename Write telemetry file. Contains lines with (offset reclen compute_time) in ascii -y # Set minimum record size (in Kbytes) for auto mode (or #m or #g) -Y filename Read telemetry file. Contains lines with (offset reclen compute_time) in ascii -z Used in conjunction with -a to test all possible record sizes -Z Enable mixing of mmap I/O and file I/O -+E Use existing non-Iozone file for read-only testing -+K Sony special. Manual control of test 8. -+m Cluster_filename Enable Cluster testing -+d File I/O diagnostic mode. (To troubleshoot a broken file I/O subsystem) -+u Enable CPU utilization output (Experimental) -+x # Multiplier to use for incrementing file and record sizes -+p # Percentage of mix to be reads -+r Enable O_RSYNC|O_SYNC for all testing. -+t Enable network performance test. Requires -+m -+n No retests selected. -+k Use constant aggregate data set size. -+q Delay in seconds between tests. -+l Enable record locking mode. -+L Enable record locking mode, with shared file. -+B Sequential mixed workload. -+A # Enable madvise. 0 = normal, 1=random, 2=sequential 3=dontneed, 4=willneed -+N Do not truncate existing files on sequential writes. -+S # Dedup-able data is limited to sharing within each numerically identified file set -+V Enable shared file. No locking. -+X Enable short circuit mode for filesystem testing ONLY ALL Results are NOT valid in this mode. -+Z Enable old data set compatibility mode. WARNING.. Published hacks may invalidate these results and generate bogus, high values for results. -+w ## Percent of dedup-able data in buffers. -+y ## Percent of dedup-able within & across files in buffers. -+C ## Percent of dedup-able within & not across files in buffers. -+H Hostname Hostname of the PIT server. -+P Service Service of the PIT server. -+z Enable latency histogram logging.
As you can see from the number of options, IOzone is comprehensive and it may take some time to learn how to use the tests effectively. NOTE: if you prefer to visualize the collected data, scripts are available to render iozone's output in Gnuplot. Updated versions of those scripts are available here.
11.4 arcstat
Arcstat is a script that prints out ZFS ARC statistics. Originally it was a perl script created by Sun. That perl script was ported to FreeBSD and was then ported as a Python script for use on FreeNAS. Watching ARC hits/misses and percentages will provide an indication of how well your ZFS pool is fetching from the ARC rather than using disk I/O. Ideally, you want as many things fetching from FreeNAS 8.2 Users Guide Page 219 of 235
cache as possible. Keep your load in mind as you review the stats. For random reads, expect a miss and having to go to disk to fetch the data. For cached reads, expect it to pull out of the cache and have a hit. Like all cache systems, the ARC takes time to fill with data. This means that it will have a lot of misses until the pool has been in use for a while. If there continues to be lots of misses and high disk I/O on cached reads, there is cause to investigate further and tune the system. The FreeBSD ZFS Tuning Guide provides some suggestions for commonly tuned sysctl values. It should be noted that performance tuning is more of an art than a science and that any changes you make will probably require several iterations of tune and test. Be aware that what needs to be tuned will vary depending upon the type of workload and that what works for one person's network may not benefit yours. In particular, the value of pre-fetching depends upon the amount of memory and the type of workload, as seen in these two examples: Understanding ZFS: Prefetch ZFS prefetch algorithm can cause performance drawbacks 11.4.1 Using the Scripts
FreeNAS provides two command line scripts: arc_summary.py: used to watch the statistics in real time arcstat.py: provides a summary of the statistics For now, these scripts can be manually run from Shell. Future FreeNAS versions will automatically integrate their results into a System -> Reporting graph. The advantage of these scripts is that they can be used to provide real time (right now) information, whereas the current GUI reporting mechanism is designed to only provide graphs charted over time. To view the help for arcstat.py:
/usr/local/www/freenasUI/tools/arcstat.py -h Usage: arcstat [-hvx] [-f fields] [-o file] [-s string] [interval [count]] -h: Print this help message -v: List all possible field headers and definitions -x: Print extended stats -f: Specify specific fields to print (see -v) -o: Redirect output to the specified file -s: Override default field separator with custom character or string Examples: arcstat -o /tmp/a.log 2 10 arcstat -s "," -o /tmp/a.log 2 10 arcstat -v arcstat -f time,hit%,dh%,ph%,mh% 1
To view ARC statistics in real time, specify an interval and a count. This command will display every 1 second for a count of five.
/usr/local/www/freenasUI/tools/arcstat.py 1 5 time read miss miss% dmis dm% pmis pm% 06:19:03 0 0 0 0 0 0 0 mmis 0 mm% 0 arcsz 425K c 6.6G
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
0 0 0 0
Real Managed: Logical Total: Logical Used: Logical Free: Kernel Memory: Data: Text: Kernel Memory Map: Size: Free: ARC Summary: (HEALTHY) Storage pool Version: Filesystem Version: Memory Throttle Count: ARC Misc: Deleted: Recycle Misses: Mutex Misses: Evict Skips: ARC Size: Target Size: (Adaptive) Min Size (Hard Limit): Max Size (High Water): ARC Size Breakdown: Recently Used Cache Size: Frequently Used Cache Size: ARC Hash Breakdown: Elements Max: Elements Current: Collisions: Chain Max: Chains: ARC Efficiency: Cache Hit Ratio: Cache Miss Ratio: Actual Hit Ratio: Data Demand Efficiency: CACHE HITS BY CACHE LIST: Most Recently Used: Most Frequently Used: Most Recently Used Ghost: Most Frequently Used Ghost: CACHE HITS BY DATA TYPE: Demand Data: Prefetch Data: Demand Metadata: Prefetch Metadata: CACHE MISSES BY DATA TYPE: Demand Data: Prefetch Data: Demand Metadata: Prefetch Metadata: File-Level Prefetch: (HEALTHY) DMU Efficiency: Hit Ratio: Miss Ratio: Colinear:
7.65 8.00 675.13 7.34 86.86 72.51 14.35 7.65 26.43 7.62 15 4 0
GiB GiB MiB GiB MiB MiB MiB GiB MiB GiB
25 0 0 0 0.01% 425.66 KiB 100.00% 6.65 GiB 12.50% 851.08 MiB 8:1 6.65 GiB 50.00% 50.00% 3.32 3.32 GiB GiB
46 100.00% 46 0 0 0 581 96.39% 560 3.61% 21 96.39% 560 100.00% 4 23.04% 76.96% 2.14% 1.61% 0.71% 0.00% 99.29% 0.00% 0.00% 0.00% 100.00% 0.00% 129 431 12 9 4 0 556 0 0 0 21 0 2.27k 2.24k 31 31
98.63% 1.37%
Hit Ratio: 0.00% Miss Ratio: 100.00% Stride: Hit Ratio: 100.00% 2.24k Miss Ratio: 0.00% DMU Misc: Reclaim: Successes: 0.00% Failures: 100.00% Streams: +Resets: 0.00% -Resets: 100.00% Bogus: VDEV Cache Summary: Hit Ratio: 90.48% Miss Ratio: 9.52% Delegations: 0.00% ZFS Tunable (sysctl): kern.maxusers vm.kmem_size vm.kmem_size_scale vm.kmem_size_min vm.kmem_size_max vfs.zfs.l2c_only_size vfs.zfs.mfu_ghost_data_lsize vfs.zfs.mfu_ghost_metadata_lsize vfs.zfs.mfu_ghost_size vfs.zfs.mfu_data_lsize vfs.zfs.mfu_metadata_lsize vfs.zfs.mfu_size vfs.zfs.mru_ghost_data_lsize vfs.zfs.mru_ghost_metadata_lsize vfs.zfs.mru_ghost_size vfs.zfs.mru_data_lsize vfs.zfs.mru_metadata_lsize vfs.zfs.mru_size vfs.zfs.anon_data_lsize vfs.zfs.anon_metadata_lsize vfs.zfs.anon_size vfs.zfs.l2arc_norw vfs.zfs.l2arc_feed_again vfs.zfs.l2arc_noprefetch vfs.zfs.l2arc_feed_min_ms vfs.zfs.l2arc_feed_secs vfs.zfs.l2arc_headroom vfs.zfs.l2arc_write_boost vfs.zfs.l2arc_write_max vfs.zfs.arc_meta_limit vfs.zfs.arc_meta_used vfs.zfs.mdcomp_disable vfs.zfs.arc_min vfs.zfs.arc_max vfs.zfs.zfetch.array_rd_sz vfs.zfs.zfetch.block_cap vfs.zfs.zfetch.min_sec_reap vfs.zfs.zfetch.max_streams vfs.zfs.prefetch_disable
0 31 2.24k 0 31 0 31 1 0 1 0 21 19 2 0 384 8213114880 1 0 329853485875 0 0 0 0 2048 37888 39936 0 512 512 3584 184832 323584 0 0 0 1 1 0 200 1 2 8388608 8388608 1784843264 430248 0 892421632 7139373056 1048576 256 2 8 0
vfs.zfs.check_hostid vfs.zfs.recover vfs.zfs.txg.write_limit_override vfs.zfs.txg.synctime vfs.zfs.txg.timeout vfs.zfs.scrub_limit vfs.zfs.vdev.cache.bshift vfs.zfs.vdev.cache.size vfs.zfs.vdev.cache.max vfs.zfs.vdev.aggregation_limit vfs.zfs.vdev.ramp_rate vfs.zfs.vdev.time_shift vfs.zfs.vdev.min_pending vfs.zfs.vdev.max_pending vfs.zfs.cache_flush_disable vfs.zfs.zil_disable vfs.zfs.zio.use_uma vfs.zfs.version.zpl vfs.zfs.version.spa vfs.zfs.version.dmu_backup_stream vfs.zfs.version.dmu_backup_header vfs.zfs.version.acl vfs.zfs.debug vfs.zfs.super_owner
When reading the tunable values, 0 means no, 1 typically means yes, and any other number represents a value. To receive a brief description of a sysctl value, use sysctl -d. For example:
sysctl -d vfs.zfs.zio.use_uma vfs.zfs.zio.use_uma: Use uma(9) for ZIO allocations
You'll note that the ZFS tunables require a fair understanding of how ZFS works, meaning that you will be reading man pages and searching for the meaning of acronyms you are unfamiliar with. Do not change a tunable's value without researching it first. If the tunable takes a numeric value (rather than 0 for no or 1 for yes), do not make one up: research examples of beneficial values that match your workload. If you decide to change any of the ZFS tunables, continue to monitor the system to determine the effect of the change. It is recommended that you test your changes first at the command line using sysctl. For example, to disable pre-fetch (i.e. change disable to 1 or yes):
vfs.zfs.prefetch_disable=1 vfs.zfs.prefetch_disable: 0 -> 1
The output will indicate the old value followed by the new value. If the change is not beneficial, change it back to the original value. If the change turns out to be beneficial, you can make it permanent by creating a tunable.
11.5 XDD
XDD is a utility which provides accurate and detailed measurements of disk I/O performance. This section provides some usage examples. Type the name of the command without any options to see its usage: FreeNAS 8.2 Users Guide Page 224 of 235
xdd Usage: xdd command-line-options -align [target <target#>] <#bytes> -blocksize [target <target#>] <#bytes/block> -combinedout <filename> -createnewfiles [target <target#>] -csvout <filename> -datapattern [target <target#>] <c> | random | sequenced | ascii <asciistring> | hex <hexdigits> | replicate -delay #seconds -deletefile [target <target#>] -deskew -devicefile -dio [target <target#>] -errout <filename> -fullhelp -heartbeat # -id "string" | commandline -kbytes [target <target#>] <#> -lockstep <mastertarget#> <slavetarget#> <time|op|percent|mbytes|kbytes> # <time| op|percent|mbytes|kbytes># <wait|run> <complete|stop> -lockstepoverlapped -maxall -maxerrors # -maxpri -mbytes [target <target#>] <#> -minall -nobarrier -nomemlock -noproclock -numreqs [target <target#>] <#> -operation [target <target#>] read|write -output <filename> -passes # -passoffset [target <target#>] <#blocks> -preallocate [target <target#>] <#blocks> -processlock -processor target# processor# -queuedepth #cmds -qthreadinfo -randomize [target <target#>] -readafterwrite [target #] trigger <stat | mp> | lag <#> | reader <hostname> | port <#> -reallyverbose -recreatefiles [target <target#>] -reopen [target <target#>] -reportthreshold [target #] <#.#> -reqsize [target <target#>] <#blocks> -roundrobin # or 'all' -runtime #seconds -rwratio [target <target#>] <ratio> -seek [target <target#>] save <filename> | load <filename> | disthist #buckets | seekhist #buckets | sequential | random | range #blocks | stagger | interleave #blocks | seed # | none -setup filename -sgio -sharedmemory [target <target#>]
-singleproc # -startdelay [target <target#>]#.#seconds -startoffset [target <target#>] # -starttime #seconds -starttrigger <target#> <target#> <<time|op|percent|mbytes|kbytes> #> -stoptrigger <target#> <target#> <<time|op|percent|mbytes|kbytes> #> -syncio # -syncwrite [target <target#>] -target filename -targetdir [target <target#>] <directory_name> -targetoffset # -targets # filename filename filename... -or- -targets -# filename -targetstartdelay #.#seconds -throttle [target <target#>] <ops|bw|var> <#.#ops | #.#MB/sec | #.#var> -timelimit [target <target#>] <#seconds> -timerinfo -timeserver <host hostname | port # | bounce #> -ts [target <target#>] summary|detailed|wrap|oneshot|size #|append|output <filename>|dump <filename>|triggertime <seconds>|triggerop <op#> -verbose -verify [target <target#>] location|contents -version
This test will write sequentially from two existing target files, /mnt/tank/BIGFILE1 and /mnt/tank/BIGFILE2. It starts at the beginning of each file using a fixed request size of 128 blocks with 512 bytes per block until it has read 2048 MB, at which time it will end the current pass and proceed to the next pass. It will do this 3 times and display performance information for each pass. The combined performance of both devices is calculated and displayed at the end of the run. Once the test is finished, you can test the read performance by changing the -op to read. You can also test read or write operations on a specified disk. Replace /dev/ada0 with the device name for the disk you wish to test.
xdd op read targets 1 /dev/ada0 reqsize 128 -mbytes 64 passes 3 verbose
If you use the same switches often, create a setup file and refer to it with the -setup switch. For example, in a writeable location (e.g. volume or dataset) create a xdd.setup file containing this line:
reqsize 128 -mbytes 64 passes 3 verbose
This random I/O test will read from the target device at some random location using a fixed request FreeNAS 8.2 Users Guide Page 226 of 235
size of 8 blocks until it has read 16 MB. It will do this 3 times and display performance information for each pass. Since this is a random I/O pattern, the read requests are distributed over a range of 4,000,000 blocks. This is useful in constraining the area over which the random locations are chosen from. The same seek locations are used for each pass in order to generate reproducible results. In fact, upon each invocation of xdd using the same parameters, the same random locations are generated each time. This allows the user to change the disk or starting offset and observe the effects. The random locations may be changed from pass to pass within an xdd run by using the -randomize option which generates a new set of locations for each pass. The random locations may be changed from run to run using the seek seed option to specify a different random number generation seed value for each invocation of xdd.
11.6 tw_cli
FreeNAS includes the tw_cli command line utility for providing controller, logical unit, and drive management for AMCC/3ware ATA RAID Controllers. The supported models are listed in the man pages for the twe(4) and twa(4) drivers. Before using this command, read its man page as it describes the terminology and provides some usage examples. If you type tw_cli in Shell, the prompt will change, indicating that you have entered interactive mode where you can run all sorts of maintenance commands on the controller and its arrays. Alternately, you can specify one command to run. For example, to view the disks in the array:
tw_cli /c0 show Unit UnitType Status %RCmpl %V/I/M Stripe Size(GB) Cache AVrfy -----------------------------------------------------------------------------u0 RAID-6 OK 256K 5587.88 RiW ON u1 SPARE OK 931.505 OFF u2 RAID-10 OK 256K 1862.62 RiW ON VPort Status Unit Size Type Phy Encl-Slot Model -----------------------------------------------------------------------------p8 OK u0 931.51 GB SAS /c0/e0/slt0 SEAGATE ST31000640SS p9 OK u0 931.51 GB SAS /c0/e0/slt1 SEAGATE ST31000640SS p10 OK u0 931.51 GB SAS /c0/e0/slt2 SEAGATE ST31000640SS p11 OK u0 931.51 GB SAS /c0/e0/slt3 SEAGATE ST31000640SS p12 OK u0 931.51 GB SAS /c0/e0/slt4 SEAGATE ST31000640SS p13 OK u0 931.51 GB SAS /c0/e0/slt5 SEAGATE ST31000640SS p14 OK u0 931.51 GB SAS /c0/e0/slt6 SEAGATE ST31000640SS p15 OK u0 931.51 GB SAS /c0/e0/slt7 SEAGATE ST31000640SS p16 OK u1 931.51 GB SAS /c0/e0/slt8 SEAGATE ST31000640SS p17 OK u2 931.51 GB SATA /c0/e0/slt9 ST31000340NS p18 OK u2 931.51 GB SATA /c0/e0/slt10 ST31000340NS p19 OK u2 931.51 GB SATA /c0/e0/slt11 ST31000340NS p20 OK u2 931.51 GB SATA /c0/e0/slt15 ST31000340NS Name OnlineState BBUReady Status Volt Temp Hours LastCapTest --------------------------------------------------------------------------bbu On Yes OK OK OK 212 03-Jan-2012
c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0 c0
[Thu [Sat [Sat [Sat [Sat [Sat [Sat [Thu [Thu [Thu [Thu [Sat [Sat [Sat [Sat [Sat [Sat [Thu [Thu [Sat [Sat [Sat [Sat [Sat [Sat
Feb Feb Feb Feb Feb Feb Feb Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar
23 25 25 25 25 25 25 01 01 01 01 03 03 03 03 03 03 08 08 10 10 10 10 10 10
2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012 2012
14:03:02] 00:02:18] 00:02:18] 00:02:18] 03:49:35] 03:51:39] 21:55:59] 13:51:09] 13:51:09] 13:51:09] 13:53:03] 00:01:24] 00:01:24] 00:01:24] 04:04:27] 04:06:25] 16:22:05] 13:41:39] 13:43:42] 00:01:30] 00:01:30] 00:01:30] 05:06:38] 05:08:57] 15:58:15]
INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO
Battery charging completed Verify started: unit=0 Verify started: unit=2,subunit=0 Verify started: unit=2,subunit=1 Verify completed: unit=2,subunit=0 Verify completed: unit=2,subunit=1 Verify completed: unit=0 Battery health check started Battery health check completed Battery charging started Battery charging completed Verify started: unit=0 Verify started: unit=2,subunit=0 Verify started: unit=2,subunit=1 Verify completed: unit=2,subunit=0 Verify completed: unit=2,subunit=1 Verify completed: unit=0 Battery charging started Battery charging completed Verify started: unit=0 Verify started: unit=2,subunit=0 Verify started: unit=2,subunit=1 Verify completed: unit=2,subunit=0 Verify completed: unit=2,subunit=1 Verify completed: unit=0
If you add some disks to the array and they aren't showing up in the GUI, try running the following command:
tw_cli /c0 rescan
Use the drives to create units and export them to the operating system. When finished, run camcontrol rescan all and they will show up in Volume Manager in the GUI.
11.7 MegaCli
MegaCli is the command line interface for the LSI MegaRAID SAS family of RAID controllers. FreeNAS also includes the mfiutil(8) utility which can be used to configure and manage connected storage devices. The MegaCli command is quite complex with several dozen options. While it is fully documented in this 442 page PDF, the commands demonstrated in the Emergency Cheat Sheet can get you started.
11.8 IPMItool
IPMItool provides a command line interface to the Baseboard Management Controller (BMC) found in IPMI devices. An IPMI device provides side-band management should the FreeNAS system become unavailable through the graphical administrative interface. This allows for a few vital functions, such as checking the log, accessing the BIOS setup, and powering on the system without requiring physical access to the system. Before using the ipmitool command, ensure that the IPMI management interface is connected to the network. FreeNAS 8.2 Users Guide Page 228 of 235
NOTE: the ipmitool will fail if the system does not recognize that a BMC is installed. To see all of the options and commands, refer to ipmitool(1). IBM has an excellent document that provides an overview of IPMI and how to get the most out of IPMItools.
11.9 freenas-debug
The FreeNAS GUI provides an option to save debugging information to a text file using System -> Settings -> Advanced -> Save Debug. This debugging information is created by the freenas-debug command line utility and a copy of the information is saved to /var/tmp/freenas-debug.txt. Using Shell, you can run this command manually to gather the specific debugging information that you need. To see the available options, type:
freenas-debug usage: /usr/local/bin/freenas-debug <options> Where options is: -e A list of comma delimited list of email addresses to email the debug log to. -a Dump Active Directory Configuration -c Dump (AD|LDAP) Cache -g Dump GEOM configuration -h Dump Hardware Configuration -l Dump LDAP Configuration -T Loader Configuration Information -n Dump Network Configuration -s Dump SSL Configuration -y Dump Sysctl Configuration -t Dump System Information -z Dump ZFS configuration
For example, if you are troubleshooting your Active Directory configuration, try the following commands. Note that your current directory needs to be writeable (e.g. a volume or dataset).
/usr/local/bin/freenas-debug -a > debug.txt more debug.txt
11.10 tmux
tmux is a terminal multiplexer which enables a number of terminals to be created, accessed, and controlled from a single screen. tmux is an alternative to GNU screen. Similar to screen, tmux can be detached from a screen and continue running in the background, then later reattached. To start a session, simply type tmux. As seen in Figure 11.10a, a new session with a single window will open with a status line at the bottom of the screen. This line shows information on the current session and is used to enter interactive commands. To create a second window, press ctrl b then ". To close a window, type exit within the window. tmux(1) lists all of the key bindings and commands for interacting with tmux windows and sessions.
If you close shell while tmux is running, it will detach its session. The next time you open Shell, it will return to the tmux session. To leave the tmux session entirely, type exit; if you have multiple windows running, you will need to exit out of each first.
localization status of your native language and to translate the text for any menus that have not been localized yet. By providing a web editor and commenting system, Pootle allows translators to spend their time making and reviewing translations rather than learning how to use a translation submission tool. To see the status of a localization, open up the FreeNAS Translation System in your browser, as seen in Figure 12.1a: Figure 12.1a: FreeNAS Localization System
The localizations FreeNAS users have requested are listed alphabetically on the left. If your language is missing and you would like to help in its translation, send an email to the translations mailing list so it can be added. The green bar in the Overall Completion column indicates the percentage of FreeNAS menus that have been localized. If a language is not at 100%, it means that the menus that currently aren't translated will appear in English instead of in that language. If you wish to help localize your language, you should first join the translations mailing list and introduce yourself and which language(s) you can assist with. This will allow you to meet other volunteers as well as keep abreast of any notices or updates that may effect the translations. You will also need to click on the Register link in order to create a Pootle login account. The first time you log into the FreeNAS Pootle interface, you'll be prompted to select your language so that you can access that language's translation whenever you login. Alternately, you can click the Home link to see the status of all of the languages. To work on a translation, click the link for the language -> click the FreeNAS link for the project -> click the link for LC_MESSAGES -> and click the link for django.po. Every text line available in the GUI menu screens has been assigned a string number. If you click the number, an editor will open where you can translate the text. In the example shown in Figure 12.1b, a user has selected string number 46 in the German translation; the other strings in the screenshot have already been translated. FreeNAS 8.2 Users Guide Page 231 of 235
Simply type in the translated text and click the Submit button to save your change.
in before you can create a new ticket. in the Summary section shown in Figure 12.2a, include descriptive keywords that describe your problem or feature request. This is useful for other users who search for a similar problem. You can also include a comma separated list of keywords in the Keywords section. in the Description section, describe the problem, how to recreate it, and include the text of any error messages. If you are requesting a feature, describe the benefit provided by the feature and, if applicable, provide examples of other products that use that feature or the URL of the homepage for the software. If you would like to include a screenshot of your configuration or error, check the "I have files to attach to this ticket" box. under Type, select defect if it is a bug report or enhancement if it is a feature request. for bug reports, be sure to select the version of FreeNAS that you are using. press the Preview button to read through your ticket before submitting it. Make sure it includes all of the information that someone else would need to understand your problem or request. Once you are satisfied with your ticket, click the Create Ticket button to submit it. if you get stuck in how to fill out a field in the ticket, the TracTickets link at the bottom of the ticket creation page has several examples. Figure 12.2a: Creating a New Ticket
provide users an opportunity to test the upcoming release and to provide feedback on bugs and errors so that they can be fixed prior to release. Feedback can be sent to the Freenas-testing mailing list. 12.3.1 Testing a Nightly Snapshot
Changes to FreeNAS occur daily as developers address the bugs and enhancement requests reported by FreeNAS users. A testing version that incorporates these changes is automatically built daily and is available for download as a nightly release. If you wish to install or upgrade to the testing version of FreeNAS (i.e. the version that addresses all fixed bugs up to today's date) or you need to upgrade to a version that incorporates a fix you are waiting for, you can download the latest nightly version. NOTE: it is possible that a recently implemented change will not work as expected or will break something else. If you experience this, take the time to add a comment to the applicable support ticket so that the developers can address the problem. DANGER! upgrading from a nightly snapshot to a RELEASE is not supported! Be wary of installing a nightly in a production environment and be sure to backup your configuration before attempting a full install of a later RC or RELEASE. Nightly builds are available as ISO, GUI upgrade, or .img images. If you are upgrading to a nightly from an earlier version of FreeNAS 8.x, see the section 2.6 Upgrading FreeNAS for instructions on how to upgrade. 12.3.2 Rolling Your Own Testing Snapshot
Users who wish to create their own custom ISO for testing purposes can download and compile the latest FreeNAS source from the svn repository. Read the README first so that you are aware of any gotchas and currently known limitations. If you wish to build your own testing snapshot, you will need to install FreeBSD 8.2 in a virtual environment or on a test system. If you are using a virtual environment, a 64-bit system with at least 4 GB of RAM is recommended. Download the FreeBSD version (i386 or amd64) that matches the architecture that you wish to build and when prompted to choose your distribution set during the installation, select the Minimal install option. After booting into the newly installed FreeBSD system, become the superuser and run the following commands. First, install the software you'll need and refresh your path so it is aware of the new binaries:
pkg_add pkg_add pkg_add pkg_add pkg_add rehash -r -r -r -r -r subversion nano cdrtools python27 pbi-manager
Change to the directory where you would like to store the FreeNAS source, then use this command to download the source:
cd /usr/local svn co https://freenas.svn.sourceforge.net/svnroot/freenas/trunk
Once the build completes, you will have an image in obj.yyyy/FreeNASVVVV-XXXX-yyyy.img.xz where: VVVV is the release branch version XXXX is the svn revision from the FreeNAS repo yyyy is either i386 or amd64 depending on your platform and what was provided via $FREENAS_ARCH on the command line or in an environment setting
This is a compressed raw disk image which needs to be decompressed and converted to your favorite virtual machine container format before use. There will also be a CD image called obj.yyy/FreeNASVVVV-XXXX-yyyy.full.iso that you can burn to disk and use to install or upgrade FreeNAS.