The server needs very basic configuration procedure.

Network

The management network interface for web console, ssh, CLI is usually created during installation time itself.  For Cloud computing instances it is usually the default network that gets assigned.  For any  additional network interfaces  network configuration can be done using

Shell prompt

WebGui


Security

MayaNAS server program is designed to work with SeLinux and firewall rules.  There is no real requirement to disable them.

SeLinux

Explanation of SeLinux  interaction with following components

Snapshot replication

Snapshot Replication service uses secure ssh based communication between MayaNAS servers with proper selinux context ssh_t  as required.  Usually no impact form selinux.

 DRBD

The service script will properly setup customized policy drbdrepli for DRBD when selinux is active.

HeartBeat  HA services

Customized selinux policy update for HeartBeat ping is done automatically when selinux is active.

ZFS

SeLinux adds additional overhead to ZFS by adding xattr on the files and directories. It maybe worthwhile disabling it when SeLinux is not really needed.

firewalld

The required firewall ports for MayaNAS services are automatically opened during installation time or at operation time.

maya.configd

The configuration server for MayaNAS is standard RPC  daemon similar to NFS services program (mountd,lockd) registered with portmapper daemon rpcbind.  The CLI program that contacts maya.configd can be run locally, from another client using ONC RPC/XDR mechanism. This makes the program flexible and cross-platform, and be run from Windows also.   You would need to restrict the client access by using TCP wrapper mechanism as you would for any network service related program.

web-gui

The default TCP port for web console is 2020. It is registered to firewalld as mayastor-gui service.

iSCSI service

Uses standard iSCSI TCP Port 3260 and has to be opened.

Snapshot replication

No additional ports required as it uses SSH pubkey based authentication

 DRBD

Each DRBD configured volume requires TCP port and the script will open-up port with firewalld. It will remove the TCP port when drbd volume is removed.

 HA Cluster services

Needs UDP port 694 to be opened.

On Cloud instances the firewalld rules are usually configured to allow all traffic between the private  networks.  Only for web console firewall rule has to configured to allow the TCP port 2020 for web GUI.

Server Information

The  Configure Server is for entering general bookkeeping  information for your reference only.



Configure Controllers

This configuration is for

Viewing or Editing network information for enet controllers

Viewing or Assign Initiator or Target mode of operation for FC controllers


Configure iSCSI

This configuration is for creating your own iSCSI target names and portal addresses. It is useful when you have multiple network interfaces and would like to control iSCSI service over particular subnet or network controller preference.

Portal Groups

Portal Groups contain list of IPv4 addresses associated with a tag number for referencing.  When iSCSI volume is associated with this tag the iSCSI discovery addresses are returned only with the addresses specified in that portal group.

  1. Enter Portal Tag a value of 1 .. 255
  2. Enter the first IP Address of that list
  3. Enter additional IP Address if available

iSCSI Target Names

MayaNAS server by default creates  iSCSI target name based on system hostname and hostid, while provisioning iSCSI volume to hosts.  But you may wish to create additional iSCSI target names and iSCSI portals to control the iSCSI service over particular subnet or network controller preference.

  1. The Node name is the standard iSCSI name, which is similar to DNS naming convention.  No underscore is permitted in the name.
  2. The Portal Tag is the number referencing the IP address portal list
  3. CHAP User is the user name for iSCSI initiator to use for authentication.
  4. CHAP Password is the password for iSCSI initiator to use for authentication.
  5. Click Apply to save.



Configure NVMET

This configuration is for creating your own NVMe subsystem name and transport addresses. This way you  have the flexibility of creating multiple controller names  in addition to multiple namespaces in a single controller.

Portal Groups

Portal Groups contain list of IPv4 addresses associated with a tag number for referencing.  The transport address and port number is used by the NVMe fabrics discovery from the host side.

  1. Enter Portal Tag a value of 1 .. 255
  2. Enter the first IP Address for discovery from NVMe host.  This field should contain valid IPv4 address even for Infiniband RDMA discovery.
  3. Enter Port Number  also known as service ID for NVMe discovery.

NVMe Target Names

These are NVMeoF subsytem name similar to iSCSI naming convention except they start with nqn.

  1. The Node name is the standard NVMeoF subsystem name which is similar to DNS naming convention.  No underscore is permitted in the name.
  2. The Portal Tag is the number referencing the transport address portal information.
  3. Click Apply to save.