Cohesity SmartFiles Administration 6.6
Cohesity SmartFiles Administration 6.6
Cohesity Academy
Cohesity Technical Trainer
Cohesity Education Disclaimer
This presentation is intended only for use by Cohesity staff, and students. No
copy or use of this presentation should occur without the permission of
Cohesity. Cohesity retains all intellectual property interests associated with
the presentation. Cohesity makes no claim, promise, or guarantee of any kind
about the accuracy, completeness, or adequacy of the content of the
presentation and expressly disclaims liability for errors and omissions in such
content.
Information: https://www.cohesity.com/resource-assets/solution-brief/certification-solution-brief.pdf
• Take free online practice exams to make sure you’re ready for the proctored exam.
• Schedule and take your exam remotely via Yardstick.
• Manage and share your Digital Badges
Benefits
Requirements
Company-level Authorizations
https://www.cohesity.com/academy
• Lab:
• Student login portal:
• https://cohesity.learnondemand.net
• Course Link:
• https://cohesity.learnondemand.net/Class/(class number)
• Login Information:
• Username: email address
• Passwords: cohesity123!
View Clone
S3-NFS compatible cloud Dedupe
Protection job / group
Data protection
Storage Domain Compression NAS generic
Protection Run/Backup snapshots
Replication
CloudArchive Granular recover and restore
S3 bucket QoS
Cohesity Helios
Data Center | Edge | Public Cloud
The Cohesity Helios Platform that can be installed in a data center, public cloud or edge location.
© 2022 Cohesity, Inc. All rights reserved. 10
SmartFiles Overview
Module 1
• Software Defined
Scale without limits
• Optimized Efficiency
Capacity & data management
• Easy to Operate
Policy-based & unified management
• Global Actionable Search
“Google-like” experience
• Integrated Apps
No NAS ecosystem infrastructure required
*Always review your use case and sizing with your Cohesity account team
COHESITY
CLUSTER
• Logical pool of storage that DefaultStorage
spans the cluster Domain
Inline Dedupe, Inline Compression,
• Determines the policy that will and Encryption
be applied to the data
Note: See Create or Edit Storage Domains for more details on Storage Domain settings
*Consult your Cohesity account team before you change the resiliency settings
© 2022 Cohesity, Inc. All rights reserved. 22
Storage Domain Configuration Options
CLOUDTIER
• Moves cold date blocks to an external storage
• Extends storage layer of cluster transparently
• Cannot be enabled, once it’s disabled
Question
Quota can only be enabled
A.True
at the Storage Domain
Level?
B. False
Question
Quota can only be enabled
A.True
at the Storage Domain
Level?
B. False
Question
Encryption can only be
A.True
enabled at the Storage
Domain Level?
B. False
Question
Encryption can only be
A.True
enabled at the Storage
Domain Level?
B. False
Views are where data is stored, and data only arrives and leaves a Cohesity cluster through a View.
Internal Views (system created) are immutable storage locations that are
utilized for backup, cloning and recovery operations.
External Views (admin created) are used as NAS or Object Storage. See
the Ideal Use Cases for SmartFiles for more details.
R
ea
d/
W
r it
Storage Domain
e
NFS/SMB/S3/Swift
Servers/apps Read/Write
Cohesity View
e
r it
d /W
ea
Cohesity Helios
R Data Center | Edge | Public Cloud
Users
Data Sourcesand Authorization for data access can be configured by Cohesity administrators
Authentication
Performance Optimization
Multi-protocol support – Advanced data access
& data tiering – Configure
Configure single or multi- control – Configure generic
QoS, SSD Pinning, and data
protocol Views and protocol-specific settings
tiering
Self-Service recovery –
Protection – Automate View Quota – Control storage
Allow View users to perform
data protection capacity consumption
recovery
view
Cohesity SmartFiles
Data Center | Edge | Public Cloud
© 2022 Cohesity, Inc. All rights reserved. You can select templates based on your requirements to create Views faster 38
Views
Create Views – Allowlists*
Demo
3 Access the View
• Logical Quota
• Description
Common QoS policies are TestAndDev and Backup Target, and each
has variants by storage media and priority.
TestAndDev Mixed I/O workloads such as file shares. Best for writes and sequential single stream reads and • High
writes. Recommended for Cohesity SmartFiles.
• Low
Backup Target Best for sequential, multi-stream reads and writes. Recommended for Cohesity DataProtect and • SSD
Cohesity Archive. Also recommended for Cohesity SmartFiles when used as a backup target.
• High
• Low
Enable Pin View to SSD* for new Views, existing Views (for a definite
period or forever)
R
ea
d/
W
rit
e
Data Read/Write
e view
Servers/apps rit
/ W
ead
R
Users
2
1
User and directory quotas can be configured after the View is created
© 2022 Cohesity, Inc. All rights reserved. 55
Views
Create Views - NFS
Storage Domain
Cohesity Helios
Users
Data Center | Edge | Public Cloud
Storage Domain
Cohesity Helios
Users
Data Center | Edge | Public Cloud
SMB Options
Storage Domain
Cohesity Helios
Users
Data Center | Edge | Public Cloud
Allows S3 Read only protocol on SMB/NFS S3 Bucket/View are accessed over HTTPS
R/W View protocol on port 3000
S3 bucket
Hierarchical Flat
Structured
0
0
1 2 3
Level 1
Short Long
1 2 3 Level 1 1.1 2.1 2.2 Level 2
HIERARCHICAL FLAT
• The input key is treated as a filesystem path where the directories • Input Key is encoded first and then used as filesystem
and file names are separated by '/' paths
• The exact hierarchy is created for storing the current version of the • Broken down into multiple smaller (2 or 3 characters)
object in the FS namespace segments to get the absolute path for storing the inode
CONSIDERATIONS
• Cohesity does not recommend using the Hierarchical view for latency-
sensitive workloads
• SmartFiles S3 View is Created through API, short Key pattern is selected
by default
Swift Support
Swift Keystone v3 ✔
Swift Multitenancy ✔
Swift Accounts ✔
Swift Containers ✔
Question
The View File Shares
Category supports the A.True
ability to have View clients
to read and write data using B.False
all the supported protocols
NFS, SMB, S3, and Swift?
Question
The View File Shares
Category supports the A.True
ability to have View clients
to read and write data using B.False
all the supported protocols
NFS, SMB, S3, and Swift?
Question
Users can have direct A.True
access to Views
immediately after Views B.False
creation?
Question
Users can have direct A.True
access to Views
immediately after Views B.False
creation?
Question
What is the category that A.File Shares
needs to be selected if an
admin wants to create a B.Backup Target
read/write S3 View?
C.Object Services
Question
What is the category that A.File Shares
needs to be selected if an
admin wants to create a B.Backup Target
read/write S3 View?
C.Object Services
View Archive
Long-term Retention
Protection Policy Protection Group Protection Runs
Tape
Cohesity Helios Data Metadata Index
Data Center
Cohesity Helios
Replication Data Center | Edge | Public Cloud
Disaster Recovery
Views added to the same Protection Group must be associated with the same Storage Domain
Demo
3 Monitor the status of the Protection Run
Demo
3 Browse contents of a View
Cloning a View makes the existing data in the original View available through the clone View
Demo
2 Review the cloning task pulse log
View B
Question
Views get automatically
A.True
protected when created? B. False
Question
Views get automatically
A.True
protected when created? B. False
CloudArchive Replication
• Transfer a copy of your data to an external storage and • Replicate a copy of your data to remote Cohesity
recover the data when needed using those copies. clusters and recover the data when needed using
those copies.
• Data can be recovered to an alternate cluster
using CloudRetrieve • Site-site Replication between multiple Cohesity
clusters over large geographical distances.
• Retain data to cheaper storage and meet regulatory and
compliance requirements.
View
Cohesity Helios
Data Center
Archive task
Index Metadata Data (After local Backup) Data Metadata Index
External Target
Day 0
Full Archive Day 1 Day 2 Day 89
Reference Incremental Incremental Incremental
dependent on Day 0 dependent on day 1 dependent on day 88
Archive
Compared to
Day 91 Day 90 No last Reference
Incremental Full Archive Archive, are
dependent on day 90 dependent on Day 0 data changes >
50%?
Yes
Day 90
Day 91
Incremental Full Archive
dependent on day 90 (New) Reference
Archive
*Make sure that you work with Cohesity support if you would like to set up a seeding appliance
• Enabled at a Policy level • Can be applied to an existing Protection Run when editing
the Protection Run configuration
• Enabling Archival at a Policy level applies to Protection
Groups associated with the Policy • Can be applied when starting an on-demand Protection
Run using the “Run Now” GUI option
4 Monitor the progress of the Protection Run and the archive task
3 Monitor the progress of the Protection Run and the Archive task
Cohesity Helios
Cohesity Helios Data Center | Edge | Public Cloud
Data Center | Edge | Public Cloud
New cluster
Source cluster
RECOVER FROM EXTERNAL TARGET CLOUDRETRIEVE
Recover entire objects (Views) or Retrieve archived data onto a
individual files or folders to your new cluster
original cluster.
1 Search by file or folder name or 2 Select the recovery point and the Archive target
browse. option to recover the data.
Demo
2 Recover a file by search and download the file from a CloudArchive
Demo
2 Verify that the CloudRetrieve task is finished
View Replication
Site-to-site Replication between Cohesity Clusters is possible no matter where the clusters are deployed
© 2022 Cohesity, Inc. All rights reserved. 141
Replication
Overview – Configuration Examples
Cross-replication Fan In
1 2
• Enabled at a Policy level • Can be applied to an existing Protection Run when editing
• Enabling Replication at a Policy level applies to the Protection Run configuration
Protection Groups associated with the Policy • Can be applied when starting an on-demand Protection
Run using the “Run Now” GUI option
Demo
3 Edit a Protection Policy to enable Replication
Question
CloudArchive can be used A.True
to recover data to an
alternate cluster that is B. False
different from the original
cluster that archived the
data.
Question
CloudArchive can be used A.True
to recover data to an
alternate cluster that is B. False
different from the original
cluster that archived the
data.
Restore NAS
backup as a
View
view
Cohesity Helios
Data Center | Edge | Public Cloud
Register the NAS Choose Protection Configure Backup with Recover NAS
storage as Source Policy Protection Group volumes as
Cohesity Views
ü Use a service account that is a member of a security group that has access to all files
ü Add cluster node IP addresses and VIPs to the NFS exports list
ü Work with support to optimize NAS backup performance using the NAS Gatekeeper gflag
ü Disable write access to the source to prevent any last-minute file modifications
ü Take a final backup before recovering the NAS data to a Cohesity View
ü Change the file category to File Shares after the migration if your use case requires the
File Share category
ü NTFS permissions should be retained but share level permissions must be reconfigured after failover
2
1
3 Cohesity Helios
Data Center
Hot files
Uptier files when needed
Cold files
User requests are redirected to Cohesity to access the cold files that have been downtiered Stub files
© 2022 Cohesity, Inc. All rights reserved. 163
External NAS Data Tiering
Overview
Cohesity Helios
Data Center | Edge | Public Cloud
Demo
3 Trigger External NAS Tiering
Question
All files will be A.True
automatically downtiered to
Cohesity from the NAS B. False
storage when configuring
External NAS Tiering.
Question
All files will be A.True
automatically downtiered to
Cohesity from the NAS B. False
storage when configuring
External NAS Tiering.
© 2022 Cohesity, Inc. All rights reserved. *Verify with your Cohesity account team if your use case requires enabling
178CloudTier
CloudTier
Key Terms
• The tiering of cold data to an External Target is based on a policy with two factors:
tiering threshold and data policy.
• Tiering happens only if utilization exceeds the tiering threshold and there are data blocks that
meet the data policy:
• Tiering threshold: The percentage of space utilization that is set to trigger the tiering of cold data (default
80%, configurable)
• Data policy: Specifies the duration of time that the data must be inactive for it to be eligible for tiering
(default 60 days, configurable)
• The tiering threshold and data policy can be set on the Cohesity cluster, or on an
individual Storage Domain, or both.
• When set on the cluster, all Storage Domains inherit the setting. When set on an
individual Storage Domain, it is not applied to any other Storage Domains.
• Down-tiering process continues until the space utilization has returned to the tiering
threshold, or until there is no more eligible cold data.
• Once many I/O requests for the same data occur within a short period of time, the
down-tiered data is considered “hot” and is up-tiered back onto the cluster.
Storage Utilization is
scanned periodically
Utilization
NO YES
threshold
exceeded
NO YES
Data Policy met
Down-tier data
YES
NO Above threshold
and data policy?
S3 Standard RF1
S3 Intelligent-Tiering RF1
AWS
S3 Gov RF1
S3 C2S RF1
*Note that each cloud vendor storage option comes with its own storage redundancy (and can be configured from the cloud side)
Question
CloudTier can be used for A.True
disaster recovery use
cases. B. False
Question
CloudTier can be used for A.True
disaster recovery use
cases. B. False
Security
Module 9
Storage Domain
Unencrypted Data
Encrypted Data
© 2022 Cohesity, Inc. All rights reserved. 202
At Rest (Cluster) – Keys
© 2022 Cohesity, Inc. All rights reserved. *External Key Manager can also be configured 203
Encryption
Data-In-Flight
1. Sources to Cohesity
Cluster for Sources
Backup/Recovery NAS storage
2. Cohesity Cluster to
External Target
3. Cohesity Cluster to 2
1
Cohesity Cluster Replication
Replication Cohesity Helios
Cohesity Helios
Data Center 3 Data Center | Edge | Public Cloud
4. Cohesity UI
1. IPMI
2. Cluster Dashboard 4
3. Helios Management
Dashboard
© 2022 Cohesity, Inc. All rights reserved. 205
In-flight – Backup Views: API-Based Backup/Recovery: NAS
Note: For NFS volumes, you must add the active directory as the Kerberos server to the Cohesity cluster.
Cohesity supports only Active Directory-based Kerberos authentication.
Restricts system access based on users’ role by creating custom users and roles
Self Service Data Protection Viewer role privileges with the ability to
manage clones and Protection Groups,
Policies, and creation of Recovery Tasks
You can optionally join a Cohesity Cluster to one or more Active Directory (AD)
domains.
ü NTLM authentication (NTLM version is determined by AD*) will be used if you access a
View or a cluster using an IP address, however, Kerberos authentication will always be
used if the cluster has joined more than one domain
ü By default (by can be changed in the UI), Cohesity uses the cluster name as the
Machine Account Name and creates the Computer Object on the Active Directory with
the same name as the Machine Account Name**.
**New computer accounts or SPN need to be created when creating new VIPs with FQDN.
© 2022 Cohesity, Inc. All rights reserved. 214
1 Join Cluster to an Active Directory Domain
3 Login as an AD user
See Manage SSO, MFA for local users, Support user and MFA for Helios SaaS
© 2022 Cohesity, Inc. All rights reserved. 219
*Applicable for Helios SaaS Management and individual clusters
Management and Data Access Control
File and Object Storage Access Control
Storage Domain
NFS/SMB/S3/Swift
Servers/apps
X Read/Write
Cohesity View
Cohesity Helios
Users
Data Center | Edge | Public Cloud
ExternalData
hostsSources
can not access or mount Cohesity Views unless the IP addresses are added to an allow list
• Global Allowlist - Applies to all Views, unless an IP address or a subnet is listed in a View
allowlist.
• Share Allowlist (SMB and S3 only) - Applies to a single Share (folders and subfolders in a
Cohesity View)
Global Allowlists don’t follow the rule of least privileges, therefore it’s recommended to set allow list at a View level
Share: IT Department
Share: Operations
3 Share Allowlist
Aside from Allowlists, the Cohesity Cluster provides secure controlled access to file and object
storage by integrating with various identity sources
• Active Directory
• Kerberos
• Keystone
Storage Domain
Cohesity Helios
Users
Data Center | Edge | Public Cloud
External hosts can not access or mount Cohesity Views unless the IP addresses are added to an allow
list
© 2022 Cohesity, Inc. All rights reserved. *NIS can be used for authentication 230
File & Object Storage Access Control
NFS - Security
ü Configure the NFS server to export file systems explicitly for the users who should
have access to it
ü Allow read-only access or squash user permissions to a common user and group ID
since a malicious or misconfigured client can easily get this wrong UID and GID’s (file
system permissions
ü Add an LDAP provider to the Cohesity cluster to provide access to NFS exports and
use Kerberos for authentication (you can map the AD domain to an LDAP provider
across SMB and NFS )
Storage Domain
Cohesity Helios
Users
Data Center | Edge | Public Cloud
Active Directory
External hosts can not access or mount Cohesity Views unless the IP addresses are added to an allow
list Inc. All rights reserved.
© 2022 Cohesity, 236
File & Object Storage Access Control
SMB/CIFS – SMB Options
Permissions are equivalent to NTFS permissions* in Windows and Share Level Permissions are equivalent to Share Permissions
© 2022 Cohesity, Inc. All rights reserved. 239
*Note that you need to manage file/folder NTFS permissions from Windows side
1 Change Share Level Permissions
ü Join the Cohesity cluster to Active Directory for SMB authentication and authorization
Cohesity supports:
• AWS ACLs
These shortcuts allow you to copy keys to the clipboard, or generate a new key
Demo
2 View S3 Keys
Review to the Cohesity Identity and Access Management for File Services for further details
255 © 2022 Cohesity, Inc. All rights reserved. 255
Security
DataLock and LegalHold
WORM stands for Write Once Read Many. WORM technology is used
for Data Compliance needs. WORM technology makes data that is
written immutable and cannot be altered, deleted, or changed in any
way.
Deletion Can only be removed by a user with the Data Security Cannot be removed before the
role. DataLock Expiration date (not even
by a user with the Data Security Role
can delete).
Locked
Removed
Retention
Retention
• A DataLocked Policy’s defined lock period can be scheduled per data target (Local
Cluster, Extended Retention, External Target, External Cluster) but must be less than
or match the retention period configured for the target.
ü When a DataLocked Policy is applied to a Protection Group, previous runs will not be
retroactively DataLocked. When an applied DataLocked Policy is modified, the
attached Protection Groups’ previously completed runs will not be affected.
• There is no way to unlock a run once locked by a DataLock Policy. The only
permissible change is to extend the locked period and can only be done by someone
with the Data Security Role.
• There is no way to delete a DataLocked run when locked (i.e., not the objects
within the run, the run, or the Protection Group’s snapshots).
© 2022 Cohesity, Inc. All rights reserved. 262
File DataLock – Automatic And Manual Lock
DataLock on Views
Autolock
Can be
deleted &
modified
Lock Period Can be deleted,
Manually Lock but not modified
Note: File DataLock is only applicable for NFS and SMB View types.
© 2022 Cohesity, Inc. All rights reserved. 263
File DataLock - Override
DataLock on Views
Override
Lock Period Can be deleted,
but not modified
Demo
2 Create a View and apply DataLock
DataLock on Views
Demo
3 Edit Settings of a DataLock View
• Set on an External View by a user with the Data Security Role upon
creation.
• The lock mechanism (automatic, manual, override) and the length of the lock
period (seconds – forever) can be customized.
• There is no way to unlock a DataLocked file. The only permissible change
is to extend the locked period and can only be done by someone with the
Data Security Role.*
• There is no way to delete a DataLocked file (i.e., not the file, its parent
folder/s or view).*
Legal Hold
• Data Security role users can put a Legal Hold on existing Runs/Objects.
They cannot be deleted until the Legal Hold is removed.
• Legal Hold can be added to unlocked and DataLocked Runs.
• If you add a legal hold to a Protection Run, it applies to all the objects that
were backed up by that Protection Run, and the Legal Hold is propagated
to replicated and archived objects.
• If you add a Legal Hold only to selected objects in a Protection Run, the
Legal Hold is propagated to archived objects, but not to replicated objects.
You must manage the Legal Hold status on the remote replication Cluster
manually.
• Using Legal Hold for long periods of time may result in the Cluster
running out of space.
© 2022 Cohesity, Inc. All rights reserved. 274
1 Login to the Cohesity cluster with a user that has a Data Security role
Demo
3 Show Legal Hold in place
• The Cohesity cluster records all events and operations occurring on the cluster in a form of
Audit Logs.
• Audit logs contains details about events, such as date and time, category, type, and user.
• Audit logs help you to monitor and analyze the events that occurred and help your
organization to meet IT or regulatory compliance requirements like HIPAA.
• File level, where each file access or change is tracked (for Cohesity NFS and
SMB Views)
Note: For a list of logged operations, see Cluster Audit Logs and File Services Audit Logs in the Cohesity documentation
To view the Cluster Audit Logs, navigate to System > Audit logs from the cluster GUI navigation bar
When you enable the Audit Log option for Views, Cohesity Helios
records events occurring on Views
• Unlike the cluster-level audit logs, the logs for Views are not displayed in the Cohesity UI
• The file services audit logs are saved in an internal View called filesystem_audit for NFS
and SMB
• By default, when you create a View, the Audit Log option is disabled. You must manually
enable it when creating the View or after creation.
Note: The File Services tab in the Audit Log page provides two mount paths for NFS and SMB. You can access those paths view the audit logs.
To view the Cluster Audit Logs, navigate to System > Audit logs from the cluster GUI navigation bar
Enable or Disable Cluster and File Services Audit Logs, and set the Log Retention Period
Question
Only Internal Key A.True
Management Server can be
used to manage the B. False
encryption keys.
Question
Only Internal Key A.True
Management Server can be
used to manage the B. False
encryption keys.
App
A marketplace “app” is a containerized application that you can install on customer/partner-managed Cohesity clusters to
unlock additional value from your data.
Integration
Cohesity Software component that allows Cohesity to integrate with third-party IT infrastructure components, such as
Cisco, Palo Alto Networks, ServiceNow, and PagerDuty.
.
https://www.cohesity.com/marketplace/
© 2022 Cohesity, Inc. All rights reserved. 296
Cohesity Marketplace
Integrations
© 2022 Cohesity, Inc. All rights reserved. Each app has its own licensing details 300
Cohesity Marketplace
Why run Apps on Cohesity?
3 Show integrations
• Apps need a /16 private IPv4 subnet (until 6.5.1x) and a /20
private IPv4 subnet (from 6.6)
*Ensure that you review the sizing with your account team if you are planning to install Apps on any of your clusters
© 2022 Cohesity, Inc. All rights reserved. 305
Cohesity Marketplace Apps
Install Apps
Cohesity Helios
Data Center | Edge | Public Cloud
Download the through Install the App Configure QoS and Access the app
Helios SaaS through Helios launch the app through its
SaaS* interface
*You can also manually upload the app package to the cluster. Useful approach for dark sites
User
• Data stored on NAS • Antivirus scan request • Remote servers do A/V scanning
• Data moved to be scanned
*Cohesity supports integration with Antivirus solutions that adheres to RFC3507 based implementation of ICAP
© 2022 Cohesity, Inc. All rights reserved. 310
Cohesity Marketplace Apps
ClamAV – Overview (With Antivirus App Integration)
File Access
Cohesity Helios
User Data Center | Edge | Public Cloud
2 ClamAV UI
The Cohesity Spotlight app enables you to analyze file audit logs and user
activities using various parameters.
User Activity
2 Install Spotlight
Demo
3 Launch Spotlight
4 Spotlight UI
2 Install Spotlight
Demo
3 Launch Spotlight
4 Spotlight UI
The Cohesity Insight app enables you to search for text strings within files that
are stored within Cohesity Views.
Insight App
Cohesity View
• The following file types are supported: txt, pdf, doc, docx, xls, xlsx, ppt,
pptx, html, and zip
• The Insight app continuously indexes files to give you up-to-date search
results. Initial searches may take additional time propagate
3 Insight UI
3 Insight UI
Question
Cohesity Spotlight App can A.True
be used to search for files
that contains a specific B.False
keyword.
Question
Cohesity Spotlight App can A.True
be used to search for files
that contains a specific B.False
keyword.
Question
All Marketplace apps A.True
require a license.
B.False
Question
All Marketplace apps A.True
require a license.
B.False
0 1 2 3 0 1 2 3 0 1 2 3
Node Node
Node 3
1 2
*Same concept applies to Cohesity clusters that are installed on hypervisors and on public cloud
© 2022 Cohesity, Inc. All rights reserved. 339
**bridge interfaces do not show in the Cohesity UI
Networking
Cluster VIPs
2 Verify VIPs
• Traditionally, when nodes are added or removed, DNS must be updated with
new VIPs
• Load-balancing is based on DNS round-robin
Or
View/Share FQDN:
shares.cohesity-a.cohesitylabs.az?
shares.cohesity-a.cohesitylabs.az
Distributed DNS Service
Cohesity Helios
Data Center | Edge | Public Cloud
Node VIPs
© 2022 Cohesity, Inc. All rights reserved. 3 A VIP is selected DNS VIPs
Reporting
Demo
2 Storage Consumption by Views
Protection
Storage/Capacity Objects
Group
• Cluster Wide Storage • Protected Objects Heat • Backup Summary
Map
• Data Transferred to • Protection Groups
External Targets • Protection Details Per Inventory and Schedule
Object
• Storage Consumed by • Protection Runs
File Categories • Protection Summary by Summary
Object Type
• Storage Consumed by • Top Protection Groups
Storage Domains
• User Quotas
• Directory Quotas
Cohesity CLI
The summary dashboard show all the errors and warnings that have been identified
across the entire clusters. Available for All Clusters and cluster level
© 2022 Cohesity, Inc. All rights reserved. 372
Troubleshooting & Operation Tools
Alerts & Health
Critical
Info
Warning
Alternatively, you can navigate to the health page to view all alerts across all the clusters
Details Configure
You can use other available dashboards to view more details about Data Protection,
File Services, Cloud, and Security.
© 2022 Cohesity, Inc. All rights reserved. 377
1 Review Alert locations and Dashboards within Helios and the Local UI.
Demo
2 Search for an Alert Code within the Knowledge Base
3 Resolve an Alert
• Storage Statistics
• In the single cluster Helios UI view, Select System > Storage in the Cohesity navigation bar
• Performance Statistics
• In the single cluster Helios UI view, Select System > Performance in the Cohesity navigation bar
Resolution: Ensure that the subnet of the host is included as a part of the Allowlist
© 2022 Cohesity, Inc. All rights reserved. 395
Troubleshooting Common Issues
Accessing a View Fails
Dashboard or SMB View authentication with AD credentials fails with an IP address and succeeds
with the DNS name. Specifying an IP address prompts the user for AD credentials
SMB View authentication with AD credentials fails when trying to access a View via a
FQDN of a new VIP.
Resolution: Add multiple computer accounts for each new VIP, or add Service Principal Names (SPNs) for each new VIP to the cluster’s computer account
© 2022 Cohesity, Inc. All rights reserved. 398
Troubleshooting Common Issues
Accessing a View File and
Folders
An SMB share user cannot browse all files and folders
When a user browses an SMB share, only the files and folders that a user has
privileges to access are displayed if Access Based Enumeration is enabled.
Resolution: Verify if the user has privileges to access the files and folders.
Resolution: This behaviour is expected. NTFS permission changes apply only to new files and folders created at the root level.
A. Admin
Question B. Cohesity_console
What is the user that needs
to be used to open SSH to a C. Cohesity
Cohesity cluster node?.
D. Support
A. Admin
Question B. Cohesity_console
What is the user that needs
to be used to open SSH to a C. Cohesity
Cohesity cluster node?.
D. Support
A. Gandalf
Question B. Apollo
What is the major cluster
internal service that is C. Bridge
responsible for managing
SmartFiles IO operations D. Magneto
like writing data on local
storage?.
A. Gandalf
Question B. Apollo
What is the major cluster
internal service that is C. Bridge
responsible for managing
SmartFiles IO operations D. Magneto
like writing data on local
storage?.
• SmartFiles Documentation
• Unable to mount or access a SMB View with credential prompt on every attempt
© 2022 Cohesity, Inc. All rights reserved. 412
*ONLY appy gflags after consulting with Cohestty support
References
Documentation and KB articles