Normal and Enterprise Modes for Clusters
You can configure your cluster for monitoring in one of the following ways:
- Using the configure_ifs.sh shell script that comes with Netwrix Auditor. See the Configure Dell Isilon/PowerScale Cluster in Normal or Enterprise Mode via Shell Script topic for additional information.
- Manual configuration. See the Configure Dell Isilon/PowerScale Cluster in Normal or Enterprise Mode Manually topic for additional information.
Configure Dell Isilon/PowerScale Cluster in Normal or Enterprise Mode via Shell Script
Follow the steps to configure Dell Isilon/PowerScale cluster in Normal or Enterprise mode using shell script:
Step 1 – On the computer where Auditor Server resides, navigate to C:\Program Files (x86)\Netwrix Auditor\File Server Auditing and copy the configure*ifs.sh shell script to */ifs/data_ catalog on your cluster.
Step 2 – Navigate to your cluster command prompt through the SSH connection.
Step 3 – Log in to your cluster as a root user.
Step 4 – Run the shell script by executing the following command:
sh /ifs/data/configure_ifs.sh -z zone1 -a 1
where
zone1
is the name of the audited access zone on your file server.
1
is a combination of the bitwise flags. The table below shows the example combination of 4 flags:
Successful changes | 1 |
Failed change attempts | 2 |
Successful reads | 4 |
Failed read attempts | 8 |
Total: | 15 |
Configure Dell Isilon/PowerScale Cluster in Normal or Enterprise Mode Manually
Follow the steps to configure Dell Isilon/PowerScale cluster in Normal or Enterprise mode manually:
Step 1 – Navigate to your cluster command prompt through the SSH connection.
Step 2 – Log in to your cluster as a root user.
Step 3 – Grant full access to the catalog /ifs/.ifsvar/audit/ for BUILTIN\Administrators:
chmod -R +a group "BUILTIN\Administrators" allow dir_gen_all,object_inherit,container_inherit, inherited /ifs/.ifsvar/audit/
chmod -a group "BUILTIN\Administrators" allow dir_gen_all,object_inherit,container_inherit, inherited /ifs/.ifsvar/audit/
chmod +a group "BUILTIN\Administrators" allow dir_gen_all,object_inherit,container_inherit /ifs/.ifsvar/audit/
chmod +a user root allow dir_gen_read /ifs/.ifsvar/audit/
Step 4 – Create a shared folder named netwrix*audit$ on a system zone. This folder points to */ifs/.ifsvar/audit/_:
/usr/likewise/bin/lwnet share add "netwrix_audit$"="c:\\ifs\\.ifsvar\\audit\\"
isi smb shares modify netwrix_audit$ --new-zone=system
Starting from Dell Isilon/PowerScale 9.2.0 and above, the lwnet
command is considered as
deprecated. When configuring audit manually, you see the following warning:
WARNING: lwnet has been deprecated.
Please use isi smb ...
equivalents instead.
See isi smb --help
for more information.
This command is required to create a shared folder pointed to /ifs/.ifsvar/audit/. Please ignore the warning.
Step 5 – Add the BUILTIN\Administrators group in the share permissions for the netwrix*audit$ folder with *"full access"_ rights:
isi smb shares permission create --share=netwrix_audit$ --group="BUILTIN\Administrators"
--permission-type=allow --permission=full --zone=system
NOTE: Please verify the correctness of the path to the Isilon audit log files in
_Monitoring Plans -> <MP name> -> <Isilon item name> -> Edit item -> General -> File share UNC path to audit logs_
It must follow the format:
\\<FQDN, NETBIOS, or IP for Isilon "system" zone>\netwrix_audit$\logs
Step 6 – Enable protocol auditing for a selected zone (for example, "zone1"). Do one of the following, depending on your Dell Isilon/PowerScale storage version:
Dell Isilon/PowerScale 7.x | Dell Isilon/PowerScale 8.x |
---|---|
isi audit settings modify --add-audited-zones=zone1 --protocol -auditing-enabled=true | isi audit settings global modify --add-audited-zones=zone1 --protocol -auditing-enabled=true |
Enable filters for auditing protocol operations that succeeded / failed for audited access zones on your cluster.
Dell Isilon/PowerScale 7.x | Dell Isilon/PowerScale 8.2 and above |
---|---|
Successful changes | |
isi zone zones modify zone1 --audit-success =write,delete,set_security,rename | isi audit settings modify --zone=zone1 --audit-success =write,delete,set_security,rename, create |
Failed change attempts | |
isi zone zones modify zone1 --audit-failure =create,write,delete,set_security,rename | isi audit settings modify --zone=zone1 --audit-failure =create,write,delete,set_security,rename,open |
Successful reads | |
isi zone zones modify zone1 --audit-success=read | isi audit settings modify --zone=zone1 --audit-success=read |
Failed read attempts | |
isi zone zones modify zone1 --audit-failure= create,read | isi audit settings modify --zone=zone1 --audit-failure=create,read, open |
Step 7 – Create the "netwrix_audit" role in your access zone (for example, "zone1") and add the required privileges to this role:
isi auth roles create --name=netwrix_audit --zone=zone1
isi auth roles modify netwrix_audit --add-priv-ro="ISI_PRIV_LOGIN_PAPI,ISI_PRIV_AUTH,ISI_PRIV_AUDIT, ISI_PRIV_IFS_BACKUP" --zone=zone1
isi auth roles modify netwrix_audit --add-group="BUILTIN\Administrators" --zone=zone1
Considerations and Recommendations
When preparing to audit your Dell Isilon/PowerScale storage system, consider the following:
-
If you plan to configure audit settings for Dell Isilon/PowerScale storage below the version 8.2 manually (without using theconfigure_ifs.sh script), make sure that auditing of the
success create
events is disabled.For Dell Isilon/PowerScale storage below the version 8.2, the storage system logging will become too verbose, which may lead to data collector overload with excessive events, decrease its performance and result in data collection errors with the "Timeout expired" message issued.
For Dell Isilon/PowerScale storage 8.2 and above, this option for manual audit configuration can be safely enabled.
-
Auditing of the System zone is not supported. As stated by Dell, this zone should be reserved for configuration access only. Current data should be stored in other access zones. See the Isilon OneFS 8.2.1 CLI Administration Guide topic for additional information.