This command modifies a view.
General Usage
view modify --id VIEW_ID
[--path PATH]
[--protocols PROTOCOLS]
[--alias ALIAS]
[--share SHARE]
[--policy-id ID]
[--cluster-id ID]
[--create-dir]
[--enable-live-monitoring|--disable-live-monitoring]
[--enable-s3-unverified-lookup]|--disable-s3-unverified-lookup
[--s3-versioning]
[--locking]
[--default-retention-period DEFAULT_RETENTION_PERIOD]
[--s3-locks-retention-mode NONE|GOVERNANCE|COMPLIANCE]
[--bucket BUCKET]
[--bucket-owner-type USER|ROLE]
[--bucket-owner BUCKET_OWNER]
[--bucket-creators BUCKET_CREATORS]
[--bucket-creators-groups BUCKET_CREATORS_GROUPS]
[--allow-s3-anonymous-access]|[--block-s3-anonymous-access]
[--qos-policy-id QOS_POLICY_ID]
[--delete_qos_policy]
[--enable-acls|--disable-acls]
[--enable-share-acl]|[--disable-share-acl]
[--clear-share-acl]
[--share-ace-grantee users|groups]
[--share-ace-permissions FULL|READ|CHANGE]
[--share-ace-identifier IDENTIFIER]
[--remove-share-ace-name NAME --remove-share-ace-fqdn FQDN]
[--abe-protocols [SMB]]
[--abe-max-depth LEVEL]
[--max-retention-period MAX_RETENTION_PERIOD]
[--min-retention-period MIN_RETENTION_PERIOD]
[--auto-commit AUTO_COMMIT]
[--bucket-logging-destination-id DESTINATION_BUCKET_ID]
[--bucket-logging-prefix PREFIX]
[--bucket-logging-key-format SIMPLE_PREFIX|PARTITIONED_PREFIX_EVENT_TIME|PARTITIONED_PREFIX_DELIVERY_TIME]
[--disable-bucket-logging]
[--enable-user-impersonation|--disable-user-impersonation]
[--user-impersonation-identifier-type ID_TYPE]
[--user-impersonation-identifier ID]
[--user-impersonation-username NAME]
[--name NAME]
[--set-is-default-subsystem|--reset-is-default-subsystem]
[--enable-indestructible-object|--disable-indestructible-object]
[--indestructible-object-duration RETENTION_PERIOD]
[--smb-encryption-state AVAILABLE|DESIRED|REQUIRED]
[--kafka-first-join-group-timeout-sec SECONDS]
[--kafka-rejoin-group-timeout-sec SECONDS]
[--enable-kafka-unencrypted-conn|--disable-kafka-unencrypted-conn]
[--kafka-unencrypted-auth-mechanism SASL_PLAIN|NONE]
[--enable-kafka-encrypted-conn|--disable-kafka-encrypted-conn]
[--kafka-encrypted-auth-mechanism SASL_PLAIN|NONE]
[--require-kafka-authorization|--cancel-kafka-authorization]Share-Level ACL Usage
To enable or disable share-level ACL on the view:
view modify --id VIEW_ID --enable-share-acl|--disable-share-aclTo add an ACE to the view's share-level ACL:
view modify --id VIEW_ID
--share-ace-grantee users|groups
--share-ace-identifier IDENTIFIER
--share-ace-permissions FULL|READ|CHANGE
To clear all ACEs from the view's share-level ACL:
view modify --id VIEW_ID
--clear-share-aclTo remove an ACE:
view modify --id VIEW_ID
--remove-share-ace-name NAME
--remove-share-ace-fqdn FQDNRequired Parameters
| Specifies the ID of the view you want to modify. |
Options
| Modifies the Element Store path to be exposed to clients. It can be a directory that was already created by a client inside an exposed parent directory, or it can be a new directory, in which case you must specify the --create_dir option to create the directory. Example: If you are going to use the path to create an S3 bucket, ensure that none of the subdirectories under the path has a replication protected path defined on it. |
| Specifies which protocol(s) the view will be exposed to. Specify PROTOCOLS as a string value for a single protocol or a comma separated list of strings to enable multiple protocols. Valid string values are:
Examples:
|
| For NFSv3 exports, specifies an alternative shorter name for the path that can be used alternatively when mounting. Optional and relevant only if the view is exposed to NFS. An alias must begin with a forward slash ("/") and must consist of only ASCII characters. An NFS export alias must be unique within the tenant. |
| Specifies the SMB share name. Required if the view is exposed to SMB. The name cannot include the following characters: /\:|<>*?" An SMB share name must be unique within the tenant. |
| Specifies which view policy to apply. If unspecified, the default policy (ID 1) is used. |
| Creates a directory at the specified path. Include this option of the directory does not already exist. |
| Enables live monitoring on the view. Live monitoring can be enabled for up to ten views at one time. Analytics data for views is polled every 5 minutes by default and every 10 seconds with live monitoring. |
| Disables live monitoring on the view. See also |
| Enables object versioning on the bucket if |
| Enables object locking on the view bucket, if |
| Sets a default retention mode for objects in the bucket. Possible values:
|
| Specifies the name of an S3 bucket. Required if A bucket name must be unique across all tenants of the cluster. For more guidelines on bucket naming, see Overview of VAST Cluster S3 Implementation. |
| Specifies whether the bucket owner is a user ( |
| Specifies a user to be the bucket owner. Required if |
| Relevant if Specify
|
| If the view has S3 Bucket or S3 Endpoint enabled, include this option to allow anonymous S3 access to the view's S3 bucket. If allowed, anonymous requests are granted provided that the object ACL grants access to the All Users group (in S3 Native security flavor) or the permission mode bits on the requested file and directory path grant access permission to "others" (in NFS security flavor). For views with SMB security flavor, anonymous requests are not granted access. |
| Blocks anonymous S3 access to the view's S3 bucket, if applicable. This is the default setting. |
| Associates a QoS policy with the view. Specify the QoS policy by its ID. To list QoS policy definitions, use qospolicy list . |
| If a QoS policy is associated with the view, this option removes the QoS policy from the view. |
| When this option is specified, access to bucket objects is controlled based on ACLs rather than on the bucket owner's permissions. This option disables S3 Object Ownership for the bucket. |
| When this option is specified, the bucket owner has full control over any object in the bucket. Access to objects is controlled based on policies configured for the bucket. ACLs are not used. Specifying this option is equivalent to setting the S3 object ownership rule of Bucket Owner Enforced. |
| Enables share-level ACL on the view. This setting enables share-level ACL on the view, which means that SMB requests to access the view will fail unless permission is granted to the requesting user by an ACE. |
| Disables a share-level ACL on a view. Share-level ACL is disabled by default. |
| Removes all ACEs from a share-level ACL if enabled on the view, without disabling share-level ACL. |
| Specifies a grantee type when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Possible values:
|
| Specifies the type of permission to grant to a specified grantee when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Possible values:
|
| Specifies a grantee by SID, UID or GID identifier when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Specify To obtain an identifier, run a query by prefix against the Active Directory domain using one of the following commands:
|
| Specifies the grantee name when running the command to remove an ACE from a share-level ACL. See also Share-Level ACL Usage. |
| Specifies the domain when running the command to remove an ACE for a given from a share-level ACL. See also Share-Level ACL Usage. |
| Enables Access-Based Enumeration (ABE) for the view, if
|
| Sets the maximum directory level (depth) at which ABE is enabled. |
| Sets the retention mode for files saved in the view, if locking (--locking ) is enabled. Possible values:
|
| Sets the default retention period for files that are locked in the view to Files that are locked manually (by setting the atime for the file to a future time) do not use the default retention period. The value Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 5d (5 days). |
| Sets the maximum retention period for files that are locked in the view to It must be larger than the min-retention-period. Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 2m (2 months). |
| Sets the minimum retention period for files that are locked in the view to It must be less than the max-retention-period. Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 3d (3 days). |
| Sets the auto-commit time to If set, then Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 5m (5 minutes). |
| For views of a tenant that has SMB encryption enabled, you can optionally configure the view with SMB encryption protection that is equal to or stronger than that of the tenant:
|
Block Options
Use the following options with the --protocol BLOCK to modify a block subsystem view:
| Modifies the name of the subsystem. |
| Sets the view to be the default subsystem view from which to provision block volumes. |
| Resets the default status of a default subsystem view. |
S3 Bucket Logging Options
The following options let you configure S3 Bucket Logging for an S3 Bucket view:
| Enables S3 bucket logging for the bucket and determines the destination bucket which will be used to store the logs.
|
| Optionally, specify a prefix that will be prepended to each key of a log object uploaded to the destination bucket. This prefix can be used to categorize log objects; for example, if you use the same destination bucket for multiple source buckets. The prefix can be up to 128 characters and must follow S3 object naming rules. |
| Specify the format for the log object keys:
In the formats:
|
| Disables S3 bucket logging configured for the bucket. |
User Impersonation Options
The following options let you configure user impersonation for a view:
| Enables user impersonation. |
| Disables user impersonation. |
| The type of a user identifier that you are going to specify on the Valid values for
This option is required if |
| The impersonator user ID or name. The ID or name must be of the type specified on the This option is required if |
| The impersonator username. If |
Event Publishing Options
The following options let you configure a view for VAST Event Broker:
| Specifies the amount of time to wait for more consumers to join a new group before performing the first rebalance. Valid values are 1-3600. The default value is 60 seconds. |
| Specifies the maximum allowed session timeout for registered consumers. Valid values are 1-3600. The default value is 60 seconds. |
Event Publishing Options
The following options let you configure a view for VAST Event Broker:
| Specifies a virtual IP pool to be used to access event topics exposed by the view.
The pool must belong to the same VAST tenant as the Kafka-enabled view. If the view is associated with a view policy that includes virtual IP pools, the pool specified as the Kafka pool must be one of the view policy pools. |
| Specifies the amount of time to wait for more consumers to join a new group before performing the first rebalance. Valid values are 1-3600. The default value is 60 seconds. |
| Specifies the maximum allowed session timeout for registered consumers. Valid values are 1-3600. The default value is 60 seconds. |
| Enables authentication of clients that use non-TLS connections to access a Kafka-enabled view. When specifying this option, also include |
| Disables authentication of clients that use non-TLS connections to access a Kafka-enabled view. |
| Specify |
| Enables authentication of clients that use TLS connections to access a Kafka-enabled view. This option requires a Kafka TLS certificate to be provided for the VAST cluster. When specifying this option, also include |
| Disables authentication of clients that use TLS connections to access a Kafka-enabled view. |
| Specify |
| Enables authorization for clients connecting to a Kafka-enabled view. |
| Disables authorization for clients connecting to a Kafka-enabled view. |
Indestructible Object Mode Options
Note
These options are not supported by default. To use these options, first enable indestructible object mode on the cluster. For full feature information, see Indestructible Object Mode.
| Enables indestructible object mode on the view. |
| Disables indestructible object mode on the view. This is only allowed when the cluster's indestructibility mechanism is unlocked. |
| Modifies the retention period for indestructible object mode. This is only allowed when the cluster's indestructibility mechanism is unlocked. Specify Default: 8 Supported range: 1-400
|
Example
This example changes the view policy used by the view that exposes the /dev path of the element store.
vcli: admin> view modify --id 2 --path /dev --policy-id 2
This example removes an ACE from a share-level ACL:
vcli: admin> view modify --id 101 --remove-share-ace-name joej --remove-share-ace-fqdn ad.arandomorg.com