This command modifies a view.
General Usage
view modify --id VIEW_ID
[--path PATH]
[--protocols PROTOCOLS]
[--alias ALIAS]
[--share SHARE]
[--policy-id ID]
[--cluster-id ID]
[--create-dir]
[--enable-live-monitoring|--disable-live-monitoring]
[--enable-s3-unverified-lookup]|--disable-s3-unverified-lookup
[--s3-versioning]
[--locking]
[--default-retention-period DEFAULT_RETENTION_PERIOD]
[--s3-locks-retention-mode NONE|GOVERNANCE|COMPLIANCE]
[--bucket BUCKET]
[--bucket-owner BUCKET_OWNER]
[--bucket-creators BUCKET_CREATORS]
[--bucket-creators-groups BUCKET_CREATORS_GROUPS]
[--allow-s3-anonymous-access]|[--block-s3-anonymous-access]
[--qos-policy-id QOS_POLICY_ID]
[--delete_qos_policy]
[--enable-acls|--disable-acls]
[--enable-share-acl]|[--disable-share-acl]
[--clear-share-acl]
[--share-ace-grantee users|groups]
[--share-ace-permissions FULL|READ|CHANGE]
[--share-ace-identifier IDENTIFIER]
[--remove-share-ace-name NAME --remove-share-ace-fqdn FQDN]
[--abe-protocols [SMB]]
[--abe-max-depth LEVEL]
[--max-retention-period MAX_RETENTION_PERIOD]
[--min-retention-period MIN_RETENTION_PERIOD]
[--auto-commit AUTO_COMMIT]
Share-Level ACL Usage
To enable or disable share-level ACL on the view:
view modify --id VIEW_ID --enable-share-acl|--disable-share-aclTo add an ACE to the view's share-level ACL:
view modify --id VIEW_ID
--share-ace-grantee users|groups
--share-ace-identifier IDENTIFIER
--share-ace-permissions FULL|READ|CHANGE
To clear all ACEs from the view's share-level ACL:
view modify --id VIEW_ID
--clear-share-aclTo remove an ACE:
view modify --id VIEW_ID
--remove-share-ace-name NAME
--remove-share-ace-fqdn FQDNRequired Parameters
| Specifies the ID of the view you want to modify. |
Options
| Modifies the Element Store path to be exposed to clients. It can be a directory that was already created by a client inside an exposed parent directory, or it can be a new directory, in which case you must specify the --create_dir option to create the directory. Example: If you are going to use the path to create an S3 bucket, ensure that none of the subdirectories under the path has a replication protected path defined on it. |
| Specifies which protocol(s) the view will be exposed to. Specify PROTOCOLS as a string value for a single protocol or a comma separated list of strings to enable multiple protocols. Valid string values are:
Examples:
|
| For NFSv3 exports, specifies an alternative shorter name for the path that can be used alternatively when mounting. Optional and relevant only if the view is exposed to NFS. An alias must begin with a forward slash ("/") and must consist of only ASCII characters. An NFS export alias must be unique within the tenant. |
| Specifies the SMB share name. Required if the view is exposed to SMB. The name cannot include the following characters: /\:|<>*?" An SMB share name must be unique within the tenant. |
| Specifies which view policy to apply. If unspecified, the default policy (ID 1) is used. |
| Creates a directory at the specified path. Include this option of the directory does not already exist. |
| Enables live monitoring on the view. Live monitoring can be enabled for up to ten views at one time. Analytics data for views is polled every 5 minutes by default and every 10 seconds with live monitoring. |
| Disables live monitoring on the view. See also |
| Enables object versioning on the bucket if |
| Enables object locking on the view bucket, if |
| Sets a default retention mode for objects in the bucket. Possible values:
|
| Specifies the name of an S3 bucket. Required if A bucket name must be unique across all tenants of the cluster. For more guidelines on bucket naming, see Overview of VAST Cluster S3 Implementation. |
| Specifies a user to be the bucket owner. Required if |
| Relevant if Specify
|
| If the view has S3 Bucket or S3 Endpoint enabled, include this option to allow anonymous S3 access to the view's S3 bucket. If allowed, anonymous requests are granted provided that the object ACL grants access to the All Users group (in S3 Native security flavor) or the permission mode bits on the requested file and directory path grant access permission to "others" (in NFS security flavor). For views with SMB security flavor, anonymous requests are not granted access. |
| Blocks anonymous S3 access to the view's S3 bucket, if applicable. This is the default setting. |
| Associates a QoS policy with the view. Specify the QoS policy by its ID. To list QoS policy definitions, use qospolicy list. |
| If a QoS policy is associated with the view, this option removes the QoS policy from the view. |
| When this option is specified, access to bucket objects is controlled based on ACLs rather than on the bucket owner's permissions. This option disables S3 Object Ownership for the bucket. |
| When this option is specified, the bucket owner has full control over any object in the bucket. Access to objects is controlled based on policies configured for the bucket. ACLs are not used. Specifying this option is equivalent to setting the S3 object ownership rule of Bucket Owner Enforced. |
| Enables share-level ACL on the view. This setting enables share-level ACL on the view, which means that SMB requests to access the view will fail unless permission is granted to the requesting user by an ACE. |
| Disables a share-level ACL on a view. Share-level ACL is disabled by default. |
| Removes all ACEs from a share-level ACL if enabled on the view, without disabling share-level ACL. |
| Specifies a grantee type when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Possible values:
|
| Specifies the type of permission to grant to a specified grantee when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Possible values:
|
| Specifies a grantee by SID, UID or GID identifier when running the command to configure an Access Control Entry (ACE) in a share-level ACL. See also Share-Level ACL Usage . Specify To obtain an identifier, run a query by prefix against the Active Directory domain using one of the following commands:
|
| Specifies the grantee name when running the command to remove an ACE from a share-level ACL. See also Share-Level ACL Usage. |
| Specifies the domain when running the command to remove an ACE for a given from a share-level ACL. See also Share-Level ACL Usage. |
| Enables Access-Based Enumeration (ABE) for the view, if
|
| Sets the maximum directory level (depth) at which ABE is enabled. |
| Sets the retention mode for files saved in the view, if locking (--locking ) is enabled. Possible values:
|
| Sets the default retention period for files that are locked in the view to Files that are locked manually (by setting the atime for the file to a future time) do not use the default retention period. The value Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 5d (5 days). |
| Sets the maximum retention period for files that are locked in the view to It must be larger than the min-retention-period. Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 2m (2 months). |
| Sets the minimum retention period for files that are locked in the view to It must be less than the max-retention-period. Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 3d (3 days). |
| Sets the auto-commit time to If set, then Set it as an integer value, including units (m - minutes, h - hours, d - days, y - years). Example: 5m (5 minutes). |
Example
This example changes the view policy used by the view that exposes the /dev path of the element store.
vcli: admin> view modify --id 2 --path /dev --policy-id 2
This example removes an ACE from a share-level ACL:
vcli: admin> view modify --id 101 --remove-share-ace-name joej --remove-share-ace-fqdn ad.arandomorg.com