Functions
Table 1 lists common SFS functions.
Before using SFS, you are advised to learn basic concepts such as NFS and CIFS in SFS Basic Concepts to better understand the functions provided by SFS.
- √: indicates that the file system type supports this function.
- ×: indicates that the file system type does not support this function.
Function |
Description |
SFS Capacity-Oriented |
SFS Turbo |
General Purpose File System |
---|---|---|---|---|
Network File System (NFS) is a distributed file system protocol that allows different computers and OSs to share data over a network. After the NFS client is installed on multiple ECSs, mount the file system to implement file sharing between ECSs. The NFS protocol is recommended for Linux clients. |
√ |
√ |
√ |
|
Common Internet File System (CIFS) is a protocol used for network file access. Using the CIFS protocol, network files can be shared between hosts running Windows. The CIFS protocol is recommended for Windows clients. |
√ |
√ You need to submit a service ticket to apply for using it. |
× |
|
Multiple VPCs can be configured for a file system so that ECSs belonging to different VPCs can share the same file system, as long as the VPCs that the ECSs belong to are added to the VPC list of the file system or the ECSs are added to the authorized addresses of the VPCs. |
√ |
√ Implemented through VPC peering connection |
√ |
|
If VPC IDs used by other accounts are added to the VPC list of a file system and IP addresses or IP address ranges of ECSs are added to the authorized address list, ECSs of different VPCs and of different accounts can share the same file system. |
√ |
× |
× |
|
A backup is a complete copy of a file system at a specific time and it records all configuration data and service data at that time. If your file system is faulty or a logical error occurs in the data in the file system, you can use the backup data to restore the data quickly. |
× |
√ |
× |
|
SFS enables you to encrypt data on the new file systems as required. |
× |
√ |
× |
|
Cloud Eye is a multi-dimensional resource monitoring service. With Cloud Eye, you can view the file system usage and service running status, and respond to exceptions in a timely manner to ensure smooth running of services. |
√ |
√ |
√ |
|
Cloud Trace Service (CTS) records operations of SFS resources, facilitating query, audit, and backtracking. |
× |
√ |
× |
|
An enterprise project manages multiple resource instances by category. Resources and projects in different cloud service regions can be classified into one enterprise project. An enterprise allows you to classify resources based on departments or project groups and put relevant resources into the same enterprise project for management. Resources can be migrated between enterprise projects. If there are more than 20 enterprise projects, SFS Turbo is recommended. |
√ |
√ |
× |
|
Tag |
You can use tags to classify and identify file systems. If you add tags to a file system, service detail records (SDRs) generated for it will be labeled with these tags. You can classify SDRs by tag for cost analysis. |
× |
√ |
√ |
Active Directory configuration |
Active Directory Domain Services (AD DS) is a directory service that provides unified identity and permissions management through domain networks. After adding an SFS Turbo file system to an AD domain, you can authenticate user identities and manage permissions by file in the domain. |
× |
You need to submit a service ticket to apply for using it. |
× |
LDAP domain configuration |
Lightweight Directory Access Protocol (LDAP) is a standard protocol for interacting with directory servers. An LDAP server can centrally manage the ownerships of users and groups. After you bind your file system to an LDAP server, when a user accesses a file in the file system, SFS Turbo will access your LDAP server for user authentication and obtains the user and group ownerships. |
× |
√ |
× |
Replication of existing file system settings |
SFS allows you to replicate settings from an existing file system when creating a new file system. The following settings can be replicated: region, AZ, protocol, authorization, and tags. |
× |
× |
√ |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot