Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 2. What's New in this Release?


This chapter describes the key features and major enhancements in the Red Hat Gluster Storage 3.1 release.
  • Dispersed Volumes and Distributed Dispersed Volumes
    Dispersed volumes are based on erasure coding. Erasure coding is a method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces and stored across a set of different locations. This allows the recovery of the data stored on one or more bricks in case of failure. Dispersed volume requires less storage space when compared to a replicated volume.
    For more information, see sections Creating Dispersed Volumes and Creating Distributed Dispersed Volumes in the Red Hat Gluster Storage Administration Guide.
  • NFS Ganesha
    NFS-Ganesha is now supported in highly available active-active environment. In a highly available active-active environment, if a NFS-Ganesha server that is connected to a NFS client running a particular application crashes, the application/NFS client is seamlessly connected to another NFS-Ganesha server without any administrative intervention. The highly available NFS-Ganesha cluster can be modified with the help of the ganesha-ha.sh script.
    For more information, see section NFS Ganesha in the Red Hat Gluster Storage Administration Guide.
  • Snapshot Enhancements
    • Snapshot Scheduler
      Snapshot scheduler creates snapshots automatically based on the configured scheduled interval of time. The snapshots can be created every hour, a particular day of the month, particular month, or a particular day of the week based on the configured time interval.
    • Snapshot Clone
      You can now create a clone of a snapshot. This is a writable clone and behaves like a regular volume. A new volume can be created from a particular snapshot clone. Snapshot Clone is provided as a Technology Preview.
    For more information, see chapter Managing Snapshots in the Red Hat Gluster Storage Administration Guide.
  • SMB
    With this this release, by upgrading Samba to version 4.1, the following enhancements are added to SMB:
    • Basic support for SMB version 3.0.0 including support for new ciphers for signing.
    • SMB 3 protocol encryption.
    • SMB 2.1 multi-credit (large MTU) operations.
    • SMB 2 offload copying using the COPYCHUNK mechanism.
    • The client tools now support SMB versions 2 and 3.
    For more information, see section SMB in the Red Hat Gluster Storage Administration Guide.
  • Network Encryption
    Red Hat Gluster Storage supports network encryption using TLS/SSL. Red Hat Gluster Storage uses TLS/SSL for authentication and authorization, in place of the home grown authentication framework used for normal connections. Red Hat Gluster Storage supports both I/O encryption and management (glusterd) encryption .
    For more information, see chapter Configuring Network Encryption in Red Hat Gluster Storage in the Red Hat Gluster Storage Administration Guide.
  • Detecting Data Corruption with BitRot
    BitRot detection is a technique used in Red Hat Gluster Storage to identify the silent corruption of data with no indication from the disk to the storage software layer when the error has occurred. BitRot also helps in catching backend tinkering of bricks, where the data is directly manipulated on the bricks without going through FUSE, NFS or any other access protocols. BitRot detection is exceptionally useful when using JBOD. A bitrot command scans all the bricks, detects bitrot issue and logs any bit rot errors on the underlying disks.
    For more information, see chapter Detecting Data Corruption with BitRot in the Red Hat Gluster Storage Administration Guide.
  • Glusterfind (Backup Hooks)
    Glusterfind is a utility that provides the list of files that are modified between the previous backup session and the current period. This list of files can then be used by any industry standard backup application for backup. These files can be used for periodic antivirus scans too.
    For more information, see chapter Red Hat Gluster Storage Utilities in the Red Hat Gluster Storage Administration Guide.
  • pNFS
    The Parallel Network File System (pNFS) is part of the NFS v4.1 protocol that allows compute clients to access storage devices directly and in parallel. pNFS is provided as a Technology Preview.
    For more information, see section NFS Ganesha in the Red Hat Gluster Storage Administration Guide.
  • SELinux Support
    Red Hat Gluster Storage now supports SELinux in enabled mode. SELinux is supported both on client-side and server-side. You can choose to run SELinux in enabled or permissive mode.
    For more information, see chapter Enabling SELinux in the Red Hat Gluster Storage Installation Guide.
  • Tiering
    Tiering improves the performance, and the compliance aspects in a Red Hat Gluster Storage environment. This is achieved by optimizing the placement of the most accessed files on the Faster Storage Medium (fast tier / hot tier) and placing less accessed data to Slower Storage Medium (slow tier / cold tier). It also serves as an enabling technology for other enhancements by combining cost-effective or archivally oriented storage for the majority of user data with high-performance storage to absorb the majority of I/O workload. Tiering is provided as a Technology Preview.
    For more information, see chapter Managing Tiering in the Red Hat Gluster Storage Administration Guide.
  • Enhancements in Red Hat Gluster Storage Console
    • Dashboard
      Dashboard displays an overview of all the entities in Red Hat Gluster Storage like Hosts, Volumes, Bricks, and Clusters. The Dashboard shows a consolidated view of the system and helps the administrator to know the status of the system.
      For more information, see chapter Dashboard Overview in the Red Hat Gluster Storage Console Administration Guide.
    • Disk Provisioning
      The list of storage devices can be viewed through Red Hat Gluster Storage Console and provisioned through the Console using Disk Provisioning feature. You can also create bricks through Red Hat Gluster Storage Console.
      For more information, see section Managing Storage Devices in the Red Hat Gluster Storage Console Administration Guide.
    • Logical Networks (Network Traffic Segregation)
      Logical networks allow both connectivity and segregation. You can create a logical network for gluster storage communication to optimize network traffic between hosts and gluster bricks.
      For more information, see chapter Logical Networks in the Red Hat Gluster Storage Console Administration Guide.
    • Snapshot Management
      Snapshot feature enables you to create point-in-time copies of Red Hat Gluster Storage volumes, which you can use to protect data. You can directly access read-only Snapshot copies to recover from accidental deletion, corruption, or modification of the data. Through Red Hat Gluster Storage Console, you can view the list of snapshots and snapshot status, create, delete, activate, deactivate and restore to a given snapshot.
      For more information, see chapter Managing Snapshots in the Red Hat Gluster Storage Console Administration Guide.
    • Geo-replication Management and Monitoring
      Geo-replication provides a distributed, continuous, asynchronous, and incremental replication service from one site to another over Local Area Networks (LANs), Wide Area Networks (WANs), and the Internet. You can perform Geo-replication operations and also manage source and destination volumes through Red Hat Gluster Storage Console.
      For more information, see chapter Managing Geo-replication in the Red Hat Gluster Storage Console Administration Guide.
Nach oben
Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2025 Red Hat