Enable or disable the reuse of previously used devices in the following use cases:
- Add SDS devices that were used in a previous
PowerFlex. system. (Adding them without the
true flag will cause deployment failure.)
- Extend a system with an SDS whose devices were used in a previous system.
- Extend a system by adding SDSs that are already installed on hosts
|
add.sds.with.force.on.next.run
|
Default: false
To enable, set to
true.
To disable, set to
false.
NOTE: After finishing and marking the deployment as complete, the flag will revert to
false, so you will need to set it again for future deployments, as necessary.
|
add.sds.with.force.on.next.run=true
|
Use a
PowerFlex Gateway that did not initially deploy your
PowerFlex system
|
mdm.ip.addresses
|
Add the IP addresses of the system's primary and secondary MDMs, separated by semicolons, to this property. Both management and data IP addresses must be listed.
|
mdm.ip.addresses=10.76.60.232;10.76.60.233;10.76.60.234;10.76.30.10;10.76.30.11;10.76.30.12
|
Enable or disable the
PowerFlex Installer
|
features.enable_IM
|
Default: true
To disable, set to
false.
You can completely disable the use of the
PowerFlex Installer default port, 443, by setting both this property and the
features.enable_gateway property to
false.
|
features.enable_IM=false
|
Enable
PowerFlex Gateway
|
features.enable_gateway
|
Default: true
To disable, set to
false
You can disable the use of the default port, 443, by setting both this property and the
features.enable_IM to
false.
|
features.enable_gateway=false
|
Enable SNMP
|
features.enable_snmp
|
Default: false
To enable, set to
true
|
features.enable_snmp=true
|
Enable Secure Remote Services or email alert notifications
|
features.notification_method
|
Default: srs
To disable Secure Remote Services, set to
none
To enable Secure Remote Services, set to
srs
To enable email notifications, set to
email
Perform additional configurations for the other email notification properties in this configuration file.
|
features.notification_method=srs
|
Set email notification type
|
notifications.emailSID.1.type
|
Default (only option currently available):
callHome
|
notifications.emailSID.1.type=callHome
|
Set email notification SID: email sender identification (identity shown in the email's "From" field)
|
notifications.emailSID.1.SID
|
|
notifications.emailSID.1.SID=DDD@dell.com
|
Set email notification user name, required only when email notification uses SMTP server authentication
|
notifications.emailSID.1.username
|
|
notifications.emailSID.1.username=user123
|
Set email notification SMTP server name
|
notifications.emailSID.1.smtp
|
|
notifications.emailSID.1.smtp=mailhub.lss.emc.com
|
Enable SMTP authenticated mode for email notification
|
notifications.emailSID.1.authenticate
|
Default: false
To disable, set to
false
To enable, set to
true
In addition, configure the user name, using the property
notifications.emailSID.1.username, and configure the password using REST API, as described in the
Configure and Customize Dell PowerFlex
|
notifications.emailSID.1.authenticate=false
|
Set a custom port for email notification (optional; will override default port number 25)
|
notifications.emailSID.1.port
|
Default: 25
|
notifications.emailSID.1.port=25
|
To restrict login to LDAP users only (disable local user login)
|
gateway-admin.disable.local.login
|
Default: false
To enable, set to
true
For more information about setting up the
PowerFlex Gateway admin login credentials for using LDAP server\servers, see the
PowerFlex User Roles and LDAP Usage Technical Notes.
|
gateway-admin.disable.local.login=true
|
Change the name of the VASA Provider replica set. When there are three VASA Providers, a replica set is created during deployment to facilitate communication between VASA Providers.
|
vasa.provider.replica.set.name
|
Default:
vasa-rs
|
vasa.provider.replica.set.name=vasa-rs
|
Enable or disable monitoring of VASA Providers
|
features.enable_vasa_monitor
|
Default: true
|
features.enable_vasa_monitor=true
|
Set the list of IP addresses for VASA Providers
|
vasa.provider.ips
|
A comma-separated list of IP addresses of all the VASA Providers. The installation process sets this property, but it can also be set manually.
|
vasa.provider.ips=<ip>,<ip>,...
|
Set the port of the VASA Providers' REST service, in order to monitor the page
http://<ip>:<port>/actuator/health
|
vasa.provider.monitor.port
|
Default: 8080
|
vasa.provider.monitor.port=8080
|
Set the number of seconds to sleep between each sample
|
vasa.provider.monitor.interval.seconds
|
Default: 60
|
vasa.provider.monitor.interval.seconds=60
|
When installing VASA in a VMware environment, set this property to false in order to enable extending the system with the
PowerFlex Installer.
|
vmware
|
In a Linux environment, default: false.
In a VMware environment, default: true
When installing VASA in a VMware environment, set the value to
false.
|
vmware=false
|
When CloudIQ will be used, set the IP address of the
PowerFlex presentation server.
|
presentationserver.ip
|
IP address of the
PowerFlex presentation server that hosts the
PowerFlex GUI
|
presentationserver.ip=10.76.60.200
|
When LIA will use LDAP authentication on a Linux-based LDAP server, configure username DN format.
For Windows-based LDAP servers, do not use this property, because internal defaults are used.
|
lia.ldap.initial.usernameDnFormat
|
Values for
CN,
OU and
DC.
CN is the user assigned to LIA
OU is the name of the organizational unit
DC fields are the domain parts of the Base DN
|
lia.ldap.initial.usernameDnFormat=CN=LIA_user,OU=group_1,DC=ldap,DC=com
|
When LIA will use LDAP authentication on a Linux-based LDAP server, configure search filter format.
For Windows-based LDAP servers, do not use this property, because internal defaults are used.
|
lia.ldap.initial.searchFilterFormat
|
Values for the search filter format
CN is the user assigned to LIA
memberOf is the organizational unit to which the user is assigned
(&(objectClass=userSecurityInformation)
should be used as is shown in the example
|
lia.ldap.initial.searchFilterFormat=(&(objectClass=userSecurityInformation)(cn=LIA_user)(memberOf=group_1))
|
When LIA will use LDAP authentication on a Linux-based LDAP server, this property allows the editing of an existing configuration for an LDAP server, instead of removing the configuration from the system and adding the LDAP server from scratch.
|
lia.ldap.replaceExisting
|
true allows editing of existing LDAP parameters
|
lia.ldap.replaceExisting=true
|
When SDCs are deployed in containers, and therefore no LIA is present, this property is required in order to ignore them during a non-disruptive upgrade.
|
sdc.allowNoLiaOnSDCOnlyNode
|
Default: false.
Set this property to
false when SDCs are not deployed in containers.
Set this property to
true when the
PowerFlex environment runs with containerized SDCs (in other words, there is no LIA on these nodes).
|
sdc.allowNoLiaOnSDCOnlyNode=true
|