Determining the POSIX path of a unified file and object access enabled fileset
Use the following steps for determining the POSIX path of a unified file and object access enabled fileset.
The swift ring builder creates a single virtual device for unified file and object access policies, named with the region number, starting with s and appended with z1device1. For example:
s13031510160z1device1
The full path to the unified file and object access containers is the concatenation of the fileset linkage, the virtual device name, and the account name:
/ibm/fs0/obj_sof-policy1/s13031510160z1device1/AUTH_73282e8bca894819a3cf19017848ce6b/
The following is an example of determining the POSIX path of a unified file and object access enabled fileset from the command line with one rather complex command. This assumes that your GPFS™ file system device is gpfs0, and also that you are interested in the first storage policy listed. If this is not the case, update the script accordingly.
Commands used:
# openstack project list
# swift capabilities
Assumptions:
# File system name is is gpfs0
# Project/Account name is admin
# first [1] SoF policy is considered
echo $(find $(mmlsfileset gpfs0 | grep $(perl -e '$p=`swift capabilities
| grep policies:`;$p=~s/:/=>/g;eval"\$v= {".$p."}";print$v->{policies}[1]{name};')
| awk '/ / {print $3}') -name AUTH_$(openstack project list | awk '/ admin / {print $2}'))