Turning old hardware into network storage
Configuration
To create a filesystem on the drives intended for the NAS as mass storage, first open Storage | File System Manager. After clicking on Create File System, a clear-cut dialog appears where you can assign a name to the filesystem, select the appropriate drive from a list of mass storage devices built into the system, and specify which RAID level you want to use for creating the drive (Figure 2).
In addition, you can set a compression level here and define how the NAS mounts the drive. It is important to note that when specifying the RAID level, if there is only one storage drive in the system, you must specify the JBOD level. Also, the filesystem name should be at least eight characters. To apply the settings, click Save. The system then confirms successful creation of a new filesystem.
Next, switch to Storage | Volume Manager and create a new volume. After clicking on Create Volume, a self-explanatory dialog appears that is limited to essential information. Because no users or groups exist initially, the administrator still appears in this dialog as the User Owner. If you created several filesystems in the first step, then specify the filesystem to be used for the volume in a selection field in this dialog. You also need to name the volume and, if applicable, assign permissions to manage access to it.
The basic setting activates read and write permissions for users, and the group only has read permission. If you create quotas, you also conveniently assign storage quotas in this dialog. After completing all the settings, press Save to save the new volume. Similar to creating a filesystem, the volume now appears in a list in the Volume Manager, which you can use to modify the settings later on if needed (Figure 3).
Groups and Users
To use the memory quota sensibly and securely, you must create groups and users using System | Groups Manager and Users Manager respectively. Depending on which option you select, you will find the Create Group or Create User links, much like the drive settings. I recommend creating the groups first and then assigning the users to the groups by selecting the desired group in the corresponding selection field in the Create User dialog.
When creating a user, you can also define quotas and assign permissions. After completing the settings, press Add to create the group or user. The dashboard will then display the total number of logged-in users in Users. Clicking View Details under Users opens detailed information about the users in a table format. Under Actions, you can manage the entries, delete users, or modify their settings (Figure 4).
Access
To gain access to the NAS system's resources, the final step is to specify which access protocols you want to use. EasyNAS offers a total of eight different access modes, ranging from Apple's AFP protocol to CIFS/SMB, which is common in the Windows world. The SSH, NFS, and FTP protocols commonly used on Linux are also available.
You can enable support for the individual protocols under System | Addons, where you will find the individual options listed in a table in the File Sharing area. To integrate an option into the system, press the installation button on the right in the Actions column. EasyNAS now downloads the corresponding package from the Internet, integrates it, and then displays a confirmation message.
To access the NAS system using the respective protocol, you need to enable the protocol first. To do this, EasyNAS creates a new File Sharing category in the sidebar on the left, which shows the currently installed protocols. You can enable them via the sliders. The protocols are then immediately available without rebooting the system.
To access the individual volumes from a desktop PC, open the respective desktop environment's file manager and connect to the desired storage via the corresponding settings option (Figure 5). The volumes can then be used like any conventional folder.
« Previous 1 2 3 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Linux Servers Targeted by Akira Ransomware
A group of bad actors who have already extorted $42 million have their sights set on the Linux platform.
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.
-
Kodi 21.0 Open-Source Entertainment Hub Released
After a year of development, the award-winning Kodi cross-platform, media center software is now available with many new additions and improvements.
-
Linux Usage Increases in Two Key Areas
If market share is your thing, you'll be happy to know that Linux is on the rise in two areas that, if they keep climbing, could have serious meaning for Linux's future.
-
Vulnerability Discovered in xz Libraries
An urgent alert for Fedora 40 has been posted and users should pay attention.
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs