Before you configure FPolicy events, you must understand what it means to create an FPolicy event. You must determine which protocols you want the event to monitor, which events to monitor, and which event filters to use. This information helps you plan the values that you want to set.
Creating the FPolicy event means defining information that the FPolicy process needs to determine what file access operations to monitor and for which of the monitored events notifications should be sent to the external FPolicy server. The FPolicy event configuration defines the following configuration information:
FPolicy can monitor SMB, NFSv3, and NFSv4 file access operations.
Not all file operations are valid for each protocol.
Only certain combinations of file operations and filters are valid. Each protocol has its own set of supported combinations.
You can use the following list of available FPolicy event configuration parameters to help you plan your configuration:
|Type of information||Option|
Specifies the SVM name that you want to associate with this FPolicy event.
Each FPolicy configuration is defined within a single SVM. The external engine, policy event, policy scope, and policy that combine together to create an FPolicy policy configuration must all be associated with the same SVM.
Specifies the name to assign to the FPolicy event. When you create the FPolicy policy you associate the FPolicy event with the policy using the event name.
The name can be up to 256 characters long.
Note: The name can be up to 200 characters long if configuring the event in a MetroCluster configuration.
The name can contain any combination of the following ASCII-range characters:
Specifies which protocol to configure for the FPolicy event. The list for -protocol can include one of the following values:
Note: If you specify -protocol, then you must specify a valid value in the -file-operations parameter. As the protocol version changes, the valid values might change.
Specifies the list of file operations for the FPolicy event.
The event checks the operations specified in this list from all client requests using the protocol specified in the -protocol parameter. You can list one or more file operations by using a comma-delimited list. The list for -file-operations can include one or more of the following values:
Note: If you specify-file-operations, then you must specify a valid protocol in the -protocol parameter.
Specifies the list of filters for a given file operation for the specified protocol. The values in the -filters parameter are used to filter client requests. The list can include one or more of the following:
Note: If you specify the -filters parameter, then you must also specify valid values for the -file-operations and -protocol parameters.
|-filters filter, ...|
|Is volume operation required
Specifies whether monitoring is required for volume mount and unmount operations. The default is false.