Whatβs New in Cyberstorage?
Would you like to receive notices about releases for Superna Cyberstorage?
We've created the What's New? feed to keep you up to date on releases and technical advisories. Subscribe using RSS or Atom.
What's New?β
This release of Cyberstorage for VAST and Qumulo introduces expanded platform support, updated capabilities for Disaster Recovery and Data Security, and a set of fixes that address issues from previous versions.
Featuresβ
Active Auditor for Qumuloβ
Active Auditing is now supported on Qumulo, enabling enhanced visibility and proactive data protection. This includes support for Mass Delete and Custom Real-Time Audit Triggers:
-
Mass Delete Protection Trigger
A pre-built trigger designed to detect and alert on high-volume delete operations by users. This helps identify unusual behaviors such as mass deletions or high-rate copy/delete workflows that may impact cluster stability or signal malicious activity.
-
Custom Audit Triggers
Build powerful, real-time audit policies using flexible logic. Combine audit fields with AND/OR rules, set thresholds, and define time windows to monitor precisely the behavior that matters to your organization.
These features enhance your ability to monitor user activity, detect risky patterns, and respond to threats in real time.
IP-Based Security Guard for Qumuloβ
Security Guard for Qumulo now supports using the IP address associated with the Security Guard share by specifying a Data Access IP and Tenant Name. Previously, Security Guard used the fixed IP provided by the Qumulo Network Element (NE) to run simulations. With this update, if a Data Access IP is provided, Eyeglass will use that IP instead of the NE IP. Tenant name is required to create the share under the correct Tenant.
This allows Security Guard to run against the intended share IP used for mapping and simulating activity. If no Data Access IP is specified, the system will continue to use the NE IP as a fallback. This change enables support for both fixed and floating IP configurations when setting up Security Guard on Qumulo.
VIP Failover for VASTβ
Superna Disaster Recovery now supports failover at the VIP Pool level for VAST environments.
With this update, VIP Pools can now be selected as independent failover targets. This enables users to initiate failover for a specific VIP Pool and its associated protected paths without failing over the entire Tenant.
Seamless Failover now supports NFS, and is available as a supported option for VIP Pool failovers.
Replication Failover Enhancement (Multi-Tenancy Support) for Qumuloβ
During failover, Eyeglass previously used the single IP that was used to register the Qumulo cluster, funneling all replication traffic through one IP.
In 4.1.0:
-
If Floating IPs exist on the network(s) that are assigned to a Tenant and that Tenant has Replication Protocol enabled, Eyeglass assigns them to failed-over relationships in a round-robin fashion. This preserves load balancing.
-
If no Floating IPs are available, Eyeglass automatically falls back to the Persistent IPs, and then to the Cluster IP if needed.
No extra setup is required. As long as the Replication Protocol is enabled at the Tenant level, Eyeglass will use any available IPs on that network (floating or persistent) after failover.
Cluster Version Supportβ
Qumuloβ
Added support for Qumulo version 7.3.2.1 and 7.4.1
Platform Supportβ
Nutanix Supportβ
Cyberstorage can now be deployed on Nutanix AHV. This adds support for running the appliance in environments using Nutanix as a hypervisor, alongside existing options.
SUSE Enterprise Supportβ
Cyberstorage now supports SUSE Linux Enterprise Server (SLES) 15 SP6 as an operating system for the appliance.
An upgrade path is available for systems currently running openSUSE Leap 15.6, for customers who have or plan to license SLES. The SUSE Upgrade Guide included with this release provides detailed instructions.
Improvementsβ
Updated Minimum Permissionsβ
We've updated the Minimum Permissions required for VAST and Qumulo.
Existing customers upgrading from 4.0.0 to 4.1.0 need to add the following permissions:
Qumuloβ
For Qumulo, SSH into the cluster with the admin username and password. Run the following command to add the necessary permission:
qq auth_modify_role --role Eyeglass-Admin --grant PRIVILEGE_FS_ATTRIBUTES_READ
For a full list of permissions, see the following articles:
- Minimum Permissions for Qumulo β Disaster Recovery
- Minimum Permissions for Qumulo β Data Security
In customer environments, we have observed that the following additional privilege may be required to successfully run config replication during Disaster Recovery (DR):
qq auth_modify_role --role Eyeglass-Admin --grant PRIVILEGE_FILE_FULL_ACCESS
Be sure to verify this in your specific deployment scenario.
VASTβ
For VAST
- In the VAST Web UI, go to Administrators > Roles.
- Select the role used for Eyeglass (or create a new one if needed).
- Edit the role and add the View permission for the Support realm.
- Click Save.
For a full list of permissions, see the following articles:
Event Types More User Friendlyβ
Event types in the Report Query Builder within Easy Auditor now display helpful descriptions directly next to each item in the dropdown menu. This update makes it easier for users to understand the purpose of each event type.
Threshold Defaultsβ
The default threshold values in the Data Security web UI have been updated to align with the latest deployment recommendations from Support. These changes ensure that new deployments start with optimal, recommended settings out of the box.
Login/Logout Information for Easy Auditorβ
The Easy Auditor report now includes a "Status" column for LOGON and LOGOFF events, displaying whether each event was successful or failed. This enhancement provides clearer visibility into user login and logoff activity.
What's Fixed?β
Fixesβ
Disaster Recoveryβ
-
CYBER-152: Cluster Editing Status Issue
Cluster status now correctly updates after editing from the inventory. Previously, the status could remain stuck on "Updating" even after the operation was complete.
-
CYBER-155: AD User Authentication Issue
Active Directory (AD) users with spaces in their usernames can now be added to User Roles. Previously, these users could not be added successfully.
-
CYBER-156: AD Group Resolution Issue
Active Directory (AD) group resolution is now supported when using the Down-Level Logon Name (DLLn) format. Groups must be added using the
domain\group_name
format. Group additions using this format are now processed successfully. -
CYBER-159: About/Contact Window Error for AD Users
After logging in with an Active Directory (AD) user, selecting About/Contact now works as expected. Previously, this action opened an empty window and prevented logout due to an uncaught type error.
-
DIS-1105/CYBER-207: Qumulo Multitenancy Audit Failure
A previous issue where Qumulo audit failures in multi-tenancy environments caused a Warning status in Eyeglass Configuration Replication has been resolved.
Data Securityβ
-
CYBER-163: Security Guard Logs Copy Issue
Fixed the issue where the Copy to Clipboard button did not work for Security Guard logs when using only RWD licenses.
-
CYBER-164: SQL Database Settings Not Preserved After Upgrade
SQL Database settings are now properly retained after upgrading Eyeglass.
-
CYBER-165: VAST NFS v4 Folder Deletes and Renames in WDMFG
Folder delete and rename operations on NFS v4 mounts now appear under the Folders category in Where Did My Data Go. Previously, these actions were incorrectly listed under Files.
-
CYBER-170: TD11 Lockout Not Triggered in Advanced/Enforcement Mode
TD11 events now correctly trigger an automatic lockout when using "Enforcement + Critical On" or "Enforcement + Critical Off" modes. Previously, these events generated only a WARNING severity.
-
DS-1539: Query on root path is not returning any results
An issue where queries on the root path in VAST did not return any results has been resolved. Previously, a workaround was required by adjusting the path formatting (removing one /). This is no longer necessary.
-
CYBER-160: Missing Locked-Out Policies for VAST S3 Events
Ransomware Defender (RWD) events originating from VAST S3 now display correctly in the Shares section when events are locked out. Previously, this section appeared empty for such events.
-
DS-1725/CYBER-95: Restore job for NFS does not remove a row in Host Access that was added during lockout
Restore jobs for Qumulo NFS exports now correctly remove Host Access rules added during lockout. Previously, if an export was locked out without a specific IP defined for read access, the access restriction remained after restore.
-
DS-1720/CYBER-94: Lockout job tries to lock out access on an Export that was removed
Lockout jobs for Qumulo no longer attempt to apply access restrictions to exports that have been removed. Previously, the job would attempt to lock out access on deleted exports.
-
DS-969/CYBER-89: Monitor Only List - RSW events from added paths are received as warning/major/critical if the path is entered in the format 'tenant:/path/to/object'
Ransomware Defender no longer raises warning, major, or critical events for paths added to the Monitor Only List using the 'tenant:/path/to/object' format. Previously, events from these paths were incorrectly flagged despite being in Monitor Only mode.
-
DS-2131/CYBER-98: Qumulo-only environment the SMB user displayed as SID
In Qumulo-only environments, SMB users now display correctly by username in Active Events. Previously, the system would display the user's SID instead.
Release Notesβ
The release notes provide detailed information on fixes, known issues, and limitations introduced or identified in this version.
Refer to this document for visibility into the state of the release,
What's New in Docs?β
Improvementsβ
We have improved the organization and usability of documentation for VAST and Qumulo.
PowerScale and ECS content is now found in a section dedicated to Cyberstorage for Dell, and we've built the Multiplatform Cyberstorage documentation with the specific needs of your VAST and Qumulo environments in mind.
4.1.0 Feature Documentationβ
VIP Failover for VASTβ
Active Auditor for Qumuloβ
Documentation is now available for Active Auditor on Qumulo. It covers how to configure custom real-time audit triggers and mass delete detection.
Nutanix Supportβ
A deployment guide is available for running Superna appliances on Nutanix AHV. The documentation includes configuration steps and prerequisites.
SUSE Upgrade Guideβ
An upgrade guide is available for moving from openSUSE Leap 15.6 to SUSE Linux Enterprise Server (SLES) 15 SP6. This is for customers who have or plan to license SLES.