Skip to main content
Version: 4.1.0

What’s New in Cyberstorage?

What's New?

Would you like to receive notices about releases for Superna Cyberstorage?

We've created the What's New? feed to keep you up to date on releases and technical advisories. Subscribe using RSS or Atom.

What's New?​

This release of Cyberstorage for VAST and Qumulo introduces expanded platform support, updated capabilities for Disaster Recovery and Data Security, and a set of fixes that address issues from previous versions.

Features​

Active Auditor for Qumulo​

Active Auditing is now supported on Qumulo, enabling enhanced visibility and proactive data protection. This includes support for Mass Delete and Custom Real-Time Audit Triggers:

  • Mass Delete Protection Trigger

    A pre-built trigger designed to detect and alert on high-volume delete operations by users. This helps identify unusual behaviors such as mass deletions or high-rate copy/delete workflows that may impact cluster stability or signal malicious activity.

  • Custom Audit Triggers

    Build powerful, real-time audit policies using flexible logic. Combine audit fields with AND/OR rules, set thresholds, and define time windows to monitor precisely the behavior that matters to your organization.

These features enhance your ability to monitor user activity, detect risky patterns, and respond to threats in real time.

IP-Based Security Guard for Qumulo​

Security Guard for Qumulo now supports using the IP address associated with the Security Guard share by specifying a Data Access IP and Tenant Name. Previously, Security Guard used the fixed IP provided by the Qumulo Network Element (NE) to run simulations. With this update, if a Data Access IP is provided, Eyeglass will use that IP instead of the NE IP. Tenant name is required to create the share under the correct Tenant.

This allows Security Guard to run against the intended share IP used for mapping and simulating activity. If no Data Access IP is specified, the system will continue to use the NE IP as a fallback. This change enables support for both fixed and floating IP configurations when setting up Security Guard on Qumulo.

VIP Failover for VAST​

Superna Disaster Recovery now supports failover at the VIP Pool level for VAST environments.

With this update, VIP Pools can now be selected as independent failover targets. This enables users to initiate failover for a specific VIP Pool and its associated protected paths without failing over the entire Tenant.

Seamless Failover

Seamless Failover now supports NFS, and is available as a supported option for VIP Pool failovers.

Replication Failover Enhancement (Multi-Tenancy Support) for Qumulo​

During failover, Eyeglass previously used the single IP that was used to register the Qumulo cluster, funneling all replication traffic through one IP.

In 4.1.0:

  • If Floating IPs exist on the network(s) that are assigned to a Tenant and that Tenant has Replication Protocol enabled, Eyeglass assigns them to failed-over relationships in a round-robin fashion. This preserves load balancing.

  • If no Floating IPs are available, Eyeglass automatically falls back to the Persistent IPs, and then to the Cluster IP if needed.

No extra setup is required. As long as the Replication Protocol is enabled at the Tenant level, Eyeglass will use any available IPs on that network (floating or persistent) after failover.

Cluster Version Support​

Qumulo​

Added support for Qumulo version 7.3.2.1 and 7.4.1

Platform Support​

Nutanix Support​

Cyberstorage can now be deployed on Nutanix AHV. This adds support for running the appliance in environments using Nutanix as a hypervisor, alongside existing options.

SUSE Enterprise Support​

Cyberstorage now supports SUSE Linux Enterprise Server (SLES) 15 SP6 as an operating system for the appliance.

An upgrade path is available for systems currently running openSUSE Leap 15.6, for customers who have or plan to license SLES. The SUSE Upgrade Guide included with this release provides detailed instructions.

Improvements​

Updated Minimum Permissions​

We've updated the Minimum Permissions required for VAST and Qumulo.

Existing customers upgrading from 4.0.0 to 4.1.0 need to add the following permissions:

Qumulo​

For Qumulo, SSH into the cluster with the admin username and password. Run the following command to add the necessary permission:

qq auth_modify_role --role Eyeglass-Admin --grant PRIVILEGE_FS_ATTRIBUTES_READ

For a full list of permissions, see the following articles:

info

In customer environments, we have observed that the following additional privilege may be required to successfully run config replication during Disaster Recovery (DR):

qq auth_modify_role --role Eyeglass-Admin --grant PRIVILEGE_FILE_FULL_ACCESS

Be sure to verify this in your specific deployment scenario.

VAST​

For VAST

  1. In the VAST Web UI, go to Administrators > Roles.
  2. Select the role used for Eyeglass (or create a new one if needed).
  3. Edit the role and add the View permission for the Support realm.
  4. Click Save.

alt text

For a full list of permissions, see the following articles:

Event Types More User Friendly​

Event types in the Report Query Builder within Easy Auditor now display helpful descriptions directly next to each item in the dropdown menu. This update makes it easier for users to understand the purpose of each event type.

Threshold Defaults​

The default threshold values in the Data Security web UI have been updated to align with the latest deployment recommendations from Support. These changes ensure that new deployments start with optimal, recommended settings out of the box.

Login/Logout Information for Easy Auditor​

The Easy Auditor report now includes a "Status" column for LOGON and LOGOFF events, displaying whether each event was successful or failed. This enhancement provides clearer visibility into user login and logoff activity.

What's Fixed?​

Fixes​

Disaster Recovery​

  • CYBER-152: Cluster Editing Status Issue

    Cluster status now correctly updates after editing from the inventory. Previously, the status could remain stuck on "Updating" even after the operation was complete.

  • CYBER-155: AD User Authentication Issue

    Active Directory (AD) users with spaces in their usernames can now be added to User Roles. Previously, these users could not be added successfully.

  • CYBER-156: AD Group Resolution Issue

    Active Directory (AD) group resolution is now supported when using the Down-Level Logon Name (DLLn) format. Groups must be added using the domain\group_name format. Group additions using this format are now processed successfully.

  • CYBER-159: About/Contact Window Error for AD Users

    After logging in with an Active Directory (AD) user, selecting About/Contact now works as expected. Previously, this action opened an empty window and prevented logout due to an uncaught type error.

  • DIS-1105/CYBER-207: Qumulo Multitenancy Audit Failure

    A previous issue where Qumulo audit failures in multi-tenancy environments caused a Warning status in Eyeglass Configuration Replication has been resolved.

Data Security​

  • CYBER-163: Security Guard Logs Copy Issue

    Fixed the issue where the Copy to Clipboard button did not work for Security Guard logs when using only RWD licenses.

  • CYBER-164: SQL Database Settings Not Preserved After Upgrade

    SQL Database settings are now properly retained after upgrading Eyeglass.

  • CYBER-165: VAST NFS v4 Folder Deletes and Renames in WDMFG

    Folder delete and rename operations on NFS v4 mounts now appear under the Folders category in Where Did My Data Go. Previously, these actions were incorrectly listed under Files.

  • CYBER-170: TD11 Lockout Not Triggered in Advanced/Enforcement Mode

    TD11 events now correctly trigger an automatic lockout when using "Enforcement + Critical On" or "Enforcement + Critical Off" modes. Previously, these events generated only a WARNING severity.

  • DS-1539: Query on root path is not returning any results

    An issue where queries on the root path in VAST did not return any results has been resolved. Previously, a workaround was required by adjusting the path formatting (removing one /). This is no longer necessary.

  • CYBER-160: Missing Locked-Out Policies for VAST S3 Events

    Ransomware Defender (RWD) events originating from VAST S3 now display correctly in the Shares section when events are locked out. Previously, this section appeared empty for such events.

  • DS-1725/CYBER-95: Restore job for NFS does not remove a row in Host Access that was added during lockout

    Restore jobs for Qumulo NFS exports now correctly remove Host Access rules added during lockout. Previously, if an export was locked out without a specific IP defined for read access, the access restriction remained after restore.

  • DS-1720/CYBER-94: Lockout job tries to lock out access on an Export that was removed

    Lockout jobs for Qumulo no longer attempt to apply access restrictions to exports that have been removed. Previously, the job would attempt to lock out access on deleted exports.

  • DS-969/CYBER-89: Monitor Only List - RSW events from added paths are received as warning/major/critical if the path is entered in the format 'tenant:/path/to/object'

    Ransomware Defender no longer raises warning, major, or critical events for paths added to the Monitor Only List using the 'tenant:/path/to/object' format. Previously, events from these paths were incorrectly flagged despite being in Monitor Only mode.

  • DS-2131/CYBER-98: Qumulo-only environment the SMB user displayed as SID

    In Qumulo-only environments, SMB users now display correctly by username in Active Events. Previously, the system would display the user's SID instead.

Release Notes​

The release notes provide detailed information on fixes, known issues, and limitations introduced or identified in this version.

Refer to this document for visibility into the state of the release,

What's New in Docs?​

Improvements​

We have improved the organization and usability of documentation for VAST and Qumulo.

PowerScale and ECS content is now found in a section dedicated to Cyberstorage for Dell, and we've built the Multiplatform Cyberstorage documentation with the specific needs of your VAST and Qumulo environments in mind.

4.1.0 Feature Documentation​

VIP Failover for VAST​

Active Auditor for Qumulo​

Documentation is now available for Active Auditor on Qumulo. It covers how to configure custom real-time audit triggers and mass delete detection.

Nutanix Support​

A deployment guide is available for running Superna appliances on Nutanix AHV. The documentation includes configuration steps and prerequisites.

SUSE Upgrade Guide​

An upgrade guide is available for moving from openSUSE Leap 15.6 to SUSE Linux Enterprise Server (SLES) 15 SP6. This is for customers who have or plan to license SLES.