Node Navigation
Get Started Here
Recent Discussions
Can you recover?
How do you ensure you can recover from ransomware attacks and malicious incidents? Start with SafeMode. Is it enabled? Have you verified that all critical workloads and recovery environments are fully protected? Everpure FlashArray SafeMode provides immutable snapshot protection that helps organizations recover from ransomware attacks by preventing deleted snapshots or volumes from being permanently eradicated until a defined retention period expires — even if attackers compromise administrative credentials. SafeMode creates a storage-level immutability layer independent of operating systems, hypervisors, or backup software, helping preserve known-good recovery points for rapid restoration. Recommended best practices include enabling locked SafeMode through Everpure Global Technical Services, extending eradication timers to 14–30 days to account for delayed ransomware detection, implementing multi-person authorization for protected operations, and applying automated snapshot policies across critical workloads such as databases, virtual machine datastores, identity services, and backup repositories. Additional technical guidance and demonstrations are available through the SafeMode Documentation, SafeMode Introduction and SafeMode 101 (Tutorial).4Views1like0CommentsEverpure Accelerate 2026
Hey gang, Everpure Accelerate is approaching fast. June 16-18th in Las Vegas. Chime in if you will be attending. I've been fortunate to have attended the last few years and always find this event to be full of great information. Not to mention the training classes and certification tests are included. Hope to see some of you out there!262Views2likes2CommentsFlashblade & Ansible collection
Hello community, We are facing some issues with our FlashBlade when provisioning policies with Ansible. We have updated all the components (py-pure-client and the collection), and we are failing on a simple policy deployment. - name: Test purestorage.flashblade.purefb_policy: name: "filesystem_export_policy" enabled: True policy_type: "nfs" at: True client: "mynfsexport.flashblade.local" secure: True security: "sys" permission: "rw" access: "no-squash" fb_url: "{{ fb_host }}" api_token: "{{ fb_api_token }}" The complete stack trace is : The full traceback is: Traceback (most recent call last): File "/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py", line 107, in <module> _ansiballz_main() File "/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py", line 99, in _ansiballz_main invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS) File "/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py", line 47, in invoke_module runpy.run_module(mod_name='ansible_collections.purestorage.flashblade.plugins.modules.purefb_policy', init_globals=dict(_module_fqn='ansible_collections.purestorage.flashblade.plugins.modules.purefb_policy', _modlib_path=modlib_path), File "<frozen runpy>", line 226, in run_module File "<frozen runpy>", line 98, in _run_module_code File "<frozen runpy>", line 88, in _run_code File "/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py", line 4233, in <module> File "/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py", line 4008, in main File "/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py", line 2392, in update_nfs_policy AttributeError: 'ErrorResponse' object has no attribute 'items' fatal: [localhost]: FAILED! => { "changed": false, "module_stderr": "Traceback (most recent call last):\n File \"/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py\", line 107, in <module>\n _ansiballz_main()\n File \"/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py\", line 99, in _ansiballz_main\n invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS)\n File \"/home/user/.ansible/tmp/ansible-tmp-1778656887.1852276-3067455-48057529014464/AnsiballZ_purefb_policy.py\", line 47, in invoke_module\n runpy.run_module(mod_name='ansible_collections.purestorage.flashblade.plugins.modules.purefb_policy', init_globals=dict(_module_fqn='ansible_collections.purestorage.flashblade.plugins.modules.purefb_policy', _modlib_path=modlib_path),\n File \"<frozen runpy>\", line 226, in run_module\n File \"<frozen runpy>\", line 98, in _run_module_code\n File \"<frozen runpy>\", line 88, in _run_code\n File \"/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py\", line 4233, in <module>\n File \"/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py\", line 4008, in main\n File \"/opt/tmp/tmp/ansible_purestorage.flashblade.purefb_policy_payload_xaietsz7/ansible_purestorage.flashblade.purefb_policy_payload.zip/ansible_collections/purestorage/flashblade/plugins/modules/purefb_policy.py\", line 2392, in update_nfs_policy\nAttributeError: 'ErrorResponse' object has no attribute 'items'\n", "module_stdout": "", "msg": "MODULE FAILURE: No start of json char found\nSee stdout/stderr for the exact error", "rc": 1 } If the policy is already set, the playbook runs perfectly fine. The problem occurs when a new policy is injected. However, we have to install the collection from GitHub. It seems that the artifact built and installed by Ansible Galaxy is not correct. Some commits are not propagated. For example, with the FlashBlade collection 1.24 (installed from Galaxy), we have: >>> from pypureclient.flashblade import ( ... PolicyRuleObjectAccessCondition, ... PolicyRuleObjectAccessPost, ... PolicyRuleObjectAccess, ... NfsExportPolicy, ... NfsExportPolicyRule, ... Policy, ... PolicyPatch, ... PolicyRule, ... SmbSharePolicyRule, ... SmbSharePolicy, ... SmbClientPolicyRule, ... SmbClientPolicy, ... ObjectStoreAccessPolicyPost, ... NetworkAccessPolicy, ... NetworkAccessPolicyRule, ... WormDataPolicy, ... ) Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/home/user/conda/envs/ansible/lib/python3.12/site-packages/pypureclient/flashblade/__init__.py", line 40, in __getattr__ raise ImportError(f'module {__package__} has no attribute {name}') ImportError: module pypureclient.flashblade has no attribute PolicyPatch We have compared the archive from GitHub and there are many differences with the upstream collection code. To help, find my my env package : Package Version ----------------- ----------- annotated-types 0.7.0 ansible-core 2.18.5 bcrypt 5.0.0 certifi 2026.4.22 cffi 2.0.0 cryptography 44.0.0 dnspython 2.8.0 invoke 3.0.3 Jinja2 3.1.4 MarkupSafe 2.1.1 packaging 24.1 paramiko 5.0.0 pip 24.2 py-pure-client 1.88.0 pycparser 2.22 pydantic 2.13.4 pydantic_core 2.46.4 PyJWT 2.12.1 PyNaCl 1.6.2 python-dateutil 2.9.0.post0 PyYAML 6.0.2 resolvelib 1.0.1 setuptools 75.8.2 six 1.17.0 typing_extensions 4.15.0 typing-inspection 0.4.2 urllib3 2.7.0 wheel 0.45.0 And our flashblades are running the Purity//FB 4.6.9. If anyone has a lead to help us get our Ansible back up and running, I thank them in advance. We appreciate your help. Matth42Views0likes2CommentsAsk Us Everything Recap: How Pure1 Makes Storage Feel… Easy
If you joined the latest Ask Us Everything session on Pure1, one theme came through clearly: storage management does not have to be complicated. This session, driven by questions from the Everpure Community, explored how Pure1 has grown from a monitoring tool into a self-service control plane with planning, assessments, workflow automation, and proactive support intelligence. Here are some of the highlights. “What is Pure1 actually doing for me?” Pure1 has always been rooted in the rich telemetry that Everpure collects from arrays. Today, it gives customers a single, global view of their environment, making it easier to understand fleet health, performance, support status, and risk. The key point from the experts was that Pure1 is not just showing data. It also helps you decide what to do next. Instead of logging into individual systems or stitching together reports, teams can use Pure1 as a central place to see what is healthy, what needs attention, and where action may be needed. And with AI Copilot, this and much more can even be done via natural language. “Can Pure1 really help with planning?” In traditional storage environments, planning often means spreadsheets, manual analysis, or bringing in outside help. Pure1 changes that by building planning tools directly into the management experience. Admins can model capacity growth, performance trends, hardware upgrades, and the impact of adding new workloads, all within the same plan. Even better, those models are interactive. You can test scenarios, compare options, and see likely outcomes before making changes. That is a major difference from legacy storage, where planning often feels like a separate project. With Pure1, planning becomes part of everyday operations. “What about security and data protection?” Attendees also asked about risk, resiliency, and readiness. Pure1 includes assessments that help teams understand where they stand. Security assessments look at areas such as password hygiene, vulnerabilities, and exposure. Data protection assessments focus on recovery readiness, replication, and SafeMode coverage. That distinction matters. Security is about reducing the chance of something bad happening. Data protection is about being ready when something does. Pure1 helps teams look at both sides, track improvement over time, and identify gaps before they become urgent problems. “How proactive is support, really?” This was one of the strongest examples of how Pure1 differs from traditional storage tools. Pure1 is tied directly into Everpure’s proactive support model. Instead of waiting for customers to find and report issues, Everpure can detect many problems early through telemetry and pattern recognition. That includes early signs of hardware issues, unusual performance behavior, or network conditions that may become problems later. The big takeaway: Pure1 helps spot trouble before it affects performance or availability. The majority of support cases are opened automatically, and customers can track case status and related alerts directly in Pure1. For storage teams, that means fewer surprises and less time spent proving that a problem exists. “Can I customize this for my environment?” Yes, and this is where Pure1 starts to feel less like a dashboard and more like an operations platform. The session touched on workflow orchestration and alerting, including the ability to create custom alerts, route notifications to tools like email or Slack, and build simple response workflows. And AI Copilot further simplifies the customization process. That flexibility is important because every environment is different. Pure1 provides built-in intelligence, but also gives teams ways to adapt it to their own operational processes. “What about file and object data?” Attendees asked whether those capabilities would be visible in their current Pure1 experience. The answer was yes. Pure1 provides visibility across protocols, including block, file, and object, without requiring separate tools. That consistency reflects Everpure’s broader design goal: add capability without adding complexity. Final thoughts The biggest takeaway from the session was simple: Pure1 turns storage management into a self-service experience. Instead of: Reacting to problems Relying on external analysis Managing systems one by one You’re able to: Plan proactively Assess continuously Automate intelligently, across your data estate For technical practitioners, that means less time in spreadsheets, fewer manual checks, and more confidence managing storage at scale. And based on the questions from the community, that is exactly the kind of simplicity storage teams are looking for. Find out more about how Pure1 enables the Everpure Intelligent Control Plane here. Check out this and all our other Ask Us Everything sessions. And, keep the conversation going by jumping into the Everpure Community.18Views1like0CommentsPure1 Feature Request: Assets > Genealogy milestones overlaid on Analytics > Performance graphs
It would be helpful in analyzing and correlating array performance profile changes if genealogy events for an array (either controller replacement via Evergreen NDU or even PurityOE upgrades vis SSU) could be overlaid on the Analytics > Performance graph data for the array and time period selected. I attached a crude mockup of the idea, but I'm sure it could be done much more elegantly and less visually intrusively with a small floating tick mark with a hover effect showing the genealogy change to the array. It could get complicated when graphing performance data for multiple arrays, but could be handled in the same way it is for the performance graphing with a different color per array. Or instead of overlaying the genealogy data as default, perhaps add a "Display Genealogy" checkbox option to the performance graphs. And I'll use this opportunity to once again beat the drums for extending the data retention in Pure1 to >30 days to help identify longer performance trends, which are sometimes not easily visible in a max 30-day performance data windows.118Views2likes1CommentVeeam v13 Integration and Plugin
Hi Everyone, We're new Pure customers this year and have two Flasharray C models, one for virtual infrastructure and the other will be used solely as a storage repository to back up those virtual machines using Veeam Backup and Replication. Our plan is to move away from the current windows-based Veeam v12 in favor of Veeam v13 hardened Linux appliances. We're in the design phase now but have Veeam v13 working great in separate environment with VMware and HPE Nimble. Our question is around Pure Storage and Veeam v13 integration and Plugin support. Veeam's product team mentions there is native integrations in v12, but that storage vendors should be "adopting USAPI" going forward. Is this something that Pure is working on, or maybe already has completed with Veeam Backup and Replication v13?2.7KViews4likes19CommentsAzure Local now works with FlashArray
A little bit of catch up here, but Azure Local is now fully GA with support for on-premises FlashArray. That means you can easily expand your current environment with FA external storage, or start a net new deployment. And yes, you can use an existing FlashArray to do it. Azure Local is shaping up to be a good VMware alternative as well as a strong solution for those needing soverign clouds, as Microsoft has a lot of support for regulatory frameworks and in-country data centers. You can learn more about it in the blog and feel free to post any questions here. We also have a webinar coming up on May 21, 9:00am PT, 12:00pm ET, so you can learn more about it.173Views1like0CommentsClaude Mythos: The Next Frontier of Autonomous Cyber Intelligence
Model Performance and Capabilities Claude Mythos represents a significant performance leap for Anthropic, reportedly beating their current best Opus model by a large margin. This kind of improvement hasn't been seen since OpenAI released their reasoning model O1 in September 2024. Key performance metrics include: Coding ability: 77% on SWE-Bench Pro (compared to Opus at 53%) Terminal usage: Substantial improvements in the model's ability to use terminal commands General purpose: Despite the cybersecurity focus in marketing, Mythos is a general-purpose LLM like other Claude models Cybersecurity Focus and Access Restrictions Anthropic has positioned Mythos around cybersecurity concerns, emphasizing AI as a potential national security risk - similar to OpenAI's approach with GPT-2 in 2019. However, the model is not cybersecurity-specific but rather a general-purpose AI. Limited Release Strategy: Anthropic has restricted access to select partners, most of whom are investors in the company: Microsoft (Series C and G investor) NVIDIA (Series G) JP Morgan (conventional loan, May 2025) Google (Series C and E, plus convertible debt) Amazon (Series D and E) Cisco (Series E) Market Implications and Competitive Advantages This restricted access creates what the video calls "privatization of tokens," giving certain companies advantages in: Cybersecurity: Finding vulnerabilities (benefiting companies like Cisco, Palo Alto) Legal services: Discovering legal loopholes and litigation strategies Finance and software development: Enhanced capabilities across various domains The core issue isn't cybersecurity itself, but rather the rapid improvement in AI capabilities outpacing society's ability to adapt. Infrastructure and Pricing Infrastructure Dependencies: Despite committing $50 billion to data centers in Texas and New York, Anthropic still relies on partners (Amazon, Google, Microsoft) for training and inference. Pricing Structure: Mythos will cost $125 per million output tokens Available through cloud APIs (Amazon Bedrock, Google Cloud Vertex, Microsoft Foundry) Unlikely to be included in subsidized Pro and Max plans Comparable to OpenAI's GPT-4 Pro at $180 per million tokens Business Strategy and Market Position IPO Positioning: The Mythos release strategically positions Anthropic for a potential IPO, with the company recently surpassing OpenAI by achieving $30 billion in annualized run rate (ARR) - though this is run rate rather than the more conservative annual recurring revenue metric. Adoption Challenges: The rapid advancement creates both excitement and concern, highlighting the growing divide between companies that adopt AI quickly and those that don't. The key is matching the right level of AI intelligence to appropriate tasks rather than using premium models for basic workflows. Future Outlook Based on historical patterns (like DeepSeek R1 catching up to OpenAI's O1 within 5 months), the performance gap created by Mythos will likely be bridged by competitors relatively quickly. The real competitive advantage lies in how quickly companies can adopt and properly allocate AI intelligence to solve complex problems.194Views1like0CommentsAsk Us Everything about Pure1® Self-service!
💬 Get ready for our first May 2026 edition of Ask Us Everything, this Friday, May 1st at 9 AM Pacific. This month is all about Pure1® Self-service. If you have a burning question, feel free to ask it here early and we'll add it to the list to answer on Friday. Or if we can't get it answered live, our Everpure experts can follow up here. jclark, mbradford plus dpoorman dpoorman are the moderators and experts answering your questions during the conversation as well as here on the community. See you this Friday! (Oh, and if you haven't registered yet, there's still time!)410Views1like0Comments
Upcoming Events
- May6Wednesday, May 06, 2026, 09:00 AM PDT
- May18
SOF Week 2026
in 2 daysMonday, May 18, 2026, 04:00 AM PDT - May19Tuesday, May 19, 2026, 04:00 AM PDT
- May19Tuesday, May 19, 2026, 11:00 AM PDT
- May20Wednesday, May 20, 2026, 12:00 AM PDT
- May21Thursday, May 21, 2026, 04:00 AM PDT
- May21Thursday, May 21, 2026, 09:00 AM PDT
- May26Tuesday, May 26, 2026, 09:00 AM PDT
- May28Thursday, May 28, 2026, 03:00 PM PDT
- Jun4Thursday, Jun 04, 2026, 09:00 AM PDT
- Jun16Tuesday, Jun 16, 2026, 04:00 PM PDT
Featured Places
Introductions
Welcome! Please introduce yourself to the Pure Storage Community.Pure User Groups
Explore groups and meetups near you./CODE
The Everpure /Code community is where collaboration thrives and everyone, from beginners taking their first steps to experts honing their craft, comes together to learn, share, and grow. In this inclusive space, find support, inspiration, and opportunities to elevate your automation, scripting, and coding skills, no matter your starting point or career position. The goal is to break barriers, solve challenges, and most of all, learn from each other.Career Growth
A forum to discuss career growth and skill development for technology professionals.
Featured Content
Featured Content
If you joined the latest Ask Us Everything session on Pure1, one theme came through clearly: storage management does not have to be complicated.
This session, driven by questions from the Ever...
18Views
1like
0Comments
Purity//FA 6.10.6 introduces NFS over TLS for FlashArray File Services: an in-transit encryption layer that wraps NFSv3 and NFSv4.1 RPC traffic in a TLS 1.3 session as defined by RFC 9289 - Towards R...
61Views
1like
0Comments
We’re constantly trying to improve and look for ways to make this community the best it can be for you all. In order to do that, we need your unique perspective.
We’ve put together a quick C...
1.3KViews
2likes
0Comments