Administrator’s Command Line Guide
Table Of Contents
- Introduction
- Accessing Acronis Storage Clusters via iSCSI
- Preparing to Work with Acronis Storage iSCSI Targets
- Creating and Running Acronis Storage iSCSI Targets
- Listing Acronis Storage iSCSI Targets
- Transferring Acronis Storage iSCSI Targets Between Acronis Storage Nodes
- Stopping Acronis Storage iSCSI Targets
- Deleting Acronis Storage iSCSI Targets
- Configuring Multipath I/O for Acronis Storage iSCSI Targets
- Managing CHAP Accounts for Acronis Storage iSCSI Targets
- Managing LUN Snapshots
- Accessing Acronis Storage Clusters via S3 Protocol
- Monitoring Acronis Storage Clusters
- Managing Cluster Security
- Maximizing Cluster Performance
Chapter 3. Accessing Acronis Storage Clusters via S3 Protocol
name—an object server to store the object’s data. Name and object server lists are stored in a vstorage cluster
directory intended for object storage data and available to anyone with a cluster access. This directory includes
subdirectories that correspond to services hosted on name and object servers. The names of subdirectories
match hexadecimal representations of the service’s ID. In each service’s subdirectory, there is a file containing
an ID of a host that runs the service. Thus, with the help of a gateway, a system component with a cluster
access can discover an ID of a service, detect its host, and send a request to it.
S3 gateway handles data interchange with the following components:
• Clients via a web server. Gateway receives S3 requests from users and responds to them.
• Name servers. Gateway creates, deletes, changes the names that correspond to S3 buckets or objects,
checks their existence, and requests name sets of bucket lists.
• Object servers in the storage. Gateway sends data altering requests to object and name servers.
3.1.4.1 Data Caching
To enable efficient data use in object storage, all gateways, name servers, and object servers cache the data
they store. Name and object servers both cache B-trees.
Gateways store and cache the following data received from name services:
• Lists of paired user IDs and e-mails.
• Data necessary for user authentication: access key IDs and secret access keys. For more information on
their semantics, consult the Amazon S3 documentation.
• Metadata and bucket’s ACLs. The metadata contains its epoch, current version identifier and transmits
it to NS to check if the gateway has the latest version of the metadata.
3.1.5 Operations on Objects
This section familiarizes you with operations S3 storage processes: operations requests; create, read, and
delete operations.
3.1.5.1 Operation Requests
To create, delete, read an object or alter its data, S3 object storage must first request one if these operations
and then perform it. The overall process of requesting and performing an operation consists of the following:
22










