Administrator’s Command Line Guide
Table Of Contents
- Introduction
- Accessing Acronis Storage Clusters via iSCSI
- Preparing to Work with Acronis Storage iSCSI Targets
- Creating and Running Acronis Storage iSCSI Targets
- Listing Acronis Storage iSCSI Targets
- Transferring Acronis Storage iSCSI Targets Between Acronis Storage Nodes
- Stopping Acronis Storage iSCSI Targets
- Deleting Acronis Storage iSCSI Targets
- Configuring Multipath I/O for Acronis Storage iSCSI Targets
- Managing CHAP Accounts for Acronis Storage iSCSI Targets
- Managing LUN Snapshots
- Accessing Acronis Storage Clusters via S3 Protocol
- Monitoring Acronis Storage Clusters
- Managing Cluster Security
- Maximizing Cluster Performance
3.1. About Object Storage
1. Requesting user authentication data. It will be stored on a name server in a specific format (see Service
Buckets). To receive data (identifier, e-mail, access keys), a request with a lookup operation code is sent
to an appropriate name server.
2. Authenticating the user.
3. Requesting bucket’s and object’s metadata. To receive it, another request with a lookup operation code
is sent to the name server that stores names of objects and buckets.
4. Checking user’s access permissions to buckets and objects.
5. Performing the requested object operation: creating, editing or reading data or deleting the object.
3.1.5.2 Create Operation
To create an object, gateway sends the following requests:
1. Request with a guard operation code to a name server. It creates a guard with a timer which will check
after a fixed time period if an object with the data was indeed created. If it was not, the create operation
will fail and the guard will request the object server to delete the object’s data if some were written. After
that the guard is deleted.
2. Request with a create operation code to an object server followed by fixed-size messages containing the
object’s data. The last message includes an end-of-data flag.
3. Another request with a create operation code to the name server. The server checks if the corresponding
guard exists and, if it does not, the operation fails. Otherwise, the server creates a name and sends a
confirmation of successful creation to the gateway.
3.1.5.3 Read Operation
To fulfill an S3 read request, gateway determines an appropriate name server’s identifier based on the name
of a directory and corresponding object server’s identifier based on the object’s full name. To perform a read
operation, gateway sends the following requests:
1. Request with a read operation code to an appropriate name server. A response to it contains a link to an
object.
2. Request to an appropriate object server with a read operation code and a link to an object received from
the name server.
23










