Administrator’s Command Line Guide
Table Of Contents
- Introduction
- Accessing Acronis Storage Clusters via iSCSI
- Preparing to Work with Acronis Storage iSCSI Targets
- Creating and Running Acronis Storage iSCSI Targets
- Listing Acronis Storage iSCSI Targets
- Transferring Acronis Storage iSCSI Targets Between Acronis Storage Nodes
- Stopping Acronis Storage iSCSI Targets
- Deleting Acronis Storage iSCSI Targets
- Configuring Multipath I/O for Acronis Storage iSCSI Targets
- Managing CHAP Accounts for Acronis Storage iSCSI Targets
- Managing LUN Snapshots
- Accessing Acronis Storage Clusters via S3 Protocol
- Monitoring Acronis Storage Clusters
- Managing Cluster Security
- Maximizing Cluster Performance
Chapter 3. Accessing Acronis Storage Clusters via S3 Protocol
To fulfill the request, object server transmits fixed-size messages with the object’s data to the gateway. The
last message contains an end-of-data flag.
3.1.5.4 Delete Operation
To delete an object (and its name) from the storage, gateway determines a name server’s identifier based on
the directory’s part of a name and sends a request with a delete operation code to the server. In turn, the
name server removes the name from its structures and sends the response. After some time, the garbage
collector removes the corresponding object from the storage.
3.2 Deploying Object Storage
This chapter describes deploying object storage on top of a ready Acronis Storage cluster. As a result you will
create a setup like shown on the figure. Note that not all cluster nodes have to run object storage services.
The choice should be based on workload and hardware configurations.
24










