Administrator’s Command Line Guide
Manuals
Brands
Acronis Manuals
Applications
Storage 2.4
11
12
13
14
15
16
17
18
19
20
Table Of Contents
Introduction
About This Guide
About Acronis Storage
Accessing Storage Clusters via iSCSI
Preparing to Work with iSCSI Targets
Creating iSCSI Targets
Performance Tips
Listing iSCSI Targets
Transferring iSCSI Targets between Nodes
Stopping iSCSI Targets
Deleting iSCSI Targets
Configuring Multipath I/O for iSCSI Targets
Managing iSCSI Users
Creating CHAP Accounts for iSCSI Targets
Creating iSCSI Targets Bound to CHAP Accounts
Changing CHAP Account Passwords
Listing CHAP Accounts and Their iSCSI Targets
Managing LUN Snapshots
Creating LUN Snapshots
Listing LUN Snapshots
Switching Between LUN Snapshots
Viewing LUN Snapshot Information
Deleting LUN Snapshots
Accessing Storage Clusters via S3 Protocol
About Object Storage
Object Storage Infrastructure Overview
Object Storage Overview
Multipart Uploads
Object Storage Interaction with a Storage Cluster
Object Storage Components
Gateway
Name Server
Object Server
S3 Management Tools
Service Bucket
Data Interchange
Data Caching
Operations on Objects
Operation Requests
Create Operation
Read Operation
Delete Operation
Deploying Object Storage
Manually Binding Services to Nodes
Managing S3 Users
Adding S3 Users
Listing S3 Users
Querying S3 User Information
Disabling S3 Users
Deleting S3 Users
Generating S3 User Access Key Pairs
Revoking S3 User Access Key Pairs
Managing S3 Buckets
Listing S3 Bucket Contents
Listing S3 Storage Buckets
Querying S3 Bucket Information
Changing S3 Bucket Owners
Deleting S3 Buckets
Best Practices for Using Object Storage
Bucket and Key Naming Policies
Improving Performance of PUT Operations
Supported Amazon S3 Features
Supported Amazon S3 REST Operations
Supported Amazon Request Headers
Supported Amazon Response Headers
Supported Amazon Error Response Headers
Supported Authentication Scheme and Methods
Monitoring Storage Cluster
Monitoring General Storage Cluster Parameters
Monitoring Metadata Servers
Monitoring Chunk Servers
Understanding Disk Space Usage
Understanding Allocatable Disk Space
Viewing Space Occupied by Data Chunks
Exploring Chunk States
Monitoring Clients
Monitoring Physical Disks
Monitoring Event Logs
Basic Events
Monitoring the Status of Replication Parameters
Managing Storage Cluster Security
Security Considerations
Securing Node Communication in the Storage Cluster
Password-based Authentication
Maximizing Storage Cluster Performance
Carrying Out Performance Benchmarking
Checking Data Flushing
Using 1 GbE and 10 GbE Networks
Setting Up Network Bonding
Improving High-Capacity HDD Performance
Disabling Inter-Tier Data Allocation
2.9.
Managing
LUN
Snapshots
2.
Deleting
a
snapshot
that
has
multiple
children
is
currently
not
supported.
13
1
...
...
16
17
18
19
20
...
...
76