Académique Documents
Professionnel Documents
Culture Documents
Installation and
Administration Guide
Build: 1.4.0.790
Information in this document is subject to change without notice. The software described in this document is furnished under a
license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those
agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means
electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the
written permission of CloudByte Inc..
CloudByte Inc.
4675 Stevens Creek Blvd, Suite 122
Santa Clara, CA 95051
USA
+1-(408)-663-6900
info@cloudbyte.com
www.cloudbyte.com
CONTENTS
8
8
Introduction
CloudByte ElastiStor feature highlights
11
14
Installation overview
17
18
19
20
20
25
27
32
40
44
44
System requirements
45
45
Installation options
46
Installing ElastiCenter
46
Installing ElastiCenter HA
54
Installing Node
55
64
70
75
84
88
97
Introduction
97
98
102
Authentication
102
103
104
105
75
108
108
Creating a Site
112
Creating an HA Group
112
Adding a Node
114
115
Creating a Pool
120
Configuring Spare
123
Migrating a Pool
123
Pool encryption
123
Creating an Account
125
126
Provisioning a VSM
126
131
134
Provisioning storage
138
142
SASmultipathing
144
147
148
149
150
156
160
163
164
Monitoring QoS
167
QoStips
167
169
169
180
183
185
193
198
201
203
210
214
220
225
Monitoring
230
Drill-down feature
234
235
Global Settings
238
CHAPTER IX Licensing
How do I access license details?
242
242
245
245
251
251
262
266
274
277
225
281
Product FAQs
281
Installation FAQs
284
Pool FAQs
287
289
293
QoSFAQs
294
297
NIC FAQs
298
Global Settings
298
301
302
307
311
"Introduction"
"Installation overview"
Introduction
What is CloudByte ElastiStor
CloudByte ElastiStor is a full-featured software-defined storage QoS solution, purpose-built for the cloud and virtualized environments. Software-only ElastiStor makes storage predictable, affordable and easy, even as you scale to thousands of applications.
Installable on a wide range of industry-standard servers, ElastiStor frees enterprises and service providers from vendor lock-ins.
ElastiStor lets you custom-build storage infrastructure based on your requirements, with support for SATA, SAS, and SSD hardware
as well as NFS, CIFS, FC, and iSCSI protocols.
Cloud-scale Performance
The allocation of application-specific storage silos to deliver performance does not scale well in todays cloud and virtualized environments. ElastiStor enables you to guarantee performance (IOPS, throughput, and latency) for every application right from a common storage platform. This fully shared storage optimizes your infrastructure, minimizes your CAPEX, and enables more
performance applications to move to the cloud.
No Vendor Lock-in
In addition to being software-defined, ElastiStor eliminates the need for you to lock into specific vendors or overspend on proprietary
hardware. The benefits of commodity, industry-standard resources are first reflected in minimized CAPEX, and later make shifting
vendors easy with no proprietary hardware lock-in.
Hardware Flexibility
Restricting storage media choice is not an ideal scenario when you have a wide variety of performance needs, from archival to big
data applications, and it is definitely not practical to fit every performance-sensitive application on an all-SSD array. ElastiStor is
software-only so you continue to work with the storage media of your choice SSD, SAS, SATA, or any mix optimized for your performance needs.
Simple Management
Managing storage for a large number of applications and their constantly changing performance demands is not for the faint hearted.
Manual tuning of spindles or other hardware is no longer an option. Being software-defined, ElastiStor allows you to instantly provision fully-elastic storage volumes for any workload from the shared storage pool to enable fast deployment and reconfiguration
options. Now it is a simple matter to schedule backups, migrate sites, and empower customers with comprehensive management
rights for their dedicated storage. Additionally, datacenter admins will be able to provision and manage QoS-aware storage volumes
for VMs right from VMWare vCenter, Citrix XenCenter, OpenStack Horizon, or CloudStack.
Affordable
With CloudByte ElastiStor you can now replace hundreds of legacy storage silos in your datacenters with a single, extensible storage platform. By fully sharing your infrastructure, deploying industry-standard hardware and optimally choosing your storage media,
ElastiStor can significantly reduce your datacenter footprint, leading to 80-90% cost savings over 3-5 years. Add simplified management that brings down your operational costs, and you get the lowest cost storage QoS solution.
Features at a glance
Along with the standard storage features, CloudByte ElastiStor provides certain product-specific features of which some are unique.
Share your storage and deliver predictable performance to every application. For the first time ever, ElastiStor allows storage endpoints to be defined beyond capacity, in terms of IOPS, throughput and latency. This allows applications with diverse workloads to
be guaranteed QoS from a shared storage platform. Together with linear scaling, a single extensible shared storage platform from
ElastiStor can now replace legacy solutions dedicated storage silos. By fully sharing storage and optimally utilizing resources,
ElastiStor steeply cuts down your storage footprint, leading to 80-90% cost savings over 3-5 years.
On-Demand Performance Provisioning
Do you still manually configure hardware to provision performance for any new application? Break the need for hardwiring storage
with ElastiStors on-demand provisioning. Just enter the required SLA/QoS parameters and let ElastiStor automate node selection
and resource allocation for you. ElastiStor includes an intelligent heuristics daemon which continuously learns the quantity of various controller resources needed to deliver the required QoS.
vCenter-like Administration Console
ElastiStor makes managing storage as easy as managing VMs, even as you scale to hundreds of applications. Storage admins can
now comprehensively manage the entire storage cluster, spanning across multiple sites, from a single web-based console. Further,
ElastiStor gives you unprecedented access and control over resource usage within shared storage, right down to the applicationlevel granularity.
REST APIs and Plugins for Easy Integration
Every action performed at ElastiStor admin console translates into a REST based API call in the backend. Using these REST APIs,
admins can comprehensively provision and manage ElastiStor volumes from VMware vCenter, Citrix XenCenter, OpenStack Horizon, or any other admin portal. Our plugin for VMware vCenter allows admins to create and manage QoS-aware VMs right from
vCenter console.
N-way High Availability
ElastiStor enables N-way High Availability, exponentially increasing reliability (mean time to failure), compared to the standard 2way HA provided by existing solutions. CloudBytes storage un-fragmentation and its patented VSM architecture make N-way HA
affordable and feasible.
Delegated Administration
A much requested feature from the cloud service providers, delegated administration empowers both CSPs and its customers to
monitor and control storage volumes. Management privileges vary based on the admin functionality for example, a super admin can
manage the entire storage cluster, whereas a customer admin can manage just the storage resources allotted to that particular customer.
Feature
Scalability
Description
l
NFSv3
NFSv4
CIFS
ISCSI
FC
Storage Connectivity
SAS JBODs
Storage Resilience
RAID Z1
RAID Z2
De-duplication
Compression
Thin Provisioning
Unlimited Clones
Unlimited Snapshots
Active-Active mode
Synchronous mirroring,
Asynchronous mirroring
RPOLast minute
RTOFew minutes
Fixes corrupt block without having to take the file system offline
Access Protocols
Storage Efficiency
Back up
Availability
Disaster Recovery
Data Integrity
Note: The supported capacity of ElastiStor depends on the hardware. With adequate hardware support, ElastiStor can scale
up to any extents.
10
Legacy solutions
CloudByte ElastiStor
Storage Architecture
Monolithic
Tenant Solution
Access to tenant-level
resource usage
No
Yes
Security
Limited
Shared storage tenants with guaranteed QoS (IOPS, Throughput, and latency), delegated administration rights, and complete
security.
Easy shared storage management with access to and control over tenant-level resource usage (disk, cache, network, and
CPU).
Together with its rich customizability and scalability, CloudByte ElastiStor offers a powerful storage virtualization solution for service providers and enterprises.
Guaranteed throughput, latency, and IOPS: Easily commission storage with guaranteed throughput, latency, and
IOPS (Input/Output Operations Per Second) at various levels. You can decide to configure QoS at a Pool level, VSM level, or
Storage Volume level.
Multi-protocol support
CloudByte ElastiStor provides LUN access using the following protocols:
11
iSCSI
CIFS
NFS
Delegated administration
Delegated administration lets you determine the actions various administrators take using administrative tools on different
resources.
The administration roles are mapped to functions using security policies. You can create and maintain separate administration capabilities depending on your needs.
Disaster Recovery
CloudByte ElastiStor equips you to effectively recover data in the case of adversities.
Use the Mirror feature for remote disaster recovery. When you mirror data, a remote snapshot, a read-only copy of the data on the
primary setup, is created in the secondary storage setup. In the case of disaster, you can activate the mirror to take care of the services handled by the primary setup.
12
APIs for all the features in ElastiCenter. The APIs function as an end-to-end translation of the Administrative Console.
CloudByte provides off-the-shelf plug-ins which you can install and start using.
13
Highly usable action pods that let you manage tasks, with easy access and minimal navigation
14
Building your storage infrastructure starts with the creation of a Site, the fundamental infrastructure building block where your Node
and storage and network infrastructure reside.
The following illustration shows the composition of a Site:
15
16
Connect the SAS cable between the SAS Port of the Node and Disk Array's INPort . To form a daisy chain, connect SAS cable
between OUTPort of one Disk Array and INPort of another Disk array.
This sets up a group of Nodes.
An HAGroup can have a maximum of four Nodes.
Installation overview
The installation of CloudByte ElastiStor involves installing
l
17
Note:Installing ElastiCenter and Node together is not recommended for production environments.
18
19
cbc_monitor_pools_ioerror to check the status of Pool I/Os. If the I/Os are suspended, ElastiCenter generates the Alert es.pool.io.suspended.
Scenario
Two customers need the same network range. You can provide the same VSM IP address for both. The feature takes away the
need of IP address conversion.
20
Illustration
Workflow
Assign VLAN to Account
21
When you have provisioned a VSM without assigning an IP address, the following page appears:
22
3. Click Save.
Proceed to provisioning Storage Volumes.
Limitations
l
You cannot assign real IP spaces if you have configured VLAN on a LAGG.
23
Procedures
1. In the Nodes page, click Network Interface Cards (Actions pane > Network Interface Cards)
2. Click Configure Backup Interface.
3. In the dialog, select a NIC as the backup from the drop-down list.
4. Click OK.
Back up LAGG
For the LAGG that you have added (Add LAGG ) you can set up a back up. The following sections explain the procedures. Backing up
your lagg assures that the VSMs are always accessible.
Assumptions
All the NICs in the primary LAGG and backup LAGG should be on the same network.
24
Procedures
1. In the HAGroups page, click Manage LAGG interface (Actions pane > Manage LAGG interfaces).
2. In the Actions pane, click Configure Backup Interface.
For LAGG interface 1, select the LAGG for which you want to configure back up.
In the LAGG interface 2 field, select the LAGG for back up.
4. Click OK.
"Space reclamation"
25
Encryption workload is moved to the drive instead of the processor. This improves system performance.
This is a full disk encryption, which means the entire disk data is encrypted (metadata included)
The feature enables drive locking mechanism using the passphrase specified by the Administrator.
Restricts data access only to the authorized hosts with the specified passphrase.
Enabling Encryption
l
You cannot create an encrypted Pool with a combination of SED and other data disks.
Using ElastiCenter
26
Space reclamation
On deletion of files on the Client filesystems (ext4/NTFS), you can reclaim space on the thin provisioned iSCSI LUNs. This is
achieved by supporting the SCSI UNMAP CDB.
5. Click Save.
Note: CloudByte recommends you to select the option Optimize drives in the disk defragmenter utility on Windows 2012 Clients, to reclaim dead space on the thin-provisioned Volumes.
27
"Geli Encryption"
"QoS Alerts"
Geli Encryption
In the latest release, CloudByte ElastiStor has introduced a software-level disk encryption mechanism using the block device-layer
disk encryption system GELI.
The following graphic illustrates the encryption architecture:
This is a full disk encryption, which means the entire disk data is encrypted (metadata included)
The encryption key used is encrypted using the passphrase specified by the Administrator
Both the encryption key and passphrase are required to unlock the disks
28
29
QoS Alerts
You are alerted when there is a variation in the quality of service (QoS) you have opted for.
Currently, only throttling alerts are available. The alerts are dependent on the following "Global Settings":
l
alert.qos.throttling.percentage: Sends an alert if the throttled IOPS percentage exceeds the specified value
(default is 20) and if alert.qos.throttle.count is encountered for the specified number of times.
alert.qos.throttle.count: Sends an alert if the number of consistent throttling exceeds the specified value (default is
10) and alert.qos.throttling.percentage exceeds the specified value.
30
31
32
Setting up LDAP authentication involves procedures on both ElastiCenter and the Active Directory Server.
1. On your Active Directory Server, select Server Manager (Start > Administrative Tools).
2. In the Server Manager, click Tools.
3. In the right pane, click Active Directory Users and Groups.
4. In the Active Directory Users and Groups wizard, right-click your Domain name.
5. Select New and then select User.
33
6. In the User page, specify the relevant information of the user and then click Next.
7. In the following page, specify and confirm password for the user.
8. Click Finish.
Create Active Directory Group
Note: Create an individual group for each administrator type in ElastiCenter. For details, see http://www.docs.cloudbyte.com/delegated-administration/
1. On your Active Directory Server, select Server Manager (Start > Administrative Tools).
2. In the Server Manager, click Tools.
3. In the right pane, click Active Directory Users and Groups.
4. In the Active Directory Users and Groups wizard, right-click your Domain name.
5. Select New and then select Group.
6. Specify a name for the group to be created.
7. Click OK.
Adding Users to the Groups
Add users to the group that you want to map with the users in the various administrator type groups in ElastiCenter.
34
1. On your Active Directory Server, select Server Manager (Start > Administrative Tools).
2. In the Server Manager, click Tools.
3. In the right pane, click Active Directory Users and Groups.
4. In the Active Directory Users and Groups wizard, click your Domain name.
5. From the list of Groups and users, right-click the User you want to add to the Group.
6. Click Add to a Group.
7. In the dialog box, specify the name of the Group to which you want to add the user.
8. At the prompt, click OK.
On ElastiCenter
1. In the admin section of ElastiCenter, click LDAP Configuration.
35
36
Option
Description
Host Name
The fully qualified domain name or the IP address of the LDAP Server. For example, my.ladap.com or 10.10.10.10
Port
The port on which the LDAP Server is listening. The default port is 389.
Bind DN
The distinguished name of the user on the LDAP Server. For example, test\Administrator.
Bind Password
Search Base
Distinguished name of the Directory tree level, where the query should start the search. For
example, CN=Users,DC=CBQA,DC=com.
4. Click OK.
Set Group names for administrators on ElastiCenter
37
Once you have configured LDAP authentication for CloudByte ElastiStor, you must add users to the administrator roles in
ElastiStor. For details of administrator types, see http://www.docs.cloudbyte.com/delegated-administration/ .
1. Launch ElastiCenter using the URL in the following format: https://ElastiCenter_Management_IP_Address.
2. Specify the following login credentials of an AD user: username and password.
38
4. As a super administrator, map the administrator roles to the newly added users.
1. In ElastiCenter, select the Account to which the user belongs to.
2. In the Actions pane, select Manage Administrator.
3. Select Assign Administrator.
Note: If you want to map the administrator roles for Site-Admin or the View-Admin, follow the procedures in the section Create Site administrators or view administrators
39
When you Add Pool or Disk group to the Pool, the list of disks displayed shows Yes if disks are Write Cache Enabled.
40
41
Procedures
1. In the Pools page, select a Pool.
2. In the Actions pane, click Manage RAIDConfiguration.
3. In the Disk Groups page, select a Disk Group in which you want to replace a disk.
4. For the disk you want to replace, click the disk offline icon.
5. At the confirmation prompt click Yes. The red icon in the status indicates the disk is offline.
42
7. Select a disk from the drop-down list and then click OK.
Note: A disk can also be replaced without bringing it to offline. But it is recommended to make the disk offline and then
replace it.
43
"System requirements"
"Installation options"
"Installing ElastiCenter"
"Installing Node"
Installing ElastiCenter: Install the administrative infrastructure used to manage the Nodes.
Installing Node: Node is the storage infrastructure that is managed by ElastiCenter. You can install only one Node per
machine. An HA Group can have up to four Nodes.
44
System requirements
The following topics explain the system requirements for installing CloudByte ElastiStor.
l
The connectivity between Controller and Storage is either on Ethernet (iSCSI) or on SFF-8088 SAS cables.
ElastiStor OS is built using FreeBSD as the base platform and therefore CloudByte ElastiStor's Hardware Supported List is
similar to that of FreeBSD Release version.
Supported AMD64, Intel 64 (x86-64), or i386 Processor and System Board (with Dual Core Processor and 8GB of RAM)
One or more SAS HBAs, depending on the number of disk arrays connected
OS boot disk drive size of 20 GB. However, the recommended size is 2.4 * RAM size + 33GB
Supported AMD64, Intel 64 (x86-64), or i386 Processor and System Board (with Dual Core Processor and 8GB of RAM)
OS boot disk drive size of 20 GB. However, the recommended size is 2.4 * RAM size + 33GB
i386 Processors and System Boards of CloudByte ElastiStor, see FreeBSD 9.0 supported list of i386 Processors
Disk Controllers of CloudByte ElastiStor, see FreeBSD 9.0 supported list of Disk Controllers
Ethernet Interfaces of CloudByte ElastiStor, see FreeBSD 9.0 supported list of Ethernet Interfaces
Description
Hostname
Root Password
IP address
Net Mask
Gateway
DNS
Search
45
Installation options
The installation wizard provides the following installation options.
n
ElastiCenter: Installs only ElastiCenter, which is the central administrative console to manage your Node. Choose if you
prefer to install Node later. For procedures, see "Installing ElastiCenter"
Node: Installs only the Node, which is managed using ElastiCenter. Choose if you prefer to install ElastiCenter later. For procedures, see "Installing Node"
Both ElastiCenter and Node: Installs both ElastiCenter and Node. This installation is not recommended for production
deployments. For procedures, see "Installing ElastiCenter"
Installing ElastiCenter
Note: The steps to install ElastiCenter or ElastiCenter and Node together are similar. The only difference has been detailed
in step 4.
1. Insert the CloudByte ElastiStor installation disk into your computer's DVD or CD drive and boot up your Node (ensure that
the disk drive is set as your system's primary boot device). The installation starts up and the following screen with the boot
46
options appear:
By default, the boot option Boot CloudByte ElastiStor is selected. So you need not interfere. To select a different boot option, see
"Boot options".
The Welcome screen appears:
47
3. Select the Only ElastiCenter option. For details, see "Installation options".
4. (Applies only if you are installing Both ElastiCenter and Node) Select "Installing ElastiCenter HA".
48
5. (If you have multiple disks) At prompt, select the disk where you want to install CloudByte ElastiStor and then click OK.
6. (If you have multiple Ethernet Interfaces) At prompt, select the Ethernet Interface and then click OK.
49
9. Select Continue to confirm the settings so that the installation can start up. To modify any of the values, select Back. Installation starts and the wizard shows the progress.
50
10. In the following screen, specify the region you belong to:
11. Confirm the country and then confirm the time zone.
51
After installing the packages, CloudByte ElastiStor reboots (indicated by the following screen).
Wait till the system automatically reboots. The following screen welcomes you after the reboot:
52
The following screen with a login prompt indicates that installation is successful. You can proceed to configure CloudByte
ElastiStor.
53
Installing ElastiCenter HA
1. Follow the procedures in the section "Installing ElastiCenter" till step 3.
2. Select ElastiCenter HA.
54
2. Select Secondary ElastiCenter and then in the following screen, specify the primary ElastiCenter IP address.
4. Click OK.
5. Follow the procedures from step 4 in the section "Installing ElastiCenter" and complete the ElastiCenter installation process.
You can now
1. Launch ElastiCenter in Mozilla Firefox Web browser (by specifying the URL, provided in the "Network configuration details",
in the format https://ipaddress).
2. Log in.
3. Perform the configuration procedures. For details, see "Configuring CloudByte ElastiStor".
Boot options
Option
Description
Boot CloudByte
The default option. Select to start the installation with all standard options enabled.
Reboot
Select to reboot.
Select to boot with advanced configuration and power interface. Helpful for power management.
To view behind the scene activities that occur during the installation. Particularly useful
for troubleshooting .
Installing Node
1. Insert the CloudByte ElastiStor installation disk into your computer's DVD or CD drive and boot up your Node Server (ensure
that the disk drive is set as your system's primary boot device). The installation starts up and the following screen with the
55
By default, the boot option Boot CloudByte ElastiStor is selected. So you need not interfere. To select a different boot
option, see "Installing Node".
The Welcome screen appears.
56
57
5. (If you have multiple disks) At prompt, select the disk where you want to install CloudByte ElastiStor.
58
6. (If you have multiple Ethernet Interfaces) At prompt, select the Ethernet Interface.
59
9. Select Continue to confirm the settings so that the installation can start up. To modify any of the values, select Back. Installation starts and the wizard shows the progress.
60
10. In the following screen, specify the region you belong to:
11. Confirm the country and then confirm the time zone.
61
After installing the packages, CloudByte ElastiStor reboots (indicated by the following screen).
62
Wait till the system automatically reboots. The following screen welcomes you after the reboot:
The following screen with a login prompt indicates that installation is successful. You can proceed to configure
CloudByte ElastiStor.
Note:When you deploy ElastiStor on production environments, ensure that all disks are SCSIreservationenabled.
63
1.4.0.272
1.4.0.340
1.4.0.528
1.4.0.6019
1.4.0.7004
Installation options
You have the following two installation options:
l
Upgrade: Upgrades from any of the versions mentioned in "Versions from which you can upgrade" to ElastiStor 1.4.0 Patch
5.
New Installation: Replaces the current version of ElastiStor with ElastiStor 1.4.0 Patch 5.
When you upgrade, ensure that you upgrade ElastiCenter first, and then proceed to upgrade the Node.
The workflow is as follows:
1. Back up ElastiCenter. For details see the section "Backing up configurations".
2. Upgrade ElastiCenter using the steps in the following section Upgrade procedures.
3. Log in to the Node as root and then run the following command to download the Volume configuration script: fetch
http://cloudbyte.com/downloads/updateVolSize.py
4. Run the following command: python updateVolSize.py
5. Move the Node to Maintenance Mode. For details see the section Bringing Node to maintenance mode in "Configuring High
Availability".
6. Upgrade the Node using the procedures in the following section Upgrade procedures.
7. Move the Node to Available mode. For details, see the section Making a Node available in "Configuring High Availability".
8. Refresh hardware for the upgraded Node.
9. Ensure that the Pools on the Node are online.
10. Repeat the procedures (from step 3 to step 7) for the other Node.
Upgrade procedures
1. Boot up your server and insert the CloudByte ElastiStor installation disk into your computer's DVD or CD drive. The installation starts up and the following screen with the boot options appear:
64
By default, the boot option Boot CloudByte ElastiStor is selected. Do not interfere.
The Welcome screen appears.
65
66
After installing the packages, CloudByte ElastiStor reboots (indicated by the following screen).
67
Wait till the system automatically reboots. The following screen welcomes you after the reboot:
68
The following screen with a login prompt indicates that upgrade is successful. You can proceed to configure
CloudByte ElastiStor.
69
70
Procedures
1. Move all Nodes to Maintenance mode. For details, see "Configuring High Availability"
2. On ElastiCenter server, change the network configurations of ElastiCenter. For details, see "release Moving your CloudByte
ElastiStor setup to a new network environment ""release Moving your CloudByte ElastiStor setup to a new network environment "
3. Change the network configurations of Node. For details, see "Change the network configuration details of Node"
71
4. In the ElastiCenter database, update the network configurations of Nodes. For details, see "release Moving your CloudByte
ElastiStor setup to a new network environment "
5. In ElastiCenter, change the IPaddress of the HAgroup. For details, see "Creating an HA Group ".
6. Restart the Nodes.
7. Bring all the Nodes back to Available mode. For details, see "Configuring High Availability"
8. (Optional) Change the network configuration setup for VSM. For details, see "Provisioning a VSM".
72
Here, you have to specify the new IP address of ElastiCenter if changed,else specify No.
73
| Node2 | 20.10.83.6
|
+-------+--------------+
Review the details and confirm by specifying Yes. Specify No to exit. To update the details later,
rerun the Change_network_config script.
Yes
Network details have been updated in ElastiCenter.
Reboot ElastiCenter
Tips
Ensure the following:
l
A physical connectivity between the Nodes and ElastiCenter exists using the command ping.
The IP address and Subnet are configured correctly using the command ifconfig -a .
74
Evaluating ElastiStor with the trial version downloaded from the CloudByte website
The following topics help you get started with CloudByte ElastiStor Appliance:
l
"Moving your CloudByte ElastiStor Appliance (ESA) to a new network environment "
Prerequisites
l
The following details are required before you start the installation:
IP address for
Management
Primary ElastiCenter
Secondary ElastiCenter
Description
The IP address used for accessing the ElastiCenter.
Host IP address of the Node where primary ElastiCenter has to be installed.
Host IP address of the Node where secondary ElastiCenter has to be installed.
75
Note:ElastiCenter Management IP address and ElastiCenter Host IP address cannot be the same.
The installation starts up and the following screen with the boot options appears:
By default, the boot option Boot CloudByte ElastiStor is selected. So you need not interfere. To select a different boot option,
see "Installing ElastiCenter and ElastiStor".
The Welcome screen appears:
76
77
78
5. Select primary ElastiCenter and then in the following screen, specify the ElastiCenter Management IP address (IP address
used to access the ElastiCenter).
6. Click OK.
79
7. (If you have multiple disks) At prompt, select the disk where you want to install CloudByte ElastiStor and then click OK.
8. (If you have multiple Ethernet Interfaces) At prompt, select the Ethernet Interface and then click OK.
80
11. Select Continue to confirm the settings so that the installation can start up. To modify any of the values, select Back. Installation starts and the wizard shows the progress.
81
12.
1. In the following screen, specify the region you belong to:
13. Confirm the country and then confirm the time zone.
82
83
4. Perform the steps 6 to 14 in the section "Installing primary ElastiCenter" to complete the secondary ElastiCenter installation
procedures.
Note:After the installation, ensure that the primary ElastiCenter is active prior to working with the Secondary ElastiCenter. If
secondary ElastiCenter is active before the primary ElastiCenter, you will have to reboot secondary ElastiCenter.
Description
Default
Management IP address
10.11.12.3
10.11.12.1
10.11.12.2
Netmask
255.0.0.0
Gateway
10.11.12.254
8.8.8.8
DNS
84
Domain name
Health check IP range
IPMI address of primary Node
IPMI address of secondary
Node
cloudbyte.com
10.11.12.1110.11.12.12
10.11.12.101
10.11.12.102
Component
User name
Password
ElastiCenter
admin
password
IPMI
ADMIN
ADMIN
SSH
root
test
Procedures
1. Bring the Nodes in the appliance (ESA-A50 and ESA-A100) to maintenance mode. For details, see "Configuring High Availability"
2. (On the secondary Node) In the /usr/local/cb/bin/, run the following command: python Change_network_config.py
3. Perform the steps as shown in the following sample command line :
You have logged into the secondary Node and the associated ElastiCenter.
You are going to change some or all of the network configuration details that you specified at the
time of installation.
Specify the new IP address for the secondary Node
20.10.60.50
To change the Netmask, specify the details in the dotted decimal format. To bypass this step, specify
No. No
To change the Gateway, specify the details. To bypass this step, specify No. No
To change the DNS, specify the details. To bypass this step, specify No. No
To change the Network Interface card, specify the details. To bypass this step, specify No. No
To change the Domain name, specify the details. To bypass this step, specify No. No
Specify the management IP address used to access ElastiCenter
20.10.39.71
Specify the primary Node IP address
20.10.60.40
The new network details of the secondary Node are as follows:
IP address: 20.10.60.50
Netmask : 255.0.0.0
Gateway: 20.10.1.1
DNS: 8.8.8.8
Network Interface Card: re0
Domain Name: cloudbyte.com
Management IP address: 20.10.39.71
Primary node IP address:20.10.60.40
Review the details and confirm by specifying Yes. Specify No to exit and cancel the changes. To
change the details later, rerun the Change_network_config script.
85
86
Value
User name
admin
Password
password
9. In ElastiCenter, change the IPaddress of the HAgroup. For details, see "Creating an HA Group "
10. Bring the secondary Node to Available mode. for details, see "Configuring High Availability"
11. Bring the primary Node to Available mode. for details, see "Configuring High Availability"
12. In the ElastiCenter admin pane, select ElastiCenter HA.
87
Ensure that both the Nodes are in sync with each other as shown in the following screen:
1.4.0.272
1.4.0.340
1.4.0.528
1.4.0.6019
1.4.0.7004
Installation options
You have the following two installation options:
88
Upgrade: Upgrades from any of the versions mentioned in "Versions from which you can upgrade" to ElastiStor 1.4.0 Patch
5.
New Installation: Replaces the current version of ElastiStor with ElastiStor 1.4.0 Patch 5.
Prerequisites
l
Both the Nodes in ESA are in sync with each other (see step 12 in the following section Workflow).
Back up ElastiCenter and Node configurations. For details, see Back up configurations.
Assumptions
The document assumes the following:
l
Workflow
1
Node 1(Primary)
Node 2(Secondary)
2
3
Perform the procedures in "Upgrade procedures" . On successful upgrade, the Node comes online as secondary Node .
10
11
12
Ensure that both the Nodes are in sync with each other as shown in the following screen (screen 1).
13
Confirm that the version number (provided in the release notes) matches the one provided in the following screen
(screen 2).
89
Screen 1:
Screen 2:
Upgrade procedures
1. Boot up your server and insert the CloudByte ElastiStor installation disk into your computer's DVD or CD drive. The installation starts up and the following screen with the boot options appear:
90
By default, the boot option Boot CloudByte ElastiStor is selected. Do not interfere.
The Welcome screen appears.
91
92
After installing the packages, CloudByte ElastiStor reboots (indicated by the following screen).
93
Wait till the system automatically reboots. The following screen welcomes you after the reboot:
94
The following screen with a login prompt indicates that upgrade is successful. You can proceed to configure
CloudByte ElastiStor.
95
96
CHAPTER V
sole
Introduction
ElastiCenter is the centralized management tool that you use to configure, monitor, manage, and deploy the services provided by
CloudByte ElastiStor.
ElastiCenter lets you
n
Track events
Using ElastiCenter, the entire ElastiStor deployment, consisting of multiple geographical sites spanning clusters and servers, can
be managed from a single browser session. Storage management tasks such as High Availability and disaster recovery can be done
from the same session.
To illustrate, let us examine the processing of a file recovery request for a particular storage tenant using a legacy solution and
CloudByte ElastiStor:
Legacy solution
The administrator has to
1. Manually recover the file from the DR storage system
CloudByte ElastiStor
In CloudByte ElastiStor, using ElastiCenter, the administrators can perform
actions remotely from the management portal. The administrator can, from
the same browser session,
1. Log in to the primary site.
The following illustration shows the workflow to setup a storage environment using CloudByte ElastiCenter:
97
Navigation pane
The navigation pane in the left-hand side of ElastiCenter provides a list of options.
When you select an option, you are taken to a specific component page. Use the component pages to perform various configuration
and management tasks.
98
Note:The options displayed in the navigation pane depend on the administrative privileges you have. If you are a super
administrator, you have all the options. For further details, see "Managing CloudByte ElastiStor".
Content pane
The content pane displays the component pages that provide options and data to configure CloudByte ElastiStor. For example, if
you select Sites in the navigation pane, the Sites page appears.
99
Summary pane
Summary pane sums up the number of storage components, such as Sites or Pools, in the storage infrastructure.
Actions pane
Action pane, in the right-hand side of the content pane, provides a list of configuration options. For example, in the HA Groups page,
go the Actions pane and add Node.
100
Notification menu
The information menu in the top right-hand side of ElastiCenter lets you access Alerts, Events, Reports, and Administrator data.
You also have the option to go back to the Home page.
Admin options
The Admin options help you with various administrative tasks.
101
Note:Ensure that you have updated Adobe Flash Player to the most recent version.
To access ElastiCenter,
1. Launch Mozilla Firefox Web browser.
2. Specify the URL in the following format: https://IP Address
Note:The IP Address you specify is the one that you configured in the installation screen. See "Installing ElastiCenter" for
details.
Authentication
You need credentials (username and password) to log in to CloudByte ElastiCenter.
1. After installation is completed, launch ElastiCenter using the URL in the following format: https://IP Address.
102
Value
Username
admin
Password
password
Update your profile. CloudByte Technical Support might use this information to contact you when your storage infrastructure
encounters any issues.
Review the auto-alert details that CloudByte Technical Support collects automatically. Technical Support might use the
information to resolve potential problems that your storage infrastructure encounters. You have the option not to share particular information.
103
1. Login to ElastiCenter using the default credentials (admin|password). The following screen appears:
Note:The utility used to perform the following tasks is keytool. You can use a utility of your preference.
104
1. In the ElastiCenter console, run the command as shown in the following example: keytool -genkey -alias
primarycb -keyalg RSA -keystore mysprimary.keystore -keysize 2048. At prompt, provide password
and the domain details.
2. In the ElastiCenter console, generate Certificate Signing Request (CSR) by executing the command as shown in the following example:keytool -certreq -keyalg RSA -alias primarycb -file mycertreq.csr -keystore
myprimary.keystore. You are then prompted to specify a password for keystore.
3. Get the CSR signed by the trusted CA. (for example, VeriSign or Thawte).
4. (Optional) Append the certificate with intermediate CA and trusted root CA.
5. Import the CA's certificate into your keystore as a trusted certificate using the following command:
keytool -importcert -file verisign.cer -keystore myprimary.keystore -alias primarycb
home
alert
105
events
reports
5. To change the active tab top border, edit the highlighted line in the following section:
.nav ul li:hover,.active-nav{
background:#fff;
border-top:4px solid #bcdf5a!important;
}
6. To change the widget top border, edit the highlighted line in the following section:
.tcl-graph{
margin:0 12px 15px 3px;
border-top:4px solid #BCDF5A;
}
106
107
"Adding a Node"
"Creating a Pool"
"Creating an Account"
"Provisioning a VSM"
"Provisioning storage"
The following illustration shows how your infrastructure and account are organized in CloudByte ElastiStor:
108
Site
Building your storage infrastructure starts with the creation of a Site, the fundamental infrastructure unit where your Node and storage and network infrastructure reside.
The following figure depicts the structure of a Site:
109
Accounts
After you set up the storage infrastructure, build the account infrastructure. That is, you set up the client/customer for using your storage infrastructure.
The following figure explains how an account is constituted in CloudByte ElastiStor:
110
111
Creating a Site
Use the Sites page (ElastiCenter > Sites) to create a Site.
The Sites page provides a graphical representation of the Sites that you have created. It provides the Site details such as HA
Groups, Pools, Provisioned Storage, and VSMs that you have set up.
Click any of the Site details link for specific review and configuration. For example, click HA Groups to access details of the HA
Groups associated with the Site.
To create a Site
1. In the Sites page, click Add Site in the actions pane.
The Add Site page appears.
Description
Name
Location
Description
3. Click Add.
Creating an HA Group
Use the HA Groups page (ElastiCenter > HA Groups) to create an HA Group.
All Nodes in the HA group you create must be on the same
112
Creation of HA Groups leads to the formation of High availability Clusters. For details, see "Configuring High Availability"
1. In the HA Groups page, click Add HA Group.
The Add HA Group page appears.
Description
The Site to which you add the HA Group.
Unique name for the HA Group.
Meaningful description for the HA Group.
Provide a range of dedicated IP addresses in the management network. For instance, ensure
that you do not specify the IP address used for Node, ElastiCenter, VSM, or client. Provide the
first and last IP address in the range, for example 1.1.1.100 and 1.1.1.104. The IP addresses
you specify are used to check the heartbeat between nodes.
113
5. In the following page, click edit and then change the details.
6. Click Save.
Adding a Node
1. In the ElastiCenter navigation pane, click Nodes.
2. In the actions pane, Click Add Node.
Description
Select a Site.
114
HA Group
Name
IP Address
Note: When you attach a new Disk Array to a Node, click Refresh Storage/Refresh Hardware to make the Disk Array visible
on the ElastiCenter.
115
116
2. Click Configure A New Disk Array. The Disk Array Configuration page appears:
3. Specify the Name, Bay Alignment, Number of columns and Number of Rows. For details, see the "Configuration details".
4. Click Next and then do the following:
117
Click the option under the column Blink. For details, see "SCSI Enclosure Service".
Specify the bay location for the disks from the drop down list under the column Bay.
5. Click Apply. On successful configuration, the Node page appears with a representation of the shared storage:
Note:You can also partially configure a Disk Array Enclosure. Suppose you have 12 disks, you can initially configure around
8 disks and other 4 disks can be configured as per the requirement.
Configuration details
Horizontal and vertical alignments
The Disk Arrays can be idealized either in terms of horizontal or vertical alignments.
The following figure represents a vertical alignment:
118
Slots per row is the number of disks each row can accommodate. For example, three slots per row implies that a single row can
accommodate three disks.
119
Blink identification
Blink identification LED on the disk slot of a disk array. When you click Blink, at the physical location of the disks, the identification
LED in the specified disk slot blinks. If the disk is not in the SCSI enclosure, the LED blink does not occur.
If the disk is in the SCSI enclosure and still if the blink does not occur, verify the health of the disk.
State in which the component is, such as critical, non-critical, OK, or unrecoverable
Specific alerts are generated for the following enclosure components: power supply, voltage sensor, current sensor, and temperature sensor.
By default, CloudByte sends alerts over mail to the email you specified when you updated your profile the first time you logged in to
CloudByte ElastiCenter. To expand the mailing list, add the IDs separated by comma in the Global settings (Information Pane >
Admin > Global Settings > alert.email.addresses).
To view alerts in CloudByte ElastiCenter, click Alerts in the information pane.
Creating a Pool
1. Go to the Node page (ElastiCenter > Nodes).
2. From the list of Nodes, select the one for which you create the storage Pool.
3. In the actions pane, go to the section Tasks and then click Add Pool.
120
4. Select the Site, HAGroup, and CBNode to which the Pool belongs.
5. Specify a name for the Pool and then click Next.
6. In the following screen, specify the RAID storage type and then choose one or more of the available disks.
7. (Optional) Enable Sector Size.
Note: For optimal performance, ensure that the disks in the same Pool belong to the same disk array.
121
Description
122
Total IOPS
Average
Latency
The desired average latency in milliseconds per I/O. Latency is the round-trip time per I/O request-response as measured
by the client.
Configuring Spare
1. Go to the Pools page (Navigation pane > Pools).
2. In the Actions pane, click Manage RAIDConfiguration. The Disk Group page appears.
3. In the Actions pane, select Add Spare.
4. In the Add Spare page, select a disk from the drop-down list.
5. Click Add.
Migrating a Pool
You cannot migrate a pool. Only a VSM can be migrated.
Pool encryption
GELI encryption
This is a software-level disk encryption mechanism using the block device-layer disk encryption system GELI.
The following graphic illustrates the encryption architecture:
123
This is a full disk encryption, which means the entire disk data is encrypted (metadata included)
The encryption key used is encrypted using the passphrase specified by the Administrator
Both the encryption key and passphrase are required to unlock the disks
Encryption workload is moved to the drive instead of the processor. This improves system performance.
This is a full disk encryption, which means the entire disk data is encrypted (metadata included)
The feature enables drive locking mechanism using the passphrase specified by the Administrator.
Restricts data access only to the authorized hosts with the specified passphrase.
124
You cannot create an encrypted Pool with a combination of SED and other data disks.
Creating an Account
Use the Account page (ElastiCenter > Accounts) to create an Account.
125
Description
Name
Description
Assign Admin
Select the type of administrator that you want to create. When you select an administrator
type, the username and password fields appear. For details, see "Delegated administration" .
3. Click Add Account. The Account is created. The wizard prompts you to continue and provision VSM.
4. Click Provision VSM to continue.
Provisioning a VSM
Use either the Create Account wizard or Virtual Storage Machines page (ElastiCenter > Virtual Storage Machines) to provision
VSM.
1. Click Provision VSM.
126
Description
Account
Name
Capacity
127
Total IOPS
Total
Throughput
When you specify the Total IOPS, CloudByte calculates the Total Throughput and is automatically added. You cannot edit
this field.
3. Click Next and then specify the provisioning details by selecting a Pool from the list.
4. Click Next.
5. Select the network interface details. For details, see "VLAN interface".
6. Specify the tenant IP address and default gateway.
128
7. Click Provision.
Multipathing
Multipathing is the ability to configure a server with multiple paths to the storage for take over on network failure. CloudByte
ElastiStor supports multipathing for iSCSI. When network failure occurs, redundant network takes over and ensures that the iSCSI
LUN is available.
Note: SATA disks or any disk with SATA interface is not supported for HA and multipathing configuration.
The details of the supported Maximum Multiple Connections (MCS) per LUN are as follows:
n
To enable multipathing,
1. In ElastiCenter, select Virtual Storage Machine.
2. In the VSM page, select the VSM for which you want to enable multipathing.
3. In the action pane, select Advanced Settings.
4. Click Edit.
129
130
Field
Description
Secondary IP address
Secondary Interface
6. If partial failover of Pool is enabled (which is enabled by default), click yes at the prompt to disable it.
Across Sites.
Note: When you migrate a VSM across Nodes, ensure that the Node to which the migrating VSMbelongs to is not down.
1. In the VSM page, select a VSM from the list.
2. In the Actions pane, go to Migrate and then click Schedule.
131
Field
Description
Site
IOPS
The IOPS of the primary VSM is populated by default. You can modify
the value to provision IOPS required for migration.
Throughput
4. Click Next.
5. Select the Pool to migrate VSM and then click Next.
132
6. Select the Backup interface, IP Address, and schedule of migration (in the format minutes/hours/days/month/year).
133
The Migrant VSM can be activated only after the base snapshot is successfully transferred from the primary VSM. You can
check the status of data transfer by clicking View Transfer Status (Actions > Tasks).
The backup interface and IP address range of the native and the migrant VSMs must be same.
Note: After activation, this backup IP address will not be active and therefore need to be removed at the Pool level.
1. In the migrant VSM page, click Settings in the Actions pane.
2. In the Settings page, click Edit and then select an interface from the drop-down list.
3. Click Save.
134
4. Click the VSM, the Migrant VSM, and then click Activate.
VLAN interface
VLAN interface can be created on a NIC whenever there is a need for the interface to subscribe to a separate broadcast domain (usually needed for high traffic data networks).
Additionally, multiple VLAN interfaces can be created on a single physical NIC, thereby allowing access to multiple networks at the
same time. The VLANs act as virtual individual NICs, each belonging to a separate broadcast domain.
135
2. In the VLANInterfaces page, go to the actions pane and then click Tasks > Add VLANInterface.
3. In the Add VLANInterface dialog box, specify the VLANtag (which must be a numeric value) and then select the parent NIC.
4. Click OK.
136
LAGG interface
LAGG interface allows aggregation of multiple network interfaces into a single virtual LAGG interface, providing fault-tolerance and
high-speed multi-link throughput. The aggregation protocols supported by LAGG determines which ports are used for outgoing traffic
and whether a specific port accepts incoming traffic.
137
Protocol Type:
l
Failover: Select Failover to send traffic only through the active port. If the master port becomes unavailable,
the next active port is used. The first interface added is the master port. Any interfaces added after that are
used as failover devices. By default, received traffic is only accepted when received through the active port.
Load Balance: Balances outgoing traffic across the active ports based on hashed protocol header information and accepts incoming traffic from any active port. This is a static setup and does not negotiate aggregation with the peer or exchange frames to monitor the link
LACP:LACP negotiates a set of aggregable links with the peer in to one or more Link Aggregated Groups.
Each LAGG is composed of ports of the same speed, set to full-duplex operation. The traffic will be balanced
across the ports in the LAGG with the greatest total speed, in most cases there will only be one LAGG which
contains all ports.
4. Click Next.
5. From the list of available NICs, drag and drop the ones you want to assign to a LAGG.
6. Click Add.
Provisioning storage
l
The maximum supported size of the Storage Volume depends on the available capacity of VSM.
There is no limit to the number of Storage Volumes that you can create. But the composite capacity of the created Storage
Volumes must be less than or equal to the capacity of the VSM they belong to. For example, if the total capacity of the VSM
is 1 TB, then you can create a Storage Volume with the capacity of 1 TB or multiple storage volumes where the total capacity
of all volumes is less than or equal to 1 TB.
You can enable both compression and deduplication on the same Storage Volume.
File system storage (NFS and CIFS) works together on the same Storage Volume, but block level storage (iSCSI) does not.
You can back up Storage Volume by creating snapshots and then rolling back when required. For details, see "Configuring
local backup".
Note:By default, ElastiStor Storage Volume is thin provisioned. You can expand the Storage Volume up to the size of the
Pool, provided the Pool has available storage.
Use the Storage Volumes page (ElastiCenter > Storage Volumes) to provision storage.
138
Description
Account
Name
Capacity
139
Provision Mode Shared or Dedicated. For details, see the section Difference between Shared and Dedicated in "QoSFAQs" .
Block Size
Average
Latency
Desired average latency in milliseconds per I/O. Latency is the round trip time per I/O request-response.
Control IOPS
Select the required IOPS using the slider. Qos can be enforced either throughonly IOPS or only Throughput.
Control
Throughput
Select the required throughput using the slider. Qos can be enforced either throughonly IOPS or only Throughput.
4. Click Next and then select the VSM on which you want to provision the Storage Volume.
140
Description
Volume Hierarchy
Record Size
Synchronization
Deduplication
Compression
Mount Point
(Applies only for NFS and CIFS) Specify the Storage Volume mount point for the client to use the storage.
Enable NFS
Enable CIFS
Enable iSCSI
7. Click Provision.
Note:Disconnect all associated clients before you delete an iSCSI Storage Volume.
141
142
4. Select a VSM that satisfies the QoS requirements. The graphical representation helps you with the IOPS data.
5. Click Next and then proceed to complete the provisioning.
Auto-Provisioning
ElastiStor can automate Node selection and resource allocation if you provide the required SLA/QoS parameters. Sensing the level
of storage performance and capacity the application requires, ElastiStor automatically allots the right Pool.
Auto-provisioning is particularly helpful when you have innumerable Pools/VSMs. CloudByte ElastiStor chooses the appropriate
Pool/VSM for provisioning automatically.
How to auto-provision
1. In ElastiCenter, select Global Settings.
143
Example
Assume that auto-provisioning is enabled and there are three Pools (pool1with 500 IOPS, pool2with 400 IOPS, and pool3with
300 IOPS respectively). If the administrator wants to create a VSM with 100 IOPS, pool1(the Pool with the highest IOPS value) is
automatically selected for VSM creation.
SASmultipathing
CloudByte ElastiStor supports SASmultipathing. Having multiple physical paths to the disk array enclosure assures effective path
failover by providing redundant paths for data access.
l
At any point in time, there is only one active path for I/O
If a failure occurs, instead of the active path, the one that was redundant (so far) takes over avoiding any interruption to data
access
144
Prerequisites
l
Firmware: 07.15.08.00
Driver: 15.00.00.00
SAS cables
Disk array enclosure with multiple IN ports (for example Dell MD1220)
In the Node page, clear all existing pools to avoid Pool name conflicts. To do this, first configure the Disk Array in the Node
page. Then select the Node and then at the bottom of the page, click Clear for the Pools to be deleted.
Sample setup
The following figure shows a simple SASmultipath setup:
145
In the case of a failure, as shown in the following instance the path disappears from the table:
146
The figure implies that there is only a single SAS path available.
Note: In the example, you can increase the value up to 100 (which means, the entire IOPS is consumed).
147
4. Click the Edit icon and then modify the editable fields.
5. Click Apply.
148
4. Click the edit icon and then modify the QoS details.
5. Click Save.
149
Note: SATA disks or any disk with SATA interface is not supported for HA and multipathing configuration.
Same NIC (for example, if em0 is the interface used on one Node, the same should apply for all Nodes) and same capacity
Disks are shared (across the Nodes)
Procedures
The following procedures explain how to configure a two-way High Availability setup:
1. Set up your hardware. For details see "Hardware setup diagram for High Availability"
2. Create a Site. For details, see "Creating a Site ".
3. Create an HA Group. For details, see "Creating an HA Group ".
When you specify the IP address range while adding the HAGroup, ensure that you specify a range that matches the number
of nodes you add.
4. Add a Node (Node1). For details, see "Adding a Node".
5. Label shared disks. For details, see "Configuring Disk Array enclosure"
Note: You can perform this step later, after you add all other Nodes. In that case, you have to refresh the hardware
(Nodes > select specific Node > select Refresh Hardware in the Tasks section of the action pane) for labeling to take
effect.
6. Add Node 2. For details, see "Adding a Node".
Now you have established a two-way HA. The following screen provides a visual representation of the configuration.
150
151
152
1. Select the Node that you want to bring to maintenance mode (ElastiCenter > Nodes).
2. In the Node Page, go to the actions pane and then click Move to maintenance icon.
Take Over
When Node failure occurs, takeover happens as illustrated in the following screens:
n
153
The following screen depicts the Node Page that lists a two-way HA. Here, Node2 is in maintenance mode.
Note: In ElastiStor, every Node has a designated partner. If the Node goes down, the resources of that Node are failed over
to the partner Node.
154
HA Jobs
To view the details of the past High Availability events, perform the following procedures;
1. (In ElastiCenter)In the HA Groups page, select an HA Group for which you want to view event details.
2. In the Actions pane, click View Jobs.
You can view the details of the past HA events and the time taken to perform these events as shown in the following screen:
155
Snapshot, which is a read-only virtual copy of your Storage Volume and VSM.
Backing up VSM
1. In ElastiCenter, select Virtual Storage Machines in the navigation pane.
2. From the list, select the VSM to create local backup.
3. In the following page, go to the Local Backup section of the Actions pane and then select either of the following options:
n
Add snapshot
1. In the Local Backup section, click Create Snapshot.
2. In the Create Snapshot dialog box, specify a unique name.
3. Click OK.
156
Add schedule
1. In the Local Backup section, click Add Snapshot Schedule. The Add Snapshot Schedule page appears.
2. Specify the following details and then click Add.
Field
Description
Name
Retention Copies
Schedule
Retentioncopies
Every 15 minutes
Every hour
24
Every day
30
157
4. In the Create Snapshot dialog box, specify a unique name for the snapshot and then click OK.
Restoring Snapshots
1. In ElastiCenter, select Storage Volumes in the Navigation pane.
2. From the list, select the Storage Volume to restore data.
3. In the following page, go to the Local Backup section of the actions pane and then click Manage Snapshots.
4. From the list of snapshots, select the one that you want to restore, click the restore icon, and then confirm at prompt.
158
Add schedule
1. In the Local Backup section, click Add Snapshot Schedule. The Add Snapshot Schedule page appears.
2. Specify the following details and then click Add.
Field
Description
Name
Retention Copies
Schedule
Creating a clone
1. In ElastiCenter, select Storage Volume in the navigation pane.
2. From the list, select the Storage Volume to create a clone.
3. In the following page, go to the actions pane and then select Local Backup > Create Snapshot.
4. In the Create Snapshot dialog box, specify a name and then click OK.
159
7. Specify a unique clone name, where to mount the clone, and then click OK.
160
161
Delete DR VSM: Remove a disaster recovery setup that you have configured.
Recovering data
Note: The DR VSM can be activated only after the base snapshot is successfully transferred from the primary VSM. You
can check the status of data transfer by clicking View Transfer Status (Actions > Tasks).
1. In the ElastiCenter navigation pane, click Virtual Storage Machines.
2. From the list of VSMs, select the DR VSM that is associated with the Primary VSM where the disaster occurred.
3. In the DR VSM page, go to actions pane and then click Tasks > Activate.
162
4. In the following page, specify the network settings of the DR VSM and then click OK.
5. At confirmation prompt, click Yes.
After you activate the DR VSM, the re-mount prompt appears. Ensure that you re-mount the Storage Volumes before you proceed.
For details, see "Connecting to ElastiStor".
163
Easily commission storage with guaranteed IOPS at various levels. You can decide to configure QoS at a Pool level, VSM
level, or Storage Volume level.
Utilize untapped system resources. For example, assume that you have three VSMs but only one is active. In this case, the
active VSM can use the entire systems capability.
Configuration
Use ElastiCenter to configure QoS settings. The configuration can be at the following levels:
n
164
Configuring Grace
What is Grace
Grace is the provisioning of unused IOPS/throughput of Pools to Storage Volumes based on the performance requirements. You can
configure Grace at Pool level and Storage Volume level.
For example, assume that you have a Pool with the capacity of 100 IOPS and Grace enabled. Two VSMs named VSM A and VSM
B, with a capacity of 30 IOPS and 60 IOPS respectively are created under the Pool.
Under VSM A (with 30 IOPS capacity), Storage Volumes named E and F are created, and assigned 10 IOPS and 15 IOPS
respectively.
Under VSM B (with 60 IOPS capacity), Storage Volume G is created and assigned 35 IOPS.
165
166
3. Click Save.
Monitoring QoS
In the Storage Volume page, select the Volume for which you want to monitor QoS. The page that appears displays the monitoring
data.
QoStips
Storage capacity
Discs, storage connectivity, and type
Capability: Ensure that you are well aware of the capabilities of your storage subsystem. For example, the right interconnection
between the controller and storage, the type of disks on the disk array, and the ability to expand the capacity.
Limitations: Ensure that you have assessed the limitations. For example, increasing storage capacity does not make any sense
if the network does not support.
167
Controller characteristics
RAM, CPU, and network:
CPU: If the storage is more I/O bound than CPU bound, it is more effective. CPU load should not be more than 60-70 percent, or
you add more cores.
RAM: RAM determines the ability to cache. Larger RAM means more filesystem caches. In a READ-centric scenario, larger RAM
helps generate better QOS. That is, more I/O and throughput but lesser latency.
Network: Network capacity decides data access and data protection. Assure adequate network bandwidth to export performance
to clients. Network should do justice to the storage system.
Segregation: Segregate data access and data protection so that protection workloads do not interfere with data access workloads.
Pool creation
Storage group tips
As a best practice, create storage with 8 to 10 disks.
When you add storage groups, keep them identical. For example, do not add disparate groups to the same Pool. For example, if one
group has SATA disks and another group has SAS disks, then do not assign both to the same Pool. That is, do not create hybrid
Pools.
Optimizing QoS
Disk characteristics: Better the disk characteristics, better the QOS. For example, the IOPS, throughput, and latency of SATA
disks are not as good as that of SS disks.
Disk layout: Better the disk layout, better the QoS. For example, keep the disk layout to 8 to 10 disks.
Improving WRITE performance: If the application requires synchronous WRITES, associate high performing disk to the
Pool to speed up the WRITEs. This guarantees better QOS.
Improving READ performance: To improve the READ performance or increase the filesystem cache hit rate, add high performing disks as cache devices to the Pool.
168
Fiber Channel
iSCSI
CIFS
NFS
When you create a Storage Volume, you are provided with an option to select the access protocols that you want to enable.
Deleting a Storage Volume disables the protocol access services automatically.
The following sections help you configure data access protocols supported by CloudByte ElastiStor:
n
iSCSI concepts
Authentication Group: A grouping of multiple iSCSI users.
Use this option if you use CHAP or mutual CHAP. You can configure Authentication group at both VSM and Storage Volume levels.
CHAP: An authentication method which uses a user/secret or IQNs for outgoing authentication. The Storage Volumes on
CloudByte ElastiStor authenticate the initiator.
Mutual CHAP: A super set of CHAP which uses peer user/peer secret for outgoing/incoming authentication between Storage
Volumes and initiator.
Initiator group: Defines who can initiate the LUN.
It is a combination of multiple IQNs. By default, CloudByte ElastiStor creates two initiator groups (all where everyone can initiate the
LUN and none where no one can). After you create the Storage Volume, when you manage the iSCSI options, you are prompted to
choose an initiator group. You can either select the default one or the ones that you create. You configure initiator group in the Storage Volume.
169
Account
VSM
Storage Volume
The following figure illustrates the work flow for configuring the iSCSI protocol options:
170
171
In the Add Authentication Group dialog box, specify the following details:
Field
Description
Name
Description
CHAP Username
Username for CHAP authentication. For uniqueness, specify the initiator IQN name as username.
CHAP Secret
Password for CHAP authentication in alpha-numeric format. The password must have 12 to 16 characters.
Mutual CHAP Username Username for mutual CHAP authentication. For uniqueness, specify the initiator IQN name as username. The
value must be same as that of the CHAP user.
Mutual CHAP Secret
Password for mutual CHAP authentication (should be different from CHAP secret). The password must have
12 to 16 characters.
Initiator Groups
In the Add Intiator Group dialog box, specify the following details:
Field
Description
Name
Allowed Intiator
Authorized Networks
List of allowed networks followed by subnet mask in the format 10.0.0.0/8, separated by comma.
Description
IQN Name
Number of
worker threads
Discovery Auth
Method
Discovery Auth
Group
Timeout
Sets the limit on how long an I/O can be outstanding before an error occurs. Values range from 0 to 300. The
default value is 30.
NOPIN Interval
The frequency of sending a NOP-IN packet in seconds. The values range from 0 to 300. The default value is 20.
172
MAX R2T
Max Sessions
Max Connections
First Burst
Length
Maximum data in bytes that an iSCSI initiator may send to the target during the execution of a single iSCSI command
unsolicited. Values range from 1 to 2^32 with a default of 65,536.
Max Burst
Length
Maximum WRITE size in bytes the target is willing to receive between R2Ts. Values range from 1-2^32. The default
value is 262,144.
Max Receive
Data Segment
length
Maximum number of ready to receive packets (R2Ts) the target can have as outstanding. This is for a single iSCSI
command,where larger values should yield performance increases until MaxOutstandingR2T exceeds the size of the
largest Write I/O divided by MaxBurstLength. Values range from 1 to 255. The default value is 16.
Default time to
wait
Minimum time in seconds to wait before attempting a logout or an active task reassignment after an unexpected
connection termination/reset. Values range from 1 to 300. The default value is 2.
Default time to
retain
Maximum time in seconds after Time2Wait before which an active task reassignment is still possible after an unexpected connection termination/reset. Values range from 1 to 300. The default value is 60.
Description
Status
IQN Name
Authentication
Method
Authentication
Group
Initiator Group
Initial Digest
Queue Depth
Pending I/O requests for the Volume. The values range from 0-255. 0 implies that the status disabled. The
default value is 32.
Configuration scenarios
The following scenarios explain iSCSI configuration in detail:
173
Scenario 1: Assigning the same iSCSI initiator groups to two Storage Volumes under a VSM
iSCSI initiator groups can be configured for only Storage Volumes based on initiator groups in the account. For example, Storage
Volumes under the VSM can have different iSCSI initiator groups.
For procedures, see "Configuring initiator group and restricting access"
Scenario 2: Assigning different authentication groups to multiple Storage Volumes under a VSM
You can have different authentication groups for VSMs and Storage Volumes.
For procedures, see "iSCSI authentication workflow"
174
Data access to the iSCSI Storage Volume can be restricted to either a single machine or to multiple machines in a Subnet.
Field
Name
Description
Unique name of the initiator group.
175
Allowed Intiator
List of IQNs, separated by comma for restricting the access to iSCSI Storage Volume from multiple machines
in a Subnet.
Authorized Networks
List of allowed networks, followed by subnet mask in the format 10.0.0.0/8, separated by comma.
6. Click OK.
7. In the Storage Volumes page, select the Storage Volume to which you want to assign the initiator.
8. Select Manage iSCSI Configuration (Actions pane > Tasks).
9. Click Edit, enter the required details, and then save the changes.
10. In the Confirmation dialog box, click Modify.
176
177
Field
Name
Description
Description
A unique name for the authentication group.
A meaningful description for the authentication group.
CHAP Username
Username for CHAP authentication. For uniqueness, specify the initiator IQN name as username. CHAPis
an authentication method which uses a user/secret or IQNs for outgoing authentication. The Storage
Volumes on CloudByte ElastiStor authenticate the initiator.
CHAP Secret
Password for CHAP authentication in alpha-numeric format.The password must have 12 to 16 characters.
Mutual CHAP User- Username for mutual CHAP authentication. For uniqueness, specify the initiator IQN name as username.
name
The value must be same as that of the CHAP user. Mutual CHAP is a super set of CHAP which uses peer
user/peer secret for outgoing/incoming authentication between Storage Volumes and initiator.
Mutual CHAP
Secret
Password for mutual CHAP authentication (should be different from CHAP secret).
Description
6. In the Storage Volumes page, select the Storage Volume for which you want to assign the authentication group.
178
8. Click Edit, enter the required details, and then click Save. In the following screen, you have selected CHAPas the authentication method.
179
Note: The following documentation is for Windows Server 2008. The procedures are similar for other versions of Windows
Server. However, there might be minor variations owing to the differences in UI strings and navigation.
1. On Windows Server, select Multipath I/O and then click Install (Server Manager Console > Add Features Wizard).
Note: This step can be skipped if Multipath I/O is already installed.
180
181
4. Click Add.
182
In the Network Interface Cards page (Nodes> Network Interface Cards), configure static IP addresses for each interface to configure multipath as shown in the following screen:
183
Procedures
1. In the VSMs page, click Provision VSM and then complete the procedures to create a VSM.
2. Select the provisioned VSM and then in the VSM page select Advanced Settings.
3. In the Advanced Settings page, click Edit.
4. In the following screen, provide the required details and then click Save.
Field
Secondary IP Address
184
Description
Alternate IP Address to configure multipath for a single LUN.
Secondary Subnet
Secondary Interface
2. Select a target that uses MPIO and then click Log On (iSCSI Initiator Properties page > Target).
1. Select the option Automatically restore this connection when the computer starts.
2. Select the option Enable multi-path.
3. Click Advanced.
185
First Subnet of the DiskStation (both the IP addresses of the initiator and the target are within the same Subnet)
186
187
2. In the Advanced Settings page, check the following and then click OK.
188
Microsoft iSCSIinititator
Second Subnet of the DiskStation (both the IP addresses of the Initiator and the Target are within the same Subnet)
189
190
191
6. Select a load balance policy and then click OK. The following screenshot shows Round Robin with Subset as the Load balance policy.
192
193
Configure VSM CIFS options at the VSM level. File system CIFS options can be configured at the Storage Volume level (if you have
enabled the protocol option).
Description
Authentication
Model
NetBios Name
Server Description
Workgroup
DOS Charset
The character set that is used while communicating with the Windows clients. The default is CP437
UNIX Charset
Log Level
Sets the amount of log/debug messages that are sent to the log file. Default is Minimum. Keep it
this way for best performance unless more information is needed for troubleshooting.
Time Server
Determines whether or not ElastiStor advertises itself as a time server to Windows clients.
194
Option
Description
Status
If Enabled, CIFS Share can be accessed. If NFS is enabled on a Storage Volume, you can access CIFS share by setting
Status to enable.
Name
Description
Read Only
Browseable lected, client has to explicitly specify the full server path in Windows Explorer.
Inherit Permissions
If selected, permissions on new files and directories are inherited from parent directory.This option is (particularly) helpful in scenarios where there are large systems with many users involved. Inheriting permissions let a single home share
to be used flexibly by each user. Leave this unselected if Type of ACL is set to Windows in the Volume's permissions.
Recycle Bin
If selected, instead of purging the files, they are moved to recycle bin of CIFS share on deletion.
Hide Dot
Files
Dot files (unlike on UNIX) appear on Windows. Select the option to hide the Dot files.
Hosts Allow
Host-based protection feature. Comma-separated or space separated list of IP addresses that are allowed to access the
shares. If nothing is specified, the default value ALL applies.
Hosts Deny
Host-based protection feature. Comma-separated or space separated list of IP addresses that are denied access to the
file system. If you specify ALL, IP Addresses that are not listed in the Host Allow field are denied permission.
CIFSauthentication workflow
A CIFS Authentication Group is a grouping of multiple CIFS users. You can select the users who can access the CIFS share.
1. In the ElastiCenter, select Accounts.
2. In the Accounts page, select the account for which you want to specify the protocol options.
3. Select Manage CIFS Authentication Groups in the Actions pane.
195
196
Field
Description
Name
Description
User name
Password
Full name
6. In the VSM page, select the VSM for which you want to assign the authentication group.
7. Select Manage CIFS Configuration (Actions pane > Tasks).
8. Click Edit, select a Discovery Authentication Group from the drop-down list and then click Save.
197
The client can use any available HBAs in the market (such as Emulex or Brocade).
FC in CloudByte ElastiStor
The following figure illustrates how you configure the FC setup in CloudByte ElastiStor:
Access over FC protocol involves an initiator group and a target group. Initiator represents the FC client, for example a Windows client and target is the CloudByte Node.
198
The Storage Volumes can be accessed by both the initiator group and the target group.
FC Initiator group
An initiator group is the list of initiators who are authorized to access the FC LUN. By default, CloudByte creates a default initiator
group named none that does not allow access to any initiator.
The initiator group is a list of WWPNs. You can create the initiator group, add initiators and ports, and then mask the LUNs to the
added initiator.
You create the initiator group at the account level and assign it at the Storage Volume level.
FC Target group
You group the FC target ports to form a target group. This means, all the FC target ports which you have grouped are used for this
particular group. The Nodes WWPNs uniquely identify each target port on the system. By default, CloudByte creates a default target group named ALL that allows access to all targets. If required, you can create a new target group and replace the default one,
though CloudByte recommends using the default target group ALL.
You create the target group at the account level and assign it at the Storage Volume level.
4. Refresh Hardware (Nodes > select the specific Node> click Refresh Hardware in the Tasks section).
Note: Step 4 applies only if you have added FCports to the Node after adding the Node to the HA Groups.
5. In the following page, click Add Initiator Group.
199
6. Specify a unique name and select the appropriate WWPNs of the FCinitiators to form the group.
7. Click Add.
200
3. In the FC Configuration page, click Edit and then replace the default initiator group/target group.
4. Click Save.
Note:You can also perform the same task at the Account level (Accounts > select Account > Manage FC Initiator Group/Target Group).
Note: This release does not support access control when using NFS.
201
3. In the following page, select Manage NFS Configuration in the Tasks section of the actions pane.
Description
Network/IP
addresses
Single Network ID with subnet mask (for example,10.10.1.100/8). You can also provide a comma-separated
list of IP addresses for which access has to be provided (for example,10.20.10.120, 10.20.10.121) instead.
All Directories
Yes the client can mount any sub directory within the Path.
Map as Root
Users
l
l
Read-only
6. Click Add.
202
3. Add Storage.
1. Click Storage in the left pane.
2. Select Add Storage.
3. Mark the storage type as Disk/LUN and then click Next.
203
4. (In the following screen) Select the listed LUN and then click Next.
204
1. Right Click on the Datastore name and then select Browse Data.
2. Click on the upload icon to copy data as seen in the following page:
205
7. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
8. From the list of snapshots, select the snapshot you want to restore and then click Restore icon to roll back the Storage
Volume content to previous state.
9. On the ESX client, refresh the Storage Volume and then view the required data.
On Windows XP, Windows 7, Windows 8, Windows Server 2008, and Windows Server 2012
1. In ElastiCenter, create an iSCSI Storage Volume.
2. Mount the Storage Volume on the Windows Client.
1. On Windows machine, launch iSCSI Initiator (Programs > Administrative Tools > ISCSI Initiator).
2. In the Target tab, specify the target (tenant IP address).
206
3. Click Quick Connect. The Quick Connect screen appears, displaying the target name.
4. Select the Target name and then click on Connect.
5. Click OK.
3. Create Storage Drive to use the iSCSI target.
1. Launch Server Manager and then select Disk Management in the left pane.
2. Right-click the unallocated space (New Simple Volume wizard appears).
3. Select New Simple Volume.
207
4. Ensure that the new Storage Volume appears as shown in the following page.
208
8. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
209
9. Before restoring the snapshot, make the volume offline on the Windows Client (Disk Management > Right-Click Disk).
10. From the list of snapshots, select the snapshot you want to restore and then click Restore icon to roll back the Storage
Volume content to previous state.
11. On the Windows Client, bring the Storage Volume online.
210
1. In the Accounts page, select the Account associated with the Storage Volume.
2. Select Manage CIFSAuthentication Groups in the Actions pane.
3. Select Add Authentication Group in the Tasks section.
4. In the following page, provide the relevant credentials and then click OK.
211
3. Provide the CIFS share access path and then click Finish.
4. Ensure that the option Connect using different credentials is checked.
5. Provide the CIFS username and password and then click OK.
6. Ensure that CIFS share is connected (highlighted), as shown in the following page:
212
9. Go to Windows Client and then delete the data from the mounted Storage Volume.
10. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
11. For the snapshot you want to restore, click Restore icon to roll back the Storage Volume content to previous state.
213
12. On Windows Client, refresh the Storage Volume and then check the data.
214
4. Add Storage:
1. Click Storage in the left pane.
2. Mark the storage type as Disk/LUN and then click Next.
3. (In the following screen) Select the listed LUN and then click Next.
215
1. Right Click on the Datastore name and then select Browse Data.
2. Click on the upload icon to copy data as seen in the following page:
216
8. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
9. From the list of snapshots, select the snapshot you want to restore and then click Restore icon to roll back the Storage
Volume content to previous state.
10. On the ESX client, refresh the Storage Volume and then view the required data.
217
4. Ensure that the new Storage Volume appears as shown in the following screen:
218
8. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
219
9. Before restoring the snapshot, make the volume offline on the Windows Client (Disk Management > Right-Click Disk).
10. From the list of snapshots, select the snapshot you want to restore and then click Restore icon to roll back the Storage
Volume content to previous state.
11. On the Windows Client, bring the Storage Volume online.
220
3. Add Storage.
1. In the Server tab, specify NFS Server IP Address.
2. In the Folder tab, specify the access path of NFS share.
3. Specify a name for DataStore and then click Next.
221
222
7. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
8. From the list of snapshots, select the snapshot you want to restore and then click Restore icon to roll back the Storage
Volume content to previous state.
9. On ESX Client, refresh the Storage Volume and then view the required data.
On Linux Client
1. In ElastiCenter, create an NFS Storage Volume.
2. Mount the volume on Linux client and then write some data.
Use the following command to mount the volume: mount Tenant IP Address : Access Path Directory Path
l
Directory Path: Local Directory Path where the NFS volume is to be mounted.
223
5. In ElastiCenter, click Manage Snapshots (Actions pane > Local Backup) to view the list of previously captured snapshots.
6. From the list of snapshots, click on Restore icon to roll back the Storage Volume content to previous state.
7. On the Linux Client, check data. Use the ls command to view the list of files.
224
"Delegated administration"
"Monitoring""Monitoring"
"Drill-down feature"
Delegated administration
Administration in CloudByte can be categorized based on services. You can have administration at the Site level or at the Account
level. Your Site can have multiple Site administrators.
Note: Currently, CloudByte ElastiStor supports only role-based administration. Future releases will have delegated administration fully implemented.
As the root administrator, you can distribute the tasks to administrators. Delegated administration is an act of providing and restricting privileges by establishing access control based on the responsibility of each individual administrator.
n
Delegated administration lets you determine the actions that each administrator can take using administrative tools on different resources.
Delegated administration roles are mapped to administrative functions using security policies. You can create and maintain
separate administration capabilities, depending on your needs.
Role hierarchy enables you to keep a tight control on how delegation happens and who can delegate what to whom. One
administrator can create sub-roles for other administrators with limited administrative privileges.
Role hierarchy
The following is a pictorial representation of how role-hierarchy functions in CloudByte ElastiStor administration:
225
Administrator
Super administrator
Site administrator
Account super
dministrator
Account administrator
226
Can
Perform all possible actions across Sites, Accounts, and VSMs
Cannot
Not applicable
Delete/Modify/Create another Site administrator
View administrator
Generate reports
Note: You can only have one super administrator. Only the super administrator can change his/her password. Administrators can change their password and passwords of administrators under them.
227
Email: Specify a unique email address for the Site administrator or View administrator
Delegated Admin Type:Select the type of Delegated Administrator from the drop-down menu
5. Click Next and then drag and drop one or more Sites for which you want to delegate administration as seen in the following
screen:
6. Click Add.
228
4. Specify the credentials for the administrator and then click Add Account.
229
4. In the Add Account dialog box, specify the details and then click OK.
Monitoring
Monitoring provides an intuitive visualization of storage statistics.
Monitoring foregrounds relevant backend activities in an easy user interface for administrators. It provides a generic outlook of the
components such as storage, input/output, throughput, latest data, status, alerts, and system configuration.
Various dashboards dynamically represent disk utilization, storage utilization, throughput, input/output, and status of network interface cards attached to the system.
Alerts and Events feature keeps a regular check on what is happening with the product. All events - even adding an additional IP
address or modifying an existing one - get registered and monitored.
The feature also provides a notification system where the administrator is informed through email/text messages when an alert is
generated in the system.
Continuous monitoring of your network
n
230
Emailing alerts
The following settings in Global Settings let you email alerts:
l
By default , alerts are not emailed. To receive alerts over email, set alert.email.enable to true . The alerts are mailed
to the email that you specified when you updated your profile. For details, see "Reset password and configure auto-alert
options". To add multiple users, add the email IDs separated by comma in alert.email.addresses.
You can set a filter to the alerts mailed based on severity using the option alert.email.severity. By default, all alerts
are mailed (as the value set is 4).
To specify the sender email ID, use the option alert.email.sender. If you do not specify an ID, the ElastiCenter domain
name is displayed along with IP address of ElastiCenter.
Events
To get a list of ElastiCenter events,
1. In ElastiCenter, click Events.
2. Select Events in the Select View. All events are listed.
To get a list of specific events, go to the component page and then click Events. For example, for events related to only Storage
Volumes:
1. In the Storage Volumes page, select a Storage Volume for which you want to generate events.
2. In the following page, click Events in the actions pane.
231
Dashboard Alerts
Dashboard provides a visual representation of monitoring statistics such as performance, usage, capacity, and availability.
To see the details, select the component and then make a specific selection.
The following figure is a dashboard representation of the alerts
For Nodes: I/O Status of various disks, GMultipath status, and Camcontrol device list for all available disks
When you select an option, details are provided in a tabular format. To access the Troubleshooting option,
1. In the Node/Pool/VSM page, click a specific Node/Pool/VSM.
2. In the Actions pane, click Troubleshooting under Tasks.
232
233
Drill-down feature
A monitoring feature in Pools, Storage Volumes, and VSMs that lets you monitor
n
IOPS
Throughput
Latency
Select a time interval option such as start time and end time, last 24 hours, or last week to plot a graph.
234
4. Click Update.
Comparing IOPS
1. From thelist, select the Pool for which you want to monitor Storage Volume IOPS.
2. Click Compare Volumes.
3. In the following page, set the desired parameters.
4. Click Update.
Note: IOPS comparison is applicable only for Storage Volumes in the same Pool.
Account QoS
Pool QoS
235
Account Storage
Pool Storage
Volume Usage
HA Group Info
Note: In future releases, you can define your own reports and add new report types.
236
To change the default settings for configuring email for reports, select Global Settings and then specify the details for the highlighted
options:
237
Global Settings
Global settings let the administrator configure various options used to control CloudByte ElastiStor. For example, email configuration. To configure global settings,
1. In ElastiCenter, select Global Settings.
2. Select a target category. A list of settings is provided by default.
3. Edit the relevant settings.
Note: You cannot add new settings.
This section lists the global settings options available on the ElastiCenter.
Option
alert.email.addresses
238
Description
Comma separated list of email addresses used
for sending alerts.
Default Value
Email ID you specified in the Update
Profile section in ElastiCenter.
Option
Description
alert.email.enable
alert.email.sender
alert.email.severity
1 - ERROR
2 - CRITICAL
3 - WARNING
4 - INFO
Default Value
TRUE
alert.smtp.host
localhost
alert.smtp.password
alert.smtp.port
alert.smtp.useAuth
alert.smtp.username
autoSupport.config.details
autosupport.httpnotify.apikey
autosupport.httpnotify.enable
autosupport.httpnotify.ipaddress
autoSupport.infastructure.statistics
Yes
autoSupport.product.alerts
Yes
autoSupport.reg.details
autoSupport.tenant.statistics
Yes
bad.disk.threshold
512
cache.multiplication.factor
devman.backup.files.retain
devman.backup.path
/var/devman/backups
587
False
Yes
False
Yes
239
Option
Description
Default Value
1
devman.build.number
Available in /cbdir/buildversion
monitor.purge.retain.days
60
monitor.qos.stats.interval
The time interval (in seconds) taken for QoS stat- 300
istics to be retrieved from Nodes.
monitor.refresh.interval
300
monitor.storage.stats.interval
300
monitor.system.purge.retain.days
no.of.nodes.per.hagroup
project.invite.required
False
provisioning.sb.algo
Best Fit
provisioning.sb.auto
No
provisioning.tsm.algo
Best Fit
provisioning.tsm.auto
No
qos.penalty.allowed.delta
qos.penality.blocksize
Standard blocksize (in KB) per IOPS, used in provisioning and penality enforcement.
qos.penalty.blocksize.factor
qos.penalty.cachehit.factor
Considers cache hit for penalty caclulations. Specify yes to Enable and No to Disable.
No
qos.penalty.enforcement.timeinterval
300
qos.penalty.readwrite.factor
Considers READs vs WRITEs for penalty caclulations. Specify yes to Enable and No to Disable.
No
read.multiplication.factor
report.email.sender
report.smtp.host
report.smtp.password
240
localhost
Option
Description
Default Value
report.smtp.port
587
report.smtp.useAuth
False
report.smtp.username
ui.protocol.enablefc
True
False
ui.protocol.enablezilmirroring
False
provisioning.uncontrolled.iops
False
alert.qos.throttling.percentage
20
alert.qos.throttle.count
Sends an alert if the number of consistent throttling exceeds the specified value and alert.qos.throttling.percentage exceeds the
specified value.
10
devman.enable.ipspaces
False
241
CHAPTER IX Licensing
CHAPTER IX Licensing
When you install the Community Edition of CloudByte ElastiStor, a free perpetual license file is already uploaded to ElastiCenter.
You can use the license for up to 25TB usage of storage on CloudByte ElastiStor.
The license file has relevant details that implement license to use various features that you have purchased. CloudByte provides
license file in the format L4J.
The following FAQs help you with licensing.
I want to evaluate CloudByte ElastiStor. How will the trial license be enforced?
When you install a the Community Edition of CloudByte ElastiStor, the free perpetual license file is, by default, uploaded. You need
not do any licensing tasks.
242
CHAPTER IX Licensing
4. Choose the license file that you have received and then click Upload.
The Check screen confirms the validity of the license and the Finish screen provides the license details. When you get back
to the License page, all license details are listed.
243
CHAPTER IX Licensing
Can I get support from CloudByte for the trial version of the product?
Yes. Contact CloudByte technical support at support@cloudbyte.com
244
245
5. Click Yes to confirm. The API key is generated and displayed as shown in the following screen:
246
Description
https://<ElastiCenter IP address>/client/api?
command=listSite
The web service command you execute. For the complete list of commands, see ElastiStor APIs.
apiKey=UjGmN7gGwzMhFsSese3TNNOWiXHGn53eon_7sHx3aL-9_
t3sHAOV_rNqVzwTnrJyCaTAg9FucSBvMp49nbnfEQ
response=json
Apart from these, the URL also has the additional parameters (required or optional) for the command.
id: 66291daa-4c40-4462-8747-926ebc488963,
name: Bangalore,
location: India,
managedstate: Available,
revisionnumber: 0,
currentUsedSpace: 29,
currentAvailableSpace: 9943,
currentTotalSpace: 9972,
currentThroughput: 605,
currentIOPS: 151,
currentLatency: 163,
currentThrottle: 20,
controllers: [
{
nodePools: 4,
id: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
clusterid: 88bf812b-5142-4780-8ad3-13178bbf30a1,
name: host1,
hostname: Both,
nodeTsms: 4,
ipaddress: 10.36.36.50
}
],
haclusters: [
{
id: 88bf812b-5142-4780-8ad3-13178bbf30a1,
haClusterPools: 4,
haClusterNodes: 1,
name: Cluster1,
247
haClusterTsms: 4
}
],
hapools: [
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 38e66579-bb91-3de3-815a-48c35e2c5943,
availiops: 50,
totalthroughput: 102400,
name: Pool1,
poolTsms: 1,
availthroughput: 51200,
totaliops: 100
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 226e2e02-a3e5-3609-b70d-aea8ef655f74,
availiops: 75,
totalthroughput: 153600,
name: Pool2,
poolTsms: 1,
availthroughput: 76800,
totaliops: 150
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 810f428d-9c26-3d91-8675-62cc3ca56da0,
availiops: 100,
totalthroughput: 153600,
name: pool3,
poolTsms: 1,
availthroughput: 102400,
totaliops: 150
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 11d6fd85-5782-39fe-b85d-079d73742757,
availiops: 175,
totalthroughput: 384000,
name: P4,
poolTsms: 1,
availthroughput: 179200,
totaliops: 375
}
248
],
tsms: [
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 1cb805fe-dd22-357e-b198-121fa08d0971,
availiops: 25,
totalthroughput: 51200,
name: T1,
ipaddress: 10.37.37.51,
availthroughput: 25600,
totaliops: 50
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 90a4e6f8-cb3c-317f-8cdf-3986e8759747,
availiops: 50,
totalthroughput: 76800,
name: T2,
ipaddress: 10.37.37.52,
availthroughput: 51200,
totaliops: 75
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: cab14af0-84b6-3761-900b-9675b32b6ba5,
availiops: 25,
totalthroughput: 51200,
name: T3,
ipaddress: 10.37.37.53,
availthroughput: 25600,
totaliops: 50
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 17b17719-137d-3f95-9f4f-468a17a45957,
availiops: 100,
totalthroughput: 204800,
name: T4,
ipaddress: 10.37.37.54,
availthroughput: 102400,
totaliops: 200
}
]
}, {
249
id: 74692191-75a9-4294-9b1e-402127c9e327,
name: test,
managedstate: Available,
revisionnumber: 0,
currentUsedSpace: 0,
currentAvailableSpace: 0,
currentTotalSpace: 0,
currentThroughput: 0,
currentIOPS: 0,
currentLatency: 0,
currentThrottle: 0
} ] } }
250
4. In the Rescan dialog box, click OK. The refreshed list of devices appears.
251
5. Click Datastore.
6. In the datastore list, select the datastore and then click Add Storage.
252
7. Follow the instructions on the Wizard and then complete the procedures to add storage.
Note: Microsoft Multipath I/O (MPIO) takes care of presenting a pseudo device.
1. Ensure that you have enabled FC for the particular Storage Volume. For details, see "Data access using FC ".
2. On Windows Server 2008, select Server Manager > Disk Management > Rescan Disks.
253
After rescan, the Volumes that you have created for FC are discovered.
254
255
5. Click OK.
6. Right-click the unallocated space and then select New Simple Volume as shown in the following screen:
256
257
7. Follow the instructions and complete the wizard to create the partition.
8. Ensure that the created disk is added to the Disk management console (indicated by the blue ribbon).
258
9. Ensure that the drive created out of FC LUN is shown (as in) the following screen:
259
260
3. Select Hard Disk as the device type and then click Next.
261
cat /sys/class/fc_host/host7/port_name
7. Run the following command to add each FC LUN as a device to the KVM client:
echo "scsi add-single-device h c t l" > /proc/scsi/scsi
Parameter
Description
FC LUN ID.
On Linux
The following procedures might work on most of the Linux setups. However the certified versions are
l
CentOS-6.4-x86
To connect to an individual target, run the command as shown in the sample command: iscsiadm m node T
<target_name_displayed_when_you_run_discover_command> p <VSM_IP_address:port> l
262
7. Specify the size of the partitions and enter w for WRITE changes.
8. Create a file system on the created partitions using the following command: mkfs.<ext2,ext3,ext4,ntfs,vfat>
<partition>
9. Create an empty directory using the following command: mkdir <directoryname>
10. Mount the partitions to the empty directory using the following command: mount <partition name> <directoryname>
11. Perform READ and WRITE operations on mount point.
Sample CLI snapshot
<codedoc code>[root@qaprod ~]# iscsiadm -m discovery -t sendtargets -p 10.10.8.201
10.10.8.201:3260,1 iqn.2012-09.CertStorage:isci-on-iscsiSet
[root@qaprod ~]# iscsiadm -m node -T
iqn.2012-09.CertStorage:iscion-iscsiSet --portal 10.10.8.201:3260 --login
Logging in to [iface: default, target: iqn.2012-09.CertStorage:iscion-iscsiSet,
portal: 10.10.8.201,3260]
Login to [iface: default, target: iqn.2012-09.CertStorage:isci-on-iscsiSet,
portal: 10.10.8.201,3260] successful.
[root@qaprod ~]# fdisk -l
Disk /dev/sda: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x00018542
Device Boot
/dev/sda1
Start
*
End
1
Blocks
64
Id
512000
System
83
Linux
8e
Linux LVM
64
60802
487873536
263
Start
/dev/sdb1
End
1
Blocks
131
Id
1045504
System
7
HPFS/NTFS
delete a partition
extended
264
p
Selected partition 1
First cylinder (1-1008, default 1):
Using default value 1
Last cylinder, +cylinders or +size{K,M,G} (1-1008, default 1008):
Using default value 1008
Command (m for help): w
The partition table has been altered!
Calling ioctl() to re-read partition table.
</codedoc>
1. Open /etc/iscsi/iscsid.conf using an editor and then specify the details for the following section:
<codedoc code node.session.auth.authmethod = CHAP
node.session.auth.username = <CHAP username>
node.session.auth.password = <CHAP secret>
node.session.auth.username_in= <Mutual CHAP username> (give only when you are doing mutual CHAP)
node.session.auth.password_in = <Mutual CHAP secret>
discovery.sendtargets.auth.authmethod = CHAP
discovery.sendtargets.auth.username = <CHAP username>
discovery.sendtargets.auth.password = <CHAP secret>
discovery.sendtargets.auth.username = <Mutual CHAP username>
discovery.sendtargets.auth.password_in = <Mutual CHAP secret>
</codedoc>
2. Restart the iSCSI daemon using the following command: /etc/init.d/iscsi restart.
3. Follow the procedures in the section "Without CHAP authentication".
For as specific target
iscsiadm -m node -T "< Target_Name > -p < VSM_IP_address >:<port> -op=update --name node.session.auth.username --value=<CHAP_username>
265
Task
Command
Example
fdisk l
mkfs.ext3 /dev/sdc
Create a directory.
mkdir /mnt/cbdata
df kh
(Optional) Retrieve the
current size of the mounted LUN.
cp
umount /mnt/cbdata
10
iscsiadm -m node -u -T
<Complete target name> -p
<Target IP Address>
iscsiadm -m node -u -T
iqn.2014-02.Acc1.TSM3:TSM3TSM3ISCSI11 -p
11.11.11.11
iscsiadm -m discovery -t
st -p <Target IP Address>
266
iscsiadm -m discovery -t st
-p 11.11.11.11
Details
Outputs the complete
target name.
iscsiadm -m node -T
iqn.2014-02.FCAcc.Test:FCAcciscsivol1 -l
The partition is displayed in the output.
At prompt, confirm by
typing y as shown in the
following example:
/dev/sdc is entire
device, not just one partition! Proceed anyway?
(y,n) y
3. Increase the Quota size of the LUN and then click Save.
Task
Command
Example
fdisk l
df kh
Details
iscsiadm -m node -T
iqn.2014-02.Acc1.TSM3:TSM3TSM3ISCSI11 -p
16.10.10.3 l
Check the output
to see if the disk
size has
increased.
resize2fs /dev/sdb/ 5G
In this example,
5G is the total
space on the resized Volume.
267
1. Ensure that you have enabled iSCSI. For details, see "Data access using iSCSI".
2. On Windows Server 2008, launch iSCSI Initiator (Programs > Administrative Tools > ISCSI Initiator).
3. In the Target tab, specify the target (tenant IP address).
4. Click Quick Connect. The Quick Connect screen appears, displaying the target name.
5. Click Done.
268
2. Right-click the unallocated space (the highlighted section) and then select Initialize Disk. The Initialize Disk dialog box
appears.
269
3. Click OK.
4. Right-click in the space and then select New Simple Volume as shown in the following screen:
270
271
6. Specify a name for the Pool, select iSCSI as the type, and then click Forward.
272
Field
Target Path
Description
Path of the target directory (to use for the Storage Pool).
273
Host Name
Source Path
IQN
Select the check box and then enter the IQN for the initiator.
8. Click Finish.
274
6. Click OK.
7. (If again prompted) Specify the credentials in the Enter Network Password dialog box.
8. Ensure that CIFS share is connected, as shown in the following screen:
275
1. Ensure that you have enabled CIFS. For details, see "Data access using CIFS".
2. On Windows Server 2012, launch Map Network Drive dialog box (Computer/Shortcut on Desktop to Computer > Map Network Drive).
276
4. Click Finish.
5. (If again prompted) Specify the credentials in the Enter Network Password dialog box.
6. Ensure that CIFS share is connected, as shown in the following screen:
277
If correctly exported, the path to the filesystem along with the authorized network is displayed.
3. Create a directory to mount the NFS using the following command: mkdir <directoryname>
4. Mount the NFS on this directory using the following command: mount -o mountproto=tcp <tenant IP
address:>/<exported path><directoryname>
5. Enter the following command: mount
6. If successfully mounted, the following is displayed in the mount list: <tenant IP address>:<exportpath> on <directoryname> type nfs (rw,addr=<tenant IP address>)
Sample CLI snapshot
[root@localhost ~]# showmount -e 20.10.26.199
Export list for 20.10.26.199:
/acctsample (everyone)
#Here everyone implies that the exported path is shared to all (as configured in NFS page).
If you specify a specific client IP, that IP is displayed.
[root@qaprod ~]# mkdir /mnt/nfslocal
[root@qaprod ~]# mount -t nfs -o vers=3,proto=tcp,nolock,sync 20.10.26.199:/acctsample /mnt/nfslocal/
[root@qaprod ~]# mount
/dev/mapper/VolGroup-lv_root on / type ext4 (rw)
proc on /proc type proc (rw)
sysfs on /sys type sysfs (rw)
devpts on /dev/pts type devpts (rw,gid=5,mode=620)
tmpfs on /dev/shm type tmpfs (rw,rootcontext="system_u:object_r:tmpfs_t:s0")
/dev/sda1 on /boot type ext4 (rw)
none on /proc/sys/fs/binfmt_misc type binfmt_misc (rw)
sunrpc on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw)
gvfs-fuse-daemon on /root/.gvfs type fuse.gvfs-fuse-daemon (rw,nosuid,nodev)
20.10.26.199:/acctsample on /mnt/nfslocal type nfs
(rw,sync,vers=3,mountproto=tcp,addr=20.10.26.199,mountaddr=20.10.26.199)
278
6. Specify a name for the Pool, select Network Exported Directory as the type, and then click Forward.
279
Field
Target Path
Format
Path of the target directory (to use for the Storage Pool).
Set the Format option to NFS.
Host Name
Source Path
Enter the NFS path (path on the Host that is being shared).
8. Click Finish.
280
Description
Can I use ElastiStor to improve the performance of storage solutions such as EMC Symmetrix or
Hitachi Unified Storage?
Like other storage systems, CloudByte ElastiStor is an independent storage system with distinct architecture.
ElastiStor does not improve performance but shares the performance between competing applications granularly in a desired way.
However, CloudByte recommends you to use raw disk for storage media rather than storage from other vendors.
Note: In ElastiStor 1.4, support is limited to SAS connected disk arrays (and not any other storage product beneath).
How many flavors and versions of CloudByte ElastiStor are available in the market?
CloudByte ElastiStor 1.0 was the pioneering release of the product. The ongoing release is CloudByte ElastiStor 1.3.2.
Provide ElastiStor specifications in terms of the supported number of logical table entries, for
example, the maximum number of simultaneous tenant networks, maximum number of storage
clients, maximum number of LUNs, maximum number of NFS mount points, etc.
ElastiStor does not have theoretical limitations on the number of Storage Volumes, VLANs and VSMs per Node as revealed in the
tests done with 12000 Volumes. Also, ElastiStor supports unlimited snapshots and clones. For details, see ElastiStor Scalability
281
The CloudByte documentation ( http://www.docs.cl oudby te.com/ena bl ing-out-of-ba nd-communica tionbetween-nodes-in-a n-ha -group/ ) refers to configuring IPMI between Nodes in an HA Group. Is such a
configuration required for ElastiCenter HA also?
No. IPMI based out of band communication between peer Nodes is used during Node HA process when necessary. This configuration is not mandatory for ElastiCenter HA. However, it is helpful to have the IPMI configured for the regular remote access and
troubleshooting.
In pages where Graphs ought to appear, I see a message invalid data throughout ElastiCenter.
Why?
Try using a different browser.
Adobe Flash is required to see the charts. For details, see http://www.docs.cloudbyte.com/wp-content/uploads/CloudByte_troubeshooting_invalid-data_graphs.pdf . Future releases will provide HTML5 support.
I am unable to access ElastiCenter on the browser Chrome (version 45). Is there a workaround
to access ElastiCenter?
Yes. Do the following to access ElastiCenter on Google Chrome version 45:
1. SSH to ElastiCenter as root.
2. Download the server.xml file from the following URL: http://cloudbyte.com/downloads/server.xml
3. Backup the existing xml file in the location /usr/local/apache-tomcat-6.0.33/conf/server.xml
4. Run the following command to replace the existing server.xml file with the new xml (that you downloaded): cp new_
server.xml /usr/local/apache-tomcat-6.0.33/conf/server.xml
5. Run the commands to restart Tomcat service:
1. /usr/local/apache-tomcat-6.0.33/bin/shutdown.sh
2. pgrep java
3. (Optional, if the java service is running) pkill java
4. /usr/local/apache-tomcat-6.0.33/bin/startup.sh
6. Open a new tab in the browser.
7. Launch ElastiCenter.
282
I encountered the error weak ephemeral Diffie-Hellman key while trying to access ElastiCenter. I
am using Mozilla Firefox version 39 browser. Is there a workaround to access ElastiCenter?
Yes. Do the following to access ElastiCenter on Mozilla Firefox version 39:
1. Launch Mozilla Firefox browser.
2. In the Address bar, type the following:
about:config
.
3. In the Search bar, search for the following parameter:
security.ssl3.dhe_rsa_aes_128_sha
4. Set the parameter to
false (security.ssl3.dhe_rsa_aes_128_sha = false)
by doing either of the following:
l
I cannot access the configuration file config.xml from ElastiCenter. How can I access it otherwise?
The following procedures let you manually restore a earlier file version to its original location:
1. Move the Node to Maintenance mode. For details, see "Configuring High Availability"
2. Run the following command to copy the latest config.xml file from the backup location: cp /var/backups/node/config.xml YYYY-MM-DD-HH-00-00 /cf/conf/config.xml.
YYYY-MM-DD-HH-00-00 is the date and time when the file was backed up .
3. Move the Node to available mode. For details, see "Configuring High Availability"
283
Installation FAQs
I cannot access CloudByte ElastiCenter after successful installation. Why?
This might be because of one of the following reasons:
l
Can you explain the memory requirements for installing CloudByte ElastiStor?
The following table provides the details. The values are same for installing both Node and ElastiCenter. Also, the same values apply
if you install both Node and ElastiCenter on the same machine:
Memory
Minimum
Recommended
RAM
1 GB
8 GB or higher
Hard Disk
20 GB
(2.4 X RAM size + 32 GB) or higher. For example, if the RAM is 8 GB, for better performance, 52 GB or
higher is recommended
If you do not comply with the recommended hard disk memory, you might encounter a message that prompts correction (for better
performance). However, if you meet the minimum memory requirements, even if you ignore the message, installation will be successful.
284
I get the message 'Installation cannot proceed as no NIC is present'. What will I do?
You encounter this issue because the NIC that you use is not supported. For a list of supported NICs and other hardware, see the
Hardware Compatibility List .
I get the message 'Installation cannot proceed as no disk is present'. What will I do?
This is because the internal RAID/SAS card in the server is not supported. For a list of supported disks and other hardware, see the
Hardware Compatibility List .
Why am I not able to access the system after the first reboot post installation?
Verify the following:
n
ElastiStor has correctly rebooted. This is indicated by the root login prompt when the installation concludes.
What happens if the network connection is lost and system boots after installing?
It waits for the connectivity to be restored and then boots up.
285
After I installed ElastiCenter on ESX 5.0, my virtual machine stopped responding. Why?
If your virtual machine on ESX 5.0 hangs, do the following:
1. (In the ElastiCenter command prompt) Run the following command: sysctl kern.timecounter.hardware=ACPIfast
2. Run the following command to edit the loader.conf file: vi /boot/loader.conf
3. Append the loader.conf with the following line: kern.timecounter.hardware=ACPI-fast
I did not come across the ElastiCenter HA option while installing ElastiCenter. Why?
The option to configure ElastiCenter HA is available only when you choose the installation option Both ElastiCenter and Node i.e.,
installing both ElastiCenter and Node on a single machine. For details, see http://www.docs.cloudbyte.com/installing-both-elasticenter-and-node/
286
Pool FAQs
What is the recommended storage pool RAID configuration?
If you need high performance, mirroring is recommended. For larger SATA drives (for example 4TB), CloudByte recommends
RAIDz2.
Can I create a mixed disk pool, for example with SATA and SSD disks?
Yes. But CloudByte does not recommend this because you get only the performance of the lowest disk; in this case SATA.
Description
Parity: p=1 for RAID-Z1, p=2 for RAID-Z2 and p=3 for RAID-Z3 where RAID-Z1 = 3, 5, 9, 17, , RAID-Z2 = 4, 6, 10,
18, , RAID-Z3 = 5, 7, 11, 19,
287
Do you recommend NFS/CIFS/ISCSI/FC setup on the same Pool or should I have the access protocols set up on different Pools?
It doesn't matter. Configure based on the usage and requirement.
What happens if you pull a disk from a Pool that has a spare disk?
Spare disk is attached to the Pool.
What happens if you pull a disk from a Pool that does not have a spare disk?
Leaves the Pool in a degraded list.
288
Reinstalled ElastiStor without removing the Pools: In the Nodes page, go to the section Existing Pools (at the
bottom of the page) and then click the Clear link under the column Clear.
Connected disk arrays (with Pools) to a different Node: Apply Refresh Hardware after connecting to the new
Node. All existing Pools are displayed in the Nodes page. Go to the section Existing Pools (at the bottom of the page) and
then click the Clear link under column Clear.
What is the maximum number of NFS or iSCSI LUNs that you can have on ElastiStor?
You can create N number of NFS or iSCSI LUNs, based on your requirement.
289
Can I disable the configuration options related to the protocols I do not use, in ElastiCenter?
Yes. The current release supports disabling of FC-specific options.
1. In the ElastiCenter, click admin > Global Settings.
2. Go to ui.protocol.enablefc, click the Edit icon, and then specify false.
3. For the changes to take effect, either relogin to ElastiCenter or refresh the browser.
All FC-specific options disappear from ElastiCenter UI.
When I use FC I see a LUN with the ID 0 and size 1MB displayed though i did not create it. Why?
This is a system LUN and is not for use.
Deleting data on my CIFS share doesnt increase the free space. Why?
This is because the data is not permanently deleted. Instead, data is moved to the CIFS share recycle bin. To delete data permanently, do the following:
On ElastiCenter
290
4. Click Save.
On Windows client
If you have not disabled this option (earlier) and then data is already moved to the CIFS share Recycle Bin, to clear the data, you
must do the following:
291
(If Show hidden files and folders option is enabled) Go to the folder .recycle and then clear the data.
(If Show hidden files and folders option is disabled) Do the following:
1. Go to Control Panel > Folder Options > View tab.
2. Enable hidden files, folders, and drives. Now you can view the .recycle folder.
3. Clear the data.
I am on a common NFS Share. Is there a way to restrict an other user on this share from deleting
my files?
Yes. If you want a home directory kind of nfs share, when configuring the NFS Storage Volume (see the following screen), set the
option Map as Root Users to No.
I changed the primary IP address of the VSM. Now I cannot access the iSCSI Storage Volumes.
What should I do?
1. Log out of all the iSCSI Volumes on the clients.
2. Delete the login entries of the VSM on the clients.
3. Relogin to the clients with the new IP address.
292
293
I enabled READ-only property for iSCSI Volume mounted on a Windows client, and observe that
the property hasn't taken effect. How can I make the Volume READ only?
For the READ-only property to take effect, disconnect the iSCSI Volume and then remount it on the Client.
Can I have Storage Volumes with same names under different accounts?
Yes.
QoSFAQs
What is QoS?
Assuring your client/application the promised IOPS, throughput, and latency.
294
For example, if both Storage Volume 1 and Storage Volume 2 are committed to busy service round the clock, Dedicated would be
your choice. Whereas, if Storage Volume 1 and Storage Volume 2 represent services in a cross-geographical setup where activities
related to Storage Volume 1 end toward the time activities related to Storage Volume 2 start, Shared would be your choice.
Do I have to set all the QoS parameters (IOPS, Latency, and Throughput)?
No. IOPS is a must. Depending on requirement, you can choose to configure Latency and Throughput.
295
Can I get the same QoS on the secondary Node in the case of a disaster?
Yes, provided you have the same or better infrastructure quality.
Workload access patterns such as sequential, random, read only, read write, write only.
Speed of the underlying disks, that is, if spinning disks such as SAS or SATA or faster ones such as SSDs
Presence of Intent log ZIL to log the writes and respond quickly.
Can I get the same QoS on the secondary Node in the case of a disaster?
Yes, provided the secondary node has same system configuration as the primary.
296
Procedures
4. In the config.xml, search for <if>Backup_interface</if> and specify the following as the next line:<backupif>Backup_interface</backupif>
For example,
<if>em1</if>
<backupif>em0</backupif>
Sample Snippet
<lan>
<uuid>fbfaf211-fd6d-4a70-984a-9642720b9d61</uuid>
<if>em0</if>
<backupif>em1</backupif>
<ipaddr>192.168.16.23</ipaddr>
<subnet>24</subnet>
297
<type>webgui</type>
<gateway>192.168.16.1</gateway>
<status>active</status>
<mtu>1500</mtu>
</lan>
<lan>
<status>active</status>
<subnet>none</subnet>
<uuid>5b0fa24e-463c-4933-817b-94b94129445c</uuid>
<ipaddr>none</ipaddr>
<mtu>1500</mtu>
<type>none</type>
<gateway>none</gateway>
<if>em1</if>
<backupif>em0</backupif>
</lan>
ElastiCenter displays the message HA ring broken. What does the message refer to?
The HA ring broken message is displayed when the management network fails. You may have to analyze the logs to find out
the reason for the network failure.
NIC FAQs
What do the terms degraded, active, and inactive imply?
Term
Degraded
Active
Inactive
Description
The interface is active on one Node but inactive on another in the same HA Group.
The interface is connected to the network on all Nodes in the HA Group.
Either the interface is not connected to the network or it is connected but not active (possibly
because the interface status could not be fetched while adding the Node to the HA Group. In
this case, in the Node page, click Network Interface Cards and then click Refresh).
Global Settings
Global settings let the administrator configure various options used to control CloudByte ElastiStor. For example, email configuration. To configure global settings,
1. In ElastiCenter, select Global Settings.
2. Select a target category. A list of settings is provided by default.
3. Edit the relevant settings.
Note: You cannot add new settings.
298
This section lists the global settings options available on the ElastiCenter.
Option
Description
Default Value
alert.email.addresses
alert.email.enable
TRUE
alert.email.sender
alert.email.severity
1 - ERROR
2 - CRITICAL
3 - WARNING
4 - INFO
alert.smtp.host
localhost
alert.smtp.password
alert.smtp.port
alert.smtp.useAuth
alert.smtp.username
autoSupport.config.details
autosupport.httpnotify.apikey
autosupport.httpnotify.enable
autosupport.httpnotify.ipaddress
autoSupport.infastructure.statistics
Yes
autoSupport.product.alerts
Yes
autoSupport.reg.details
autoSupport.tenant.statistics
Yes
bad.disk.threshold
512
587
False
Yes
False
Yes
299
Option
Description
Default Value
cache.multiplication.factor
devman.backup.files.retain
devman.backup.path
/var/devman/backups
devman.build.number
Available in /cbdir/buildversion
monitor.purge.retain.days
60
monitor.qos.stats.interval
The time interval (in seconds) taken for QoS stat- 300
istics to be retrieved from Nodes.
monitor.refresh.interval
300
monitor.storage.stats.interval
300
monitor.system.purge.retain.days
no.of.nodes.per.hagroup
project.invite.required
False
provisioning.sb.algo
Best Fit
provisioning.sb.auto
No
provisioning.tsm.algo
Best Fit
provisioning.tsm.auto
No
qos.penalty.allowed.delta
qos.penality.blocksize
Standard blocksize (in KB) per IOPS, used in provisioning and penality enforcement.
qos.penalty.blocksize.factor
qos.penalty.cachehit.factor
Considers cache hit for penalty caclulations. Specify yes to Enable and No to Disable.
No
qos.penalty.enforcement.timeinterval
300
qos.penalty.readwrite.factor
Considers READs vs WRITEs for penalty caclulations. Specify yes to Enable and No to Disable.
No
300
Option
Description
Default Value
read.multiplication.factor
report.email.sender
report.smtp.host
report.smtp.password
report.smtp.port
587
report.smtp.useAuth
False
report.smtp.username
ui.protocol.enablefc
localhost
True
False
ui.protocol.enablezilmirroring
False
provisioning.uncontrolled.iops
False
alert.qos.throttling.percentage
20
alert.qos.throttle.count
Sends an alert if the number of consistent throttling exceeds the specified value and alert.qos.throttling.percentage exceeds the
specified value.
10
devman.enable.ipspaces
False
Description
Reference
Pool FAQs
MPIO
Device mapper
LAGG
Configuring interfaces
Creating Pools
Client Multipathing
301
SAS Multipathing
Performance and redundancy
Network MTUs
MTU revision
Secondary ElastiCenter
Separate ZIL and Cache device
Block Length for iSCSI LUNs
Reducing Dell R720 boot time
SAS multipathing
Promoting secondary
ElastiCenter
302
Diagram 1:
Diagram 2:
Important:The primary and secondary setups cannot be used at the same time. Ensure that only the database service is
operational on the secondary setup. Promote the secondary setup only when the primary setup is down.
Prerequisites
l
303
Note: If you copy and paste the commands in the section, ensure that they appear correctly on the CLI.
1. (On both the setups) Log in as root and access (over SSH or directly) the command prompt on the machine where the
ElastiCenters are installed.
2. (On the secondary setup) Run the following command: service rabbitmq onestop
3. (On the secondary setup) Run the following command to ensure that the RabbitMQ service is stopped: service rabbitmq onestatus
4. (On secondary setup) Run the following command to ensure that no Java process is running:
ps auxwww | grep java
5. If any of the Java processes or RabbitMQ service is running, kill it using the following command: kill -9 PID_of_process
6. Else, ensure the following:
l
Size of/tpoolfolder is same on both primary ElastiCenter and secondary ElastiCenter using the following command:
zpool list
/folder in secondary ElastiCenter database has enough space for backup. This means the available space in / directory on the secondary ElastiCenter must be greater than the used space in /tpool directory on the primary
ElastiCenter.
7. (Optional) On the secondary setup, start the mysql service using the command: service mysql -server onestart .
8. (On the secondary setup) Run the script /usr/local/cb/bin/cb_config_slave.sh .
9. Perform the steps as shown in the following command line :
Select your choice:
1) Configure secondary ElastiCenter.
2) Promote secondary to primary ElastiCenter.
3) Exit
1
Here, you have to select 1 as highlighted.
You have selected to configure secondary ElastiCenter.
Do you want to continue? (Yes/No) Yes
Here, you have to select Yes as highlighted.
Specify primary ElastiCenter's IP address:
20.10.97.1
Wait for the script to execute.
Stopping Tomcat and RabbitMQ services...
Tomcat and RabbitMQ services stopped.
Restarting MySql service...
MySql service started.
Starting backup of primary ElastiCenter...
Primary Elasticenter backup completed.
Starting the setting up of secondary ElastiCenter...
Setting up the secondary ElastiCenter completed.
Syncing reports...
If the primary setup is down, try the following before promoting the secondary setup:
304
Verify the error logs in java/Rabbitmq/Mysql or the service status. For example, service mysql-server
onestatus.
If downtime prevails despite the service restart, promote the secondary setup.
Procedures
Note: If you copy and paste the commands in the section, ensure that they appear correctly on the CLI.
1. Power off the primary ElastiCenter.
2. (On the secondary ElastiCenter console) Run the script /usr/local/cb/bin/cb_config_slave.sh .
3. Perform the steps as shown in the following command line :
Select your choice:
1) Configure secondary ElastiCenter.
2) Promote secondary to primary Elasticenter.
3) Exit
2
Here, you have to select 2 as highlighted.
You have selected to promote secondary Elasticenter to primary Elasticenter.
Do you want to continue ? (Yes/No)Yes
Here, you have to select Yes as highlighted.
Dropped secondary ElastiCenter.
Starting RabbitMQ and Tomcat services..
Promoted secondary Elasticenter to primary Elasticenter. Check catalina logs for errors(if any).
4. (On all the ElastiStor consoles) Modify the /usr/local/agent/listener/cbc.conf file by changing the IP address of
ElastiCenter. Specify the IP address of secondary ElastiCenter.
5. (On the ElastiStor console) Run the following command to restart all the python/cbc services on the Node: service -l
| grep cbc | grep -v cbc_ec | xargs -I {} service {} onerestart
Also, ensure that the ElastiCenter is accessible to the Nodes with same status as prior to the promotion.
Note: During the promotion process, if a Node is offline or is powered down, then manually start the cbc_monitor_
hajobs service and point it to the promoted ElastiCenter.
Backing up configurations
How to backup and restore ElastiCenter configuration
By default, CloudByte schedules a backup everyday. You can modify the settings using the following options in Global Settings:
l
devman.backup.files.retain
devman.backup.path
devman.backup.scheduling.interval.
But, in the case you need to do a manual backup, follow the steps:
305
Backing up
1. Copy the backed up TAR file to a location on ElastiCenter, for example /var.
2. Go to the directory /usr/local/cb/bin and then run the following command: ./restore.sh <path of backedup file>.
For example ./restore.sh /var/backup_Jul26_1374815679.tar.bz2.
The configuration is restored.
By default, CloudByte schedules a daily backup in the location /cf/conf. CloudByte recommends you to move this backup daily
to a safe location. Either schedule a cron job or manually copy the files from the conf directory.
You can backup configurations manually by doing the following:
1. cp /usr/local/agent/cb* .
2. cp -r /cf/conf .
Restoring
1. Reinstall the Node with the same configurations (for example, same IP address, Hostname, and ElastiCenter details) as in
the previous installation.
2. Copy the following backed up files to the reinstalled Node:
l
306
Concepts
IOPS
Description
Standard IOPS
This is the benchmarked IOPS. The details are as follows: 80 READ/20 WRITE, and 4K block size. This acts as
the frame of reference for QoS in CloudByte ElastiStor.
Operating IOPS
IOPS under a given workload that can be measured against the standard IOPS.
Pool IOPS
Provisioned IOPS
Illustration
Consider a Pool assigned with 1300 Standard IOPS. There are three Storage Volumes with the following conditions:
Storage Volume
Provisioned IOPS
Block Size
Workload (READ/WRITE)
Operational IOPS
Volume 1
500
4K
80% /20%
500
Volume 2
200
4K
100% /0%
170
Volume 3
400
4K
0% /100%
600
In the case of VSM 3 where WRITEs are more, operational IOPS exceeds the standard IOPS which demands the implementation of
penalty enforcement.
307
Settings
Description
qos.penalty.factor
qos.penalty.enforcement.timeinterval
read.multiplication.factor
cache.multiplication.factor
308
CloudByte equates one WRITE to four READS. You can tune this on per pool basis if required.
Calculation
If standard IOPS are 100 at 80 READS/20 WRITES, the following is the formula to convert the operating IOPS into standard IOPS:
Operating
IOPS
At
READ/WRITE
Throttle at
(IOPS)
100
100/0
80 READS +20 READS (as READs occur in place of WRITEs). Here you convert 20 WRITEs to
READS. That is, 20x4=80 READs. The total standard IOPS that can be consumed is 80 + 80 =
160 IOPS.
160
100
80/20
80 READS + 20 READS
100
100
60/40
60 READs + 40 READs (as WRITES occur in place of READs). Here you convert 20 READs to
WRITEs. 20 READs are equal to 20/4=5 WRITEs. The total standard IOPS that can be consumed is 80+5 = 85 IOPS.
85
309
100
40/20
40 READs + 60WRITEs (as WRITEs occur in place of READs). Here you convert 40 READs to
WRITES. 40 READs are equal to 40/4=10 WRITEs. The total standard IOPS that can be consumed is 40+10 = 50 IOPS.
50
100
20/80
20 READs + 80 WRITEs (as WRITEs occur in place of READs). Here you convert 60 READs to
WRITEs. 60 READs are equal to 60/4=15 WRITEs. The total standard IOPS that can be consumed is 20+15 = 35 IOPS.
35
100
0/100
0 READs + 100 WRITEs (as WRITEs occur in place of READs). Here you convert 80 READs to
WRITEs. 80 READs are equal to 80/4=20 WRITEs. The total standard IOPS that can be consumed is 0+20 = 20 IOPS.
20
X operating IOPS are converted to X1 after considering the block size variation
310
Description
Account
An entity with specific storage needs. Account represents a department of an Enterprise or a customer of a
Cloud Service Provider.
Alerts
Notifications that demand action. Alerts can be on a range of issues such as network cable pullout or degradation
of a Pool.
Asynchronous rep- The process of writing data to local storage and then queuing it up for replication on remote storage at assigned
lication
intervals. If the local storage fails before the data is written in remote storage, then replication fails.
Auto-Provisioning
ElastiStor can automate Node selection and resource allocation if you provide the required SLA/QoS parameters.
Sensing the level of storage performance and capacity the application requires, ElastiStor automatically allots the
right Pool.
Block Size
The size of a block in data storage and file systems. Block is a sequence of bytes or bits, having a nominal size.
CIFS
HA Group
Houses a group of Nodes. HA Group enables takeover during failures. Workload of a failed Node is assigned to
another Node in the same HA Group based on availability and performance requirements.
Dashboard
A graphical representation of the key performance indicators. It presents an overview of all the Sites in
ElastiCenter in an organized manner. You can update information instantaneously.
Delegated Administration
The process of distributing administrative tasks and content in the portal to dedicated administrators. Using
access control lists, you determine the actions administrators take on various resources. Delegated administration roles are mapped to administrative functions using security policies. You can create and maintain separate administration capabilities depending on your needs.
Disaster Recovery
Disaster implies unplanned outage. Your storage system must be capable of effective backup and recovery so
that there is no damage to the data that is handled in the case of any adversity.
Disk Array
Popularly called JBODs, disk array is a set of disks clubbed to single disk shelf.
Disk Type
The type of disk supported by CloudByte ElastiStor. The supported disk types are SAS, SATA, and SSD.
Domain Search
Event
FC (Fibre Channel)
A high-speed interconnect between controllers and back-end disk enclosures. FC components include HBAs,
hubs, and switches. The term also refers to a high-speed, fully duplex serial communication protocol permitting
data transfer up to 10GB per second.
An application layer protocol used to transfer bulk-volumes of files between machines or hosts.
Global Settings
Grace
Provisioning of Pool's unused IOPS/Throughput to Storage Volumes based on their performance requirements.
High-Availability
High Availability minimizes/prevents the consequences of downtime in the storage setup. A typical High Availability environment comprises two setups: one active while the partner remains dormant. In a downtime, the passive setup takes over the storage tasks that the active setup was performing. This effects a reversal of states each
setup was in. When the downtime is over, all events are given back to the original active setup.
Host
311
Terms
Initiator Group
Description
When an initiator group is associated with a LUN, only initiators from that group can access the LUN. Initiators are
identified by unique addressing methods.
IOPS (Input/OutThe number of READs or WRITEs per second. It is used to measure the performance of storage solution. Total
put operations per IOPS is the average input/output operations per second, Read IOPS is the average READ operations per
second)
second, and Write IOPS is the average WRITEoperations per second.
iSCSI
Internet Small Computer Systems Interface is a client-server protocol used to enable the transfer of SCSI packets
over a TCP/IP (Ethernet) network.
Lagg Interface
Allows integration of multiple network interfaces with a single virtual interface. This helps in fault-tolerance and
high-speed multi-link throughput.
Unique address to identify a logical unit. Logical unit is the conceptual subunit of a storage disk or set of disks.
Mirrored Disks
A High Availability setup where you have a different set of disks on each node. Active disks are replicated/mirrored on the partnering node.
Mirroring
Storing duplicate copies of data on one or more sets of additional Storage Volumes, apart from the set of Storage Volume that stores the original data.
Monitoring
Provides an intuitive visualization of storage statistics. Monitoring foregrounds relevant back end activities in an
easy user interface for the administrator.
Network Failure
Indicates that the system is unable to reach the network. For example, due to physical port failure.
NFS
A distributed file system protocol that lets clients access files over a network in the same way they access local
storage.
Physical Infrastructure
Pool
Provisioning
A set of steps to allocate storage to Hosts and applications. For example, creating Storage Volumes in Pools.
QoS (Quality of
Service)
Lets you easily commission storage with guaranteed IOPS at various levels. You can decide to configure QoS at a
Pool level, VSM level, or Storage Volume level.
Report
Detailed information related to configuration. Use Configuration Reports for component configuration details.
Dynamic Reports provide QoS statistics.
Rest APIs
Every action performed at ElastiStor admin console translates into a REST based API call in the back end. This
enables administrators to fully manage ElastiStor from their portals. CloudByte plugin for VMware vCenter (also
based on REST API) enables storage management from vCenter.
Shared Disks
A High Availability setup where you have a common set of disks shared between primary and secondary nodes.
The disks can be either hard disks or iSCSI disks.
Shared Storage
Storage devices that are connected to and used by two or more systems.
Site
Represents a data center or part of a data center. Building storage infrastructure starts with the creation of Site.
It is the fundamental infrastructure unit where your controller, storage, and network infrastructure reside.
Snapshot
Storage Capacity
The overall disk space (and not the free disk space).
Striping
Writes data across two or more disks in an array but utilizes only a part of the space on each disk. The amount of
space used by stripe on each disk is always the same. A virtual disk may write several stripes on the same set of
disks in the array.
312
Terms
Description
Synchronous Replication
The process of writing the same data to two separate volumes, stored on different physical hardware, before the
application receives an I/O complete message. This results in both the volumes being always in sync.
Takeover
The process of taking over the storage control activity from a node. Typically, when there is a downtime on the
primary node, the secondary node takes over the control of storage.
Thin Provisioning
The process of optimizing efficiency of using the available storage space. It is the allocation of disk storage space
flexibly among multiple users, based on the minimum space each user requires at any given time.
Throughput
Amount of work a system can perform at specific intervals. It is also the amount of data moved successfully from
one place to another in a given time period.
Virtual Storage
Machine(VSM )
VSM Architecture
Unique to CloudByte ElastiStor, this is a patented architecture. In a Storage Controller, each application is fully
isolated across all storage stack levels and unified under a Virtual Storage Machine (VSM). VSM isolation allows
controller resources allotted to applications to be easily monitored, controlled, and provisioned.
VMware vSphere
client
A Microsoft Windows desktop application that enables you to access VMware ESXi and VMware vCenter.
ZFS (Zettabyte File ZFS is a 128-bit file system that provides features such as data integrity verification, disk management, snapshots,
System)
and transactional operations.
313