Beruflich Dokumente
Kultur Dokumente
Information in this document is subject to change without notice. The software described in
this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of
this publication may be reproduced, stored in a retrieval system, or transmitted in any form or
any means electronic or mechanical, including photocopying and recording for any purpose
other than the purchaser's personal use without the written permission of CloudByte Inc..
CloudByte Inc.
20863 Stevens Creek Blvd, Suite 530
Cupertino, CA 95014
USA
1-(408)-604-9401
engage@cloudbyte.com
www.cloudbyte.com
CONTENTS
Intended audience
Knowledge prerequisites
CHAPTER II Introduction
12
12
12
Licensing policy
16
17
Installation
17
18
Installation options
18
20
Installing ElastiCenter HA
27
33
33
34
38
Authentication
38
39
40
Creating a Site
44
Creating an HA Group
44
Adding a Node
46
47
Creating a Pool
52
Creating an Account
55
56
Provisioning a VSM
56
61
62
63
64
67
Provisioning storage
68
71
78
89
92
94
102
107
78
109
109
Monitoring
114
118
121
Introduction to RESTAPIs
121
121
121
126
Monitoring QoS
129
QoStips
130
131
138
138
144
149
152
153
157
VLAN interface
157
SASmultipathing
159
162
CHAPTER XI Glossary
163
CHAPTER I
In this chapter
l
Intended audience
This guide is designed to be a study resource for ElastiStor Certified Professionals. It is a step-by-step training manual to learn and
start using CloudByte ElastiStor.
However,
l
If you are already an ElastiStor user, we recommend you to follow the CloudByte ElastiStor Installation and Administration
Guide.
If you are searching for information on CloudByte and its product line, follow the resources available on the CloudByte Website.
Knowledge prerequisites
You can perform almost all the tasks, while working with CloudByte ElastiStor, using the simple and intuitive management console
CloudByte ElastiCenter. So if you are conversant with the storage concepts, working with ElastiStor is a cakewalk.
As far as the technology is concerned, CloudByte expects the users to have prior knowledge in the following areas of technology:
Basic concepts
Basic storage concepts which include
DAS, NAS, and SAN. That is, you have
good understanding of the underlying storage protocols such as iSCSI, NFS, and
CIFS
Advanced concepts
l
SAN boot
Don't worry if you are not familiar with any of the areas mentioned here. Use the following links to familiarize yourself with the technologies or reaffirm your knowledge.
Section
DAS
NAS
SAN
Resource
l
http://en.wikipedia.org/wiki/Direct-attached_storage
http://searchstorage.techtarget.com/definition/direct-attached-storage
http://www.dellstorage.com/data-consolidation/storage-architecture/direct-attached-storage.aspx
http://en.wikipedia.org/wiki/Network-attached_storage
http://compnetworking.about.com/od/itinformationtechnology/l/aa070101a.htm
http://www.techopedia.com/definition/26197/network-attached-storage-nas
http://www.thinkmate.com/storage/reference/what-is-nas
http://en.wikipedia.org/wiki/Storage_area_network
http://en.wikipedia.org/wiki/Logical_unit_number
RAID
http://searchstorage.techtarget.com/essentialguide/LUN-storage-Working-with-a-SANs-logical-unit-numbers
http://searchstorage.techtarget.com/definition/logical-unit-number
http://en.wikipedia.org/wiki/RAID
http://en.wikipedia.org/wiki/Standard_RAID_levels
http://www.webopedia.com/TERM/R/RAID.html
RAIDCard
http://www.netdevgroup.com/support/documentation/NETLAB_Remote_PC_Guide_Vol_2b_Dell_
R720.pdf
Link Aggregation
http://en.wikipedia.org/wiki/Link_aggregation
http://www.thomas-krenn.com/en/wiki/Link_Aggregation_and_LACP_basics
http://en.wikipedia.org/wiki/Virtual_LAN
http://searchnetworking.techtarget.com/definition/virtual-LAN
http://www.techopedia.com/definition/4804/virtual-local-area-network-vlan
VLAN
Section
Resource
SANBoot
http://support.microsoft.com/kb/305547
http://www.youtube.com/watch?v=--afdH7kIfk
SASSwitch
l
l
Multipathing
l
l
REST API
http://www.redbooks.ibm.com/redbooks/pdfs/sg247958.pdf
http://www.lsi.com/products/pages/lsi-sas-6160-switch.aspx
http://en.wikipedia.org/wiki/SAS_%28software%29
http://en.wikipedia.org/wiki/Multipath_I/O
http://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.vsphere.storage.doc%2FGUIDDD2FFAA7-796E-414C-84CE-1FCC14474D5B.html
http://en.wikipedia.org/wiki/Representational_state_transfer
http://www.restapitutorial.com/
http://stackoverflow.com/questions/2217758/what-is-a-rest-api
Days
Advanced user
One
Intermediate user
Three
Five
Since CloudByte wants to include all catagories of trainees, the courseware is designed as a five day long training program.
Only entry level trainees need adhere to the schedule.
Courseware
Schedule
Chapter 1
Course Description
What is ElastiStor
l
What is ElastiStor
Features
Licensing policy
Chapter 2
Installing ElastiStor
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
10
Accessing ElastiCenter
ElastiCenter UI orientation
Setting up Storage
ElastiStor infrastructure
l
Physical infrastructure
Virtual infrastructure
Setting up protocols
Connecting to ElastiStor
Delegated administration
Management
Global Settings
Monitoring
Reporting
HA
Backup and DR
Schedule
Chapter 9
Chapter 10
Course Description
Advanced settings and Implementation
l
CloudByte Plug-ins
11
CHAPTER II Introduction
CHAPTER II
Introduction
Agenda
l
12
Delegated Administration
A much requested feature from the cloud service providers, delegated administration empowers both CSPs and its customers to
monitor and control storage volumes. Management privileges vary based on the admin functionality for example, a super admin can
manage the entire storage cluster, where as a customer admin can manage just the storage resources allotted to that particular customer.
References
13
CloudByte ElastiStor
ElastiStor resources
CHAPTER II Introduction
14
ElastiStor supports both NAS and SAN protocols. It is intended for use wherever applications need storage in the form of NAS and
SAN. Also, it is apt to use ElastiStor if the environment is shared in the form of server virtualization and applications that run on the
VMs compete for storage resources.
ElastiStor is a new class of storage, built ground up, to meet the requirements of shared environments such as public or private
Cloud. Multi-tenancy and secure isolation between tenants are part of the architecture and not just add-on features.
15
CHAPTER II Introduction
Licensing policy
You need to install a license file to use CloudByte ElastiStor.
When you install the community edition of ElastiStor, license file is already
uploaded to ElastiCenter. You can use the product till you exceed the Storage
limit of 25TB.
Perpetual
16
Installing ElastiCenter: Install the administrative infrastructure used to manage the Nodes.
Installing Nodes: A Node is the storage infrastructure that is managed by ElastiCenter. You can install only one Node per
machine. An HA Group can have up to four Nodes.
The connectivity between Controller and Storage is either on Ethernet (iSCSI) or on SFF-8088 SAS cables.
ElastiStor OS is built using FreeBSD 9 as the base platform and therefore CloudByte ElastiStors Hardware Supported List is
similar to that of FreeBSD 9 Release version.
17
Supported AMD64, Intel 64 (x86-64), or i386 Processor and System Board (with Dual Core Processor and 8GB of RAM)
One or more SAS HBAs, depending on the number of disk arrays connected
OS boot disk drive size of 20 GB. However, the recommended size is 2.4 * RAM size + 33GB
Supported AMD64, Intel 64 (x86-64), or i386 Processor and System Board (with Dual Core Processor and 8GB of RAM)
OS boot disk drive size of 20 GB. However, the recommended size is 2.4 * RAM size + 33GB
i386 Processors and System Boards of CloudByte ElastiStor, see FreeBSD 9.0 supported list of i386 Processors
Disk Controllers of CloudByte ElastiStor, see FreeBSD 9.0 supported list of Disk Controllers
Ethernet Interfaces of CloudByte ElastiStor, see FreeBSD 9.0 supported list of Ethernet Interfaces
Description
Host
Root Password
The password assigned to the root account. When you are in single-user mode, the system lets you log in
using this password.
IP address
Net Mask
Gateway
DNS
The standard IPv4 address of the DNS server, for example 8.8.8.8.
Search
Installation options
The installation wizard provides the following installation options.
n
18
Only ElastiCenter: Installs only ElastiCenter, which is the central administrative console to manage your Nodes. Choose if
you prefer to install Node later. For procedures, see Installing CloudByte ElastiCenter.
Only Node: Installs only the Node, which is managed using ElastiCenter. Choose if you prefer to install ElastiCenter later.
For procedures, see Installing Node.
Both ElastiCenter and Node: Installs both ElastiCenter and Node. This installation is not recommended for production
deployments. For procedures, see Installing both ElastiCenter and Node.
19
By default, the boot option Boot CloudByte ElastiStor is selected. So you need not interfere. To select a different boot option,
see "Boot options".
The Welcome screen appears.
20
21
3. Select Both ElastiCenter and Node option. For details, see "Installation options"
Note: If you want to install ElastiCenter HA, follow the procedures in "Installing ElastiCenter HA", else select Standalone
ElastiCenter.
4. (If you have multiple disks) At prompt, select the disk where you want to install CloudByte ElastiStor.
22
5. (If you have multiple Ethernet Interfaces) At prompt, select the Ethernet Interface and click OK.
23
8. Select Continue to confirm the settings so that the installation can start up. To modify any of the values, select Back. Installation starts and the wizard shows the progsress.
24
10. Confirm the country and then confirm the time zone.
25
After installing the packages, CloudByte ElastiStor reboots (indicated by the following screen).
Wait till the system automatically reboots. The following screen welcomes you after the reboot:
26
The following screen with a login prompt indicates that installation is successful. You can proceed to configure CloudByte
ElastiStor.
Installing ElastiCenter HA
1. Follow the procedures in the section "Installing ElastiCenter" till step 3.
2. Select ElastiCenter HA.
27
28
Select primary ElastiCenter and then in the following screen, specify the ElastiCenter Management IP address.
Select Secondary ElastiCenter and then in the following screen, specify the primary ElastiCenter IP address.
4. Click OK.
5. Follow the procedures from step 4 in the section "Installing ElastiCenter" and complete the ElastiCenter installation process.
Installing ElastiCenter
Installing Node
29
Minimum
Recommended
RAM
1 GB
8 GB or higher
Hard Disk
20 GB
(2.4 X RAM size + 32 GB) or higher. For example, if the RAM is 8 GB, for better performance, 52 GB
or higher is recommended
If you do not comply with the recommended hard disk memory, you might encounter a message that prompts correction (for
better performance). However, if you meet the minimum memory requirements, even if you ignore the message, installation
will be successful.
I get the message 'Installation cannot proceed as no NIC is present'. What will I do?
You encounter this issue because the NIC that you use is not supported. For a list of supported NICs and other hardware,
see the Hardware Compatibility List .
30
I get the message 'Installation cannot proceed as no disk is present'. What will I do?
This is because the internal RAID/SAS card in the server is not supported. For a list of supported disks and other hardware,
see the Hardware Compatibility List .
Why am I not able to access the system after the first reboot post installation?
Verify the following:
n
ElastiStor has correctly rebooted. This is indicated by the root login prompt when the installation concludes.
31
32
CHAPTER IV
In this chapter
l
To illustrate, let us examine the processing of a file recovery request for a particular
storage tenant using a legacy solution and CloudByte ElastiStor:
Legacy solution
CloudByte ElastiStor
In CloudByte ElastiStor, using ElastiCenter, the administrators can perform
actions remotely from the management portal. The administrator can, from the
same browser session,
1. Log in to the primary site.
The following illustration shows the workflow to setup a storage environment using CloudByte ElastiCenter:
33
Navigation pane
The navigation pane in the left-hand side of ElastiCenter provides a list of options.
When you select an option, you are taken to a specific component page. Use the component pages to perform various configuration
and management tasks.
34
Note:The options displayed in the navigation pane depend on the administrative privileges you have. If you are a super administrator, you have all the options. For further details, see"Managing | Monitoring | Reporting".
Content pane
The content pane displays the component pages that provide options and data to configure CloudByte ElastiStor. For example, if
you select Sites in the navigation pane, the Sites page appears.
35
Summary pane
Summary pane sums up the number of storage components, such as Sites or Pools, in the storage infrastructure.
Actions pane
Action pane, in the right-hand side of the content pane, provides a list of configuration options. For example, in the HA Groups page,
go the Actions pane and add Node.
36
Notification menu
The information menu in the top right-hand side of ElastiCenter lets you access Alerts, Events, Reports, and Administrator data.
You also have the option to go back to the Home page.
Admin options
The Admin options help you with various administrative tasks.
37
See Also:CloudByte ElastiStor API Reference, "Licensing" on page 1, and "Delegated administration" on page 1
Note:Ensure that you have updated Adobe Flash Player to the most recent version.
To access ElastiCenter,
1. Launch Mozilla Firefox Web browser.
2. Specify the URL in the following format: https://IP Address
Note:The IP Address you specify is the one that you configured in the installation screen. See Installing CloudByte
ElastiCenter for details.
Authentication
You need credentials (username and password) to log in to CloudByte ElastiCenter.
1. After installation is completed, launch ElastiCenter using the URL in the following format: https://IP Address.
38
Value
Username
admin
Password
password
Update your profile. CloudByte Technical Support might use this information to contact you when your storage infrastructure
encounters any issues.
Review the auto-alert details that CloudByte Technical Support collects automatically. Technical Support might use the
information to resolve potential problems that your storage infrastructure encounters. You have the option not to share particular information.
39
1. Login to ElastiCenter using the default credentials (admin|password). The following screen appears:
The following illustration shows how your infrastructure and account are organized in CloudByte ElastiStor:
40
Site
Building your storage infrastructure starts with the creation of a Site, the fundamental infrastructure unit where your Node and storage and network infrastructure reside.
The following figure depicts the structure of a Site:
41
Accounts
After you set up the storage infrastructure, build the account infrastructure. That is, you set up the client/customer for using your storage infrastructure.
The following figure explains how an account is constituted in CloudByte ElastiStor:
42
43
Creating a Site
Use the Sites page (ElastiCenter > Sites) to create a Site.
The Sites page provides a graphical representation of the Sites that you have created. It provides the Site details such as HA
Groups, Pools, Provisioned Storage, and VSMs that you have set up.
Click any of the Site details link for specific review and configuration. For example, click HA Groups to access details of the HA
Groups associated with the Site.
To create a Site
1. In the Sites page, click Add Site in the actions pane.
The Add Site page appears.
Description
Name
Location
Description
3. Click Add.
Creating an HA Group
Use the HA Groups page (ElastiCenter > HA Groups) to create an HA Group.
All Nodes in the HA group you create must be on the same
44
Creation of HA Groups leads to the formation of High availability Clusters. For details, see "High Availability | Backup | Recovery"
1. In the HA Groups page, click Add HA Group.
The Add HA Group page appears.
Description
The Site to which you add the HA Group.
Unique name for the HA Group.
Meaningful description for the HA Group.
Provide a range of dedicated IP addresses in the management network. For instance, ensure
that you do not specify the IP address used for Node, ElastiCenter, VSM, or client. Provide the
first and last IP address in the range, for example 1.1.1.100 and 1.1.1.104. The IP addresses
you specify are used to check the heartbeat between nodes.
45
5. In the following page, click edit and then change the details.
6. Click Save.
Adding a Node
1. In the ElastiCenter navigation pane, click Nodes.
2. In the actions pane, Click Add Node.
46
Description
Select a Site.
HA Group
Name
IP Address
Note: When you attach a new Disk Array to a Node, click Refresh Storage/Refresh Hardware to make the Disk Array visible
on the ElastiCenter.
47
48
2. Click Configure A New Disk Array. The Disk Array Configuration page appears:
3. Specify the Name, Bay Alignment, Number of columns and Number of Rows. For details, see "Configuring Disk Array
enclosure"
4. Click Next and then do the following:
l
Click the option under the column Blink. For details, see "SCSI Enclosure Service"
Specify the bay location for the disks from the drop down list under the column Bay.
49
5. Click Apply. On successful configuration, the Node page appears with a representation of the shared storage:
Note:You can also partially configure a Disk Array Enclosure. Suppose you have 12 disks, you can initially configure around
8 disks and other 4 disks can be configured as per the requirement.
Configuration details
Horizontal and vertical alignments
The Disk Arrays can be idealized either in terms of horizontal or vertical alignments.
The following figure represents a vertical alignment:
50
Slots per row is the number of disks each row can accommodate. For example, three slots per row implies that a single row can
accommodate three disks.
51
Blink identification
Blink identification LED on the disk slot of a disk array. When you click Blink, at the physical location of the disks, the identification
LED in the specified disk slot blinks. If the disk is not in the SCSI enclosure, the LED blink does not occur.
If the disk is in the SCSI enclosure and still if the blink does not occur, verify the health of the disk.
State in which the component is, such as critical, non-critical, OK, or unrecoverable
Specific alerts are generated for the following enclosure components: power supply, voltage sensor, current sensor, and temperature sensor.
By default, CloudByte sends alerts over mail to the email you specified when you updated your profile the first time you logged in to
CloudByte ElastiCenter. To expand the mailing list, add the IDs separated by comma in the Global settings (Information Pane >
Admin > Global Settings > alert.email.addresses).
To view alerts in CloudByte ElastiCenter, click Alerts in the information pane.
Creating a Pool
1. Go to the Node page (ElastiCenter > Nodes).
2. From the list of Nodes, select the one for which you create the storage Pool.
3. In the actions pane, go to the section Tasks and then click Add Pool.
52
4. Select the Site, HAGroup, and CBNode to which the Pool belongs.
5. Specify a name for the Pool and then click Next.
6. In the following screen, specify the RAID storage type and then choose one or more of the available disks.
7. (Optional) Enable Sector Size.
Note: For optimal performance, ensure that the disks in the same Pool belong to the same disk array.
53
54
Description
Total IOPS The maximum per second I/O limit for a Pool.
Average
Latency
The desired average latency in milliseconds per I/O. Latency is the round-trip time per I/O request-response as measured
by the client.
Configuring Spare
1. Go to the Pools page (Navigation pane > Pools).
2. In the Actions pane, click Manage RAIDConfiguration. The Disk Group page appears.
3. In the Actions pane, select Add Spare.
4. In the Add Spare page, select a disk from the drop-down list.
5. Click Add.
Migrating a Pool
You cannot migrate a pool. Only a VSM can be migrated.
Creating an Account
Use the Account page (ElastiCenter > Accounts) to create an Account.
1. Click Add Account. The Add Account page appears.
Description
55
Name
Description
Assign Admin
Select the type of administrator that you want to create. When you select an administrator type, the
username and password fields appear. For details, see s
3. Click Add Account. The Account is created. The wizard prompts you to continue and provision VSM.
4. Click Provision VSM to continue.
Provisioning a VSM
Use either the Create Account wizard or Virtual Storage Machines page (ElastiCenter > Virtual Storage Machines) to provision
VSM.
1. Click Provision VSM.
56
Description
Account
Name
Capacity
Total IOPS
Total
Throughput
When you specify the Total IOPS, CloudByte calculates the Total Throughput and is automatically added. You cannot edit
this field.
3. Click Next and then specify the provisioning details by selecting a Pool from the list.
57
4. Click Next.
5. Select the network interface details. For details, see "Advanced settings | Implementation ".
6. Specify the tenant IP address and default gateway.
58
7. Click Provision.
Multipathing
Multipathing is the ability to configure a server with multiple paths to the storage for take over on network failure. CloudByte
ElastiStor supports multipathing for iSCSI. When network failure occurs, redundant network takes over and ensures that the iSCSI
LUN is available.
Note: SATA disks or any disk with SATA interface is not supported for HA and multipathing configuration.
The details of the supported Maximum Multiple Connections (MCS) per LUN are as follows:
n
To enable multipathing,
1. In ElastiCenter, select Virtual Storage Machine.
2. In the VSM page, select the VSM for which you want to enable multipathing.
3. In the action pane, select Advanced Settings.
4. Click Edit.
59
60
Field
Description
Secondary IP address
Secondary Interface
6. If partial failover of Pool is enabled (which is enabled by default), click yes at the prompt to disable it.
Note: In the example, you can increase the value up to 100 (which means, the entire IOPS is consumed).
61
4. Click the Edit icon and then modify the editable fields.
5. Click Apply.
62
5. Click Save.
63
Note:The quota of the Storage Volume cannot exceed the VSM size.
Across Sites.
Note:When you migrate a VSM across Nodes, ensure that the Node to which the migrating VSMbelongs to is not down.
1. In the VSM page, select a VSM from the list.
2. In the Actions pane, go to Migrate and then click Schedule.
64
Field
Description
Site
IOPS
The IOPS of the primary VSM is populated by default. You can modify the
value to provision IOPS required for migration.
Throughput
4. Click Next.
5. Select the Pool to migrate VSM and then click Next.
65
6. Select the Backup interface, IP Address, and schedule of migration (in the format minutes/hours/days/month/year).
66
The backup interface and IP address range of the native and the migrant VSMs must be same.
Note:After activation, this backup IP address will not be active and therefore need to be removed at the Pool level.
1. In the migrant VSM page, click Settings in the Actions pane.
2. In the Settings page, click Edit and then select an interface from the drop-down list.
3. Click Save.
67
4. Click the VSM, the Migrant VSM, and then click Activate.
Provisioning storage
l
The maximum supported size of the Storage Volume depends on the available capacity of VSM.
There is no limit to the number of Storage Volumes that you can create. But the composite capacity of the created Storage
Volumes must be less than or equal to the capacity of the VSM they belong to. For example, if the total capacity of the VSM
is 1 TB, then you can create a Storage Volume with the capacity of 1 TB or multiple storage volumes where the total capacity
of all volumes is less than or equal to 1 TB.
You can enable both compression and deduplication on the same Storage Volume.
File system storage (NFS and CIFS) works together on the same Storage Volume, but block level storage (iSCSI) does not.
You can back up Storage Volume by creating snapshots and then rolling back when required.
Note:By default, ElastiStor Storage Volume is thin provisioned. You can expand the Storage Volume up to the size of the
Pool, provided the Pool has available storage.
Use the Storage Volumes page (ElastiCenter > Storage Volumes) to provision storage.
68
Description
Account
Name
Capacity
69
Provision
Mode
Shared or Dedicated. For details, see the section Difference between Shared and Dedicated in "Frequently Asked
Questions".
Block Size
Average
Latency
Desired average latency in milliseconds per I/O. Latency is the round trip time per I/O request-response.
Control IOPS
Select the required IOPS using the slider. Qos can be enforced either throughonly IOPS or only Throughput.
Control
Throughput
Select the required throughput using the slider. Qos can be enforced either throughonly IOPS or only Throughput.
4. Click Next and then select the VSM on which you want to provision the Storage Volume.
70
Description
Volume Hierarchy
Parent Dataset
Record Size
Synchronization
Deduplication
Compression
Mount Point
(Applies only for NFS and CIFS) Specify the Storage Volume mount point for the client to use the storage.
Enable NFS
Enable CIFS
Enable iSCSI
7. Click Provision.
71
Auto-Provisioning
Auto-provisioning is particularly helpful when you have innumerable Pools/TSMs. CloudByte ElastiStor chooses the appropriate
Pool/TSM for provisioning automatically.
To auto-provision a VSM/Storage Volume,
1. In ElastiCenter, select Global Settings.
72
73
74
75
Description
Parity: p=1 for RAID-Z1, p=2 for RAID-Z2 and p=3 for RAID-Z3 where RAID-Z1 = 3, 5, 9, 17, , RAID-Z2 = 4, 6,
10, 18, , RAID-Z3 = 5, 7, 11, 19,
76
77
Connect to ElastiStor
iSCSI
CIFS
NFS
When you create a Storage Volume, you are provided with an option to select the access protocols that you want to enable.
Deleting a Storage Volume disables the protocol access services automatically.
The following sections help you configure data access protocols supported by CloudByte ElastiStor.
iSCSI concepts
Authentication Group: A grouping of multiple iSCSI users.
Use this option if you use CHAP or mutual CHAP. You can configure Authentication group at both VSM and Storage Volume levels.
CHAP: An authentication method which uses a user/secret or IQNs for outgoing authentication. The Storage Volumes on
CloudByte ElastiStor authenticate the initiator.
Mutual CHAP: A super set of CHAP which uses peer user/peer secret for outgoing/incoming authentication between Storage
Volumes and initiator.
Initiator group: Defines who can initiate the LUN.
It is a combination of multiple IQNs. By default, CloudByte ElastiStor creates two initiator groups (all where everyone can initiate the
LUN and none where no one can). After you create the Storage Volume, when you manage the iSCSI options, you are prompted to
choose an initiator group. You can either select the default one or the ones that you create. You configure initiator group in the Storage Volume.
78
Account
VSM
Storage Volume
The following figure illustrates the work flow for configuring the iSCSI protocol options:
79
80
In the Add Authentication Group dialog box, specify the following details:
Field
Description
Name
Description
CHAP Username
Username for CHAP authentication. For uniqueness, specify the initiator IQN name as username.
CHAP Secret
Password for CHAP authentication in alpha-numeric format. The password must have 12 to 16 characters.
Username for mutual CHAP authentication. For uniqueness, specify the initiator IQN name as username. The
value must be same as that of the CHAP user.
Password for mutual CHAP authentication (should be different from CHAP secret). The password must have
12 to 16 characters.
Initiator Groups
In the Add Intiator Group dialog box, specify the following details:
Field
Description
Name
Allowed Intiator
Authorized Networks
List of allowed networks followed by subnet mask in the format 10.0.0.0/8, separated by comma.
Description
IQN Name
Number of
worker threads
Discovery Auth
Method
Discovery Auth
Group
Timeout
Sets the limit on how long an I/O can be outstanding before an error occurs. Values range from 0 to 300. The default
value is 30.
NOPIN Interval
The frequency of sending a NOP-IN packet in seconds. The values range from 0 to 300. The default value is 20.
81
MAX R2T
Max Sessions
Max Connections
First Burst
Length
Maximum data in bytes that an iSCSI initiator may send to the target during the execution of a single iSCSI command
unsolicited. Values range from 1 to 2^32 with a default of 65,536.
Max Burst
Length
Maximum WRITE size in bytes the target is willing to receive between R2Ts. Values range from 1-2^32. The default
value is 262,144.
Max Receive
Data Segment
length
Maximum number of ready to receive packets (R2Ts) the target can have as outstanding. This is for a single iSCSI
command,where larger values should yield performance increases until MaxOutstandingR2T exceeds the size of the
largest Write I/O divided by MaxBurstLength. Values range from 1 to 255. The default value is 16.
Default time to
wait
Minimum time in seconds to wait before attempting a logout or an active task reassignment after an unexpected connection termination/reset. Values range from 1 to 300. The default value is 2.
Default time to
retain
Maximum time in seconds after Time2Wait before which an active task reassignment is still possible after an unexpected connection termination/reset. Values range from 1 to 300. The default value is 60.
Description
Status
IQN Name
Authentication
Method
Authentication
Group
Initiator Group
Initial Digest
Queue Depth
Pending I/O requests for the Volume. The values range from 0-255. 0 implies that the status disabled. The default
value is 32.
Configuration scenarios
The following scenarios explain iSCSI configuration in detail:
82
Scenario 1: Assigning the same iSCSI initiator groups to two Storage Volumes under a VSM
iSCSI initiator groups can be configured for only Storage Volumes based on initiator groups in the account. For example, Storage
Volumes under the VSM can have different iSCSI initiator groups.
For procedures, see "Configuring initiator group and restricting access"
Scenario 2: Assigning different authentication groups to multiple Storage Volumes under a VSM
You can have different authentication groups for VSMs and Storage Volumes.
For procedures, see "iSCSI authentication workflow"
83
Data access to the iSCSI Storage Volume can be restricted to either a single machine or to multiple machines in a Subnet.
Field
Name
Description
Unique name of the initiator group.
84
Allowed Intiator
List of IQNs, separated by comma for restricting the access to iSCSI Storage Volume from multiple machines
in a Subnet.
Authorized Networks
List of allowed networks, followed by subnet mask in the format 10.0.0.0/8, separated by comma.
6. Click OK.
7. In the Storage Volumes page, select the Storage Volume to which you want to assign the initiator.
8. Select Manage iSCSI Configuration (Actions pane > Tasks).
9. Click Edit, enter the required details, and then save the changes.
10. In the Confirmation dialog box, click Modify.
85
86
Field
Name
Description
Description
A unique name for the authentication group.
A meaningful description for the authentication group.
CHAP Username
Username for CHAP authentication. For uniqueness, specify the initiator IQN name as username. CHAPis
an authentication method which uses a user/secret or IQNs for outgoing authentication. The Storage
Volumes on CloudByte ElastiStor authenticate the initiator.
CHAP Secret
Password for CHAP authentication in alpha-numeric format.The password must have 12 to 16 characters.
Mutual CHAP
Username
Username for mutual CHAP authentication. For uniqueness, specify the initiator IQN name as username.
The value must be same as that of the CHAP user. Mutual CHAP is a super set of CHAP which uses peer
user/peer secret for outgoing/incoming authentication between Storage Volumes and initiator.
Mutual CHAP
Secret
Password for mutual CHAP authentication (should be different from CHAP secret).
Description
6. In the Storage Volumes page, select the Storage Volume for which you want to assign the authentication group.
87
8. Click Edit, enter the required details, and then click Save. In the following screen, you have selected CHAPas the authentication method.
88
Note: The following documentation is for Windows Server 2008. The procedures are similar for other versions of Windows
Server. However, there might be minor variations owing to the differences in UI strings and navigation.
1. On Windows Server, select Multipath I/O and then click Install (Server Manager Console > Add Features Wizard).
Note: This step can be skipped if Multipath I/O is already installed.
89
90
4. Click Add.
91
In the Network Interface Cards page (Nodes> Network Interface Cards), configure static IP addresses for each interface to configure multipath as shown in the following screen:
92
Procedures
1. In the VSMs page, click Provision VSM and then complete the procedures to create a VSM.
2. Select the provisioned VSM and then in the VSM page select Advanced Settings.
3. In the Advanced Settings page, click Edit.
4. In the following screen, provide the required details and then click Save.
Field
Secondary IP Address
93
Description
Alternate IP Address to configure multipath for a single LUN.
Secondary Subnet
Secondary Interface
2. Select a target that uses MPIO and then click Log On (iSCSI Initiator Properties page > Target).
1. Select the option Automatically restore this connection when the computer starts.
2. Select the option Enable multi-path.
3. Click Advanced.
94
First Subnet of the DiskStation (both the IP addresses of the initiator and the target are within the same Subnet)
95
96
2. In the Advanced Settings page, check the following and then click OK.
97
Microsoft iSCSIinititator
Second Subnet of the DiskStation (both the IP addresses of the Initiator and the Target are within the same Subnet)
98
99
100
6. Select a load balance policy and then click OK. The following screenshot shows Round Robin with Subset as the Load balance policy.
101
102
Configure VSM CIFS options at the VSM level. File system CIFS options can be configured at the Storage Volume level (if you have
enabled the protocol option).
Description
Authentication Model
NetBios Name
Server Description
Workgroup
DOS Charset
The character set that is used while communicating with the Windows clients. The default is CP437
UNIX Charset
Log Level
Sets the amount of log/debug messages that are sent to the log file. Default is Minimum. Keep it this
way for best performance unless more information is needed for troubleshooting.
Time Server
Determines whether or not ElastiStor advertises itself as a time server to Windows clients.
103
Description
Status
If Enabled, CIFS Share can be accessed. If NFS is enabled on a Storage Volume, you can access CIFS share by setting
Status to enable.
Name
Description
Read Only
Browseable lected, client has to explicitly specify the full server path in Windows Explorer.
Inherit Permissions
If selected, permissions on new files and directories are inherited from parent directory.This option is (particularly) helpful
in scenarios where there are large systems with many users involved. Inheriting permissions let a single home share to
be used flexibly by each user. Leave this unselected if Type of ACL is set to Windows in the Volume's permissions.
Recycle Bin
If selected, instead of purging the files, they are moved to recycle bin of CIFS share on deletion.
Hide Dot
Files
Dot files (unlike on UNIX) appear on Windows. Select the option to hide the Dot files.
Hosts Allow
Host-based protection feature. Comma-separated or space separated list of IP addresses that are allowed to access the
shares. If nothing is specified, the default value ALL applies.
Hosts Deny
Host-based protection feature. Comma-separated or space separated list of IP addresses that are denied access to the
file system. If you specify ALL, IP Addresses that are not listed in the Host Allow field are denied permission.
CIFSauthentication workflow
A CIFS Authentication Group is a grouping of multiple CIFS users. You can select the users who can access the CIFS share.
1. In the ElastiCenter, select Accounts.
2. In the Accounts page, select the account for which you want to specify the protocol options.
3. Select Manage CIFS Authentication Groups in the Actions pane.
104
105
Field
Description
Name
Description
User name
Password
Full name
6. In the VSM page, select the VSM for which you want to assign the authentication group.
7. Select Manage CIFS Configuration (Actions pane > Tasks).
8. Click Edit, select a Discovery Authentication Group from the drop-down list and then click Save.
106
107
Description
Single Network ID with subnet mask (for example,10.10.1.100/8). You can also provide a comma-separated
list of IP addresses for which access has to be provided (for example,10.20.10.120, 10.20.10.121) instead.
All Directories Yes the client can mount any sub directory within the Path.
Map as Root
Users
Read-only
6. Click Add.
108
Generate reports
Delegated administration
Administration in CloudByte can be categorized based on services. You can have administration at the Site level or at the Account
level. Your Site can have multiple Site administrators.
Note: Currently, CloudByte ElastiStor supports only role-based administration. Future releases will have delegated administration fully implemented.
As the root administrator, you can distribute the tasks to administrators. Delegated administration is an act of providing and restricting privileges by establishing access control based on the responsibility of each individual administrator.
n
Delegated administration lets you determine the actions that each administrator can take using administrative tools on different resources.
Delegated administration roles are mapped to administrative functions using security policies. You can create and maintain
separate administration capabilities, depending on your needs.
Role hierarchy enables you to keep a tight control on how delegation happens and who can delegate what to whom. One
administrator can create sub-roles for other administrators with limited administrative privileges.
Role hierarchy
The following is a pictorial representation of how role-hierarchy functions in CloudByte ElastiStor administration:
109
Administrator
Super administrator
Site administrator
Account super
dministrator
Account administrator
110
Can
Perform all possible actions across Sites, Accounts, and VSMs
Cannot
Not applicable
Delete/Modify/Create another Site administrator
View administrator
Generate reports
Note: You can only have one super administrator. Only the super administrator can change his/her password. Administrators
can change their password and passwords of administrators under them.
111
Email: Specify a unique email address for the Site administrator or View administrator
Delegated Admin Type:Select the type of Delegated Administrator from the drop-down menu
5. Click Next and then drag and drop one or more Sites for which you want to delegate administration as seen in the following
screen:
6. Click Add.
112
4. Specify the credentials for the administrator and then click Add Account.
113
4. In the Add Account dialog box, specify the details and then click OK.
Global Settings
Global settings let the administrator configure various options used to control CloudByte ElastiStor. For example, email configuration. To configure global settings,
1. In ElastiCenter, select Global Settings.
2. Select a target category. A list of settings is provided by default.
3. Edit the relevant settings.
Note: You cannot add new settings.
Monitoring
Monitoring provides an intuitive visualization of storage statistics.
Monitoring foregrounds relevant backend activities in an easy user interface for administrators. It provides a generic outlook of the
components such as storage, input/output, throughput, latest data, status, alerts, and system configuration.
Various dashboards dynamically represent disk utilization, storage utilization, throughput, input/output, and status of network interface cards attached to the system.
Alerts and Events feature keeps a regular check on what is happening with the product. All events - even adding an additional IP
address or modifying an existing one - get registered and monitored.
The feature also provides a notification system where the administrator is informed through email/text messages when an alert is
generated in the system.
Continuous monitoring of your network
114
Emailing alerts
The following settings in Global Settings let you email alerts:
l
By default , alerts are not emailed. To receive alerts over email, set alert.email.enable to true . The alerts are mailed
to the email that you specified when you updated your profile. For details, see "Reset password and configure auto-alert
options". To add multiple users, add the email IDs separated by comma in alert.email.addresses.
You can set a filter to the alerts mailed based on severity using the option alert.email.severity. By default, all alerts
are mailed (as the value set is 4).
To specify the sender email ID, use the option alert.email.sender. If you do not specify an ID, the ElastiCenter domain
name is displayed along with IP address of ElastiCenter.
115
Events
To get a list of ElastiCenter events,
1. In ElastiCenter, click Events.
2. Select Events in the Select View. All events are listed.
To get a list of specific events, go to the component page and then click Events. For example, for events related to only Storage
Volumes:
1. In the Storage Volumes page, select a Storage Volume for which you want to generate events.
2. In the following page, click Events in the actions pane.
Dashboard Alerts
Dashboard provides a visual representation of monitoring statistics such as performance, usage, capacity, and availability.
To see the details, select the component and then make a specific selection.
The following figure is a dashboard representation of the alerts
116
For Nodes: I/O Status of various disks, GMultipath status, and Camcontrol device list for all available disks
When you select an option, details are provided in a tabular format. To access the Troubleshooting option,
1. In the Node/Pool/VSM page, click a specific Node/Pool/VSM.
2. In the Actions pane, click Troubleshooting under Tasks.
117
Account QoS
Pool QoS
Account Storage
Pool Storage
Volume Usage
HA Group Info
Note: In future releases, you can define your own reports and add new report types.
118
119
To change the default settings for configuring email for reports, select Global Settings and then specify the details for the highlighted
options:
120
Introduction to RESTAPIs
CloudByte ElastiStor REST APIs provide a bundle of functions that encompasses all the features in the CloudByte ElastiStor
Administrator Console (CloudByte ElastiCenter). You do not need ElastiCenter to configure and manage CloudByte ElastiStor.
Rather you can use your own portal.
The CloudByte ElastiStor REST APIs provide powerful, convenient, and simple REST-based APIs which can interact with
CloudByte ElastiStor.
Click one of the following links to get a complete list of CloudByte ElastiStor REST APIs and documentation relevant to your administrative privileges:
l
121
3. From the list of Accounts, click the specific account for which you want to generate the API key.
4. In the following page, click Generate Keys.
5. Click Yes to confirm. The API key is generated and displayed as shown in the following screen:
122
Description
https://<ElastiCenter IP address>/client/api?
command=listSite
apiKey=UjGmN7gGwzMhFsSese3TNNOWiXHGn53eon_7sHx3aL-9_
t3sHAOV_rNqVzwTnrJyCaTAg9FucSBvMp49nbnfEQ
response=json
Apart from these, the URL also has the additional parameters (required or optional) for the command.
id: 66291daa-4c40-4462-8747-926ebc488963,
name: Bangalore,
location: India,
managedstate: Available,
currentUsedSpace: 29,
currentAvailableSpace: 9943,
currentTotalSpace: 9972,
currentThroughput: 605,
currentIOPS: 151,
currentLatency: 163,
currentThrottle: 20,
controllers: [
{
nodePools: 4,
id: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
clusterid: 88bf812b-5142-4780-8ad3-13178bbf30a1,
name: host1,
hostname: Both,
nodeTsms: 4,
ipaddress: 10.36.36.50
}
],
haclusters: [
{
id: 88bf812b-5142-4780-8ad3-13178bbf30a1,
haClusterPools: 4,
123
haClusterNodes: 1,
name: Cluster1,
haClusterTsms: 4
}
],
hapools: [
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 38e66579-bb91-3de3-815a-48c35e2c5943,
availiops: 50,
totalthroughput: 102400,
name: Pool1,
poolTsms: 1,
availthroughput: 51200,
totaliops: 100
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 226e2e02-a3e5-3609-b70d-aea8ef655f74,
availiops: 75,
totalthroughput: 153600,
name: Pool2,
poolTsms: 1,
availthroughput: 76800,
totaliops: 150
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 810f428d-9c26-3d91-8675-62cc3ca56da0,
availiops: 100,
totalthroughput: 153600,
name: pool3,
poolTsms: 1,
availthroughput: 102400,
totaliops: 150
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 11d6fd85-5782-39fe-b85d-079d73742757,
availiops: 175,
totalthroughput: 384000,
name: P4,
poolTsms: 1,
availthroughput: 179200,
124
totaliops: 375
}
],
tsms: [
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 1cb805fe-dd22-357e-b198-121fa08d0971,
availiops: 25,
totalthroughput: 51200,
name: T1,
ipaddress: 10.37.37.51,
availthroughput: 25600,
totaliops: 50
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 90a4e6f8-cb3c-317f-8cdf-3986e8759747,
availiops: 50,
totalthroughput: 76800,
name: T2,
ipaddress: 10.37.37.52,
availthroughput: 51200,
totaliops: 75
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: cab14af0-84b6-3761-900b-9675b32b6ba5,
availiops: 25,
totalthroughput: 51200,
name: T3,
ipaddress: 10.37.37.53,
availthroughput: 25600,
totaliops: 50
},
{
controllerId: 4c6e2246-52c1-3227-b51a-9928cf3b675a,
id: 17b17719-137d-3f95-9f4f-468a17a45957,
availiops: 100,
totalthroughput: 204800,
name: T4,
ipaddress: 10.37.37.54,
availthroughput: 102400,
totaliops: 200
}
125
]
}, {
id: 74692191-75a9-4294-9b1e-402127c9e327,
name: test,
managedstate: Available,
revisionnumber: 0,
currentUsedSpace: 0,
currentAvailableSpace: 0,
currentTotalSpace: 0,
currentThroughput: 0,
currentIOPS: 0,
currentLatency: 0,
currentThrottle: 0
} ] } }
126
Easily commission storage with guaranteed IOPS at various levels. You can decide to configure QoS at a Pool level, VSM
level, or Storage Volume level.
Utilize untapped system resources. For example, assume that you have three VSMs but only one is active. In this case, the
active VSM can use the entire systems capability.
Configuration
Use ElastiCenter to configure QoS settings. The configuration can be at the following levels:
n
Configuring Grace
What is Grace
Grace is the provisioning of unused IOPS/throughput of Pools to Storage Volumes based on the performance requirements. You can
configure Grace at Pool level and Storage Volume level.
For example, assume that you have a Pool with the capacity of 100 IOPS and Grace enabled. Two VSMs named VSM A and VSM
B, with a capacity of 30 IOPS and 60 IOPS respectively are created under the Pool.
127
Under VSM A (with 30 IOPS capacity), Storage Volumes named E and F are created, and assigned 10 IOPS and 15 IOPS
respectively.
Under VSM B (with 60 IOPS capacity), Storage Volume G is created and assigned 35 IOPS.
128
3. Click Save.
Monitoring QoS
In the Storage Volume page, select the Volume for which you want to monitor QoS. The page that appears displays the monitoring
data.
129
QoStips
Storage capacity
Discs, storage connectivity, and type
Capability: Ensure that you are well aware of the capabilities of your storage subsystem. For example, the right interconnection
between the controller and storage, the type of disks on the disk array, and the ability to expand the capacity.
Limitations: Ensure that you have assessed the limitations. For example, increasing storage capacity does not make any sense if
the network does not support.
Controller characteristics
RAM, CPU, and network:
CPU: If the storage is more I/O bound than CPU bound, it is more effective. CPU load should not be more than 60-70 percent, or you
add more cores.
RAM: RAM determines the ability to cache. Larger RAM means more filesystem caches. In a READ-centric scenario, larger RAM
helps generate better QOS. That is, more I/O and throughput but lesser latency.
Network: Network capacity decides data access and data protection. Assure adequate network bandwidth to export performance to
clients. Network should do justice to the storage system.
Segregation: Segregate data access and data protection so that protection workloads do not interfere with data access workloads.
Pool creation
Storage group tips
As a best practice, create storage with 8 to 10 disks.
When you add storage groups, keep them identical. For example, do not add disparate groups to the same Pool. For example, if one
group has SATA disks and another group has SAS disks, then do not assign both to the same Pool. That is, do not create hybrid
Pools.
Optimizing QoS
Disk characteristics: Better the disk characteristics, better the QOS. For example, the IOPS, throughput, and latency of SATA
disks are not as good as that of SS disks.
Disk layout: Better the disk layout, better the QoS. For example, keep the disk layout to 8 to 10 disks.
130
Improving WRITE performance: If the application requires synchronous WRITES, associate high performing disk to the Pool to
speed up the WRITEs. This guarantees better QOS.
Improving READ performance: To improve the READ performance or increase the filesystem cache hit rate, add high performing
disks as cache devices to the Pool.
Concepts
IOPS
Description
Standard IOPS
This is the benchmarked IOPS. The details are as follows: 80 READ/20 WRITE, and 4K block size. This acts
as the frame of reference for QoS in CloudByte ElastiStor.
Operating IOPS
IOPS under a given workload that can be measured against the standard IOPS.
Pool IOPS
Provisioned IOPS
Illustration
Consider a Pool assigned with 1300 Standard IOPS. There are three Storage Volumes with the following conditions:
Storage Volume
Provisioned IOPS
Block Size
Workload (READ/WRITE)
Operational IOPS
Volume 1
500
4K
80% /20%
500
Volume 2
200
4K
100% /0%
170
Volume 3
400
4K
0% /100%
600
131
In the case of TSM 3 where WRITEs are more, operational IOPS exceeds the standard IOPS which demands the implementation of
penalty enforcement.
Description
qos.penalty.factor
qos.penalty.enforcement.timeinterval
read.multiplication.factor
cache.multiplication.factor
132
Read/write variation
CloudByte equates one WRITE to four READS. You can tune this on per pool basis if required.
Calculation
If standard IOPS are 100 at 80 READS/20 WRITES, the following is the formula to convert the operating IOPS into standard IOPS:
Operating
IOPS
At
READ/WRITE
Throttle at
(IOPS)
100
100/0
80 READS +20 READS (as READs occur in place of WRITEs). Here you convert 20 WRITEs
to READS. That is, 20x4=80 READs. The total standard IOPS that can be consumed is 80 +
80 = 160 IOPS.
160
100
80/20
80 READS + 20 READS
100
100
60/40
60 READs + 40 READs (as WRITES occur in place of READs). Here you convert 20 READs 85
to WRITEs. 20 READs are equal to 20/4=5 WRITEs. The total standard IOPS that can be consumed is 80+5 = 85 IOPS.
100
40/20
40 READs + 60WRITEs (as WRITEs occur in place of READs). Here you convert 40 READs
to WRITES. 40 READs are equal to 40/4=10 WRITEs. The total standard IOPS that can be
consumed is 40+10 = 50 IOPS.
50
100
20/80
20 READs + 80 WRITEs (as WRITEs occur in place of READs). Here you convert 60 READs
to WRITEs. 60 READs are equal to 60/4=15 WRITEs. The total standard IOPS that can be
consumed is 20+15 = 35 IOPS.
35
100
0/100
0 READs + 100 WRITEs (as WRITEs occur in place of READs). Here you convert 80 READs
to WRITEs. 80 READs are equal to 80/4=20 WRITEs. The total standard IOPS that can be
consumed is 0+20 = 20 IOPS.
20
X operating IOPS are converted to X1 after considering the block size variation
133
134
For example, if both Storage Volume 1 and Storage Volume 2 are committed to busy service round the clock, Dedicated
would be your choice. Whereas, if Storage Volume 1 and Storage Volume 2 represent services in a cross-geographical setup
where activities related to Storage Volume 1 end toward the time activities related to Storage Volume 2 start, Shared would
be your choice.
Do I have to set all the QoS parameters (IOPS, Latency, and Throughput)?
No. IOPS is a must. Depending on requirement, you can choose to configure Latency and Throughput.
What is the difference between IOPS, Latency, and Throughput?
l
Latency: Time that ElastiStor takes to acknowledge a READ/WRITE back to the client.
135
Workload access patterns such as sequential, random, read only, read write, write only.
Speed of the underlying disks, that is, if spinning disks such as SAS or SATA or faster ones such as SSDs
Dataset cached in the ZFS L1ARC caches and ZFS L2ARC caches.
Presence of Intent log ZIL to log the writes and respond quickly.
136
137
Handling disasters
Note: SATA disks or any disk with SATA interface is not supported for HA and multipathing configuration.
Same NIC (for example, if em0 is the interface used on one Node, the same should apply for all Nodes) and same capacity
Disks are shared (across the Nodes)
Procedures
The following procedures explain how to configure a two-way High Availability setup:
1. Set up your hardware. For details see "High Availability | Backup | Recovery"
2. Create a Site. For details, see "Creating a Site ".
3. Create an HA Group. For details, see "Creating an HA Group ".
When you specify the IP address range while adding the HAGroup, ensure that you specify a range that matches the number
of nodes you add.
4. Add a Node (Node1). For details, see "Adding a Node".
5. Label shared disks. For details, see "Configuring Disk Array enclosure"
Note: You can perform this step later, after you add all other Nodes. In that case, you have to refresh the hardware
(Nodes > select specific Node > select Refresh Hardware in the Tasks section of the action pane) for labeling to take
effect.
6. Add Node 2. For details, see "Adding a Node".
Now you have established a two-way HA. The following screen provides a visual representation of the configuration.
138
139
140
1. Select the Node that you want to bring to maintenance mode (ElastiCenter > Nodes).
2. In the Node Page, go to the actions pane and then click Move to maintenance icon.
Take Over
When Node failure occurs, takeover happens as illustrated in the following screens:
n
141
The following screen depicts the Node Page that lists a two-way HA. Here, Node2 is in maintenance mode.
Note: In ElastiStor, every Node has a designated partner. If the Node goes down, the resources of that Node are failed over
to the partner Node.
142
HA Jobs
To view the details of the past High Availability events, perform the following procedures;
1. (In ElastiCenter)In the HA Groups page, select an HA Group for which you want to view event details.
2. In the Actions pane, click View Jobs.
You can view the details of the past HA events and the time taken to perform these events as shown in the following screen:
143
Particularly helpful in scenarios such as site damage caused due to natural disasters.
144
Local backup
Disaster recovery is possible by either backing up at tenant level or dataset level in the case of remote replication.
Optimizing Disaster Recovery Point and Time Objectives
l
RPO depends on the scheduling done for Data Replication in remote tenants backup. In the best case, where it is scheduled
for every minute, RPO could be 1 minute of data.
RTO depends on how fast the administrator on the other site gets the information that he needs to activate the backup tenant.
Supports hybrid configurations involving data replication in high availability scenarios.Configuring local backup
Backup refers to copying and archiving of data. In the event of data loss, you can use the backup to restore the original data.
You can create a
n
Snapshot, which is a read-only virtual copy of your Storage Volume and VSM.
Backing up VSM
1. In ElastiCenter, select Virtual Storage Machines in the navigation pane.
2. From the list, select the VSM to create local backup.
3. In the following page, go to the Local Backup section of the Actions pane and then select either of the following options:
n
145
Add snapshot
1. In the Local Backup section, click Create Snapshot.
2. In the Create Snapshot dialog box, specify a unique name.
3. Click OK.
Add schedule
1. In the Local Backup section, click Add Snapshot Schedule. The Add Snapshot Schedule page appears.
2. Specify the following details and then click Add.
Field
Description
Name
Retention Copies
Schedule
Retentioncopies
Every 15 minutes
Every hour
24
Every day
30
146
4. In the Create Snapshot dialog box, specify a unique name for the snapshot and then click OK.
Restoring Snapshots
1. In ElastiCenter, select Storage Volumes in the Navigation pane.
2. From the list, select the Storage Volume to restore data.
3. In the following page, go to the Local Backup section of the actions pane and then click Manage Snapshots.
147
4. From the list of snapshots, select the one that you want to restore, click the restore icon, and then confirm at prompt.
Add schedule
1. In the Local Backup section, click Add Snapshot Schedule. The Add Snapshot Schedule page appears.
2. Specify the following details and then click Add.
Field
Description
Name
Retention Copies
Schedule
148
Creating a clone
1. In ElastiCenter, select Storage Volume in the navigation pane.
2. From the list, select the Storage Volume to create a clone.
3. In the following page, go to the actions pane and then select Local Backup > Create Snapshot.
4. In the Create Snapshot dialog box, specify a name and then click OK.
5. Click Manage Snapshot (actions pane > Local Backup).
6. From the list of snapshots, go to the one which you want to use as reference for creating the snapshot and then click the
Clone icon (highlighted in the circle).
7. Specify a unique clone name, where to mount the clone, and then click OK.
149
Currently, ElastiStor supports disaster recovery for a single Site. You can rebuild a primary Site using the disaster recovery copy.
ElastiStor provides disaster recovery across Sites over WANs.
4. In the Add DRVSM page, select a Site on which you want to configure the DR VSM and also specify the name of DR VSM.
5. In the following page, select a Pool and then click Next.
6. Select the Backup interface, IP Address, and specify a schedule for the DR VSM (in the format minutes/hours/days/month/year).
7. Click Add.
150
Delete DRVSM: Remove a disaster recovery setup that you have configured.
Recovering data
1. In the ElastiCenter navigation pane, click Virtual Storage Machine.
2. From the list of VSMs, select the DR VSM that is associated with the Primary VSM where the disaster occurred.
3. In the DR VSM page, go to actions pane and then click Tasks > Activate.
151
4. In the following page, specify the network settings and then click OK.
5. At confirmation prompt, click Yes.
152
Confirm if the DR Transfer occurs after the upgrade as scheduled. In the case of any exceptions, contact CloudByte Technical Support.
Important:The primary and secondary setups cannot be used at the same time. Ensure that only the database service is
operational on the secondary setup. Promote the secondary setup only when the primary setup is down.
Prerequisites
l
Note: If you copy and paste the commands in the section, ensure that they appear correctly on the CLI.
1. (On both the setups) Log in as root and access (over SSH or directly) the command prompt on the machine where the
ElastiCenters are installed.
2. (On the secondary setup) Run the following command: service rabbitmq onestop
3. (On the secondary setup) Run the following command to ensure that the RabbitMQ service is stopped: service rabbitmq onestatus
4. (On secondary setup) Run the following command to ensure that no Java process is running:
ps eaf | grep java
5. If any of the Java processes or RabbitMQ service is running, kill it using the following command: kill -9 PID_of_process
6. Else, ensure the following:
l
Size of/tpoolfolder is same on both primary ElastiCenter and secondary ElastiCenter using the following command:
zpool list
/folder in secondary ElastiCenter database has enough space for backup. This means the available space in / directory on the secondary ElastiCenter must be greater than the used space in /tpool directory on the primary
ElastiCenter.
7. (Optional) On the secondary setup, start the mysql service using the command: service mysql -server onestart .
8. (On the secondary setup) Run the script /usr/local/cb/bin/cb_config_slave.sh .
9. Perform the steps as shown in the following command line :
Select your choice:
1) Configure secondary ElastiCenter.
2) Promote secondary to primary ElastiCenter.
3) Exit
1
Here, you have to select 1 as highlighted.
153
If the primary setup is down, try the following before promoting the secondary setup:
l
Verify the error logs in java/Rabbitmq/Mysql or the service status. For example, service mysql-server
onestatus.
If downtime prevails despite the service restart, promote the secondary setup.
Procedures
Note: If you copy and paste the commands in the section, ensure that they appear correctly on the CLI.
1. Bring down the primary ElastiCenter by stopping rabbitmq services and Java processes.
2. (On the secondary ElastiCenter console) Run the script /usr/local/cb/bin/cb_config_slave.sh .
3. Perform the steps as shown in the following command line :
Select your choice:
1) Configure secondary ElastiCenter.
2) Promote secondary to primary Elasticenter.
3) Exit
2
Here, you have to select 2 as highlighted.
You have selected to promote secondary Elasticenter to primary Elasticenter.
Do you want to continue ? (Yes/No)Yes
Here, you have to select Yes as highlighted.
Dropped secondary ElastiCenter.
Starting RabbitMQ and Tomcat services..
Promoted secondary Elasticenter to primary Elasticenter. Check catalina logs for errors(if any).
4. (On all the ElastiStor consoles) Modify the /usr/local/agent/listener/cbc_conf file by changing the IP address of
ElastiCenter. Specify the IP address of secondary ElastiCenter.
5. (On the ElastiStor console) Run the following command to restart all the python/cbc services on the Node: service -l
| grep cbc | xargs -L 1 -I {} service {} onerestart
Also, ensure that the ElastiCenter is accessible to the Nodes with same status as prior to the promotion.
154
Note: During the promotion process, if a Node is offline or is powered down, then manually start the cbc_monitor_
hajobs service and point it to the promoted ElastiCenter.
Backing up configurations
How to backup and restore ElastiCenter configuration
By default, CloudByte schedules a backup everyday. You can modify the settings using the following options in Global Settings:
l
devman.backup.files.retain
devman.backup.path
devman.backup.scheduling.interval.
But, in the case you need to do a manual backup, follow the steps:
Backing up
1. Copy the backed up TAR file to a location on ElastiCenter, for example /var.
2. Go to the directory /usr/local/cb/bin and then run the following command: ./restore.sh <path of backedup file>.
For example ./restore.sh /var/backup_Jul26_1374815679.tar.bz2.
The configuration is restored.
By default, CloudByte schedules a daily backup in the location /cf/conf. CloudByte recommends you to move this backup daily
to a safe location. Either schedule a cron job or manually copy the files from the conf directory.
Restoring
1. Reinstall the Node with the same configurations (for example, same IP address, Hostname, and ElastiCenter details) as in
the previous installation.
2. Copy the following backed up files to the reinstalled Node:
155
156
VLAN interface
VLAN interface can be created on a NIC whenever there is a need for the interface to subscribe to a separate broadcast domain (usually needed for high traffic data networks).
Additionally, multiple VLAN interfaces can be created on a single physical NIC, thereby allowing access to multiple networks at the
same time. The VLANs act as virtual individual NICs, each belonging to a separate broadcast domain.
2. In the VLANInterfaces page, go to the actions pane and then click Tasks > Add VLANInterface.
3. In the Add VLANInterface dialog box, specify the VLANtag (which must be a numeric value) and then select the parent NIC.
4. Click OK.
157
LAGG interface
LAGG interface allows aggregation of multiple network interfaces into a single virtual LAGG interface, providing fault-tolerance and
high-speed multi-link throughput. The aggregation protocols supported by LAGG determines which ports are used for outgoing traffic
and whether a specific port accepts incoming traffic.
158
Protocol Type:
l
Failover: Select Failover to send traffic only through the active port. If the master port becomes unavailable,
the next active port is used. The first interface added is the master port. Any interfaces added after that are
used as failover devices. By default, received traffic is only accepted when received through the active port.
Load Balance: Balances outgoing traffic across the active ports based on hashed protocol header information
and accepts incoming traffic from any active port. This is a static setup and does not negotiate aggregation
with the peer or exchange frames to monitor the link
LACP:LACP negotiates a set of aggregable links with the peer in to one or more Link Aggregated Groups. Each
LAGG is composed of ports of the same speed, set to full-duplex operation. The traffic will be balanced across
the ports in the LAGG with the greatest total speed, in most cases there will only be one LAGG which contains
all ports.
4. Click Next.
5. From the list of available NICs, drag and drop the ones you want to assign to a LAGG.
6. Click Add.
SASmultipathing
CloudByte ElastiStor supports SASmultipathing. Having multiple physical
paths to the disk array enclosure assures effective path failover by providing
redundant paths for data access.
l
At any point in time, there is only one active path for I/O
If a failure occurs, instead of the active path, the one that was redundant (so far) takes over avoiding any interruption to data access
Prerequisites
l
Firmware: 07.15.08.00
Driver: 15.00.00.00
SAS cables
Disk array enclosure with multiple IN ports (for example Dell MD1220)
In the Node page, clear all existing pools to avoid Pool name conflicts. To do this, first configure the Disk Array in the Node
page. Then select the Node and then at the bottom of the page, click Clear for the Pools to be deleted.
Sample setup
The following figure shows a simple SASmultipath setup:
159
160
In the case of a failure, as shown in the following instance the path disappears from the table:
The figure implies that there is only a single SAS path available.
161
CHAPTER X
Going Forward
Agenda
l
What next
Congratulations.
l
You are conversant with CloudByte ElastiStor and can provision storage.
Support workflow
Now that you are an expert in CloudByte ElastiStor, you would start setting up the storage infrastructure at your workplace. What if
you get struck?
You have the following options:
Documentation
CloudByte provides elaborate documentation for its products. This includes Product Help, various technical articles, and knowledge
base articles. All these documents are available on search on popular search engines.
Community Forums
Join the CloudByte Forums to connect with other CloudByte users and experts on our Forums.
162
CHAPTER XI Glossary
CHAPTER XI Glossary
Terms
Description
Account
An entity with specific storage needs. Account represents a department of an Enterprise or a customer of a Cloud
Service Provider.
Alerts
Notifications that demand action. Alerts can be on a range of issues such as network cable pullout or degradation
of a Pool.
Asynchronous rep- The process of writing data to local storage and then queuing it up for replication on remote storage at assigned
lication
intervals. If the local storage fails before the data is written in remote storage, then replication fails.
Auto-Provisioning
ElastiStor can automate Node selection and resource allocation if you provide the required SLA/QoS parameters.
Sensing the level of storage performance and capacity the application requires, ElastiStor automatically allots the
right Pool.
Block Size
The size of a block in data storage and file systems. Block is a sequence of bytes or bits, having a nominal size.
CIFS
HA Group
Houses a group of Nodes. HA Group enables takeover during failures. Workload of a failed Node is assigned to
another Node in the same HA Group based on availability and performance requirements.
Dashboard
A graphical representation of the key performance indicators. It presents an overview of all the Sites in ElastiCenter
in an organized manner. You can update information instantaneously.
Delegated Administration
The process of distributing administrative tasks and content in the portal to dedicated administrators. Using access
control lists, you determine the actions administrators take on various resources. Delegated administration roles
are mapped to administrative functions using security policies. You can create and maintain separate administration capabilities depending on your needs.
Disaster Recovery
Disaster implies unplanned outage. Your storage system must be capable of effective backup and recovery so that
there is no damage to the data that is handled in the case of any adversity.
Disk Array
Popularly called JBODs, disk array is a set of disks clubbed to single disk shelf.
Disk Type
The type of disk supported by CloudByte ElastiStor. The supported disk types are SAS, SATA, and SSD.
Domain Search
Event
FC (Fibre Channel)
A high-speed interconnect between controllers and back-end disk enclosures. FC components include HBAs,
hubs, and switches. The term also refers to a high-speed, fully duplex serial communication protocol permitting
data transfer up to 10GB per second.
An application layer protocol used to transfer bulk-volumes of files between machines or hosts.
Global Settings
Grace
Provisioning of Pool's unused IOPS/Throughput to Storage Volumes based on their performance requirements.
High-Availability
High Availability minimizes/prevents the consequences of downtime in the storage setup. A typical High Availability
environment comprises two setups: one active while the partner remains dormant. In a downtime, the passive setup
takes over the storage tasks that the active setup was performing. This effects a reversal of states each setup was
in. When the downtime is over, all events are given back to the original active setup.
Host
Initiator Group
When an initiator group is associated with a LUN, only initiators from that group can access the LUN. Initiators are
identified by unique addressing methods.
163
Terms
Description
IOPS (Input/Output
operations per
second)
The number of READs or WRITEs per second. It is used to measure the performance of storage solution. Total
IOPS is the average input/output operations per second, Read IOPS is the average READ operations per second,
and Write IOPS is the average WRITEoperations per second.
iSCSI
Internet Small Computer Systems Interface is a client-server protocol used to enable the transfer of SCSI packets
over a TCP/IP (Ethernet) network.
Lagg Interface
Allows integration of multiple network interfaces with a single virtual interface. This helps in fault-tolerance and
high-speed multi-link throughput.
Unique address to identify a logical unit. Logical unit is the conceptual subunit of a storage disk or set of disks.
Mirrored Disks
A High Availability setup where you have a different set of disks on each node. Active disks are replicated/mirrored
on the partnering node.
Mirroring
Storing duplicate copies of data on one or more sets of additional Storage Volumes, apart from the set of Storage
Volume that stores the original data.
Monitoring
Provides an intuitive visualization of storage statistics. Monitoring foregrounds relevant back end activities in an
easy user interface for the administrator.
Network Failure
Indicates that the system is unable to reach the network. For example, due to physical port failure.
NFS
A distributed file system protocol that lets clients access files over a network in the same way they access local storage.
Physical Infrastructure
Pool
Provisioning
A set of steps to allocate storage to Hosts and applications. For example, creating Storage Volumes in Pools.
QoS (Quality of
Service)
Lets you easily commission storage with guaranteed IOPS at various levels. You can decide to configure QoS at a
Pool level, VSM level, or Storage Volume level.
Report
Detailed information related to configuration. Use Configuration Reports for component configuration details.
Dynamic Reports provide QoS statistics.
Rest APIs
Every action performed at ElastiStor admin console translates into a REST based API call in the back end. This
enables administrators to fully manage ElastiStor from their portals. CloudByte plugin for VMware vCenter (also
based on REST API) enables storage management from vCenter.
Shared Disks
A High Availability setup where you have a common set of disks shared between primary and secondary nodes.
The disks can be either hard disks or iSCSI disks.
Shared Storage
Storage devices that are connected to and used by two or more systems.
Site
Represents a data center or part of a data center. Building storage infrastructure starts with the creation of Site. It is
the fundamental infrastructure unit where your controller, storage, and network infrastructure reside.
Snapshot
Storage Capacity
The overall disk space (and not the free disk space).
Striping
Writes data across two or more disks in an array but utilizes only a part of the space on each disk. The amount of
space used by stripe on each disk is always the same. A virtual disk may write several stripes on the same set of
disks in the array.
Synchronous Replication
The process of writing the same data to two separate volumes, stored on different physical hardware, before the
application receives an I/O complete message. This results in both the volumes being always in sync.
164
CHAPTER XI Glossary
Terms
Description
Takeover
The process of taking over the storage control activity from a node. Typically, when there is a downtime on the
primary node, the secondary node takes over the control of storage.
Thin Provisioning
The process of optimizing efficiency of using the available storage space. It is the allocation of disk storage space
flexibly among multiple users, based on the minimum space each user requires at any given time.
Throughput
Amount of work a system can perform at specific intervals. It is also the amount of data moved successfully from
one place to another in a given time period.
VSM Architecture
Unique to CloudByte ElastiStor, this is a patented architecture. In a Storage Controller, each application is fully isolated across all storage stack levels and unified under a Virtual Storage Machine (VSM). VSM isolation allows controller resources allotted to applications to be easily monitored, controlled, and provisioned.
VMware vSphere
client
A Microsoft Windows desktop application that enables you to access VMware ESXi and VMware vCenter.
ZFS is a 128-bit file system that provides features such as data integrity verification, disk management, snapshots,
and transactional operations.
165