Documentation
Next
 

Acronis Cyber Infrastructure 3.0 Administrator's Command Line Guide

Nov 20, 2019
  • 1. Introduction
    • 1.1. Providing Credentials
    • 1.2. Managing Tasks
  • 2. Managing Storage Cluster
    • 2.1. Managing Tokens
    • 2.2. Managing Traffic Types and Networks
    • 2.3. Managing Storage Nodes
    • 2.4. Managing Node Network Interfaces
    • 2.5. Managing Node Disks
    • 2.6. Creating and Deleting the Storage Cluster
    • 2.7. Showing Storage Cluster Overview and Details
  • 3. Managing Compute Cluster
    • 3.1. Creating and Deleting the Compute Cluster
    • 3.2. Showing Compute Cluster Details and Overview
    • 3.3. Changing Compute Cluster Parameters
    • 3.4. Managing Compute Nodes
    • 3.5. Managing Virtual Networks
    • 3.6. Managing Virtual Routers
    • 3.7. Managing Floating IP Addresses
    • 3.8. Managing Images
    • 3.9. Managing Flavors
    • 3.10. Managing Storage Policies
    • 3.11. Managing Volumes
    • 3.12. Managing Volume Snapshots
    • 3.13. Managing Compute SSH Keys
    • 3.14. Managing Virtual Machines
  • 4. Managing General Settings
    • 4.1. Managing Licenses
    • 4.2. Managing Domains
    • 4.3. Managing Domain Users
    • 4.4. Managing Domain Projects
    • 4.5. Managing SSH Keys
    • 4.6. Managing External DNS Servers
    • 4.7. Configuring Management Node High Availability
    • 4.8. Managing Storage Tier Encryption
    • 4.9. Managing Alerts
    • 4.10. Managing Audit Log
    • 4.11. Sending Problem Reports
  • 5. Monitoring Storage Cluster
    • 5.1. Monitoring General Storage Cluster Parameters
    • 5.2. Monitoring Metadata Servers
    • 5.3. Monitoring Chunk Servers
    • 5.4. Monitoring Clients
    • 5.5. Monitoring Physical Disks
    • 5.6. Monitoring Event Logs
    • 5.7. Monitoring Replication Parameters
  • 6. Accessing Storage Clusters via iSCSI
    • 6.1. iSCSI Workflow Overview
    • 6.2. Configuring CLI Tool
    • 6.3. Managing Target Groups
    • 6.4. Managing iSCSI Volumes
    • 6.5. Managing Nodes
    • 6.6. Managing Targets and Portals
    • 6.7. Managing CHAP Accounts
    • 6.8. Managing LUN Views
  • 7. Advanced Tasks
    • 7.1. Updating Kernel with ReadyKernel
    • 7.2. Managing Guest Tools
    • 7.3. Running Commands in Virtual Machines without Network Connectivity
    • 7.4. Setting Virtual Machines CPU Model
    • 7.5. Creating Linux Templates
    • 7.6. Creating SSH-Enabled Templates
    • 7.7. Securing OpenStack API Traffic with SSL
    • 7.8. Enabling Metering for Compute Resources
    • 7.9. Configuring Memory Policy for Storage Services
  • Acronis Cyber Infrastructure 3.0 Administrator's Command Line GuidePDF, 847 KB
Next

Acronis Cyber Infrastructure 3.0 Administrator’s Command Line Guide¶

  • 1. Introduction
  • 2. Managing Storage Cluster
  • 3. Managing Compute Cluster
  • 4. Managing General Settings
  • 5. Monitoring Storage Cluster
  • 6. Accessing Storage Clusters via iSCSI
  • 7. Advanced Tasks
Nov 20, 2019
Edit Raw Print Share
Next