Documentation
Prev Next
 

Acronis Cyber Infrastructure 3.0 Administrator's Guide

Jul 28, 2020
  • 1. About This Guide
  • 2. Managing the Storage Cluster
    • 2.1. Managing Networks and Traffic Types
    • 2.2. Configuring Node Network Interfaces
    • 2.3. Creating the Storage Cluster
    • 2.4. Connecting Remote iSCSI Devices to Storage Cluster Nodes
    • 2.5. Replacing Node Disks
    • 2.6. Releasing Nodes from the Storage Cluster
    • 2.7. Removing Nodes from the Unassigned List
    • 2.8. Re-Adding Nodes to the Unassigned List
  • 3. Monitoring the Storage Cluster
    • 3.1. Monitoring the Entire Cluster
    • 3.2. Monitoring Nodes
    • 3.3. Monitoring Storage Cluster Objects via SNMP
    • 3.4. Monitoring Storage Cluster Remotely
    • 3.5. Viewing Alerts and Audit Log and Sending E-mail Notifications
  • 4. Managing the Compute Cluster
    • 4.1. Creating the Compute Cluster
    • 4.2. Managing Compute Nodes
    • 4.3. Managing Virtual Networks
    • 4.4. Managing Storage Policies
    • 4.5. Managing Images
    • 4.6. Managing Virtual Machines
    • 4.7. Managing Volumes
    • 4.8. Managing Flavors
    • 4.9. Managing SSH Keys
    • 4.10. Monitoring the Compute Cluster
    • 4.11. Destroying the Compute Cluster
  • 5. Exporting Storage Cluster Data
    • 5.1. Exporting Storage via iSCSI
    • 5.2. Exporting Data via S3
    • 5.3. Exporting Data via NFS
    • 5.4. Connecting Acronis Backup Software to Storage Backends via Backup Gateway
  • 6. Managing General Settings
    • 6.1. Managing Tier Encryption
    • 6.2. Managing Domains, Users, and Projects
    • 6.3. Managing Updates
    • 6.4. Allowing root Access to Cluster Nodes Over SSH
    • 6.5. Enabling High Availability
    • 6.6. Accessing the Admin Panel via SSL
    • 6.7. Backing Up and Restoring Management Database
    • 6.8. Managing Licenses
    • 6.9. Adding External DNS Servers
    • 6.10. Enabling RDMA
    • 6.11. Sending Problem Reports
    • 6.12. Configuring the Self-Service Panel
  • Acronis Cyber Infrastructure 3.0 Administrator's GuidePDF, 4173 KB
Prev Next

4. Managing the Compute Cluster¶

In this chapter:¶

  • 4.1. Creating the Compute Cluster
  • 4.2. Managing Compute Nodes
    • 4.2.1. Adding Nodes to Compute Cluster
    • 4.2.2. Releasing Nodes from Compute Cluster
  • 4.3. Managing Virtual Networks
    • 4.3.1. Virtual Network Architecture
      • 4.3.1.1. Private Network Connectivity
      • 4.3.1.2. Public Network Connectivity
    • 4.3.2. Creating, Editing, and Deleting Virtual Networks
    • 4.3.3. Managing Virtual Routers
      • 4.3.3.1. Managing Router Interfaces
      • 4.3.3.2. Managing Static Routes
    • 4.3.4. Managing Floating IP Addresses
  • 4.4. Managing Storage Policies
  • 4.5. Managing Images
  • 4.6. Managing Virtual Machines
    • 4.6.1. Supported Guest Operating Systems
    • 4.6.2. Creating Virtual Machines
    • 4.6.3. Virtual Machine Actions Overview
    • 4.6.4. Enabling Logging inside Virtual Machines
    • 4.6.5. Migrating Virtual Machines
    • 4.6.6. Reconfiguring and Monitoring Virtual Machines
    • 4.6.7. Configuring Virtual Machine High Availability
  • 4.7. Managing Volumes
    • 4.7.1. Creating, Editing, and Removing Volumes
    • 4.7.2. Cloning Volumes
    • 4.7.3. Attaching and Detaching Volumes
    • 4.7.4. Creating Images from Volumes
    • 4.7.5. Managing Volume Snapshots
  • 4.8. Managing Flavors
  • 4.9. Managing SSH Keys
  • 4.10. Monitoring the Compute Cluster
    • 4.10.1. Used CPUs Chart
    • 4.10.2. Reserved RAM Chart
    • 4.10.3. Provisioned Storage Chart
    • 4.10.4. VM Status Chart
    • 4.10.5. Top VMs Chart
    • 4.10.6. Alerts Chart
    • 4.10.7. Per-VM Charts
  • 4.11. Destroying the Compute Cluster
Jul 28, 2020
Edit Raw Print Share
Prev Next