Documentation
Prev Next
 

Acronis Cyber Infrastructure 3.0 Administrator's Guide

Jul 28, 2020
  • 1. About This Guide
  • 2. Managing the Storage Cluster
    • 2.1. Managing Networks and Traffic Types
    • 2.2. Configuring Node Network Interfaces
    • 2.3. Creating the Storage Cluster
    • 2.4. Connecting Remote iSCSI Devices to Storage Cluster Nodes
    • 2.5. Replacing Node Disks
    • 2.6. Releasing Nodes from the Storage Cluster
    • 2.7. Removing Nodes from the Unassigned List
    • 2.8. Re-Adding Nodes to the Unassigned List
  • 3. Monitoring the Storage Cluster
    • 3.1. Monitoring the Entire Cluster
    • 3.2. Monitoring Nodes
    • 3.3. Monitoring Storage Cluster Objects via SNMP
    • 3.4. Monitoring Storage Cluster Remotely
    • 3.5. Viewing Alerts and Audit Log and Sending E-mail Notifications
  • 4. Managing the Compute Cluster
    • 4.1. Creating the Compute Cluster
    • 4.2. Managing Compute Nodes
    • 4.3. Managing Virtual Networks
    • 4.4. Managing Storage Policies
    • 4.5. Managing Images
    • 4.6. Managing Virtual Machines
    • 4.7. Managing Volumes
    • 4.8. Managing Flavors
    • 4.9. Managing SSH Keys
    • 4.10. Monitoring the Compute Cluster
    • 4.11. Destroying the Compute Cluster
  • 5. Exporting Storage Cluster Data
    • 5.1. Exporting Storage via iSCSI
    • 5.2. Exporting Data via S3
    • 5.3. Exporting Data via NFS
    • 5.4. Connecting Acronis Backup Software to Storage Backends via Backup Gateway
  • 6. Managing General Settings
    • 6.1. Managing Tier Encryption
    • 6.2. Managing Domains, Users, and Projects
    • 6.3. Managing Updates
    • 6.4. Allowing root Access to Cluster Nodes Over SSH
    • 6.5. Enabling High Availability
    • 6.6. Accessing the Admin Panel via SSL
    • 6.7. Backing Up and Restoring Management Database
    • 6.8. Managing Licenses
    • 6.9. Adding External DNS Servers
    • 6.10. Enabling RDMA
    • 6.11. Sending Problem Reports
    • 6.12. Configuring the Self-Service Panel
  • Acronis Cyber Infrastructure 3.0 Administrator's GuidePDF, 4173 KB
Prev Next

3. Monitoring the Storage Cluster¶

Acronis Cyber Infrastructure uses the Prometheus monitoring system to monitor performance and availability of both the entire cluster and its components. It also generates alerts, which you can configure to be sent as notifications via e-mail.

In this chapter:¶

  • 3.1. Monitoring the Entire Cluster
    • 3.1.1. I/O Activity Charts
    • 3.1.2. Services Chart
    • 3.1.3. Chunks Chart
    • 3.1.4. Physical Space Chart
      • 3.1.4.1. Understanding Physical Space
    • 3.1.5. Logical Space Chart
      • 3.1.5.1. Understanding Logical Space
  • 3.2. Monitoring Nodes
    • 3.2.1. Node Statuses
    • 3.2.2. Monitoring Node Performance
    • 3.2.3. Monitoring Node Disks
      • 3.2.3.1. Monitoring the S.M.A.R.T. Status of Node Disks
    • 3.2.4. Monitoring Node Network
  • 3.3. Monitoring Storage Cluster Objects via SNMP
    • 3.3.1. Enabling SNMP Access
    • 3.3.2. Accessing Storage Cluster Information Objects via SNMP
      • 3.3.2.1. Listening to SNMP Traps
    • 3.3.3. Monitoring the Storage Cluster with Zabbix
    • 3.3.4. Storage Cluster Objects and Traps
  • 3.4. Monitoring Storage Cluster Remotely
  • 3.5. Viewing Alerts and Audit Log and Sending E-mail Notifications
    • 3.5.1. Viewing Alerts
    • 3.5.2. Viewing Audit Log
    • 3.5.3. Sending E-mail Notifications
Jul 28, 2020
Edit Raw Print Share
Prev Next