Documentation
Prev Next
 

Acronis Storage 2.4 Administrator's Command Line Guide

Jan 15, 2019
  • 1. Introduction
    • 1.1. About This Guide
    • 1.2. About Acronis Storage
  • 2. Accessing Storage Clusters via iSCSI
    • 2.1. Preparing to Work with iSCSI Targets
    • 2.2. Creating iSCSI Targets
    • 2.3. Listing iSCSI Targets
    • 2.4. Transferring iSCSI Targets between Nodes
    • 2.5. Stopping iSCSI Targets
    • 2.6. Deleting iSCSI Targets
    • 2.7. Configuring Multipath I/O for iSCSI Targets
    • 2.8. Managing iSCSI Users
    • 2.9. Managing LUN Snapshots
  • 3. Accessing Storage Clusters via S3 Protocol
    • 3.1. About Object Storage
    • 3.2. Deploying Object Storage
    • 3.3. Managing S3 Users
    • 3.4. Managing S3 Buckets
    • 3.5. Best Practices for Using Object Storage
    • 3.6. Supported Amazon S3 Features
  • 4. Monitoring Storage Cluster
    • 4.1. Monitoring General Storage Cluster Parameters
    • 4.2. Monitoring Metadata Servers
    • 4.3. Monitoring Chunk Servers
    • 4.4. Monitoring Clients
    • 4.5. Monitoring Physical Disks
    • 4.6. Monitoring Event Logs
    • 4.7. Monitoring the Status of Replication Parameters
  • 5. Managing Storage Cluster Security
    • 5.1. Security Considerations
    • 5.2. Securing Node Communication in the Storage Cluster
    • 5.3. Password-based Authentication
  • 6. Maximizing Storage Cluster Performance
    • 6.1. Carrying Out Performance Benchmarking
    • 6.2. Checking Data Flushing
    • 6.3. Using 1 GbE and 10 GbE Networks
    • 6.4. Setting Up Network Bonding
    • 6.5. Improving High-Capacity HDD Performance
    • 6.6. Disabling Inter-Tier Data Allocation
  • Acronis Storage 2.4 Administrator's Command Line GuidePDF, 676 KB
Prev Next

1. Introduction¶

This chapter provides basic information about this guide and Acronis Storage.

In this chapter:¶

  • 1.1. About This Guide
  • 1.2. About Acronis Storage
Jan 15, 2019
Edit Raw Print Share
Prev Next