Acronis Cyber Infrastructure 3.
Copyright Statement Copyright ©Acronis International GmbH, 2002-2019. All rights reserved. ”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH. ”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Instant Restore”, and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Installing Acronis Cyber Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.
CHAPTER 1 Introduction 1.1 About This Guide This guide describes how to set up a full-fledged storage cluster on three nodes, deploy a compute cluster on top of it, and create a virtual machine. 1.2 Hardware Requirements A minimum Acronis Cyber Infrastructure installation recommended for production consists of three nodes for storage and compute services with enabled high availability for the management node. This is to ensure that the cluster can survive failure of one node without data loss.
Chapter 1. Introduction Table 1.2.1 – continued from previous page Type Management and storage/compute node Storage 1 disk: system + metadata, 100+ GB SATA HDD 1 disk: storage, SATA HDD, size as required Network 1 GbE for storage traffic 1 GbE (VLAN tagged) for other traffic * A logical CPU is a core (thread) in a multicore (multithreading) processor. ** Each chunk server (CS), e.g., storage disk, requires 1 GB of RAM (0.5 GB anonymous memory + 0.5 GB page cache). The total page cache limit is 12 GB.
CHAPTER 2 Installing Acronis Cyber Infrastructure To install Acronis Cyber Infrastructure, do the following: 1. Prepare bootable media using the distribution ISO image (mount it to an IPMI virtual drive, create a bootable USB drive, or set up a PXE server). 2. Boot the server from the chosen media. 3. On the welcome screen, choose Install Acronis Cyber Infrastructure. 4. On step 1, please carefully read the End-User License Agreement.
Chapter 2. Installing Acronis Cyber Infrastructure shown on the login screen and the primary node’s root password. In the admin panel, open INFRASTRUCTURE > Nodes and click ADD NODE to invoke a screen with the management node address and the token. The node may appear on the INFRASTRUCTURE > Nodes screen in the UNASSIGNED list as soon as token is validated. However, you will be able to join it to the storage cluster only after the installation is complete. 8.
CHAPTER 3 Creating the Storage Cluster To create the storage cluster, do the following: 1. Open the INFRASTRUCTURE > Nodes screen and click a node in the UNASSIGNED list. 2. On the node overview screen, click Create cluster. 3. In the Cluster field, type a name for the cluster. The name may only contain Latin letters (a-z, A-Z), numbers (0-9), underscores (“_”) and hyphens (“-“). 4. Click NEW CLUSTER. 5. Click the next node in the UNASSIGNED list and click JOIN CLUSTER.
Chapter 3. Creating the Storage Cluster 6. Repeat the previous step for the remaining unassigned nodes. You can monitor cluster creation in the HEALTHY list of the INFRASTRUCTURE > Nodes screen. The creation might take some time depending on the number of disks to be configured. Once the automatic configuration is complete, the cluster is created.
CHAPTER 4 Enabling Management Node High Availability To make your infrastructure more resilient and redundant, you can create a high availability configuration of three nodes. Management node HA and compute cluster are tightly coupled, so changing nodes in one usually affects the other. Take note of the following: 1. All nodes in the HA configuration will be added to the compute cluster. 2. Single nodes cannot be removed from the compute cluster as they are included in the HA configuration.
Chapter 4. Enabling Management Node High Availability 3. Select three nodes and click Create HA. The management node is automatically selected. 4. On Configure network, check that correct network interfaces are selected on each node. Otherwise, click the cogwheel icon for a node and assign networks with the Internal management and Admin panel traffic types to its network interfaces. Click PROCEED. 5.
Chapter 4. Enabling Management Node High Availability Once the high availability of the management node is enabled, you can log in to the admin panel at the specified static IP address (on the same port 8888).
CHAPTER 5 Deploying Compute Cluster Before creating a compute cluster, make sure the following requirements are met: 1. Network is set up according to recommendations in the “Managing Networks and Traffic Types” section of the Administrator’s Guide. The basic requirements are: (a) the traffic types VM private, VM public, and Compute API must be assigned to networks; (b) the nodes to be added to the compute cluster must be connected to these networks. 2.
Chapter 5. Deploying Compute Cluster If node network interfaces are not configured, click the cogwheel icon, select networks as required, and click Apply. 2. In the Public network section, enable IP address management if needed and provide the required details for the public network. With IP address management enabled, Acronis Cyber Infrastructure will handle virtual machine IP addresses and provide the following features: • Allocation pools.
Chapter 5. Deploying Compute Cluster network to and optionally specify its gateway. The subnet IP range in the CIDR format will be filled in automatically. If you choose to leave IP address management disabled, select a physical network to connect the public virtual network to. The selected public network will appear in the list of virtual networks on compute cluster’s NETWORKS tab. Click Next. 3. If you enabled IP address management on the previous step, you will move on to the DHCP and DNS section.
Chapter 5. Deploying Compute Cluster 4. In the Summary section, review the configuration and click Create cluster. You can monitor compute cluster deployment on the Compute screen.
CHAPTER 6 Creating a Virtual Machine Note: For supported guest operating systems and other information, see the “Managing Virtual Machines” section in the Administrator’s Guide. To create a VM, do the following: 1. On the COMPUTE > Virtual machines > VIRTUAL MACHINES tab, click Create virtual machine. A window will open where you will need to specify VM parameters.
Chapter 6. Creating a Virtual Machine 2. Specify a name for the new VM. 3. In Deploy from, choose Volume if you have a boot volume or want to create one. Otherwise, choose Image. 4. Depending on your choice, click the pencil icon in the Volumes or Image section and do one of the following: • In the Images window, select the ISO image or template and click Done.
Chapter 6. Creating a Virtual Machine 5. Optionally, in the Volumes window, click Add or Attach to create or attach any other volumes you need. To select a volume as bootable, place it first in the list by clicking the up arrow button next to it. 6. In the Flavor window, choose a flavor and click Done.
Chapter 6. Creating a Virtual Machine 7. In the network window, click Add, select a virtual network interface and click Add. It will appear in the Network interfaces list. You can edit additional parameters of newly added network interfaces, like IP and MAC addresses and spoofing protection. To do this, click interface’s ellipsis icon, then Edit, and set parameters in the Edit network interface window. You will not be able to edit these parameters later.
Chapter 6. Creating a Virtual Machine Click Done. 8. (Optional) If you are deploying the VM from a template or boot volume (not an ISO image), you can specify the following: • An SSH key to be injected into the VM. To do it, select an SSH key in the Select an SSH key window, and click Done.
Chapter 6. Creating a Virtual Machine Note: To be able to connect to the VM via SSH, make sure the VM template or boot volume has cloud-init and OpenSSH installed (see the “Creating SSH-Enabled Templates” section in the Administrator’s Command Line Guide). • User data to customize the VM after launch. To do it, write a script in the Customization script field or browse a file on your local server to load the script from. You can specify user data in one of two formats: cloud-config or shell script.
Chapter 6. Creating a Virtual Machine Note: For the guest OS to be customizable, make sure the VM template or boot volume has cloud-init installed. 9. Back in the Create virtual machine window, click Deploy to create and boot the VM. 10. If you are deploying the VM from an ISO image (not a boot volume template or a volume with a pre-installed guest OS), select the VM, click Console, and install the guest OS using the built-in VNC console. 11.
Chapter 6. Creating a Virtual Machine • For Windows templates, enter the username that you specified during Cloudbase-Init installation. • For VMs customized with user data, enter the username specified in the script. For example: # ssh myuser@10.10.10.