Acronis Cyber Infrastructure 3.
Copyright Statement Copyright ©Acronis International GmbH, 2002-2019. All rights reserved. ”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH. ”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Instant Restore”, and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc.
Contents 1. Supported Storage Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Accessing S3 Buckets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.1 Managing Buckets via the Acronis Cyber Infrastructure User Panel . . . . . . . . . . . . . . . . . 2 2.1.1 Logging in to User Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.1.
CHAPTER 1 Supported Storage Types Your service provider can configure Acronis Cyber Infrastructure to keep your data in three storage types: • S3 object storage for storing an unlimited number of objects (files). • iSCSI block storage for virtualization, databases, and other needs. • NFS shares for storing an unlimited number of files via a distributed filesystem. The following sections describe the ways to access data in Acronis Cyber Infrastructure in detail.
CHAPTER 2 Accessing S3 Buckets To access S3 buckets, get the following information (credentials) from your system administrator: • user panel IP address • DNS name of the S3 endpoint • access key ID • secret access key Acronis Cyber Infrastructure allows you to access your S3 data in several ways: • via the Acronis Cyber Infrastructure user panel • via a third-party S3 application like Cyberduck, Mountain Duck, Backup Exec, etc. 2.
Chapter 2. Accessing S3 Buckets http://:8888/s3/. 2. On the login screen, enter your credentials and click LOG IN. Once you log in to the web interface, you will see the Buckets screen with the list of your buckets. From here, you can manage buckets as well as folders and files stored inside the buckets. To log out, click the user icon in the upper right corner of any screen and click Log out. 2.1.
Chapter 2. Accessing S3 Buckets • To list bucket contents, click a bucket name in the list. 2.1.2.1 Listing S3 Bucket Contents in a Browser You can list bucket contents with a web browser. To do this, visit the URL that consists of the external DNS name for the S3 endpoint that you specified when creating the S3 cluster and the bucket name. For example, mys3storage.example.com/mybucket. Note: You can also copy the link to bucket contents by right-clicking it in CyberDuck, and then selecting Copy URL. 2.
Chapter 2. Accessing S3 Buckets • To download files, select them and click Download. 2.1.5 Obtaining and Validating File Certificates Acronis Cyber Infrastructure offers integration with the Acronis Notary service to leverage blockchain notarization and ensure the immutability of data saved in S3 buckets. To certify files stored in your buckets, ask your system administrator to enable the Acronis Notary service for the buckets.
Chapter 2. Accessing S3 Buckets By default, the connection is established over HTTPS. To use CyberDuck over HTTP, you must install a special S3 profile. 3. Once the connection is established, click File > New Folder to create a bucket. 4. Specify a name for the new bucket, and then click Create. Use bucket names that comply with DNS naming conventions. For more information on bucket naming, see S3 Bucket and Key Naming Policies (page 13). The new bucket will appear in CyberDuck.
Chapter 2. Accessing S3 Buckets 2.3 Mounting S3 Storage with Mountain Duck Mountain Duck enables you to mount and access Acronis Cyber Infrastructure S3 storage as a regular disk drive. Do the following: 1. If your service provider has provided you with an SSL certificate, install it. 2. In Mountain Duck, click New Bookmark. 3.
Chapter 2. Accessing S3 Buckets following parameters: • Nickname of the disk drive • endpoint DNS name in the Server field • access key ID in the Username field Click Connect. 4. In the login window, specify Secret Access Key and click Login.
Chapter 2. Accessing S3 Buckets Mountain Duck will mount the S3 storage as a disk drive. On the disk, you can manage buckets and store files in them. 2.3.1 Creating S3 Buckets on Mounted S3 Storage Windows and Mac OS X, operating systems supported by Mountain Duck, treat buckets as folders in case the S3 storage is mounted as a disk drive. In both operating systems, the default folder name contains spaces.
Chapter 2. Accessing S3 Buckets 5. In Backup Exec, click Configure Cloud Storage on the Storage tab. 6. In the Configure storage… window, specify a name for the S3 storage and click NEXT. 7. Select the S3 device and click NEXT.
Chapter 2. Accessing S3 Buckets 8. Select cloudinstance [cloudian] from the Cloud storage drop-down list. 9. Click Add/Edit next to the Logon account drop-down list. 10. In the Logon Account Selection window, click Add.
Chapter 2. Accessing S3 Buckets 11. In the Account credentials section, specify your credentials: 1. S3 access key ID in the User name field. 2. S3 secure access key in the Password field and confirm it. 3. The username of your account in the Account name field. 12. Clear all the checkboxes and click OK. 13.
Chapter 2. Accessing S3 Buckets click OK. 14. Back in the Configure storage… window, click NEXT. 15. Select a bucket and click NEXT twice. 16. On the summary screen, click Finish, OK, and Yes. Once the Backup Exec services are restarted, the S3 storage will appear in the list on the Storage tab. Now you can create backup jobs and specify the S3 storage as destination. 2.
CHAPTER 3 Accessing iSCSI Targets This section describes ways to attach iSCSI targets to operating systems and third-party virtualization solutions that support the explicit ALUA mode. 3.1 Accessing iSCSI Targets from VMware ESXi Before using Acronis Cyber Infrastructure volumes with VMware ESXi, you need to configure it to properly work with ALUA Active/Passive storage arrays. It is recommended to switch to the VMW_PSP_RR path selection policy (PSP) to avoid any issues. For example, on VMware ESXi 6.
Chapter 3. Accessing iSCSI Targets 2. In the Configure iSCSI window, click Add static target in the Static targets section, fill out target IQNs, IP addresses, and ports. Click Save configuration. 3. Proceed to the Devices tab and click Refresh. The newly added disk will appear in the list of devices. 4. Select the disk and click New datastore. In the wizard that appears, enter a name for the datastore and select partitioning options. Click Finish to actually partition the disk.
Chapter 3. Accessing iSCSI Targets Note: If your ESXi host loses connectivity to VMFS3 or VMFS5 datastores, follow the instructions in KB article #2113956. 3.2 Accessing iSCSI Targets from Linux To connect a Linux-based iSCSI initiator to iSCSI targets of Acronis Cyber Infrastructure working in the ALUA mode, do as follows: 1. Make sure the required packages are installed.
Chapter 3. Accessing iSCSI Targets failback followover path_checker tur prio alua } } ... 3. Load the kernel module and launch the multipathing service. # modprobe dm-multipath # systemctl start multipathd; systemctl enable multipathd 4. If necessary, enable CHAP parameters node.session.auth.* and discovery.sendtargets.auth.* in /etc/iscsi/iscsid.conf. 5. Launch the iSCSI services: # systemctl start iscsi iscsid # systemctl enable iscsi iscsid 6. Discover all targets by their IP addresses.
Chapter 3. Accessing iSCSI Targets the volume ID. In the example above, 360000000000000000000b50326ea44e3 is the multipath device ID mapped from the volume ID 61c9d567-4666-4c16-8030-b50326ea44e3. Now you can create partitions on the iSCSI device (/dev/mapper/360000000000000000000b50326ea44e3 in this example) as well as format and mount it to your initiator node using standard Linux tools. When you no longer need the external iSCSI device, you can remove it from the initiator node as follows: 1.
Chapter 3. Accessing iSCSI Targets 2. Set the failover policy to Fail Over Only. The policy uses a single active path for sending all I/O, and all other paths are standby. If the active path fails, one of the standby paths is used. When the path recovers, it becomes active again. > Set-MSDSMGlobalDefaultLoadBalancePolicy -Policy FOO 3. Enable path verification. By default, the initiator will verify each path every 30 seconds. > Set-MPIOSetting -NewPathVerificationState Enabled 4. Reboot the server. 3.
Chapter 3. Accessing iSCSI Targets 4. In the Discover Target Portal window, enter the target IP address and click OK. Repeat this step for each target from the target group. 5. On the Targets tab, click Refresh to discover the added targets.
Chapter 3. Accessing iSCSI Targets 6. Click Connect for each target to connect it to the initiator. In the Connect To Target window, select the Enable multi-path checkbox and click OK. 7. On the Targets tab, click Devices.., select the connected LUN, and click MPIO...
Chapter 3. Accessing iSCSI Targets 8. Make sure the connected LUN has several paths. You can now initialize the newly added disk for use in Microsoft Hyper-V. Do the following: 1. Open Disk Management, right-click the added disk, and choose Properties from the drop-down menu.
Chapter 3. Accessing iSCSI Targets 2. Check the settings on the MPIO tab. The first connected target becomes Active/Optimized and the preferred path.
Chapter 3. Accessing iSCSI Targets 3. Partition and format the disk as usual.
Chapter 3.
CHAPTER 4 Accessing NFS Shares This section describes ways to mount Acronis Cyber Infrastructure NFS shares on Linux and MacOS. Note: Acronis Cyber Infrastructure currently does not support the Windows built-in NFS client. 4.1 Mounting NFS Exports on Linux You can mount an NFS export created in Acronis Cyber Infrastructure like any other directory exported via NFS. You will need the share IP address (or hostname) and the volume identifier.
Chapter 4. Accessing NFS Shares 4.2 Mounting NFS Exports on MacOS You can mount an NFS export created in Acronis Cyber Infrastructure like any other directory exported via NFS. You will need the share IP address (or hostname) and the volume identifier. You can use the command-line prompt or Finder: • In console, run a command like the following: # mount -t nfs -o vers=4.0 192.168.0.51:// /mnt/nfs where: • -o vers=4.0 is the NFS version to use. • 192.168.0.51 is the share IP address.