Acronis Cyber Infrastructure - 3.0 User Manual

Acronis Cyber Infrastructure 3.0
Storage User’s Guide
November 20, 2019
Copyright Statement
Copyright ©Acronis International GmbH, 2002-2019. All rights reserved.
”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Instant Restore”, and the Acronis logo are trademarks of Acronis
Linux is a registered trademark of Linus Torvalds.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is
obtained from the copyright holder.
DOCUMENTATION IS PROVIDED ”AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT
SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Third party code may be provided with the Software and/or Service. The license terms for such third-parties are detailed in the license.txt file located in
the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the
Software and/or Service at http://kb.acronis.com/content/7696.
Acronis patented technologies
Technologies, used in this product, are covered and protected by one or more U.S. Patent Numbers: 7,047,380; 7,246,211; 7,275,139; 7,281,104;
7,318,135; 7,353,355; 7,366,859; 7,383,327; 7,475,282; 7,603,533; 7,636,824; 7,650,473; 7,721,138; 7,779,221; 7,831,789; 7,836,053; 7,886,120; 7,895,403;
7,934,064; 7,937,612; 7,941,510; 7,949,635; 7,953,948; 7,979,690; 8,005,797; 8,051,044; 8,069,320; 8,073,815; 8,074,035; 8,074,276; 8,145,607; 8,180,984;
8,225,133; 8,261,035; 8,296,264; 8,312,259; 8,347,137; 8,484,427; 8,645,748; 8,732,121; 8,850,060; 8,856,927; 8,996,830; 9,213,697; 9,400,886; 9,424,678;
9,436,558; 9,471,441; 9,501,234; and patent pending applications.
Contents
1. Supported Storage Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2. Accessing S3 Buckets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1 Managing Buckets via the Acronis Cyber Infrastructure User Panel . . . . . . . . . . . . . . . . . 2
2.1.1 Logging in to User Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.2 Adding, Deleting, and Listing S3 Buckets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1.2.1 Listing S3 Bucket Contents in a Browser . . . . . . . . . . . . . . . . . . . . . . 4
2.1.3 Creating, Deleting, and Listing Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.4 Uploading and Downloading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.5 Obtaining and Validating File Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Accessing S3 Storage with CyberDuck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2.1 Managing S3 Bucket Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Mounting S3 Storage with Mountain Duck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.1 Creating S3 Buckets on Mounted S3 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4 Configuring Backup Exec to Keep Backups in S3 Storage . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5 S3 Bucket and Key Naming Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3. Accessing iSCSI Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1 Accessing iSCSI Targets from VMware ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Accessing iSCSI Targets from Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.3 Accessing iSCSI Targets from Microsoft Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4. Accessing NFS Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.1 Mounting NFS Exports on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.2 Mounting NFS Exports on MacOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
i
CHAPTER 1

Supported Storage Types

Your service provider can configure Acronis Cyber Infrastructure to keep your data in three storage types:
• S3 object storage for storing an unlimited number of objects (files).
• iSCSI block storage for virtualization, databases, and other needs.
• NFS shares for storing an unlimited number of files via a distributed filesystem.
The following sections describe the ways to access data in Acronis Cyber Infrastructure in detail.
1
CHAPTER 2

Accessing S3 Buckets

To access S3 buckets, get the following information (credentials) from your system administrator:
• user panel IP address
• DNS name of the S3 endpoint
• access key ID
• secret access key
Acronis Cyber Infrastructure allows you to access your S3 data in several ways:
• via the Acronis Cyber Infrastructure user panel
• via a third-party S3 application like Cyberduck, Mountain Duck, Backup Exec, etc.

2.1 Managing Buckets via the Acronis Cyber Infrastructure User Panel

This section describes how to manage buckets and their contents from the Acronis Cyber Infrastructure user
panel.
2.1.1 Logging in to User Panel
To log in to the Acronis Cyber Infrastructure user panel, do the following:
1. On any computer with access to the web interface, in a web browser visit
2
http://<user_panel_IP_address>:8888/s3/.
2. On the login screen, enter your credentials and click LOG IN.
Chapter 2. Accessing S3 Buckets
Once you log in to the web interface, you will see the Buckets screen with the list of your buckets. From
here, you can manage buckets as well as folders and files stored inside the buckets.
To log out, click the user icon in the upper right corner of any screen and click Log out.
2.1.2 Adding, Deleting, and Listing S3 Buckets
On the Buckets screen:
• To add a new bucket, click Add bucket, specify a name, and click Add.
Use bucket names that comply with DNS naming conventions. For more information on bucket naming,
see S3 Bucket and Key Naming Policies (page 13).
• To delete a bucket, select it and click Delete.
3
Chapter 2. Accessing S3 Buckets
• To list bucket contents, click a bucket name in the list.
2.1.2.1 Listing S3 Bucket Contents in a Browser
You can list bucket contents with a web browser. To do this, visit the URL that consists of the external DNS
name for the S3 endpoint that you specified when creating the S3 cluster and the bucket name. For example,
mys3storage.example.com/mybucket.
Note: You can also copy the link to bucket contents by right-clicking it in CyberDuck, and then selecting
Copy URL.
2.1.3 Creating, Deleting, and Listing Folders
On the bucket contents screen:
• To create a folder, click New folder, specify folder name in the New folder window, and click Add.
• To delete a folder, select it and click Delete.
• To list folder contents, click a folder name.
2.1.4 Uploading and Downloading Files
On the bucket or folder contents screen:
• To upload files to S3, click Upload and choose files to upload.
4
• To download files, select them and click Download.
Chapter 2. Accessing S3 Buckets
2.1.5 Obtaining and Validating File Certificates
Acronis Cyber Infrastructure offers integration with the Acronis Notary service to leverage blockchain
notarization and ensure the immutability of data saved in S3 buckets.
To certify files stored in your buckets, ask your system administrator to enable the Acronis Notary service for
the buckets.
After that, you will be able to do the following:
• To get a notarization certificate for a file, select it and click Get Certificate.
• To check the validity of a file’s certificate, click Verify.

2.2 Accessing S3 Storage with CyberDuck

To access Acronis Cyber Infrastructure with CyberDuck, do the following:
1. In CyberDuck, click Open Connection.
2. Specify your credentials:
• The DNS name of the S3 endpoint.
• The Access Key ID and the Password, the secret access key of an object storage user.
5
Chapter 2. Accessing S3 Buckets
By default, the connection is established over HTTPS. To use CyberDuck over HTTP, you must install a
special S3 profile.
3. Once the connection is established, click File > New Folder to create a bucket.
4. Specify a name for the new bucket, and then click Create. Use bucket names that comply with DNS
naming conventions. For more information on bucket naming, see S3 Bucket and Key Naming Policies
(page 13).
The new bucket will appear in CyberDuck. You can manage it and its contents.
2.2.1 Managing S3 Bucket Versions
Versioning is a way of keeping multiple variants of an object in the same bucket. You can use versioning to
preserve, retrieve, and restore every version of every object stored in your S3 bucket. With versioning, you
can easily recover from both unintended user actions and application failures. For more information about
bucket versioning, refer to the Amazon documentation.
Bucket versioning is turned off by default. In CyberDuck, you can enable it in bucket properties. For example:
6
Loading...
+ 21 hidden pages