Acronis Storage 2.4 User’s Guide

Acronis Storage 2.4
User’s Guide
January 15, 2019
Copyright Statement
Acronis International GmbH, 2002-2016. All rights reserved.
”Acronis” and ”Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
”Acronis Compute with Confidence”, ”Acronis Startup Recovery Manager”, ”Acronis Active Restore”,
”Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is
obtained from the copyright holder.
DOCUMENTATION IS PROVIDED ”AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT
SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Third party code may be provided with the Software and/or Service. The license terms for such third parties are detailed in the license.txt file located in
the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the
Software and/or Service at http://kb.acronis.com/content/7696
Acronis patented technologies
Technologies, used in this product, are covered and protected by one or more U.S. Patent Numbers: 7,047,380; 7,275,139; 7,281,104; 7,318,135;
7,353,355; 7,366,859; 7,475,282; 7,603,533; 7,636,824; 7,650,473; 7,721,138; 7,779,221; 7,831,789; 7,886,120; 7,895,403; 7,934,064; 7,937,612; 7,949,635;
7,953,948; 7,979,690; 8,005,797; 8,051,044; 8,069,320; 8,073,815; 8,074,035; 8,145,607; 8,180,984; 8,225,133; 8,261,035; 8,296,264; 8,312,259; 8,347,137;
8,484,427; 8,645,748; 8,732,121 and patent pending applications.
Contents
1. About Acronis Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Supported Storage Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2. Accessing S3 Buckets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1 Managing Buckets via the Acronis Storage User Panel . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.1 Logging in to the Acronis Storage User Panel . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.2 Adding, Deleting, and Listing S3 Buckets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.2.1 Listing S3 Bucket Contents in a Browser . . . . . . . . . . . . . . . . . . . . . . 4
2.1.3 Creating, Deleting, and Listing Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.4 Uploading and Downloading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.5 Obtaining and Validating File Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Accessing S3 Storage with CyberDuck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.1 Managing S3 Bucket Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3 Mounting S3 Storage with Mountain Duck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.1 Creating S3 Buckets on Mounted S3 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.4 Configuring Backup Exec to Keep Backups in S3 Storage . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5 S3 Bucket and Key Naming Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3. Accessing iSCSI Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.1 Accessing iSCSI Targets from CentOS 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.2 Accessing iSCSI Targets from Microsoft Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . 20
3.3 Accessing iSCSI Targets from VMware ESXi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.4 Accessing iSCSI Targets from Citrix XenServer 6.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.5 Accessing iSCSI Targets from Microsoft Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4. Accessing NFS Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.1 Mounting NFS Exports on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
i
4.2 Mounting NFS Exports on MacOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
ii
CHAPTER 1

About Acronis Storage

Acronis Storage is a software-defined storage solution that allows you to quickly and easily transform
low-cost commodity storage hardware and network equipment into protected enterprise-grade storage like
SAN or NAS.
Acronis Storage is optimized for storing large amounts of data and provides data redundancy (replication
and erasure coding), high availability, self-healing, and storage sharing.
Acronis Storage offers integration with the Acronis Notary service to leverage blockchain notarization and
ensure the immutability of data saved in object storage clusters. The notary service timestamps the data and
stores data fingerprints in a public blockchain ledger, not owned by Acronis, ensuring data immutability. As a
result, blockchain notarization is well suited for and commonly used to maintain authenticity of such data as
property and medical records, chain-of-evidence for court documents, police video or security camera
footage, intellectual property bound documents, long-term archiving that could be subject to IT audits, and
‘consortium’ data storage, where multiple entities or individuals need to securely store and exchange
massive amounts of data and information.

1.1 Supported Storage Types

Your service provider can configure Acronis Storage to keep your data in three storage types:
• S3 object storage for storing an unlimited number of objects (files).
• iSCSI block storage for virtualization, databases, and other needs.
• NFS shares for storing an unlimited number of files via a distributed filesystem.
The following sections describe the ways to access data in Acronis Storage in detail.
1
CHAPTER 2

Accessing S3 Buckets

To access Acronis Storage S3 buckets, get the following information (credentials) from your system
administrator:
• user panel IP address,
• DNS name of the S3 endpoint,
• access key ID,
• secret access key.
Acronis Storage allows you to access your S3 data in several ways:
• via Acronis Storage user panel;
• via a third-party S3 application like Cyberduck, Mountain Duck,Backup Exec, etc.

2.1 Managing Buckets via the Acronis Storage User Panel

This section describes how to manage buckets and their contents using Acronis Storage user panel.
2.1.1 Logging in to the Acronis Storage User Panel
To log in to the Acronis Storage user panel, do the following:
1. On any computer with access to the web interface, in a web browser visit
2
2.1. Managing Buckets via the Acronis Storage User Panel
http://<user_panel_IP_address>:8888/s3/.
2. On the Acronis Storage login screen, enter your credentials in the corresponding fields and click
Once you log in to the web interface, you will see the Buckets screen with the list of your buckets. From
here, you can manage buckets as well as folders and files stored inside the buckets.
To log out, click the user icon in the upper right corner of any screen and click Log out.
LOG IN
.
3
2.1.2 Adding, Deleting, and Listing S3 Buckets
On the Buckets screen:
• To add a new bucket, click Add bucket, specify a name, and click Add.
Chapter 2. Accessing S3 Buckets
Use bucket names that comply with DNS naming conventions. For more information on bucket naming,
see S3 Bucket and Key Naming Policies on page 18.
• To delete a bucket, select it and click Delete.
• To list bucket contents, click a bucket name in the list.
2.1.2.1 Listing S3 Bucket Contents in a Browser
You can list bucket contents with a web browser. To do this, visit the URL that consists of the external DNS
name for the S3 endpoint that you specified when creating the S3 cluster and the bucket name. For example,
mys3storage.example.com/mybucket.
Note: You can also copy the link to bucket contents by right-clicking it in CyberDuck, and then
selecting Copy URL.
2.1.3 Creating, Deleting, and Listing Folders
On the bucket contents screen:
• To create a folder, click New folder, specify folder name in the New folder window, and click Add.
4
2.1. Managing Buckets via the Acronis Storage User Panel
• To delete a folder, select it and click Delete.
• To list folder contents, click a folder name.
2.1.4 Uploading and Downloading Files
On the bucket or folder contents screen:
• To upload files to S3, click Upload and choose files to upload.
• To download files, select them and click Download.
5
Chapter 2. Accessing S3 Buckets
2.1.5 Obtaining and Validating File Certificates
Acronis Storage offers integration with the Acronis Notary service to leverage blockchain notarization and
ensure the immutability of data saved in S3 buckets.
To certify files stored in your buckets, ask your system administrator to enable the Acronis Notary service for
the buckets.
On the bucket’s or folder’s contents screen:
• To get a notarization certificate for a file, select it and click Get Certificate.
• To check the validity of a file’s certificate, click Validate.

2.2 Accessing S3 Storage with CyberDuck

To access Acronis Storage with CyberDuck, do the following:
6
2.2. Accessing S3 Storage with CyberDuck
1. In CyberDuck, click Open Connection.
2. Specify your credentials:
• The DNS name of the S3 endpoint.
• The Access Key ID and, the Password field, the secret access key of an object storage user.
By default, the connection is established over HTTPS. To use CyberDuck over HTTP, you must install a
special S3 profile.
3. Once the connection is established, click File > New Folder to create a bucket.
4. Specify a name for the new bucket, and then click Create. Use bucket names that comply with DNS
naming conventions. For more information on bucket naming, see S3 Bucket and Key Naming Policies on
page 18.
7
Loading...
+ 24 hidden pages