Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
This product is subject to the terms and conditions of a software license agreement provided with the software. The product may only be used in accordance
with the license agreement.
This product may be protected by one or more U.S. and non-U.S patents. Details are available at www.avid.com/patents
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This document is protected under copyright law. An authorized licensee of Avid ISIS 7000 may reproduce this publication for the licensee’s own use in learning
how to use the software. This document may not be reproduced or distributed, in whole or in part, for commercial purposes, such as selling copies of this
document or providing support or educational services to others. This document is supplied as a guide for Avid ISIS 7000. Reasonable care has been taken in
preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc.
does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without notice.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee,
provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of
Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam
Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT
LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL
DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms
and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by
the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific
prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above
copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is
provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above
copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is
provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear
in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel Dardailler not be
used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations
about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all
copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.
.
2
Page 3
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR
AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS
FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,” including
by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s failure to perform
reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including but not limited to,
incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products
or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised, knew or should have
known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability or
its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN ver.
3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of
applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software
documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with respect
to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as
applicable.
Trademarks
003, 192 Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages,
AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid
Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID,
AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager,
ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|24, Command|8, Control|24,
Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio
Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet,
DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do
More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander,
ExpertRender, Fader Pack, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process,
HDpack, Home-to-Hollywood, HYBRID, HyperSPACE, HyperSPACE HDCAM, iKnowledge, Image Independence, Impact, Improv, iNEWS, iNEWS Assign,
iNEWS ControlAir, InGame, Instantwrite, Instinct, Intelligent Content Management, Intelligent Digital Actor Technology, IntelliRender, Intelli-Sat, Intelli-sat
Broadcasting Recording Manager, InterFX, Interplay, inTONE, Intraframe, iS Expander, iS9, iS18, iS23, iS36, ISIS, IsoSync, LaunchPad, LeaderPlus, LFX,
Lightning, Link & Sync, ListSync, LKT-200, Lo-Fi, MachineControl, Magic Mask, Make Anything Hollywood, make manage move | media, Marquee,
MassivePack, Massive Pack Pro, Maxim, Mbox, Media Composer, MediaFlow, MediaLog, MediaMix, Media Reader, Media Recorder, MEDIArray,
MediaServer, MediaShare, MetaFuze, MetaSync, MIDI I/O, Mix Rack, Moviestar, MultiShell, NaturalMatch, NewsCutter, NewsView, NewsVision, Nitris, NL3D,
NLP, NSDOS, NSWIN, OMF, OMF Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Painterly Effects, Palladium, Personal Q,
PET, Podcast Factory, PowerSwap, PRE, ProControl, ProEncode, Profiler, Pro Tools, Pro Tools|HD, Pro Tools LE, Pro Tools M-Powered, Pro Transfer,
QuickPunch, QuietDrive, Realtime Motion Synthesis, Recti-Fi, Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, Reprise, Res Rocket Surfer, Reso,
RetroLoop, Reverb One, ReVibe, Revolution, rS9, rS18, RTAS, Salesview, Sci-Fi, Scorch, ScriptSync, SecureProductionEnvironment, Serv|GT, Serv|LT,
Shape-to-Shape, ShuttleCase, Sibelius, SimulPlay, SimulRecord, Slightly Rude Compressor, Smack!, Soft SampleCell, Soft-Clip Limiter, SoundReplacer,
SPACE, SPACEShift, SpectraGraph, SpectraMatte, SteadyGlide, Streamfactory, Streamgenie, StreamRAID, SubCap, Sundance, Sundance Digital,
SurroundScope, Symphony, SYNC HD, SYNC I/O, Synchronic, SynchroScope, Syntax, TDM FlexCable, TechFlix, Tel-Ray, Thunder, TimeLiner, Titansync,
Titan, TL Aggro, TL AutoPan, TL Drum Rehab, TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, tools for storytellers,
Transit, TransJammer, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Video the Web Way, VideoRAID, VideoSPACE, VTEM, Work-N-Play, Xdeck, X-Form,
Xmon and XPAND! are either registered trademarks or trademarks of Avid Technology, Inc. in the United States and/or other countries.
3
Page 4
Apple, Macintosh, and Safari are either registered trademarks or trademarks of Apple Computer, Inc., registered in the U.S. and other countries. HP is a
registered trademark of Hewlett-Packard Company. Intel is a registered trademark of Intel Corporation. Java is a trademark of Sun Microsystems in the United
States and/or other countries. Kingston is a registered trademarks of Kingston Technology Corporation. All other marks may be the property of their respective
titleholders. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks
contained herein are the property of their respective owners.
Avid ISIS Administration Guide • 0175-30980-00 Rev. C• June 2014• Created 6/4/14
The Avid® ISIS® media network provides a high-performance distributed file system that contains high-capacity
shared media storage for workgroups of connected Avid editing workstations. This user’s guide describes how to
connect your client system to the media network, mount workspaces, and configure your system for best
performance.
Unless noted otherwise, the material in this document applies to the Windows
systems.The majority of screen shots in this document were captured on a Windows system, but the information
applies to all operating systems. Where differences exist, information on the differences is provided.
The documentation describes the features and hardware of all models. Therefore, your system might not contain
n
certain features and hardware that are covered in the documentation.
Who Should Use This Guide
This user’s guide is intended for users who need to access workspaces on the Avid ISIS media network. You should
have a basic understanding of how to use and manage the Windows operating system or the Mac OS X systems, and
you should be familiar with basic workgroup and network concepts.
®
, Mac OS® X, and Linux operating
Symbols and Conventions
Avid documentation uses the following symbols and conventions:
Symbol or ConventionMeaning or Action
n
c
w
>This symbol indicates menu commands (and subcommands) in the order
(Windows), (Macintosh), or
(Linux)
Bold fontBold font is primarily used in task instructions to identify user interface
A note provides important related information, reminders,
recommendations, and strong suggestions.
A caution means that a specific action you take could cause harm to your
computer or cause you to lose data.
A warning describes an action that could cause you physical harm. Follow
the guidelines in this document or on the unit itself when handling
electrical equipment.
you select them. For example, File > Import means to open the File menu
and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list
indicate that you perform one of the actions listed.
This text indicates that the information applies only to the specified
operating system, either Windows Macintosh OS X or Linux.
items and keyboard sequences.
12
Page 13
Symbol or ConventionMeaning or Action
Italic fontItalic font is used to emphasize certain words and to indicate variables.
If You Need Help
Courier Bold font
Ctrl+key or mouse actionPress and hold the first key while you press the last key or perform the
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important
to check each step of your workflow.
2. Check the latest information that might have become available after the documentation was published.
New information would be found in the ReadMe file supplied on your Avid software kit located on the
installation USB. Documentation is available as a PDF in the software kit and through the user interface.
Always check online for the most up-to-date release notes or ReadMe because the online version is
updated whenever new information becomes available. To view the online versions, visit the Knowledge
Base at
3. Check the documentation that came with your Avid application or your hardware for maintenance or
hardware-related issues.
4. Visit the online Knowledge Base at
7 days per week. Search this online Knowledge Base to find answers, to view error messages, to access
troubleshooting tips, to download updates, and to read or join online message-board discussions.
www.avid.com/US/support.
Courier Bold font identifies text that you type.
mouse action. For example, Command+Option+C or Ctrl+drag.
www.avid.com/US/support. Online services are available 24 hours per day,
Accessing the Online Documentation
The Avid ISIS online documentation contains all the product documentation in PDF format. You can access the
documentation in the top-level AvidISISDocumentation folder on the Avid ISIS installer software kit.
The documentation describes the features and hardware of all models. Therefore, your system might not contain
n
certain features and hardware that are covered in the documentation.
To access the online documentation from the software installer kit:
1. Insert the Avid ISIS installer USB into the USB port.
2. Navigate to the [drive]:\.AvidISISDocumentation folder, and double-click the PDF file for the document you
want to view.
Avid Training Services
Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid
understands that the knowledge you need to differentiate yourself is always changing, and Avid continually updates
course content and offers new training delivery methods that accommodate your pressured and competitive work
environment.
13
Page 14
Avid Training Services
For information on courses/schedules, training centers, certifications, courseware, and books, please visit
www.avid.com/support
and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).
14
Page 15
1Working with the Avid ISIS Management Console
The Avid ISIS Management Console allows you to access administration functions from any system that has an
Ethernet connection to the System Director, as well as from the System Director itself.
c
Performing administrative functions on more than one Administration site at the same time can cause
unexpected results.
When you access the Avid ISIS Management Console, the Login page opens, and the site prompts you to supply a
user name and password to log in. If you type the wrong password, an error message appears and the Login dialog
box reappears.
When you first install the Avid ISIS software, the login password is blank by default. To set a password for the
n
administrator, see “Changing the Administrator Password” on page 29.
Standard ISIS client users can log in to the Management Console, but they will have limited access to the
Management Console interface. They can also view certain information about the network through the Client
Manager. For more information about the Client Manager, see the Avid ISIS Client Manager Help. The Avid ISIS Client Guide is also included in the AvidISISDocumentation folder in the software kit.
ISIS Nomenclature Used in this Guide
Throughout this guide, any information for the ISIS | 7500 also applies to the ISIS 7000; likewise for the ISIS | 5500
(applies to ISIS 5000), and ISIS | 2500 (applies to ISIS 2000).
Before Performing Administrative Functions
It is critical that clients unmount Workspaces when you do the following:
•Stop and restart the System Director (unmount all Workspaces)
•Change users’ or user groups’ access (unmount only the affected Workspaces)
•Rename or delete Workspaces (unmount only the affected Workspaces)
c
If a client is using a Workspace when the ISIS system is taken offline, the connection to the Workspace is
broken and data might be lost.
Opening the Management Console
The Avid ISIS Management Console runs within a web browser window. The following web browsers have been
qualified for use with the Management Console:
15
Page 16
Microsoft Windows
•Microsoft Internet Explorer
•Mozilla Firefox
•Google® Chrome
®
™
Apple Macintosh
•Safari
•Mozilla Firefox
•Google Chrome
Red Hat Linux
•Mozilla Firefox
To open the Management Console as Administrator:
1. Open your web browser.
2. In the address bar of your browser, type one of the following:
ISIS ModelOptionEnter
Opening the Management Console
ISIS | 7500 Namehttps://[System Director host name]:5015
IP Address
ISIS | 5500Name
IP Address
ISIS | 2500Name
IP Address
https://[
http://[
http://[
http://[
http://[
System Director IP address]:5015
System Director host name
System Director IP address
System Director host name
System Director IP address
]
]
]
]
The active System Director host name is one of the following:
-The System Director Windows host name.
-A host name which has been assigned to the active System Director on your network DNS server(s).
Check with your network administrator if you are unsure of which System Director name to use.
When you enter the ISIS | 7500 System Director address, if any site certification warnings open, click Yes to
accept the certificate. If you are not sure about the security requirements of your shared storage network, see
your network administrator.
The Login dialog box for the ISIS Management Console opens. The “Username” field is automatically
populated with the Administrator user name.
3. Type your password.
For information on changing the administrative password, see “Changing the Administrator Password” on
page 29
.
4. Click Login (arrow icon), or press Enter.
The Avid ISIS Home page opens.
16
Page 17
To log out of the ISIS Management Console:
tClick Logout in the upper right corner of the screen.
Using the Management Console Interface
The ISIS Management Console, which you can access on the System Director or on any Ethernet-attached client,
has a user interface where controls are grouped by function and are displayed by clicking the appropriate icons.
To use the ISIS Management Console, you must have Adobe® Flash® Player installed on your system.
The following illustrations are from the ISIS | 7500 Management Console. They might include features not available
n
in the ISIS | 5500 and ISIS | 2500. Non-Administrator users will see a subset of the tools available to Administrators,
depending on access privileges.
Using the Management Console Interface
1System Status Console — Provides a snapshot view of several aspects of the Avid ISIS system. See “System Status Console” on
.
page 17
2Navigation toolbar — Access Management Console tools and bread crumb navigation. See
3Main tools panel — Click to go to the respective tool pages. See
4Help link — provides links to various ISIS online documents. See
5Logout link — Ends the Management Console session and logs the user out of the system. See
Console” on page 15
.
“Main Tools Panel” on page 21.
“Main Tools Panel” on page 21.
“Navigation Toolbar” on page 20.
“Opening the Management
System Status Console
The System Status Console, located on the left side of the Avid ISIS Management Console, contains several
components that give you a snapshot view of the Avid ISIS system. These allow you to access additional
information about your system and to perform certain administrative tasks, such as monitoring and logging.
17
Page 18
Using the Management Console Interface
Administrators can configure whether or not the System Status Console is visible on the login screen of the
n
Management Console. However, even if it is visible, you must log in to follow links from the tool bar screens (such as
the log files).
1Current system status panel — LEDs for errors, warnings, info, and upgrade statuses will be lit to indicate the presence of system
events. Click a color to open the Status panel. See
2Status retrieval panel — The Management Console periodically retrieves system status information. The panel displays the results and
the time stamp of the retrieval operation.
3System Status History panel — Displays the system events that have occurred since the System Director was started, along with the
date and time of the first logged event. Clicking this panel opens the System Status History tool. For more information, see
Status History Page” on page 122
4Storage capacity panel — displays the total capacity of all bound Storage Managers, capacity allocated to Workspaces, and the
amount of capacity used by data.
5System Status Console panels — click the panel headings to display the system information panel. For more information, see
Status Console Panels” on page 18
.
.
“System Status Console Panels” on page 18.
“System
“System
System Status Console Panels
The System Status Console contains several panels that provide information about different areas of Avid ISIS
operation. Expand and collapse a panel by clicking the panel title.
18
Page 19
Using the Management Console Interface
PanelDescription
Status Console PanelProvides a quick summary of the System Director status. If an event in the system log triggers
a status to appear, a link is provided to the System Logs tool. For more information, see
“Using the System Logs Page” on page 119
System Console PanelProvides a summary of hardware, software, and networking information.
An error message is displayed in the Status panel if the system drives (C: and D:) become too
full (defined as less than 6 GB free space on drive C:, or less than 16 GB on drive D:).
A warning message is displayed when the C: drive has less than 11 GB, or the D: drive has
less than 26 GB.
If the C: or D: drives become too full, the system might not be able to save metadata, and you
might not be able to upgrade the ISIS software.
If these events or warnings occur, look on the C: and D: drives on the System Director and
delete any old ISIS installation kits, and anything in the /temp folder. You can also delete
copies of the PartitionDump.bin file that are more than one month old, and any
IndexServer.dmp files.
19
Page 20
PanelDescription
Using the Management Console Interface
Performance Console Panel
Bandwidth Console Panel
Provides a summary of the number of messages per second, number of open files, and the
names of clients connected to the system.
Displays “Megabytes per second,” information on total and per-client bandwidth.
Navigation Toolbar
The navigation toolbar provides several items to help you navigate through the Management Console interface.
1Home link—You can click this link from any page to return to the Management Console Home screen
2Current tool heading—Indicates the tool you are currently using
3Related links section—Displays links to other Management Console tools relevant to the one you are currently using
Accessing Help
The Help menu, located in the upper right-hand corner of the Management Console window, provides links to the
complete set of Avid ISIS online PDF documents.
20
Page 21
PDF documents can open in an external application or browser, depending on your configuration. An
n
Administration Guide HTML Help is only available from the System Director Control Panel and requires Internet
Explorer. The Help does not work properly in other browsers.
To access the Help menu:
1. Move the mouse cursor over the Help menu text.
The Help pop-up menu opens.
2. (Option) Click the Help menu text to open the Avid ISIS online document.
Session Counter
Using the Management Console Interface
The user session will time out automatically after two hours of inactivity, after which you must log in again to
continue working. The session counter, located in the lower right corner of the Management Console, displays the
time remaining in the user session.
The counter is automatically reset to two hours when you click a link or perform an action such as adding or deleting
a Workspace. You can also reset the counter manually by clicking it.
If you enable Auto refresh on a tool screen you will not automatically be logged out after two hours, as long as you
stay on the page where Auto refresh is enabled, or navigate between tools as described in
on page 25
To manually reset the session counter:
tClick the session counter display.
. Clicking Home disables Auto refresh, and the session counter functionality (automatic logout) resumes.
The session timer is reset to two hours.
Main Tools Panel
The ISIS Management Console main panel is divided into the following sections:
“Updating Information”
•The System section, which contains the following tools:
ToolDescription
WorkspacesView details of, create, delete, duplicate, or change capacity of any Workspace; see
“Managing Workspaces” on page 69 for more information.
21
Page 22
Using the Management Console Interface
ToolDescription (Continued)
UsersView details of, create, delete, duplicate, or modify Workspace access of any User; see
“Managing Users” on page 90 for more information.
GroupsView details of, create, duplicate, modify Workspace access of, or assign User access to any
User Group; see
“Managing User Groups” on page 96 for more information.
DevicesView details of, create, delete, or modify descriptions of any device; see
on page 106
InstallersDownload installers for Avid ISIS Client Manager, Flash, and other software.
EnginesView details of Engines, reported serial number, status, uptime and more information, see
“Managing Storage Managers” on page 33.
Switch Blades (7500)View switch IP addresses, Upgrade Switches, or open the switch Agent pages; for more
information, see
Storage ManagersView details of, bind, or unbind any Storage Manager; for more information, see
Storage Managers” on page 33
Storage GroupsView details of, create, delete, or modify Storage Managers of any Storage Group; for more
information, see
for more information.
“Managing Storage Managers” on page 33.
.
“Managing Storage Groups” on page 61.
“Managing Devices”
•The Connectivity section, which contains the following tools:
ToolDescription
Connection StatusView or disconnect any connected client; for more information, see “Monitoring System
Connection Status” on page 111
BandwidthView read and write bandwidth of any connected client; for more information, see
“Monitoring Client Bandwidth” on page 110.
.
“Managing
ReservationsView and revoke any current bandwidth reservation; for more information, see
Reservations” on page 113
.
“Monitoring
•The Tools section, which contains the following tools:
ToolDescription
System Status HistoryView historical system status information; for more information, see “System Status History
Page” on page 122
Network UtilitiesAllows you to retrieve a detailed look at the connected network, or run a ping or traceroute;
for more information, see
.
“Network Utilities Page” on page 131.
•The Logging section, which contains the following tools:
22
Page 23
Organizing Display Information
r
ToolDescription
System InformationGet complete system information: Memory stats, host information, running processes, and Agent
statistics, all on one screen; for more information, see “System Information Page” on page 116.
System LogsView all system messages, info, warnings, and errors at the application, system, and security levels; fo
more information, see “Using the System Logs Page” on page 119.
Administration LogsView current and archived Management Console logs; for more information, see
Administration Logs” on page 118
ISIS SnapshotsCreate a snapshot of the ISIS system for viewing or downloading; for more information, see
Snapshots Page” on page 120.
ProfilerCreate and view profiles of the System Director; for more information, see
page 120
.
.
“ISIS Snapshots Page” on
•The Advanced section, which contains the following tools:
ToolDescription
PreferencesChange and save bandwidth, LCT threshold, device creation, disk error threshold, and other
preferences; for more information, see
.
page 28
External AuthenticationConfigure external authentication servers; for more information, see
Authentication” on page 30
Notification ServiceConfigure email notification on specific system events; for more information, see
“Configuring the Notification Service” on page 31.
Agent SettingsModify agent configuration options and trace settings; for more information, see
Settings Page” on page 139
.
.
“Configuring Management Console Preferences” on
“Configuring External
“Agent
“Using the
“ISIS
Administrator PasswordChange the Management Console Administrator password; for more information, see
“Changing the Administrator Password” on page 29.
Organizing Display Information
You can customize the Main display panel for any option by moving and hiding columns, and by sorting and
filtering information.
Moving Columns
To move a column in the Main display panel:
tClick and drag any column to the position you want, and release the mouse button.
The column appears in the new position, and columns to the right are moved to make room.
23
Page 24
Showing and Hiding Columns
rewqtyu
When you open a Management Console tool (for example, the Storage Managers tool), the Main display panel lists
items in default columns. Depending on the option selected, there might be other headings available to view. You
can select individual or multiple column headings to be displayed or hidden.
To show or hide columns:
tSelect one of the options, right-click in the column heading row and select a heading you want to show or hide.
Displayed column headings are marked by a bullet symbol (•). You cannot hide the first column on the left of
the Main display panel (usually the Name column).
Filtering the Display
Sorting Information
The ISIS Management Console interface allows you to sort information listed in the Main display panel, or in the
Details panel. Sorting the information in columns arranges items in either numerical or alphabetical order. You can
also perform a multilevel sort of the displayed information.
To sort information:
tClick the column heading for the column you want to sort.
The information is sorted in ascending order. To reverse the sort order, click the column heading again.
To perform a multilevel sort:
1. Click the column heading for the first column you want to sort.
The items in the column are sorted in ascending order.
2. Click a second column.
The items in the second column are sorted in ascending order. The items in the first column maintain their sort
order, but with a lower priority than the second sort.
3. (Option) Click multiple columns to add levels to the sort. To cancel a multilevel sort, click a column heading
that has already been sorted.
Filtering the Display
You can limit the items listed in the Main display panel by setting Filter parameters at the bottom of the
Management Console window. Filtering the display allows you to focus on only those items that you want to
monitor. You can restore all items to the display by clearing the Filter parameters.
24
Page 25
1Category menu—Select the category to filter
2“not” operator—Select to exclude items matching the filter rules from the search results
3Condition menu—Select the filter condition
4Search term field—Type the text or value to filter
5Filter button—Perform the filter operation
6Clear button—Clear the filter settings
7Filter results counter—Displays the number of filtered results on the page, and in total
You cannot filter the display for the Bandwidth, Connection Status, and Reservation options.
To filter the display:
1. Select a category from the Category menu.
The Category menu lists all of the column headings available for the selected Command menu option.
2. (Option) Select “not” to exclude the items matching the filter rules from the search results.
3. Click the Condition menu and select the filter condition you want to use.
Updating Information
4. In the Filter text box, type the text or value you want to use to filter the display.
5. Click Filter.
The Main display panel updates to display the filtered results. The Filter panel displays the number of filtered
items displayed and the total number of items available for display.
To restore all items to the display:
tClick Clear.
The Main display panel updates to display all items.
Updating Information
You can update onscreen information to reflect recent system changes by clicking Refresh. You can also use Auto
refresh to automatically refresh information at timed intervals, and prevent your session from timing out.
This setting persists between tools, when you navigate between them using the Related Links, but not between
n
browser sessions, and not if you click Home and then back into the tools. In those cases, Auto refresh reverts to the
default (disabled) setting.
To enable Auto refresh:
tSelect the check box next to the Refresh.
Auto refresh mode is enabled, and a message is displayed.
While Auto refresh mode is enabled, other functions such as add, delete, and details are not available.
n
25
Page 26
To disable Auto refresh:
tDeselect the check box next to the Refresh.
Auto refresh mode is disabled, and the confirmation message closes.
Selecting Items
You can select multiple items in most Management Console tool windows. The methods for selecting more than one
item in a list are similar to those used in Windows Explorer or the Macintosh Finder.
The following table summarizes the methods for selecting items and performing actions.
ActionsSelection Method
To select an itemClick the item.
To select multiple, non-contiguous itemsCtrl+click each item you want to select.
To select multiple, contiguous itemsClick the first item, then Shift+click on the last item.
Selecting Items
Using Context Menus to Perform Actions
Most Management Console tool windows offer context menus you can use to perform commands on selected items.
To access context menus within the Management Console:
tRight-click (Windows and Linux) or Ctrl+click (Macintosh) selected items.
Entering Text
Follow these guidelines when entering text in Management Console tool text fields:
•Names can be a maximum of 31 ASCII characters in length.
•Workspace names must use Unicode characters and cannot include a space.
26
Page 27
Entering Text
•Passwords can be a maximum of 15 ASCII characters in length.
•Do not include a space in the name fields.
•Do not use a period (.) as either the first or last character in the names you create.
•Avoid using the non-permitted characters listed in the following table in the name fields for workspace, group,
file, user, device, or storage group names:
CharacterName
^Circumflex accent
\Backslash
/Forward slash
:Colon
*Asterisk
?Question mark
"Double quotation mark
<Less-than sign
>Greater-than sign
|Vertical line
[Left square bracket
]Right square bracket
+Plus sign
=Equals sign
%Percent sign
;Semicolon
,Comma
@Commercial At symbol
The System Director does not support viewing regional language characters in the Management Console.
n
27
Page 28
2Configuring the Management Console
Avid ISIS provides a number of tools to customize the way the Management Console functions and interacts with
the network and other Avid products.
Configuring Management Console Preferences
The Preferences tool allows you to set parameters that apply to the basic functionality of the ISIS
Management Console.
To configure Management Console Preferences:
1. From the Management Console home page, click the Preferences icon, located in the Advanced section.
The Preferences tool opens.
2. Configure ISIS preferences. The following table summarizes the ISIS Preferences items.
OptionTypeDescription
Total System Bandwidth
(MB/sec)
Default Bandwidth for Auto
Created Devices (MB/sec)
Force Manual Device Creationcheck boxIf enabled, clients which do not have an entry in the Devices list will not be
Show status prior to logincheck boxWhen selected, prevents anyone from seeing the Status Console panel on
The following options should only be altered under the direction of qualified Avid service or support personnel.
c
Default LCT Threshold (ms)text
text
(numeric)
text
(numeric)
(numeric)
Total reservation bandwidth allowed by the system, in MB/sec. Default
value is 1,000 MB/sec. When this value has been reached, ISIS will no
longer accept bandwidth reservations from clients.
This value does not represent the actual bandwidth capabilities of the
n
ISIS system. For more information about ISIS bandwidth capabilities,
see the Avid ISIS Performance Guide.
Reservation bandwidth allowed for devices that are automatically created at
connection time. Default value is 0 (zero). Using the default value results in
auto-created devices being granted unlimited bandwidth.
allowed to connect. The Administrator must manually create a device
account for every client computer that is expected to connect to the ISIS
system. Default value is disabled.
the left side before they log in. Only administrators can change this setting.
This setting is disabled by default; users can see the Status Console before
logging in.
Defines the upper limit of the Long Command Time (LCT) value, above
which the Storage Manager will report a Disk Degraded condition to the
System Director. Default value is 0 (zero). Using the value of zero sets the
LCT threshold to the internal system default of 750ms.
28
Page 29
OptionTypeDescription (Continued)
Changing the Administrator Password
Default Hard Disk Error
Threshold
Enable failover if standby has
more active NICS
(7500 and 2500)
Auto Remove Redistribution on
Disk Failure (7500)
Delete Loggingcheck boxLogs all deletes performed in the Storage Groups. For more information
Auto-Rectifycheck boxAutomatically reconciles the actual amount of used space and the reported
text
(numeric)
check boxWhen enabled, this causes the Active System Director to failover to the
check boxDefault value is enabled. For more information about Auto Remove
3. (Option) To revert all options to the previously saved values, click Refresh.
4. Click Save Preferences to save your changes.
Creating a Log of File Deletions
Defines the upper limit for number of hard disk errors before the
Storage Manager reports a Disk Failure condition to the System Director.
Default value is 0 (zero). Using the value of zero sets the LCT threshold to
the internal system default of 25 errors).
Standby System Director if the network connection fails. Default value is
enabled.
Redistribution, see
about delete logging, see
Default value is disabled.
amount of used space on a system.Default value is disabled. Takes effect
immediately with no restart required.
“Automatic Redistribution on Disk Failure” on page 83.
“Creating a Log of File Deletions” on page 29.
The delete-logging function is controlled in the Management Console Preferences. When enabled, log files are
created and saved in the following location:
D:\Program Files\Avid\ISIS System Director\DeleteLogs
Log file names include name contains the date and time, for example
“ISISdeleteLog-07_17_2012_17_59_30_322.csv.” Individual log files are limited to 4 MB in size except where a
new log file would have the same name as an existing one. Up to 100 log files are kept then the oldest files are
deleted.
®
You can view the delete log files (.csv) using Microsoft
Excel®. The first field does not display the date until you
select the cell and click the text entry box at the top of the spreadsheet.
Each entry in the log file consists of the following fields:
•Date and time of the file delete (19 characters)
•Name of the ISIS user initiating the delete (32 characters)
•Name of the client system the delete was issued from (32 characters)
•Full path of deleted file starting with the workspace name
Changing the Administrator Password
The Management Console Administrator password is blank by default; it is highly recommended that you set an
Administrator password when you use the Management Console for the first time.
29
Page 30
To change the Administrator password:
1. From the Management Console home page, click the Administrator Password icon, located in the Advanced
section.
The Administrator Password tool opens.
2. Type the current Administrator password in the Current Password field (blank by default).
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Change.
-The Administrator Password is changed to the new value.
-A confirmation message appears in the Results area.
Configuring External Authentication
Users added to the system through the LDAP Sync Tool are automatically configured as remote LDAP users in the
ISIS system. When a remote LDAP user logs into the ISIS system, ISIS checks with an external LDAP server to
authenticate the user instead of the local ISIS user database. Before remote LDAP users can access the ISIS system,
you must configure ISIS to use an external LDAP server for authentication.
Configuring External Authentication
For more information on working with LDAP users and groups, see
To configure external Authentication:
1. From the Management Console home page, click the External Authentication icon, located in the Advanced
section.
The External Authentication tool opens.
2. Click the Enable check box to select it.
The Domain Name text box becomes active.
3. In the Domain Name text box, enter the domain name of the network which the LDAP server(s) are members of,
including subdomains, if applicable.
Use the format subdomain.domain.top-level-domain; for example:
dir.company.com
4. Click the “Server 0” check box to select it.
The Address text box becomes active.
5. In the Address text box, enter the fully-qualified domain name of the LDAP server.
Use the format servername.subdomain.domain.top-level-domain; for example:
server1.dir.company.com
6. (Option) Repeat steps 3 – 5 (using the “Server 1” and “Server 2” check boxes) to configure additional backup
LDAP servers, if applicable.
“Managing LDAP Accounts” on page 99.
All of the LDAP servers must be mirrors, and reside on the same subdomain/domain.
n
7. When you have finished entering server information, click Submit.
The domain and LDAP server information is added to the ISIS database, and a confirmation message is
displayed in the Results area.
30
Page 31
Configuring the Notification Service
You can use the Notification Service tool to configure System Director to notify you when problems occur. An error
notification service regularly polls the Windows System Event log and, if any errors are logged, sends a concise
summary of those errors to one or more email accounts.
The Notification Service tool window is divided into three main sections:
•Configuration – Start and stop the Notification Service, and configure the Notification Service settings.
•Filters – Modify the parameters that define when email notifications are sent to email recipients.
•Contacts – Add and modify email recipients.
Starting, Stopping, and Configuring the Notification Service
The configuration information for the notification service (SMTP information, contacts, and filters) is currently
stored in the registry on the System Director. This information is not currently replicated to the Dual System
Director server, so you must enter configuration information for notification service on both System Directors.
To configure the Notification Service:
1. From the Management Console home page, click the Notification Service icon, located in the Advanced
section.
Configuring the Notification Service
The Notification Service tool opens.
2. Click the Enable Service check box to toggle between checked and cleared.
tIf the check box is checked, the Notification Service is enabled.
tIf the check box is cleared, the Notification Service is disabled.
3. (Option) configure the Notification service settings. The following table summarizes the Notification Service
settings.
OptionTypeDescription
SMTP ServertextThe IP address or host name of your SMTP server.
SMTP Porttext (numeric) The port number of your SMTP server. The default value (25) is appropriate in
most instances.
Poll Frequency (seconds)text (numeric) The frequency (in seconds) with which the error notification service checks for
problems.
Return AddresstextThe email address of the Avid ISIS administrator or other primary contact for the
error notification service.
4. (Option) To test the configuration settings, click Test.
The results of the service test are displayed in the Results area.
5. Click Save.
-A confirmation message is displayed in the Results area.
-If you started or stopped the Notification Service, the Service State will change to reflect the new service
state.
6. (Option) Click Reset.
31
Page 32
The changes for the configuration will be lost.
Configuring Error Notification Parameters
The Filters area of the Notification Service tool window allows you to specify the type of error message that triggers
an email notification and to set parameters for each type of error message—Error, Warning, and Information
messages.
You can configure the ISIS to send notification emails for one or more error types and what severity level on which
to be notified.
Configuring the Notification Service
For a complete list of Avid ISIS email notifications, see
To configure error notification parameters:
1. In the Filters section, select or deselect individual notifications by clicking the check boxes corresponding to the
error notification.
2. Click Save.
The settings are saved, and a confirmation message is displayed in the Results area.
Configuring Contact Information
You must specify the contact information for all the people you want to receive ISIS notification emails.
To add contacts:
1. In the Contacts section, click New.
Empty User Name and Email fields open.
2. Type a user name into the first text box.
This can be any name you want to assign to the user.
3. Type a valid email address into the second text box.
4. Click Save.
5. Repeat steps 1 – 4 to add more email contacts, if needed.
“Avid ISIS E-mail Notification List” on page 173.
To remove a contact:
1. Click Delete next to the email contact entry.
The contact is removed from the list.
2. Click Save.
32
Page 33
3Managing Avid ISIS Hardware
This section describes how to configure and manage your storage hardware. You perform all storage management
operations from the Avid ISIS Management Console, which allows you to add, remove, configure, and manage your
Storage Managers.
For an overview of the ISIS Management Console and information about how to start the tool, see “Opening the
n
Management Console” on page 15.
Managing Storage Managers
The Storage Managers tool coordinates and controls the activity of Storage Managers. The Storage Managers tool
allows you to bind/unbind Storage Managers and perform maintenance operations.
Before you start building Storage Groups and Workspaces, you must bind each Storage Manager to the ISIS file
system to make Storage Managers available for use.
33
Page 34
1Action button toolbar — Perform actions on selected Storage Managers
Managing Storage Managers
2Details panel—Detailed information on the selected Storage Managers; see
page 35
3Storage Managers list — Lists all configured Storage Managers and related information; see “Storage Manager Column
List” on page 34
4Filter panel — Filter the Storage Managers list display based on conditions you configure; see “Filtering the Display” on
page 24
5IP addresses list — Displays the IP addresses of the selected Storage Manager
Storage Manager Column List
The following table summarizes the basic information available when you first open the Storage Manager list. Some
columns are hidden by default (see
HeadingDescription
NameDisplays the system-created name of each Storage Manager connected to the system
ISB Name (ISIS | 7500)Displays the name of the ISB in the ISIS | 7500 Engine
Hostname (ISIS | 5500 and
ISIS | 2500)
Status TimeLists the last time the System Director logged the Storage Manager’s status
Displays the host name of the Storage Manager (System Director or Engine)
“Viewing Storage Manager Details” on
“Showing and Hiding Columns” on page 24).
StatusDisplays any change in the working status logged by the System Director (for a description of
status messages, see
StateDisplays the Storage Manager state (Bound/Unbound)
UptimeDisplays the amount of time Storage Manager service has been running (days:hours:min:sec)
Temperature (ISIS | 7500)Displays the temperature of each ISB in the ISIS | 7500 Engine
TypeDisplays the Storage Manager type (ISIS | 7500 - ISB size, ISIS | 5500 - ISIS Engine,
ISIS 2000 - Nearline Engine)
CapacityDisplays the total capacity of all Storage Managers controlled by the selected Storage Manager
UsableDisplays the amount of storage space in gigabytes (GB) remaining
UsedDisplays the amount of used space in gigabytes (GB)
VersionDisplays the software version number of each Storage Manager
Engine SerialDisplays the serial number of the Engine
Slot Number (ISIS | 7500)Displays the slot location of the ISB in the Engine, see
Storage Managers Prior to Removal” on page 41
Domain ID (ISIS | 7500)Displays the domain ID number of the Management Domain (stack) for each Engine (chassis)
in which the Storage Manager is part of.
Domain ID numbers are not displayed until the Storage Managers are bound.
n
Chunk SizeDisplays the smallest unit of data that can be written to the shared storage network.
“Storage Manager Status” on page 36)
“Identifying the ISIS | 7500
34
Page 35
Managing Storage Managers
HeadingDescription (Continued)
Storage GroupDisplays the Storage Group, if any, to which the Storage Manager is allocated.
You can organize the information in the Storage Managers list by showing additional columns or by sorting or
n
filtering displayed items. For more information on modifying the display, see “Organizing Display Information” on
page 23.
A color-coded icon precedes the name of each Storage Manager, providing an indication of the status of the
component. The following table describes the color coding system used by the ISIS Management Console.
Icon ColorDescription
WhiteIndicates the status of the Storage Manager is Unbound (the Storage Manager is not linked to the ISIS
file system)
GreenIndicates the Storage Manager is bound to the file system
YellowIndicates one of the following:
•a problem with the Storage Manager
•the Storage Manager is experiencing degraded performance
Blue (ISIS | 7500)Indicates that an installation or software upgrade is in progress
RedIndicates a Storage Manager problem, including any of the following:
•a hardware error
•a failed software installation or upgrade
Viewing Storage Manager Details
The Details panel displays all information for the currently selected Storage Manager. The information displayed is
the information as seen by the System Director. Some of the information is embedded in the Storage Manager, and
other information is assigned to the Storage Manager by the Avid ISIS software.
The information displayed in the Details panel is the same as that shown in the Storage Managers tool; see
Manager Column List” on page 34
To view detailed information about a Storage Manager:
1. In the Storage Manager list, select a Storage Manager.
2. Do one of the following:
tClick Details.
tDouble-click the Storage Manager name.
The Details panel displays all the information for the selected Storage Manager. For more information, see
“Viewing Storage Manager Details” on page 35.
.
“Storage
To close the Details panel:
tClick Details.
35
Page 36
Storage Manager Status
The Status column in the Storage Managers list reports the status of the Storage Managers logged by the
System Director. (The Status line in the Details panel reports the same information.) If the Storage Manager
maintains a working status, the ISIS Management Console lists no entries in the Status field. When a problem arises,
or when the status of the Storage Manager changes, the ISIS Management Console updates the Storage Managers
display.
The following table summarizes the Storage Manager status messages, in alphabetical order.
StatusDescription
Data conversion modeA fully populated ISIS 2000 system is running a one-time data conversion redistribution.
Demonstration modeA system is configured to run in demonstration mode with limited ability. Demonstration
Disk FailureThe hard disk error threshold for a disk has been exceeded and the Storage Manager has
Managing Storage Managers
This mode applies only to ISIS v4.5 on ISIS 2000, and is required to upgrade a fully
populated ISIS 2000 from v4.5).
mode runs on non-approved hardware (such as a laptop).
taken the disk offline. The default threshold is 25 hard errors.
•For the ISIS | 7500, a Storage Manager or disk showing this status should be removed
from the Storage Group, triggering a redistribution. Once the redistribution is complete,
the Storage Manager on the ISIS | 7500 can then be removed from the file system, and
physically removed from the Engine.
•For the ISIS | 5500 and ISIS | 2500, the disk should be removed, not the entire Storage
Manager. The disks should be left physically in the Engine as the disk participates in the
redistribution.
Disk fullOne or more Storage Managers in a Storage Group has reached its full capacity. Even if
some of the Storage Managers still have available space, the Storage Group is considered full
as soon as one Storage Manager is filled. As data is written and deleted, some Storage
Managers are filled before others. During redistribution, the data is redistributed evenly
among the Storage Managers.
Disk Performance DegradedDisk Performance Degraded: There are two parameters that can trigger this status.
•A disk has logged a Long Command Time. The ISIS system periodically clears this log.
The Long Command Time counter is also cleared during a reboot.
•Once a disk reaches 75% of its hard error threshold, it triggers disk performance degrade.
This status is reset only by rebooting the Engine.
If an ISIS | 7500 Storage Manager is reporting this status, remove the ISB from the
Storage Group, triggering a redistribution.
Drive controller error(ISIS | 5500) The drive controller has reported an error.
Foreign diskA drive with an existing RAID signature has been inserted into a system and cannot be used
as a spare or as part of a RAID configuration until the signature is cleared. To clear the
foreign configuration, see the Avid ISIS Setup Guide. When you click “Format Foreign
Disks” the Status is cleared.
InitializingThe ISIS | 5500 and ISIS | 2500 RAID set is being initialized. This could take several hours
to several days. You can use the Engine while the RAID set is initializing.
Install failed - Phase #A message displays if the ISIS | 7500 ISB fails during the three phases of the upgrade or
during the two phases of the ISIS | 2500 upgrade.
36
Page 37
Managing Storage Managers
Status (Continued)Description (Continued)
Install neededThis message displays if the ISIS | 7500 or ISIS | 2500 Storage Manager (Engine Controller
in ISIS | 2500) is not at the same version of the ISIS System Director software. Select all the
storage Managers and click Upgrade.
Install needed - No Connection (ISIS | 7500) This a normal one-time message displayed only during the upgrade from v4.0
and earlier to v4.0.1 and later.
Invalid number of drivesThe Storage Manager has determined it doesn't have enough drives to run in the bound
operating mode. In this mode the Storage Manager only communicates with the System
Director, no clients are allowed to connect, and the Storage Manager is not functional in the
Storage Group.
Once the Administrator has addressed the issue in the Storage Manager, the Storage Manager
must be restarted via the Storage Manager agent.
Invalid spare driveA replacement drive installed to become the new spare is not qualified as an acceptable spare
drive for this Engine. Obtain another replacement drive. When a valid replacement drive is
installed, it becomes the new spare and the status is cleared.
Memory ErrorThe Storage Manager runs a memory test when it starts or restarts reports any errors; this
status is persistent. Replace the Storage Manager as soon as possible.
Metadata error (ISIS | 7500) The Storage Manager experienced an error loading metadata from the disk or
writing new metadata to the disk (if mirrored in the ISIS | 7500, the data on the mirrored
Storage Manager is still available and no actual data loss occurs); this indicates that the
Storage Manager should be replaced.
Reboot the Storage Manager with this status. If “Metadata Error” status exists after a reboot,
replace the Storage Manager. If the Metadata Error status clears after a reboot, then no
further action is required.
Missing spare drive(ISIS | 5500 and ISIS | 2500) A rebuild automatically occurs on drive failure by using a spare
disk in the Engine. When the spare has been used to replace a failed disk, this warning
message is displayed in the Management Console. Obtain a replacement drive for the failed
drive. When the replacement drive is installed, it becomes the new spare and the status is
cleared. There is one spare drive in each ISIS | 5500 Engine and two spare drives in each
ISIS | 2500 Engine.
Network degradedThe IP interfaces on the Storage Manager have failed or the Storage Manager experiences at
least a 10% error rate (usually due to lost packets), indicating a network communication
problem.
Although the Storage Manager is reporting and detecting the errors, it is usually not the
Storage Manager itself that is the problem. Seating issues, slot issues, midplane problems,
switch problems, stacking issues, or anything that contributes to bad data getting to the
Storage Manager can cause this status. See the tech note “How to troubleshoot Network
Degraded” for further details on how to handle this status.
Offline(ISIS | 7500) The Storage Manager has been taken offline. It is good practice to take a
Storage Manager offline before reseating or removing it.
Rectifying FilesThe Storage Manager is cleaning up deleted files and verifying existing files. This occurs
every time the Storage Manager restarts and every 10 days thereafter, and also when
manually initiated. Each Storage Manager staggers their process so that they do not run
simultaneously.
Redistribution details availableA problem with redistribution occurred. Open the Agent page for the Storage Manager to see
the details.
37
Page 38
Status (Continued)Description (Continued)
Repairing Mirrors (ISIS | 7500) The Storage Manager is repairing mirrored blocks with a single point of failure.
This Storage Manager has 25 or more blocks that it cannot mirror to another ISB. This can
occur due to transient conditions like another ISB rebooting, network problems, or a
redistribution in progress. If this condition persists, further troubleshooting is required.
Server Performance Degraded The Storage Manager chassis needs to be rebooted as soon as possible.
Test ModeThe disks in the Storage Manager are in test mode. This is an Error Insertion function that
should only be done by Avid Customer Support.
Binding Storage Managers to the ISIS File System
Before you start building Storage Groups and Workspaces, you must bind each Storage Manager to the ISIS file
system to make Storage Managers available for use.
To bind a Storage Manager to the ISIS file system:
1. Click to select the Storage Manager you want to bind.
2. Click Bind.
Managing Storage Managers
A Bind Settings dialog appears.
3. Enter the appropriate chunk size for the Storage Manager (for more information, see
Chunk Sizes” on page 63
4. Click OK to bind the Storage Manager.
The selected Storage Manager is added to the ISIS file system, and its state is changed to Active - Bound.
).
Unbinding Storage Managers from the ISIS File System
Avid strongly recommends that you wait until any redistribution process completes before unbinding
Storage Managers. Redistribution can take a long time; use the Redistribution Monitor tool (see
Redistributions” on page 87
You cannot unbind a Storage Manager that is part of a Storage Group. You must remove the Storage Manager from
n
its Storage Group first so the system can redistribute data before unbinding the Storage Manager from the file
system. For more information about removing Storage Managers from a Storage Group, see “Removing ISIS
Storage Managers from Storage Groups” on page 66.
Before you can unbind a Storage Manager from the ISIS file system, it must be in the Spare state.
To unbind a Storage Manager from the ISIS file system:
1. Click to select the Storage Manager you want to unbind.
2. Click Unbind.
) to track the progress and estimate the time remaining.
“Storage Groups and
“Monitoring
A confirmation dialog appears.
3. Click Yes to confirm.
The selected Storage Manager is removed from the ISIS file system and its state changes to Unbound.
38
Page 39
Clearing Network Degraded Status Messages
You can use the Issue Command button to clear all Network Degraded status messages from the Storage Managers
list. Network Degraded status indicates a high number of errors detected by the Storage Manager (see
“Storage Manager Status” on page 36). If correcting the problem does not clear the status messages, use the Issue
Command button to clear the messages and reset the error count.
Managing Storage Managers
c
Correct the cause of the Network Degraded status messages before you clear them from the ISIS
Management Console.
To clear all Network Degraded messages in the Storage Managers list:
1. Select one or more Storage Managers from the Storage Managers list.
You can use the Shift and Control keys to select multiple items. For more information, see
page 26
2. Click Issue Command.
The Issue Storage Manager(s) Command window opens.
3. Click Clear Network Degraded, and then click Send.
.
Upgrading Storage Managers
On ISIS | 7500 and ISIS | 2500 systems, you can use the Storage Managers tool to upgrade the Storage Manager
software installed in an Engine and connected to the shared storage network.
On ISIS | 7500 systems, you can also use the Engines page to upgrade Storage Managers (Blades) and switches. For
n
more information, see “Upgrading ISIS | 7500 Engine Components” on page 47.
To upgrade a Storage software:
1. Select the Storage Managers you want to upgrade.
“Selecting Items” on
2. Click Upgrade.
The Upgrade Storage Managers dialog box opens.
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid
support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
The ISIS Management Console installs the necessary upgrade for the selected Storage Manager. You can
monitor the progress of the upgrade either in the Details panel of the Storage Manager tool or in the ISIS | 7500
System Monitor tool.
Removing Storage Managers from the ISIS | 7500 Shared Storage Network
You can remove and replace Storage Managers without stopping the System Director or turning off other
components of the network. There are two principal reasons for removing Storage Managers from the system:
•The Manager has a high number of unrecoverable errors
•The Manager has failed or has been removed from the system
39
Page 40
Managing Storage Managers
If you do not have a replacement for a failed or failing Storage Manager, Avid recommends that you physically leave
n
it in the Engine (ISIS | 7500 only), even after it has been removed from the file system. Proper airflow cannot be
guaranteed if a Storage Manager slot is left open.
Before you remove an Avid ISIS Storage Manager from the network, you must redistribute the data stored on the
Storage Manager to other Storage Managers in the system. The redistribution occurs before you physically remove
the Storage Manager, and the process entails moving data to the remaining drives within the Storage Group. Once
you redistribute the data, you add a new Storage Manager to the system and then perform a redistribution again to
place data onto the new Storage Manager.
c
n
n
c
If you physically remove a Storage Manager from the shared storage network before redistribution is
complete, data loss can occur.
Maintain an unused block of storage equivalent to one Storage Manager within the Storage Group to allow
redistribution from a failing Storage Manager to other Storage Managers within the group.
If possible, redistribute data while the drive is experiencing problems but has not yet been removed from the system.
This allows the Storage Manager having problems to participate in the redistribution process by offering its data to
both clients and to other Storage Managers.
Often the Storage Manager is still functional, but its performance is slightly degraded — for example, the
Storage Manager might have an unrecoverable error on one of its disks, or it might have long I/O times.
If the Storage Manager fails, or if it has been removed from the system, you can perform a redistribution from the
mirrored or RAID locations associated with the Storage Manager. However, if any other mirrored location
experiences a failure while performing a redistribution, the system can lose data.
If the failed Storage Manager was part of an unprotected Workspace, data loss is likely.
Consider the following when planning a redistribution:
•A one-to-one replacement of Storage Managers might leave you with less storage space in the Storage Group
than you require. Instead, plan for using more Storage Managers than you need for storage and bandwidth for
each Storage Group. This way, you can keep an optimal amount of available storage space allocated to the
Storage Group. This allows you to quickly perform redistribution, rather than attempting a redistribution with
only one spare Storage Manager.
•In general, the removal of a Storage Manager is quicker than an addition. This is because all of the other
Storage Managers in a Storage Group participate in redistribution by moving a copy of any block held by the
Manager to another location. The more Storage Managers in the Storage Group, the more the workload is
shared. A single Storage Manager addition is slower than a removal because the Storage Manager receiving the
data acts as a limiting factor for the redistribution.
•When you add a new Storage Manager to the Avid ISIS file system and then add it to a Storage Group, the
system redistributes data from the existing drives in the Storage Group to the new Storage Manager. This
redistribution maintains all previously stored data, but the data might not reside on the same Storage Managers.
The following steps list the actions necessary for removing a Storage Manager:
1. Identify the Storage Manager to replace.
2. Remove the Storage Manager from the Storage Group.
3. View the status of the redistribution and wait for redistribution to finish.
4. Unbind the Storage Manager from the Storage Group.
5. Physically remove and replace the Storage Manager.
40
Page 41
6. Add the new Storage Manager to the file system.
ISIS slot numbering
01 23
456 7
89
1011
12131415
7. Add the new Storage Manager to a Storage Group.
For more information on the process of redistributing data and how redistribution affects system performance,
see “Redistribution Guidelines” on page 82
Redistributing while adding a Storage Manager takes longer than redistributing while removing an ISB.
n
Identifying the ISIS | 7500 Storage Managers Prior to Removal
To identify the Storage Manager to be removed and replaced:
1. Locate the failing or failed Storage Manager. For information on Storage Manager status, see “Storage Manager
Status” on page 36
2. Select the Storage Manager, and do one of the following:
tClick Details.
tDouble-click the name of the Storage Manager.
The Details panel opens.
The Details panel lists the Engine Serial number and the Slot Number of the selected Storage Manager. The slot
number identifies the Storage Manager to be physically removed.
.
.
Managing Storage Managers
The slot numbers for Storage Managers begin at zero (0).
n
Preparing to Removing Storage Managers from the Avid ISIS Engine
After you have identified the Storage Manager you want to remove, remove it from the Storage Group before you
physically remove it from the Engine.
c
You must finish the redistribution before you physically remove the Storage Manager. If you do not wait until
the redistribution finishes, shared storage network clients might receive multiple errors.
To physically remove a Storage Manager from your shared storage network:
1. Remove the Storage Manager from its Storage Group. For information on removing Storage Managers, see
“Removing ISIS Storage Managers from Storage Groups” on page 66.
2. Open the Workspaces tool by clicking the Workspaces icon in the System section of the Management Console
home page.
The Workspaces tool opens.
3. Select the Workspace for the appropriate Storage Group.
4. Monitor the Status column for to update the display.
41
Page 42
Managing Storage Managers
The Status column displays no status message when the redistribution is complete. Alternatively, because
redistribution can take a long time, you can track the progress of the redistribution in the Storage Managers
Monitor tool (see “Monitoring Redistributions” on page 87
).
c
Do not remove the Storage Manager before the redistribution has completed.
5. Unbind the Storage Manager from the ISIS file system; see “Unbinding Storage Managers from the ISIS File
System” on page 38
6. In the Storage Manager list, select the Storage Manager you want to remove and then click Issue Command.
The Issue Storage Manager(s) Command dialog box opens.
7. Select Take Offline, and then click Send.
If you remove an active Storage Manager by mistake, the System Director restores the Storage Manager to the
n
Storage Manager list the next time it polls the shared storage network (usually within 20 seconds).
The system spins down the drives in the selected Storage Manager and changes the status in the
Storage Managers list to Offline.
8. Disconnect the Storage Manager from the network, as described in the Avid ISIS Setup Guide.
.
Removing Orphaned Storage Managers
Orphaned Managers are Storage Managers connected to a file system which is not currently in use. This can happen
when a Storage Manager is moved from one ISIS environment to another, or when you use the System Director
Control Panel to create a new active partition on a system that already includes bound Storage Managers. The
“Force Remove” command will remove the file system binding from the Storage Manager and make it available for
use in the current file system.
c
To remove orphaned Storage Managers, you must force-remove them from the system.
Removing Storage Managers causes all data stored on them to be erased. Do not remove disconnected
Storage Managers unless you are certain they contain no data you want to save.
To remove orphaned Storage Managers:
1. From the Management Console home page, click the Storage Managers icon, located in the System section.
The Storage Managers tool opens.
2. Select the orphaned Manager you want to force-remove.
3. Click Force Remove.
A message warns you that removing Storage Managers erases all data on the component.
4. Click Yes.
The Force Removal Text Confirmation dialog box opens.
5. Type
Remove
The orphaned Storage Manager is unbound from the ISIS file system and removed from the Orphaned
Managers list.
in the text box, and then click Remove.
42
Page 43
Initiate Block Rectify
Once you have added Storage Managers to your network and configured them for storage, the Storage Manager
periodically checks the status of stored files, cleaning up deleted files and verifying existing files. This process,
called “rectifying files,” allows the Storage Managers to communicate with the System Director to monitor the state
of its storage and clean up any files that the Storage Managers no longer need to store. Rectifying files occurs
randomly and asynchronously during normal system operation to minimize any potential decrease in system
performance. The process is indicated for each affected Storage Manager in the Status column in the
Storage Manager list.
Storage Managers also rectify files when starting or restarting. When this happens, data stored on the
Storage Managers might not be in sync with the data in the file system itself. Also, if a client, such as the asset
manager, cannot communicate with the Storage Manager, there might appear to be more data allocated to the
Storage Managers than the file system has allocated. To correct this, you can manually send the Storage Manager a
command to rectify its files.
To rectify files:
1. Select one or more Storage Managers from the Storage Managers list.
Managing ISIS | 7500 Switch Blades
You can use the Shift and Control keys to select multiple items. For more information, see
page 26
.
2. Click Issue Command.
The Issue Storage Manager(s) Command dialog box opens.
3. Select Initiate Block Rectify, and then click Send.
The system rectifies files on the selected Storage Managers and changes the status in the Storage Managers list
to Rectifying Files.
Managing ISIS | 7500 Switch Blades
The Switch Blades tool of the ISIS Management Console allows you to monitor and upgrade all Switch Blades
connected to the shared storage network. You can also launch the Agents for the selected Switch Blades to view
details and change configuration.
ISIS | 7500 Switch Blades Column List
The following table summarizes the information available in the Switch Blades list.
HeadingDescription
In band IPDisplays the internal IP addresses assigned to the CPU on the switch
“Selecting Items” on
Status TimeThe time at which the current status display was reported
StatusDisplays changes in the working status of the switch
VersionDisplays the software version number of each switch
TypeIdentifies the switch as one of the following:
•Integrated (ISS)
•Expansion (IXS)
43
Page 44
HeadingDescription (Continued)
TempLists the last logged temperature of the switch, in degrees Celsius
Chassis MasterIndicates if an ISS or an IXS module is used as a master switch in the Engine
Base IPThe base IP addresses of the switch, which are assigned during system configuration; for more information,
see the Avid ISIS Setup Guide
Out of band IPThe IP address of the Switch Blade management port; for more information about the management port,
see the Avid ISIS Setup Guide
Engine SerialDisplays the serial number of the Engine
Viewing ISIS | 7500 Switch Blade Details
You can view detailed information on Switch Blades using Avid ISIS Switch Blade Agents, which can be accessed
through the Switch Blades tool. For more information about Avid ISIS Switch Blade Agents, see
Switch Blade Agent” on page 155
To launch Avid ISIS Switch Blade Agents:
1. From the Switch Blades list, select a Switch Blade.
.
Managing ISIS | 7500 Switch Blades
“Avid ISIS | 7500
2. Click Show Info.
The Avid ISIS Switch Blade Agent opens.
The default switch Agent page password is se-admin.
n
Upgrading ISIS | 7500 Switch Blades
You can use the Switch Blades tool to upgrade the software for Switch Blades installed in an Engine and connected
to the shared storage network.
You can also use the Engine page to upgrade Switch Blades. For more information, see “Upgrading ISIS | 7500
n
Engine Components” on page 47.
To upgrade Switch Blades:
1. From the Management Console home page, click the Switch Blades icon, located in the System section.
The Switch Blades tool opens.
2. Select the Switch Blade you want to upgrade.
3. Click Upgrade Switches.
The Upgrade Switch Blades dialog box opens.
4. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid
support personnel. Doing so can result in system degradation and data loss.
5. Click Upgrade.
44
Page 45
The ISIS Management Console installs the necessary upgrade for the selected Switch Blade. You can monitor
the progress of the upgrade either in the Details panel of the Switch Blades tool or in the Avid ISIS System
Monitor tool.
Managing the Engine
The Engines page of the ISIS Management Console allows you to view details and to monitor the status of all
Engine connected to the shared storage network, as well as ISIS | 7500 Storage Managers, ISIS | 7500 Integrated
switches (ISS), ISIS | 7500 Expansion Integrated switches (IXS), ISIS | 7500 and ISIS | 5500 power blades, and ISIS
7500 | 7000 upgrades.
Engine Column List
The following table summarizes the information available in the Engine list.
HeadingDescription
Serial NumberSerial number of the Engine
Status TimeThe last time the System Director logged the status of the Engine
Managing the Engine
StatusDisplays changes in the working status of Storage Manager components due to upgrade
installation or failure.
On the ISIS | 7500 it also displays changes in the working status of ISS and IXS
modules due to upgrade installation or failure.
Uptime (ISIS | 5500)Displays the length of time that the Storage Manager has been running continuously
AvailableLists the number of available Storage Managers in each Engine
SpareLists the number of spare Storage Managers in each Engine
ActiveLists the number of active Storage Managers in each Engine
Storage Blades (ISIS | 7500)Lists the number of Storage Manager components installed in each Engine
Switch Blades (ISIS | 7500)Lists the number of ISS and IXS modules for each Engine
Power Blades (ISIS | 7500 and
ISIS | 5500)
Free Memory (ISIS | 5500 and
ISIS | 2500)
Total Memory (ISIS | 5500 and
ISIS | 2500)
Product Serial (ISIS | 5500)Displays the Avid part number for the ISIS | 5500 product. The ISIS 5500 | 5000 has
Lists the number of power supply units for each Engine
Displays the amount of memory not in use
Displays the total amount of available memory
more than one ISIS | 5500 Engine configuration.
Product Part Number (ISIS | 2500)Displays the Avid part number for the ISIS | 2500 product.
45
Page 46
Engine Details
The Details panel displays all information for the currently selected Engines. The panel is divided into three
sections:
•Engine Details — displays the same information as in the Engine list
•Switches (ISIS | 7500) — lists basic configuration and status information of all ISS and IXS modules connected
to the shared storage network
•Storage Managers — displays information also available in the Storage Managers list
The information displayed is as seen by the System Director. Some of the information is embedded in the Engine,
and other information is assigned to the Engine by the Avid ISIS software.
You can sort the information in the Switches and Storage Managers sections of the Details panel by clicking any
column heading. For more information on sorting items in columns, see
You can view more detailed information on Engine components by using the Avid ISIS Agent tool. For more
n
information, see “Avid ISIS Storage Manager Agent” on page 141 and “Avid ISIS Storage Manager Agent” on
page 141.
To view information about an Engine:
Managing the Engine
“Sorting Information” on page 24.
1. In the Engine list, select an Engine.
2. Do one of the following:
tClick Details.
tDouble-click the Engine name.
The Details panel displays all the information for the selected Engine.
To close the Details panel:
tClick Details.
Removing Engines from the Engine List
If you need to replace an Engine, you can use the ISIS Management Console to remove the connection history of the
inactive or inoperative Engine from the list in the Engines page. Once the Engine is removed from the ISIS file
system, you can physically remove it from the network.
For information on removing Engines from the network, see the Avid ISIS Setup Guide.
To remove an Engine from the Engine list:
1. In the Engine list, select the Engine to remove.
2. Click Remove Status.
The Engine is removed from the Engine list.
If you remove an active Engine by mistake, the System Director restores the Engine to the Engine list the next time it
n
polls the shared storage network (usually within 20 seconds).
46
Page 47
Upgrading ISIS | 7500 Engine Components
On an ISIS | 7500 system, you can use the Engines page to upgrade the software for all Storage Managers and all
Switch Blades installed in an Engine and connected to the shared storage network. You can also upgrade individual
Storage Managers and switches.
You might lose network connectivity temporarily when you upgrade Switch Blades while the upgrade process
n
reboots the switches.
To upgrade all Storage Managers and switches in an Engine:
1. In the Engine list, select the Engine to upgrade.
2. Do one of the following:
tClick Upgrade Blades.
tClick Upgrade Switches.
The Upgrade Storage Managers dialog box or the Upgrade Switch Blades dialog box opens.
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Managing the Engine
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid
support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
The ISIS Management Console installs the necessary upgrades for all Storage Managers or for all Switch
Blades for the selected Engine. You can monitor the progress of the upgrade either in the Details panel of the
Engine page or in the Avid ISIS System Monitor tool.
You can upgrade individual Storage Managers and Switch Blades in the Engine page. You can also upgrade
Storage Managers by using the Storage Managers page and Switch Blades by using the Switch Blades page. For
more information on Storage Manager upgrades, see
information on Switch Blade upgrades, see
To upgrade individual Storage Managers and switches in an Engine:
1. In the Details panel of the Engine page, do one of the following:
tSelect the switch you want to upgrade.
tSelect the Storage Manager you want to upgrade.
2. Click Upgrade.
The Upgrade Storage Elements dialog box or the Upgrade Switches dialog box opens.
“Upgrading ISIS | 7500 Switch Blades” on page 44.
“Upgrading Storage Managers” on page 39. For more
c
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid
support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
47
Page 48
Managing the Engine
The ISIS Management Console installs the necessary upgrade for the selected Storage Manager or Switch
Blade. You can monitor the progress of the upgrade either in the Details panel of the Storage Managers page or
in the Avid ISIS System Monitor page.
48
Page 49
4Avid ISIS Control Panels
When you log into the Avid ISIS System Director desktop, there are several tools available to help you access ISIS
tools and perform diagnostic and maintenance tasks.
ISIS Launch Pad provides buttons for quick access to various ISIS tools.
•
Avid ISIS System Director Control Panel provides low-level, performance-monitoring functions.
•
ISIS Launch Pad
ISIS Launch Pad provides buttons for quick access to various ISIS tools. The Launch Pad window remains “docked”
to the upper right corner of the System Director desktop, but may be collapsed to a smaller size if needed (see
“Minimizing or Closing the ISIS Launch Pad” on page 51).
49
Page 50
The following information is displayed in the Launch Pad for all ISIS models:
•Status Data:
-Whether the System Director is running
-The presence or absence of warning events
-Whether reconfiguration is required
-The number of client licenses in use
-The virtual name of the System Director
-The version number of the installed software on the System Director
•Metadata:
-Whether the metadata was successfully loaded by the System Director
-Metadata status
-Percentage of allocated memory in use
-Date and time the metadata was last saved
-Date and time the metadata was last verified
•Redundancy:
ISIS Launch Pad
-Whether redundancy is enabled between dual System Directors
-Redundancy mode of the current System Director (Active or Standby)
-Replication state of the System Directors
-Status of the failover network ports
•Performance:
-Number of messages transmitted per second
-Total Write bandwidth in Mb/s
-Total Read bandwidth in Mb/s
-Total number of open files in all Workspaces
On the ISIS | 5500, the following additional information for the Storage Manager is displayed:
•Status (running or not)
•Fan status
•System drive status
•Power supply status
•Software version number (ideally, same as the System Director version)
Opening ISIS Launch Pad
ISIS Launch Pad starts with Windows on the System Director and usually remains on the desktop at all times. If it
was shut down, you can restart the ISIS Launch Pad from the System Director Windows Start Menu.
To open ISIS Launch Pad on the ISIS | 7500 and ISIS | 2500:
tClick Start > All Programs > Avid > ISIS System Director > ISIS Launch Pad.
The ISIS Launch Pad window remains “pinned” to the upper right corner of the System Director desktop, but may
be collapsed to a smaller size if needed.
To minimize the ISIS Launch Pad:
tRight-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Minimize.
To restore the ISIS Launch Pad:
tRight-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Restore.
To quit the ISIS Launch Pad:
tRight-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Quit.
ISIS Launch Pad Buttons
The following table describes the ISIS Launch Pad buttons. You can also hold the cursor over the button and get a
tool tip on the button function.
ISIS Launch Pad
Button Function
System Director
Starts the System Director. The button is blue when the System Director is stopped. The button is gray when
the System Director is running.
Stops the System Director. The button is blue when the System Director is running. The button is gray when
the System Director is stopped.
Opens the Avid ISIS Management Console in a web browser window (the default browser is Microsoft
Internet Explorer). For more information about using the Management Console, see
Management Console” on page 15
Opens the Avid ISIS System Director Control Panel. For more information, see
Control Panel” on page 52
Opens the System Director Memory Log Viewer tool. For more information, see
Director Memory Log Viewer” on page 56
Opens the Avid ISIS Profiler. Gathers system and version information on the System Director, System
Manager, or client. This tool detects the system if is being run on and selects the components automatically.
For more information, see
Storage Manager (ISIS | 5500)
“Opening the
.
“Avid ISIS System Director
.
“Using the ISIS System
.
“Profiler Page” on page 122.
Starts the Storage Manager. The button is blue when the Storage Manager is stopped. The button is gray
when the Storage Manager is running.
51
Page 52
Button Function (Continued)
Stops the Storage Manager. The button is blue when the Storage Manager is running. The button is gray
when the Storage Manager is stopped.
Avid ISIS System Director Control Panel
Opens the Agent Management page. For more information, see
Agent” on page 141
Opens the Network Configuration Tool. This tool is used to set the IP addresses for the network ports on the
ISIS | 5500 System Director. For more information, see the Avid ISIS 5500 Setup Guide.
Opens the Storage Manager Memory Log Viewer. For more information, see
Memory Log Viewer” on page 52
Opens the Avid ISIS Profiler. Gathers system and version information on the System Director, System
Manager, or client. This tool detects the system if is being run on and selects the components automatically.
For more information, see
.
.
“Profiler Page” on page 122.
Using Storage Manager Memory Log Viewer
The Storage Manager Memory Log Viewer is a valuable tool that allows you to view the Storage Manager log as it
is buffered in memory. This log provides detailed status information that is especially useful to Avid Customer
Support personnel for monitoring Storage Manager status during prolonged operations.
To open the Storage Manager Memory Log Viewer:
tDo one of the following:
-In the Storage Manager section of the ISIS Launch Pad, click Storage Manager Memory Log Viewer icon.
“Opening the Avid ISIS Storage Manager
“Using Storage Manager
-From the System Director desktop, click Start > Programs > Avid > ISIS Storage Manager >
Memory Log Viewer
-From the Storage Manager Agent page, click Console viewer in the Tools section (see
Viewer Tool” on page 153
.
Avid ISIS System Director Control Panel
The Avid ISIS System Director Control Panel provides low-level performance monitoring functions. Using the
Control Panel, you can view the following:
•The current status of connected clients, including name, type, ID number, and active or inactive status
•The status of communications between the System Director and the clients
•Information on the metadata maintained by the System Director
The System Director Control Panel is used to start, stop, and monitor the Avid ISIS System Director, the application
running on the System Director server that manages the overall operation of the network. You can also use the
Control Panel to configure general or Dual System Director parameters, and to set some administrative options.
Opening the System Director Control Panel
The System Director Control Panel is a Windows application that can be accessed from the Windows Start menu
and from the ISIS Launch Pad.
“Using the Log
52
Page 53
Avid ISIS System Director Control Panel
To open the Control Panel, do one of the following:
tIn the ISIS Launch Pad, click ISIS Control Panel icon.
tFrom the System Director desktop, select Start > Programs > Avid > ISIS System Director > Control Panel.
The System Director Control Panel opens.
The buttons on the System Director control panel do the following:
-—Start and stop the System Director windows service
-—Dump metadata
- —Change the virtual server name for the System Director
-—Reset the ISIS password
The following table summarizes the functions available in the Control Panel.
PanelTabFunction
Status(NA)Displays the local and virtual machine names and a summary of
the system and metadata status
53
Page 54
Avid ISIS System Director Control Panel
PanelTabFunction
ConfigureFile SystemThis panel is active only when the System Director is stopped.
Allows you to:
•Create a new active file system on the System Director
•Create a new active file system using information imported
from another System Director
•Create a Standby System Director in a Dual System Director
configuration
•Reconfigure the existing file system
•Delete the file system
ConfigureDual System DirectorThis panel allows you to configure a Dual System Director
configuration, specifying:
•Virtual and local addresses
•Local and remote machine routing parameters
Active ClientsThe Active Clients tab displays the identity of the Avid ISIS
clients known to the System Director, and all active Storage
managers.
•Click Refresh to refresh the display.
•Click Disconnect to disconnect the selected clients.
Starting and Stopping the System Director Service
The System Director software runs as a Windows service that starts automatically whenever the System Director is
online. However, various maintenance and administration functions require that you shut down the System Director
engine and then restart it.
Maintaining metadata integrity is very important to ensure you do not lose any data files. Avid recommends you use
the following procedure prior to System Director engine shutdown to avoid problems with metadata integrity.
c
In a Dual System Director configuration, Avid recommends that you shut down the standby System Director
before shutting down the active System Director. Otherwise, the active System Director fails over to the
standby System Director as the active System Director shuts down.
To prevent errors, make sure that clients unmount all Workspaces before you stop the System Director.
n
To stop the System Director service:
1. Do one of the following:
tIn the ISIS Launch Pad, click Stop System Director.
tFrom the ISIS Control Panel, click Stop System Director.
A dialog box opens, prompting you to confirm that you really want to stop the System Director.
2. Click OK.
The System Director Shutdown dialog box opens stating that it is saving multiple copies of the metadata.
Wait for the process to finish and for the dialog box to close. When the System Director has shut down, the
System Director Status tab lists the System Director status as “Not running.”
54
Page 55
Avid ISIS System Director Control Panel
3. (Option) If you are upgrading or modifying the system, make sure the System Director software has
successfully written a local copy of the metadata file:
a.Open the folder D:\Program Files\Avid\ISIS System Director
b. Make sure the files Partition0, Partition1, and PartitionDump.bin exist and have the date and time of when
you stopped the System Director. If they do not, call Avid Customer Support.
c
Pay special attention to the date and time of the Partitiondump.bin file before importing it to recreate a file
system. If the PartitionDump.bin file is more than a few hours old, it could cause loss of data or data
corruption. Call Avid Customer Support before importing this file to recreate the file system.
c.Copy (not move) these files to a temporary folder to be used in case there is a problem with the upgrade.
To start or restart the System Director service, do one of the following:
tIn the ISIS Launch Pad, click Start System Director.
tFrom the System Director control panel, click Start System Director.
Changing the System Director Virtual Name
The System Director virtual name is the name that is used for the Shared Storage network and appears in the System
Director list in the Avid ISIS Client Manager application. The System Director virtual name is set to the Windows
computer name by default, but you can change it to a different value.
The System Director virtual name is used only within the Shared Storage network. It has no effect on Windows
n
networking.
To change the virtual System Director name:
1. In the Control Panel toolbar, click Change Virtual System Director Name.
The Change Virtual System Director Name dialog box opens.
2. Type a name for the System Director in the Virtual System Director Name text box.
In a Dual System Director configuration, you must specify the same virtual System Director name for both
System Directors.
The naming conventions are the same for the System Director virtual name as they are for Windows network
computer names:
-No more than 31 characters in length
-Cannot use the following characters: " \ / [ ] : | < > + = ; , ?
-Cannot use ASCII control characters in range 0x00 through 0x1F
3. Click OK.
Monitoring System Director Status
The System Director Status panel provides status displays that provide a summary of your network and controls that
allow you to start and stop the System Director, and reset the event log.
55
Page 56
System Director Status Indicators
When the shared storage network is functioning normally, a green indicator is displayed with the following
messages:
•Active Mode
•No warning events logged
•Reconfiguration not required
•Single System Director — Redundant operation not Enabled; Dual System Directors — Both paths are up
•Single System Director — Replication not Enabled; Dual System Directors — Replicated
If your network does not use a Dual System Director configuration, a gray indicator is displayed next to the
n
message, “Redundant operation is not enabled.”
If the indicator is yellow or red, the message changes. Use the following information to correct the problem:
•System Director is not running — start the System Director by clicking Start System Director.
•Check event log — logged significant events related to the System Director are also logged in the Logging tab
of the ISIS Management Console. For information on how to extract data in the system logs, see
Administration Log Pages” on page 118
Avid ISIS System Director Control Panel
“System and
.
•The following error messages indicate metadata replication status:
-Replication failed — Indicates that there was an error replicating the metadata to or from a standby
System Director.
-Replication unknown — Indicates that the current replication status has not been determined.
-Replication status not available — Indicates that the status is unknown. Most likely, the System Director is
not running.
Using the ISIS System Director Memory Log Viewer
The System Director Memory Log Viewer allows you to view the System Director log as it is buffered in memory.
This log provides detailed status information that is especially useful to Avid Customer Support personnel for
monitoring system status during prolonged operations.
To open the System Director Memory Log Viewer:
tDo one of the following:
-Click the Memory Log Viewer icon under System Director on the Launch Pad
-From the System Director desktop, click Start > Programs > Avid > ISIS System Director >
Memory Log Viewer
Working with File System Operations
c
The File System tab in the Control Panel allows you to create Active and Standby partitions, as well as to
reconfigure existing file systems. You can also use the Control Panel to delete file systems.
Deleting the file system erases all data stored on the System Director.
For information on creating partitions, see the Avid ISIS Setup Guide.
56
Page 57
Reconfiguring the File System
You can reconfigure the internal memory configuration of the System Director — for example, if you want to adjust
the memory usage to take advantage of expanded memory capabilities. Reconfiguring the file system entails the
following:
•Validating the export file
•Creating new metadata
•Importing the metadata
Reconfiguring an existing file system does not delete any data.
n
To reconfigure the file system:
1. On the Control panel, click Stop System Director.
A dialog box opens, prompting you to confirm that you want to stop the System Director.
2. Click OK.
The System Director Shutdown dialog box opens stating that it is saving multiple copies of the metadata.
3. Click the File System tab, if it is not selected.
4. In the “Active File System Actions” section, click “Reconfigure File System.”
Avid ISIS System Director Control Panel
A dialog box opens, prompting you to confirm that you want to reconfigure the existing file system.
5. Click OK.
The system reconfigures its metadata and restarts the System Director.
Creating or Re-creating a File System
You might need to create or re-create a file system if you are:
•Setting up a System Director for the first time
•Adding a second System Director
•Upgrading your System Director hardware
•Deleting and re-creating the System Director file system to recover from an error
For more information about creating, deleting and re-creating file systems on the System Director, see the Avid ISIS Setup Guide.
Monitoring Metadata Status
The System Director Status panel displays information about the System Director’s internal description of the file
system. This metadata memory is used to record descriptions of Workspaces, folders, and files.
All of this metadata information is also is displayed in the ISIS Launch Pad.
n
To guard against corruption of the metadata due to a system failure, the metadata is saved to disk every 20 seconds.
The metadata save operations alternate between two files, Partition0 and Partition1. This guarantees the existence of
one known good file if a failure occurs while writing to one of the files. The System director automatically chooses
the best copy to load when it starts up.
57
Page 58
Avid ISIS System Director Control Panel
Metadata memory is also saved automatically to the Partition0 and Partition1 files when the System Director stops
normally and without error. A third file, PartitionDump.bin, containing an alternate representation of the file system
metadata is also created. The PartitionDump.bin file should be used only when adding memory to a System director
or moving to a newer System Director with more memory, unless otherwise instructed by Avid Customer Support.
The Metadata Status box shows when the metadata was last verified and saved, and replicated. A green indicator
means no problem has been detected. A yellow indicator means the status is uncertain. A red indicator means that a
problem exists.
The following tables lists the status messages displayed in the Metadata Status box.
Status CategoryMessagesAdditional Notes
Overall Status•Metadata loaded
•Validating
•No Metadata loaded
•Loading nn.n MBps
•State Unknown
Verification•Not Active
•Verified
•Verify Failed
•State Unknown
Saving•Saving
•Saved
•Unknown State
•Not Active
•Save Failed
Replication•Sending
•Receiving
•Unknown State
•Not Active
•Replication Failed
System Director is running
Occurs periodically
System Director is stopped or metadata is unable to
load for some reason
System Director is restarting
When the System Director is in standby mode, the
Verify indicator is disabled.
When the System Director is not in a Dual System
Director configuration, the Replicate indicator is
disabled.
Creating a Metadata Dump File
You can use the “Dump Metadata” function to write all metadata information to a text file.
This operation should be used only as a diagnostic aid. You cannot restore ISIS metadata from a metadata dump file.
n
c
When you write metadata to a file, the resulting file is extremely large and takes a long time to create. Do not
use this option unless instructed to do so by Avid Customer Support.
To write the contents of metadata to a text file in the System Director directory:
tIn the System Director toolbar, click Dump Metadata.
A text file called PartitionDump.txt is created in the System Director’s data directory:
58
Page 59
“D:\Program Files\Avid\ISIS System Director”
Resetting the Administrator Password
The Control Panel allows you to reset the ISIS administrator's password in the event that it is forgotten. This feature
does not affect the Windows operating system password. Windows administrator’s privileges are required to reset
the password.
To change the administrator’s password, use the ISIS Management Console. For more information, see “Changing
n
the Administrator Password” on page 29.
To reset the administrator’s password:
1. In the Control Panel toolbar, click Reset ISIS Password.
A dialog box warns you that this action removes the administrator’s password from the System Director’s
account.
2. Click Yes to clear the password.
Managing Active Clients
The Active Clients tab displays the identity of the Avid ISIS clients known to the System Director. Use the
information listed in this tab to determine if obsolete numeric identifiers (IDs) exist in the System Director.
Avid ISIS System Director Control Panel
The Active Clients tab displays all active Storage Managers as well as connected client accounts. You can use the
Bandwidth dialog box in the ISIS Management Console to view only the active client accounts. For more
information, see
The System Director reports the current client status as described in the following table.
HeadingDescription
NameName of the client
IDAn internal numeric identifier used by the System Director to represent each client that has a Workspace
“Monitoring Client Bandwidth” on page 110.
mounted. These identifiers are assigned when a client first contacts the System Director and remain valid until
the client unmounts all Workspaces
59
Page 60
Avid ISIS System Director Control Panel
HeadingDescription (Continued)
TypeClient type (Admin, Client, Storage Manager or System Director)
OSOperating system on the client
LicenseNumber of licenses registered to the client
Last seenDate and time when each client last sent its status to the System Director. The System Director removes the
entry when all Workspaces are unmounted from the client desktop
The area below the active clients list indicates the number of licenses being used by the clients currently connected
to the shared storage network.
If a client fails without unmounting all Workspaces, the System Director maintains the numeric identifiers.
Typically, this is not a problem because the same identifier is reused when that client mounts a Workspace the next
time. However, it is possible for a client to leave a Workspace mounted, shut down the client system, and never be
seen by the System Director again. If that client system is then physically removed or renamed, the numeric
identifiers are not removed from the identification table. If enough obsolete entries accumulate, new clients might
not be able to obtain numeric identifiers.
To check the license status of an active or an inactive client:
tSelect the client in the active client list, and click Refresh.
To disconnect an active or an inactive client:
tSelect the client in the active client list, and click Disconnect Client.
Inform the client you are temporarily disconnecting them and that the connection will return after a few seconds.
n
60
Page 61
5Managing Storage Groups and Workspaces
Storage Groups are collections of Storage Managers. Storage Groups give you flexibility in allocating storage
capacity among groups with different functional areas, workflow requirements, or as a means of mitigating the risk
of various drive failure scenarios. Workspaces are virtual volumes that exist on Storage Groups and can be resized
dynamically. Workspaces allow you to segment your Storage Groups easily to accommodate projects and users.
Managing Storage Groups
The Storage Groups page of the ISIS Management Console allows you to add and delete Storage Groups, to rename
Storage Groups, and to configure and manage Storage Groups.
1Action button toolbar—Perform actions on selected Storage Groups
2Details panel—Detailed information on the selected Storage Groups; see
Details” on page 62
3Storage Groups list—Lists all configured Storage Groups and related information; see “Storage Groups List” on page 62
4Filter panel—Filter the Storage Groups list display based on conditions you configure; see “Filtering the Display” on
page 24
5Storage Managers list—Displays Storage Managers bound to the selected Storage Group
61
“Viewing Storage Group and Storage Manager
Page 62
Storage Groups List
The following table summarizes the information available in the Storage Groups list. This information is also
displayed in the Details panel for a selected Storage Group.
HeadingDescription
NameDisplays the name of the currently selected Storage Group
CapacityDisplays the storage capacity in gigabytes (GB) of the selected Storage Group
EffectiveDisplays the effective (available) storage capacity in gigabytes (GB) of the selected Storage Group
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data written on it in the
UnusedDisplays the total amount of storage space in gigabytes (GB) that currently has no data written on it
AllocatedDisplays the amount of storage space in gigabytes (GB) reserved for use by Workspaces in the
UnallocatedDisplays the amount of storage space in gigabytes (GB) available on the Storage Managers and not
Managing Storage Groups
selected Storage Group
in the Storage Managers assigned to the selected Storage Group
selected Storage Group
currently reserved for the selected Storage Group
Chunk SizeDisplays the size of segmented media files sent over the network
FilesDisplays the number of files in the selected Storage Group
DirectoriesDisplays the number of directories in the selected Storage Group
You can sort the information in the Storage Groups page by clicking any column heading. For more information on
sorting items in columns, see
“Sorting Information” on page 24.
Viewing Storage Group and Storage Manager Details
The Details and Storage Managers panels display information about the currently selected Storage Group and the
Storage Managers it contains. The information displayed is the information as seen by the System Director. Some of
the information is embedded in the Storage Manager, and other information is assigned to the Storage Manager by
the Avid ISIS software.
To sort the information in the Storage Managers panel, click any column heading. For more information on sorting
n
items in columns, see “Sorting Information” on page 24.
To view information about a Storage Group:
tIn the Storage Groups list, select a Storage Group.
The Storage Groups page displays all the information for the selected Storage Group. If the Details panel is not
visible, click Details.
To close the Details panel:
tClick Details.
The Storage Managers panel lists the Storage Managers allocated to the currently selected Storage Group, as well as
the Storage Managers available for allocation to the Storage Group.
62
Page 63
For information about what is shown in the Storage Managers panel, see “Storage Manager Column List” on
page 34
. Some columns are hidden by default (see “Showing and Hiding Columns” on page 24).
Storage Groups on ISIS | 7500
Storage Groups are created from bound Storage Managers. First, you bind Storage Managers to the system, then you
create one or more Storage Groups using the Storage Managers. A Storage Manager can belong to only one Storage
Group.
Once you have a Storage Group you can create Workspaces.
Storage Groups and Chunk Sizes
Storage Managers are combined to create Storage Groups in the ISIS file system. When you bind a Storage Manager
you must select either 512 KB (default) or 256 KB chunk sizes. Earlier Avid ISIS releases used 256 KB chunk sizes.
These bound Storage Managers must all be of the same chunk size when you configure your Storage Group.
Avid ISIS switch hardware shipped with v1.x (ISS1000 and IXS1000) does not support 512 KB chunk sizes. If you
n
have Avid ISIS v2.x software running on v1.x switches, you must select the 256 KB chunk size when adding Storage
Managers to the file system to create Storage Groups.
You cannot change the chunk size of an existing Storage Group. If you need to change the chunk size of a Storage
Group, you must delete it and create a new one with the desired chunk size, using Storage Managers that use that
chunk size. The chunk size selection is available only when binding the Storage Managers.
Managing Storage Groups
Storage Managers and Chunk Sizes
There are two drives in all Avid ISIS | 7500 ISBs. ISBs are identified by the total amount of storage in the ISB; for
example, an ISB with the two 1 terabyte (TB) drives is referred to as an i2000. The supported chunk size available
on each ISB type is listed below:
When there is a single ISB failure in an ISIS Workspace configured with RAID-6 protection, the Workspace
continues to function normally but at a lower bandwidth. For more information, see
ISB Failure” on page 64
After confirming the failure of an ISB, Avid highly recommends that you initiate the remove redistribution process
immediately. There are two benefits to doing this:
•Immediately upon initiation of the remove redistribution, all new writes to the Workspace have the full benefit
of RAID-6 protection (dual-parity protection).
•Upon completion of the remove redistribution process, existing data in the Workspace is once again fully
protected. Prior to completion, if another ISB were to fail, the Workspace would be in an unprotected state
(though no data would be lost).
RAID-6 Workspace, Dual ISB Failure
.
“Mirrored Workspace, Single
An “unprotected state” occurs if two ISBs fail in a RAID-6 Workspace. In an unprotected state with no additional
failures, read operations continue to function normally at a lower bandwidth.
63
Page 64
However, in an unprotected state, due to the distributed architecture of the ISIS file system (optimized for real-time
performance), it is possible under certain circumstances that the system would not be able to correctly update the
parity information when writing new data. As a result under these circumstances, the file system could return a
failure status when writing. While the failure rate percentage on the total number of write operations is low, heavy
workloads on the system would result in enough write failures to disrupt operations.
This issue only applies when the Workspace is in an unprotected state and the remove redistribution process on the
failed ISBs has not been initiated. Therefore, Avid highly recommends that you initiate the remove redistribution
process immediately upon confirmation of any ISB failure. This ensures immediate protection (RAID-6 or
mirroring) of new data being written, and full protection of all stored data at the earliest possible time.
Mirrored Workspace, Single ISB Failure
An “unprotected state” occurs when you have a single ISB failure in a mirrored Workspace. In an unprotected state
with no additional failures, read operations continue to function normally.
However, in an unprotected state a subsequent or infrastructure failure will cause operational issues which could
result in failures when writing new data or prevent you from accessing data in the Workspace. An additional ISB
failure can compromise data accessibility. Networking issues, on the other hand, will not cause accessibility issues
on previously written data but might prevent the successful completion of an active write operation.
This issue only applies when the Workspace is in an unprotected state and the remove redistribution process on the
failed ISBs has not been initiated. Therefore, Therefore, Avid highly recommends that you initiate the remove
redistribution process immediately upon confirmation of any ISB failure. This ensures immediate protection
(RAID-6 or mirroring) of new data being written, and full protection of all stored data at the earliest possible time.
Managing Storage Groups
Matching Chunk Sizes to the File System
If you add an ISB (displays as an available Storage Manager) to your file system, make sure you match the chunk
size of the new Storage Manager to the chunk size of the existing Storage Group. New Storage Managers are added
with a default chunk size of 512 KB on mirrored Storage Groups (256 KB with i1000 ISBs). You cannot mix the
chunk sizes within a Storage Group. To change the chunk size of an ISB, you must remove the Storage Manager
from the file system and add the Storage Manager again (rebind it), selecting the same protection and chunk size as
the existing Storage Group.
Zone 1 Switches
The ISIS v2.x generation IXS and ISS switches install in the same engines as earlier releases; the chassis has not
changed. However, all the switches in the engines must be of the same generation. The two new switches are labeled
IXS2000 and ISS2000. The new switches cannot be mixed in ISIS Engines with earlier versions of the switches
(labeled IXS1000 and ISS1000). If your IXS and ISS switches are not labeled, consider them the earlier versions.
The ISS2000 switches are required for 10 Gb clients and 512 KB chunk size, see
on page 63
.
The Avid ISIS documentation refers to IXS2000 and ISS2000 switches as v2.x hardware and IXS1000 and ISS1000
switches as v1.x hardware.
Storage Groups on ISIS | 5500 and ISIS | 2500
For both ISIS | 5500 and ISIS | 2500, each Engine is a Storage Manager. You can assign all of your Engines to one
large Storage Group, or each Engine can be a Storage Group. An Engine can be assigned to only one Storage Group.
“Storage Groups and Chunk Sizes”
64
Page 65
Avid ISIS | 5500 provides RAID-5 data protection with an active hot spare and Avid ISIS | 2500 provides RAID-6
data protection.
Adding Storage Managers to Storage Groups
You can add unassigned Storage Managers to a Storage Group to increase its storage capacity. This is typically done
when adding a new Engine to your Avid ISIS system. This process initiates a redistribution of the files in the
existing Storage Group to include the new Storage Manager. For more information, see
page 81
To add Storage Managers to a Storage Group:
.
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. In the Storage Groups list, select the Storage Group where you want to add Storage Managers, and then do one
of the following:
tClick Details.
tDouble-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the spare Storage Managers you want to add to the Storage Group.
Managing Storage Groups
“Redistributing Data” on
If you have two Management Domains in the ISIS | 7500, check the Domain ID column and select Storage Managers
n
from the same domain. You cannot add Storage Managers to a Storage Group with a different Domain ID. Storage
Groups cannot span Management Domains.
4. Click Add to add the selected spare Storage Managers to the Storage Group.
The Storage Managers panel refreshes to display the selected Storage Managers added to the Storage Group.
5. (Option) Click Revert to undo any modifications made to the Storage Group information.
6. Click Apply.
The Storage Managers are added to the Storage Group.
-The shared storage network performs a redistribution of any data on the Storage Managers. The amount of
time required for the redistribution depends on the amount of data in the Storage Group.
-The configuration change counter for all affected Workspaces is incremented by one.
After 20 configuration changes, the system advises you to perform a full redistribution. You can suspend and resume
n
the redistribution as needed. For more information, see “Suspending and Resuming Redistribution” on page 84.
Adding New Storage Groups
A Storage Group is a set of physical Storage Managers that store a subset of the complete set of media files
accessible within a shared storage environment. You can create up to 32 Storage Groups.
You must add Storage Managers to the file system before you can create any Storage Groups. For more information,
n
see “Binding Storage Managers to the ISIS File System” on page 38.
If you have bound Storage Managers to the ISIS file system but you have not created any Storage Groups, the Create
n
Storage Groups dialog box opens by default when you select the Storage Groups list.
65
Page 66
To add a new Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. Click New.
The Create Storage Group dialog box opens.
3. In the Name text box, type a name for the Storage Group.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. In the Storage Managers panel, select the Storage Managers you want to assign to the new Storage Group.
5. Click Add.
The Storage Managers are allocated to the Storage Group. You can click Remove to remove Storage Managers
from the Storage Group.
6. (Option) Before you create your Storage Group, you can click Revert to undo any modifications made to the
Storage Group information.
7. Click Apply to create a new Storage Group containing all the selected Storage Managers.
If there is already a Storage Group with the same name, an error message is displayed.
Managing Storage Groups
The new Storage Group appears in the Storage Groups list, and the Create Storage Group dialog box refreshes
to show the Storage Managers still available for additional Storage Groups.
8. (Option) Repeat steps 3 through 8 to create new Storage Groups.
9. Click Close to close the Create Storage Group dialog box and to return to the Storage Groups page.
Removing ISIS Storage Managers from Storage Groups
You can remove Storage Managers from your Storage Group, as long as the following conditions continue to apply
after the operation:
•The Storage Group contains at least the minimum number of Storage Managers remain. For more information,
“Adding New Storage Groups” on page 65.
see
•If the ISIS | 7500 Storage Group includes RAID-6 Workspaces in the Storage Group, you must have at least 8
Storage Managers in the Storage Group.
•The Storage Group contains enough Storage Managers to support the space allocated to your Workspaces.
This is the total amount of storage allocated to the Workspaces, not the actual amount of data stored on the
n
Workspaces.
Storage Managers removed from the Storage Group are returned to the system’s pool of spare Storage Managers.
c
When Storage Managers are removed, a redistribution is initiated. If you start the Storage Manager removal
during high client usage, it might reduce performance on your clients. This can include dropped frames,
underruns, and failed captures. Remove Storage Managers during periods of light client activity.
You can suspend and resume a redistribution as needed.
To remove Storage Managers from a Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
66
Page 67
2. In the Storage Groups list, select the Storage Group from which you want to remove Storage Managers, and
then do one of the following:
tClick Details.
tDouble-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the Storage Managers you want to remove from the Storage Group.
4. Click Remove.
The Storage Managers panel refreshes and displays the selected Storage Managers as Spare.
You cannot remove Storage Managers if it would cause the capacity of the Storage Group to fall below either the
n
used space or the allocated space. You must reduce the amount of space allocated to the Workspaces. For more
information on modifying Workspaces, see “Resizing Workspaces” on page 78.
5. (Option) Click Revert to undo any modifications made to the Storage Group information.
6. Click Apply.
The Storage Managers are added to the Storage Group.
Adding Storage Managers from Another Storage Group
Managing Storage Groups
If you want to reassign Storage Managers from one Storage Group to another, you must remove the
Storage Managers from the current Storage Group before adding them to a new one.
To add Storage Managers previously used in another Storage Group to your current Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. In the Storage Groups list, select the Storage Group which contains the Storage Managers you want to reassign,
and then do one of the following:
tClick Details.
tDouble-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the Storage Managers you want to move to another Storage Group.
4. Click Remove.
The Storage Managers panel refreshes to display the selected Storage Managers as Spare.
5. Click Apply.
The selected Storage Managers are removed from the Storage Group, and the shared storage network performs
a redistribution of any data on the Storage Managers.
6. In the Storage Groups list, click the Storage Group to which you want to add the Storage Managers.
The Details panel displays all the information on the selected Storage Group.
7. In the Storage Managers panel, select all the spare Storage Managers you want to add to the new
Storage Group.
If you have two Management Domains, check the Domain ID column and select Storage Managers from the same
n
domain. You cannot add Storage Managers to a Storage Group with a different Domain ID. Storage Groups cannot
span Management Domains.
67
Page 68
8. Click Add to add the selected Storage Managers to the Storage Group.
The Storage Managers panel refreshes to display the selected Storage Managers added to the new
Storage Group.
9. (Option) Click Revert to undo any modifications made to the Storage Group information.
10. Click Apply.
The selected Storage Managers are added to the Storage Group, and the shared storage network performs a
redistribution of any data on the Storage Managers. The amount of time required for the redistribution depends
on the amount of data in the Storage Group.
Adding Storage Managers From Another Environment (ISIS | 7500)
If adding Storage Managers that were previously used in another environment, first connect them to your Avid ISIS
shared storage network, and then bind them to the ISIS using the Storage Manager page.
To add the Storage Managers to your current Storage Group:
1. Make sure the new Storage Managers are connected to the network. For information on connecting
Storage Managers, see the Avid ISIS Setup Guide.
2. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
Managing Storage Groups
3. Click Storage Manager in the System panel.
The Storage Manager page opens.
If the ISIS Management Console was open when you added the Storage Manager, click Refresh to view the
newly added Storage Manager.
If the Storage Managers are not listed, something might be wrong with their physical connections; see the Avid ISIS Setup Guide.
4. Add the new Storage Managers to your Storage Group (see
page 65
).
5. Click Apply.
A dialog box opens asking you to confirm the action.
6. Click Yes.
The selected Storage Managers are added to the Storage Group.
Deleting Storage Groups
You can delete any Storage Group that does not have any Workspaces on it. As a result, all Storage Managers
previously assigned to the Storage Group return to the system’s pool of spare Storage Managers.
To delete a Storage Group:
1. If any Workspaces exist on the Storage Group you want to delete, first delete the Workspaces (see “Deleting
Workspaces” on page 79
“Adding Storage Managers to Storage Groups” on
).
2. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
3. In the Storage Groups list, select the Storage Group you want to delete.
4. Click Delete.
68
Page 69
Minimum Free Storage Space Requirement
tr
e
wq
A dialog box opens asking you to confirm the action.
5. Click Yes.
The Storage Group is deleted.
After the Storage Group is deleted, all of the Storage Managers previously in your Storage Group will appear in the
Storage Managers panel as Spare.
Minimum Free Storage Space Requirement
Avid recommends that you maintain a minimum threshold of free space in each Storage Group. The amount differs
depending on the ISIS model:
•On the ISIS | 7500, keep at least 7% of free space in each Storage Group. Exceeding 93% used space can
produce severe performance issues in some situations.
•On the ISIS | 5500 and ISIS | 2500, keep at least 5% of free space in each Storage Group.
To calculate the right amount of free space, log into the ISIS management Console and navigate to the Storage
Group window. For each Storage Group, multiply the Effective number by 0.07 or 0.05 (depending on your ISIS
system) to determine your recommended free space in GBs. Create a new workspace of that size in this Storage
Group and label it “Headroom” and do not give anyone access to this workspace.
Managing Workspaces
This section describes how to create, rename, and delete Workspaces. and how to manipulate the amount of storage
allocated to each Workspace.
69
Page 70
1Action button toolbar—Perform actions on selected Workspaces
Managing Workspaces
2Details panel—Detailed information on the selected Workspaces; see
3Workspaces list—Lists all configured Workspaces and related information; see “Workspaces List” on page 70
4Filter panel—Filter the Workspaces list display based on conditions you configure; see “Filtering the Display” on
page 24
5User access panel—Displays users who have access to the selected Workspace and details about their access privileges;
“Managing Workspace Access Privileges” on page 80
see
Workspaces List
The Workspaces list displays all Workspaces, the Storage Groups on which they reside, and details about each
Workspace.
Heading Description
NameLists the names of all Workspaces in the selected Storage Groups
CapacityLists the total storage capacity of each Workspace in gigabytes (GB)
Resize sliderDisplays a graphical representation of the used and available space for each Workspace (for information
MaximumLists the maximum amount of storage space in gigabytes (GB) available for the Workspace on the network
on using the Workspace Size graph, see
“Viewing Workspace Details” on page 73
“Using the Workspace Size Graph” on page 72)
Protection ModeDisplays the type of protection applied:
Avid ISIS | 7500 provides “mirrored” and “RAID-6” data protection modes, as well as an “unprotected”
mode.
Avid ISIS | 5500 provides RAID-5 data protection with an active hot spare, called “HW RAID.”
Avid ISIS | 2500 provides RAID-6 data protection, called “SW RAID.”
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data written on it in each
Workspace
% UsedDisplays the percentage (%) of storage space currently storing data on the Workspace
ReservedDisplays the amount of storage space in gigabytes (GB) that has been reserved by a client application
UnusedLists the amount of storage space in gigabytes (GB) that currently has no data written on it in each
Workspace
StatusDisplays the status of any current redistribution:
•In Progress
•Stalled
•Pending
•Suspended
•Requires Full Redistribution
Config ChangesDisplays the number of changes to a Storage Group that involve moving data — for example, the number
of times a Storage Manager has been added or removed
Storage GroupFor each Workspace, lists the Storage Group on which it is located
70
Page 71
Heading Description
FilesLists the total number of files stored on the network for each Workspace
To sort the information in the Storage Managers panel, click any column heading. For more information on sorting
n
items in columns, see “Sorting Information” on page 24.
Workspace Considerations
Before you create Workspaces:
•Consider how you want to allocate them. For example, do you want to allocate them to accommodate projects,
groups, individual clients, streaming bit rates, media types, media distributors, or a combination of these?
•Determine how much storage each Workspace requires and allocate space accordingly. This might be a function
of project size or the number of clients, or it might be a function of media duration or media resolution.
In a multiple Workspace configuration, consider reserving some space rather than assigning all of it immediately.
Once space is allocated, it tends to be filled quickly and you might need space later to accommodate a new project or
client or to extend or protect an existing Workspace. In these situations, it is easier to use space held in reserve than
to take it away from an existing Workspace.
Managing Workspaces
When allocating and sizing Workspaces, also consider whether access restrictions are required and whether
protection for data integrity is necessary for each Workspace.
The sections below describe Workspace considerations that apply only to ISIS | 7500 because of the different
Workspace protection modes available. On ISIS | 5500, the only data protection mode is hardware RAID; on ISIS |
2500, the only protection mode is software RAID.
Workspace Data Protection (ISIS | 7500 only)
Avid ISIS | 7500 supports two types of Workspace data protection: mirrored and redundant array of independent
disks (RAID-6), which in turn depends on the number of Storage Managers in the Storage Group:
•For Mirrored Workspaces there must be at least two Storage Managers in the Storage Group
•For RAID-6 Workspaces there must be at least eight Storage Managers in the Storage Group, and the Chunk
Size must be 512 KB. RAID-6 storage provides more storage at a lower cost per GB.
Workspace Creation (ISIS | 7500)
The following table describes what protection modes you can apply to a Workspace in a Storage Group on an ISIS |
7500 depending on what the Storage Group already contains.
If the Storage Group contains:You can create:
No WorkspacesMirrored, unprotected, or RAID-6 Workspaces
Unprotected WorkspacesMirrored or unprotected Workspaces
Mirrored WorkspacesMirrored or unprotected Workspaces
RAID-6 WorkspacesRAID-6 Workspaces (only)
71
Page 72
Workspace Duplication (ISIS | 7500)
e
wq
rt
You can duplicate a Workspace in a Storage Group on an ISIS | 7500 that supports the same protection mode as the
source Workspace, as described in the following table.
Protection Mode of Workspace to
Duplicate:Target Storage Group can Contain:
Unprotected WorkspaceMirrored, unprotected, or no Workspaces
Mirrored WorkspacesMirrored, unprotected, or no Workspaces
RAID-6 WorkspacesRAID-6 or no Workspaces
Workspace Moves (ISIS | 7500)
When moving a Workspace on an ISIS | 7500, the Storage Group list contains Storage Groups with the same
protection mode as the Workspace you are moving. If moving a RAID-6 Workspace, only Storage Groups that
support RAID-6 workspaces appear in the list. If the Workspace is mirrored, only Storage Groups that support
mirrored or unprotected Workspaces appear in the list.
Using the Workspace Size Graph
Managing Workspaces
The Workspaces Size graph provides a quick way to view how much storage capacity is currently allocated to each
Workspace and how much of that storage space currently has data written on it. The graph represents the following:
•Workspace size—total drive space in the Storage Group allocated to each Workspace
•Used space—used drive space in the Workspace
•Unused space—unused drive space in the Workspace
•Maximum Workspace size—total of Workspace size + drive space in the Storage Group still available for
allocation to each Workspace
1Decrease/Increase buttons—Increases or decreases the scale of the graph
2Resize handle—Click and drag to increase or decrease the Workspace size; see
3Used Space
4Unused space
“Resizing Workspaces” on page 78
5Maximum Workspace size—total of Workspace size + drive space in the Storage Group still available for allocation to
each Workspace
To resize the Workspaces Size graph, do one of the following:
tClick Decrease Size to reduce the size of the graph.
72
Page 73
tClick Increase Size to expand the size of the graph.
Viewing Workspace Details
The Details panel and the User Access panels display all information for the currently selected Workspace.
To view detailed information about a Workspace:
tIn the Workspaces list, select a Workspace.
The Workspaces page displays all the information for the selected Workspace. If the Details panel is not visible,
click Details.
To close the Details panel:
tClick Details.
The Details panel contains the same information as the Workspaces column list (except for the Resize slider and the
Maximum storage space; see
HeadingDescription
DirectoriesDisplays the number of directories used by the selected Workspace
Managing Workspaces
“Workspaces List” on page 70), but includes the following additional information:
Warning Event TriggerDisplays the value in used percentage (%) or unused gigabytes (GB) of storage at which a
warning event is written to the Event Log
Error Event TriggerDisplays the value in used percentage (%) or unused gigabytes (GB) of storage at which an
error event is written to the Event Log
Chunk SizeThe smallest unit of data that can be written to the disks
The User Access panel lists all users and user groups and their access privileges. (For information on access
privileges, see
HeadingDescription
NameLists the names of the users and user groups on the network
TypeDisplays the client category (user or user group) for each client in the Name list
AccessLists the access privileges for each client in the Name list
EffectiveLists the effective access privileges for each client in the Name list
ReasonLists the reason for any difference between the access privileges assigned to a user and the effective access
To sort the information in the User Access panel, click any column heading. For more information on sorting items
n
in columns, see “Sorting Information” on page 24.
“Managing Workspace Access Privileges” on page 80.)
assigned to a user as a member of a user group
Adding New Workspaces
Workspaces are locations to store and segregate data. You can allow users to access some or all of the Workspaces,
and you can assign permissions for how each user can access the data in a Workspace. You can create up to 1024
Workspaces, divided among all your Storage Groups.
73
Page 74
Managing Workspaces
If you have created Storage Groups but you have not created any Workspaces, the Create Workspace dialog box
n
opens by default when you select the Workspaces list.
To add a new Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. Click New.
The Details panel opens.
3. In the Name text box, type a name for the Workspace.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. Click the Storage Group menu, and select the Storage Group in which you want to create the Workspace.
The Storage Group name appears in the Storage Group text box.
5. (ISIS | 7500 Option) Click the Protection menu and select a Workspace protection option (depends on the
protection modes available for the Storage Group you selected).
6. Type a size for the Workspace in the Capacity text box. The default size (200 GB) is listed in the Capacity text
box, and the maximum size is listed next to the Capacity text box.
The minimum Workspace size is 1 GB.
n
If all storage in the Storage Group is allocated to existing Workspaces, you can make an existing Workspace
smaller. For information on resizing Workspaces, see
7. (Option) To set a Warning event trigger, select the type of trigger from the drop-down list (either Used % > or
Unused GB <), then type in a value.
8. (Option) To set an Error event trigger, select the type of trigger from the drop-down list (either Used % > or
Unused GB <), then type in a value.
For more information about setting Event triggers, see “Setting Event Triggers” on page 78.
n
9. In the User Access panel, set the User and User Group access privileges (for more information, see “Setting
Workspace Access Privileges” on page 80
10. Click Apply.
The new Workspace appears in the Workspace dialog box, and the Create Workspace dialog box refreshes to
allow you to create a new Workspace.
If there is already a Workspace with the same name, an error occurs.
11. (Option) Repeat steps 3 through 10 to create new Workspaces.
12. Click Close.
The new Workspace appears in the Workspaces list.
).
“Resizing Workspaces” on page 78.
Duplicating Workspaces
When you duplicate Workspaces, they inherit the attributes of the Workspace from which they were created.
The contents of the original Workspace are not duplicated.
n
74
Page 75
Managing Workspaces
To duplicate a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspace list, select the Workspace you want to duplicate.
3. Click Duplicate.
The Duplicate Workspace dialog box opens.
4. (Option) Modify any of the attributes of the new Workspace. For information on modifying Workspaces, see the
following topics:
-“Resizing Workspaces” on page 78
-“Renaming Workspaces” on page 75
-“Protecting ISIS | 7500 Workspaces” on page 76
-“Managing Workspace Access Privileges” on page 80
5. Click Apply.
The duplicate Workspace appears in the Workspace list, and the Duplicate Workspace list refreshes to allow you
to duplicate a new Workspace. The new Workspace has a default name — Workspace n, where n is an integer
that is incremented each time you click Apply to create another duplicate Workspace.
If there is no room for a Workspace of the same size as the original, the Capacity column displays a red line and
the Apply button remains inactive.
6. Click Close.
Renaming Workspaces
You can rename a Workspace at any time, even when it is being used by client workstations and mapped to a local
drive or by letterless mapping (to a Universal Naming Convention path) on the client system. The only effect on
users is that the Workspace name will be different the next time they need to access it.
To rename a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, click the Workspace name you want to change.
3. If the Details panel is not visible, do one of the following:
tClick Details.
tDouble-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. Type a new name in the Name text box.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
5. (Option) Click Revert to undo any modifications made to the Workspace information.
6. Click Apply.
75
Page 76
Protecting ISIS | 7500 Workspaces
Because of the potential impact of a drive failure, Avid recommends protecting all your Workspaces whenever
possible. On the ISIS | 7500, workspace protection is optional. If you want to ensure protection of your files at all
times, always choose a Protection option when creating new Workspaces (before any files are stored on the
Workspace).
If you are not sure that all files on a given Workspace are protected, select the Workspace and enable the available
Protection option for the Workspace. This protects all new files added to the Workspace, and adds protection to any
existing files in the Workspace that are not already protected. Using RAID-6 protection on Workspaces has the
following advantages:
•Migration from mirrored to RAID-6 Workspaces can become part of your normal workflow. You can move the
data that is no longer used in the mirrored Workspaces to RAID-6 Workspaces for long term storage. This frees
up faster Storage Managers for higher performance work.
•RAID-6 Workspaces allow you to use low bit-rate data, at less cost.
The following table summarizes the advantages and disadvantages of the different protection types:
TypeAdvantagesDisadvantages
Managing Workspaces
Mirrored•Maximizes performance of protected
Workspaces
•Supports high-resolution workflows
RAID-6•Maximizes protected storage capacity
•Tolerates two Storage Manager failures
RAID-6 Workspaces have the following restrictions:
•Require a Storage Group with a 512 KB chunk size (256 KB chunk sizes are not supported).
•Require a Storage Group with at least 8 Storage Managers.
•Require ISIS v2.x generation switches (ISS2000/IXS2000) in the ISIS Engines (these switches are also required
for 512 KB chunk sizes).
•Support only resolutions that draw 16 MB/s (50 Mb/s) or less.
For example, you can run two streams of DV 50 or DNxHD 36. Bandwidths are listed by resolution and number of
n
streams on the Avid Knowledge Base. Search the Avid Knowledge Base for the Avid ISIS Performance Guide.
•If a RAID-6 Workspace experiences two disk failures, capturing (or writing) to the Workspace is not supported
until the error condition is corrected.
•Before you perform a full redistribution, all clients must stop using that Storage Group and unmount the
Workspaces in that Storage Group.
•Mirrored Workspaces use twice as much space as
unprotected Workspaces
•Tolerates single Storage Manager failure
•Supports low bit-rate (<=50 Mbs) workflows
Setting ISIS | 7500 Workspace Protection
You can use the Workspaces page to enable or disable Workspace protection.
To enable protection for a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
76
Page 77
Managing Workspaces
2. In the Workspaces list, click the Workspace you want to protect.
3. If the Details panel is not visible, do one of the following:
tClick Details.
tDouble-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. Click Protection menu and select Mirrored.
In order to enable Workspace protection, there must be enough unallocated space in the Storage Group to which the
n
Workspace is assigned. Mirrored protection requires an amount of unallocated space equal to the size of the
Workspace.
5. (Option) Click Revert to undo any modifications made to the Workspace information.
6. Click Apply.
Protection is enabled for the Workspace, and the Protection heading changes from unprotected to the type of
protection you selected.
To disable protection for a Workspace:
1. In the Workspaces list, click the Workspace from which you want to remove protection.
2. In the Details panel, click the Protection menu and select unprotected from the list to remove protection from
the Workspace.
Protection is disabled for the Workspace, and the Protection field for the Workspace changes to Unprotected.
3. Click Apply.
Moving Workspaces
You can move a Workspace and all of its contents by assigning it to another Storage Group in the Details panel of
the Workspaces page, as long as the destination Storage Group has Workspaces using compatible protection modes.
For example, you can move a mirrored or unprotected Workspace to a Storage Group that contains other mirrored or
unprotected Workspaces, and you can move a RAID-6 Workspace to a Storage Group that contains RAID-6
Workspaces.
On the ISIS | 7500 system, moving a Workspace requires that the source and destination Storage Groups contain
Storage Managers of the same chunk size or moving a smaller chunk size to a larger chunk size.
If you are moving between chunk sizes, you cannot do any I/O to the Workspace while the move is in progress. The
n
Management Console displays a warning when you start the move and if you ignore the warning, the I/O fails. You
can do I/Os in other Workspaces in both the source and destination Storage Groups during the move.
If moving a larger chunk size Workspace to a Storage Group with a smaller chunk size, you must create a new
Workspace in the destination Storage Group and manually transfer the files from the source to the destination using
an external copy method.
To move a Workspace and all of its contents to another Storage Group:
1. In the Workspaces list, select the Workspace you want to move.
2. If the Details panel is not visible, do one of the following:
tClick Details.
tDouble-click the Workspace name.
77
Page 78
The Workspaces Details panel displays all the information on the selected Workspace.
3. Click the Storage Group menu, and select the Storage Group to which you want to move the Workspace.
4. (Option) Click Revert to undo any modifications made to the Workspace information.
5. Click Apply.
The Workspace is moved, and the Details panel updates to show the new Storage Group assignment. Existing
files are moved, and new files written to the Workspace are written to the destination Storage Group.
Resizing Workspaces
There are occasions when you must change the size of Workspaces. For example, you might need to make a
Workspace larger to create room for a capture procedure planned for later in the day or for some new media files.
Alternatively, you might need to make a Workspace smaller to create space for other Workspaces or to reserve
storage for another day.
To adjust the size of a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select a Workspace.
Managing Workspaces
3. Do one of the following:
tClick the handle of the Workspaces Size graph, and drag it to resize the graphical display. The Workspace
size listed in the Capacity text box updates as you drag the handle.
tClick Details and type a new value for the Workspace size in the Capacity text box in the Workspace Details
panel.
4. Click Apply.
You cannot increase Workspace size above the storage space listed as the maximum size.
n
Setting Event Triggers
You can set event triggers that will write events to the Event log when Workspace capacity (in gigabytes) is less than
the specified value, or when used Workspace capacity exceeds the specified percentage. You can create triggers for
both Warning and Error events.
If you have email notifications enabled, you can select the ISIS General Error and Warning subcodes to receive
email notifications when Workspace capacity events are written to the Windows Event Log. For more information
on email notifications, see
To set an event trigger:
1. In the Workspaces list, select the Workspace for which you want to set a trigger.
2. If the Details panel is not visible, do one of the following:
“Configuring the Notification Service” on page 31.
tClick Details.
tDouble-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
78
Page 79
Managing Workspaces
3. (Option) Select one of the following from the Warning Event Trigger “used” list:
OptionDescription
Unused GB <Trigger a warning when unused capacity falls below the specified value, in gigabytes
Used % >Trigger a warning when used capacity exceeds the specified percentage value
4. Type a value in the text field for the used or unused capacity at which you want a warning event to be written to
the Event Log.
5. (Option) Select one of the following from the Error Event Trigger “used” list:
OptionDescription
Unused GB <Trigger an error when unused capacity falls below the specified value, in gigabytes
Used % >Trigger an error when used capacity exceeds the specified percentage value
6. Type a value in the text field for the used or unused capacity at which you want an error event to be written to
the Event Log.
7. Click Apply.
8. Click Close.
Deleting Workspaces
You can delete Workspaces that are not currently accessed by any clients. You can also delete Workspaces whether
or not they have media files stored on them. You can delete multiple Workspaces at one time.
Before deleting a Workspace, make sure that its media is no longer needed, is moved, or is backed up. You then can
safely delete the Workspace.
If you delete a Workspace that has been mapped to a local drive by a client, the client cannot access that Workspace.
Clients should unmap the deleted Workspace using the Avid ISIS Client Manager. For information on using the
Client Manager, see the Avid ISIS Client Guide or the Client Manager Help.
c
When a Workspace is deleted, a redistribution is initiated. If you start the delete on an ISIS during high client
usage, it might reduce performance on your clients. This can include dropped frames, underruns, and failed
captures. Delete Workspaces during periods of light client activity.
You can suspend and resume a redistribution as needed.
To delete a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select the Workspace you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm the operation.
4. Click Yes.
The Workspace is deleted.
79
Page 80
Managing Workspace Access Privileges
You can set privileges for user and user group access to Workspaces in the Workspaces page. There are three levels
of access available to clients of the network, described in the following table.
Access LevelDescription
Read/WriteWorkspace can be read and written to.
ReadWorkspace can be read but not written to.
NoneWorkspace cannot be read, written to, or mounted.
Managing Workspace Access Privileges
By default, new client accounts do not have access privileges until an administrator assigns them (see
Users” on page 93
For example, you might need to increase the access privileges for a user who does not have write access to the
appropriate Workspace, or for a Workspace that does not provide the appropriate access to one or more users. To do
so, you can either modify an individual client’s access privileges in the Users dialog box (see
page 94
You also can assign users access privileges different from those originally assigned to the group. If a user group is
given a more permissive level of access than some members of the group, the group members then can have an
effective access different from their assigned access. This can be useful for projects that require users with a variety
of permissions to be able to write to certain Workspaces. You can also have users who have more permissive access
than a user group in which they are members. Using the Workspaces page, the administrator can assign the
necessary privileges.
Consider the following for access privileges:
•As access privileges are increased, the newly accessible Workspaces are immediately available.
•If a client has Read privileges to a Workspace and is granted Read/Write privileges, the new privileges apply
•If a client is already at the Workspace selection stage when the access privileges are removed, then newly
•If a client has Read/Write privileges to a Workspace and access privileges are reduced to read, the new
), or you can use the Workspace dialog box (see “Setting Workspace Access Privileges” on page 80).
immediately, without modifying the Workspace.
inaccessible Workspaces remain in the display. However, attempting to access the Workspaces will be
unsuccessful.
privileges apply immediately, without modifying the Workspace. If a file is open for writing, the client retains
write privilege to that file until it is closed.
). You can customize access for each client to every Workspace, if necessary.
“Modifying Users” on
“Adding
•If a client has privileges to a Workspace and those privileges are reduced to None, then the Workspace is
unavailable the next time the client attempts to access it.
Setting Workspace Access Privileges
You can set access privileges for users and user groups when the client accounts are first created (see “Adding
Users” on page 93
“Modifying Users” on page 94). The Workspaces page, however, allows you to set, modify, and monitor access
privileges to Workspaces without having to modify individual client accounts.
and “Adding User Groups” on page 98). You can also change access in the Users dialog box (see
80
Page 81
Redistributing Data
To set user or user group access to a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select a Workspace.
3. If the Details panel is not visible, do one of the following:
tClick Details.
tDouble-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. In the User Access panel, select a user or a user group. Ctrl+click (Windows and Linux) or Cmd+click
(Macintosh) to select multiple users and user groups. You can select all users and user groups by clicking Select
All.
5. Do one of the following:
tClick Read/Write to set both read and write Workspace access for the client.
tClick Read to set read-only Workspace access for the client.
tClick None to remove Workspace access privileges for the client.
6. (Option) Click Revert to undo any modifications made to the user access information.
7. Click Apply.
Redistributing Data
Redistribution is an operation that ensures all files on a Workspace are balanced evenly across the Storage Managers
in the Storage Group to provide optimal file system performance. Data chunks are distributed across multiple
Storage Managers to ensure redundancy and protect against data loss. When redistributing files in a Storage Group,
the redistribution applies to all Workspaces in that Storage Group.
There are several operations that involve redistribution of data:
•Adding or removing Storage Managers from a Storage Group
•Deleting or moving Workspaces
•Switching Workspaces between Mirrored protection and Unprotected
Configuration Changes
The configuration of a Storage Group is based on the Storage Managers that make up that group. When you add or
remove Storage Managers from the Storage Group two things happen: a configuration change is made and an
incremental redistribution is performed to balance the files in the Storage Group across the Storage Managers.
Deleting and moving Workspaces result in a redistribution but do not cause a configuration change. You can view
the number of configuration changes that have been applied to a Workspace in the Details panel of the Workspaces
page. For more information, see
“Viewing Workspace Details” on page 73.
After 20 configuration changes, the Workspaces page displays a warning to perform a full redistribution. You can
manually initiate a Full Redistribution at any time using the Workspaces page in the Management Console. If you do
not do so, the system continues to function, but the affected Workspaces, and System Status Panel general status will
both remain at Warning until a full redistribution is performed. For more information on performing a full
redistribution, see
“Performing a Full Redistribution” on page 83.
81
Page 82
Redistributing Data
c
After 30 configuration changes without a full redistribution, the system will perform a full redistribution
automatically. This could significantly reduce system performance until the redistribution operation has
completed.
Redistribution Guidelines
•The ISIS | 7500 and ISIS | 5500 support add, remove, and full redistributions under load.
• The ISIS | 2500 supports add redistributions under load.
-A load condition exists when the Workspace has active clients (reading and writing to the Workspace).
-A no load condition exists when a Workspace has inactive clients (the Workspace is mounted but clients are
not performing reads or writes).
•ISIS | 2500 systems do not support “remove” or “full” redistribution of Storage Managers (Engines) to a
Storage Group.
•When redistributing under load, allow the redistribution to complete before initiating a second redistribution.
•System performance can degrade significantly during redistribution in a Storage Group with the maximum
client count. Reducing the number of clients allows the active clients using the Storage Group to function
normally, with successful playback and captures. Perform redistributions during periods of light client activity,
or reduce the overall load if client performance degrades (for example, the client experiences dropped frames,
underruns, and failed captures). Limitations on expected client performance during redistribution include the
following:
-Reducing audio tracks from 8 to 4 during playback might be required during redistribution. (Normal
operation supports 2 streams of video 8 tracks of audio.)
-Reducing the number of video streams from 2 to 1 might be required during redistribution. (Normal
operation supports 2 streams of video.)
You can suspend and resume a redistribution as needed. See the Avid ISIS Performance Guide for more
information.
•The amount of time a redistribution takes depends on whether the Workspace is in a load or a no load condition,
whether you are adding or removing a Storage Manager, and how much data in the Storage Group must be
redistributed. For more information on redistribution times, see the Avid ISIS Performance Guide.
•Do not physically remove a Storage Manager until it has been removed from the Storage Group, the
redistribution is complete, and it has been unbound as a Storage Manager.
c
c
If you physically remove a Storage Manager from the shared storage network before redistribution is
complete, or if you physically remove more than one Storage Manager from a Storage Group before
performing a redistribution, data loss can occur.
If you turn off any of the Engines before redistribution is complete, data loss can occur.
Symmetric Configuration Redistribution
Full redistributions happen faster on workspaces that have had symmetric configuration changes. For example, the
same number of ISBs that were removed from a storage group are also added in a single configuration change. For
more examples of symmetric configuration changes search the Avid Knowledge Base for the Avid ISIS Performance and Redistribution Guide. As with all full redistributions, all workspaces in the storage group should be selected for
the full redistribution.
A full redistribution is still recommended at 20 configuration changes. At 30 configuration changes the Avid ISIS
software automatically performs a full redistribution.
82
Page 83
Automatic Redistribution on Disk Failure
Avid ISIS performs an automatic redistribution on Disk Failure notification. Storage Managers continuously
monitor disk status and sends a “Disk Failed” notification to the System Director upon determination that a disk is
not usable. The System Director then removes the Storage Manager from its associated Storage Group. The removal
of the Storage Manager from the Storage Group initiates redistributions on all workspaces associated with that
Storage Group. The System Director then prevents the Storage Manager that reported the disk failure from being
added to a Storage Group.
The Automatic Removal feature is controlled by a system preference that is configured using the ISIS Management
Console Preferences tool. The preference is called “Auto Remove Redistribution on Disk Failure” The default
setting is “enabled.” The Storage Manager is only removed from the Storage Group. It is not unbound from the ISIS
Systems for the following reasons:
•The Storage Manager participates in the removal redistribution. This is required to prevent data loss when full
redundancy has not been attained for all data blocks.
•The Storage Manager continues to report status, such as physically replacing the blade.
Auto removal status is reported by way of the System Event Log. A sequence of event log entries are generated for
the initial report of the failure, the decision to remove the Storage Manager, and subsequent success or failure.
Events are also logged for the start and stop of all the workspace redistributions.
Redistributing Data
When using Automatic Redistribution:
•Keep a certain percentage of your Storage Group unused at all times. Failure to do so can cause the system to
run out of space after an automatic redistribution has initiated and cause a client outage. The recommended
amount of free space varies by ISIS platform; for more information, see
Requirement” on page 69
•If an automatic redistribution of a Storage Group is started during a critical time the overall system performance
can degrade significantly and be disruptive. For more information on understanding the performance
characteristics during remove redistribution, see the Avid ISIS Performance and Redistribution Guide.
•An automatic redistribution removes the Storage Manager from the Storage Group but not from the file system.
Once an automatic redistribution has occurred and completed, the removed Storage Manager should be
removed from the file system. You must first remove the Storage Manager with the software and then physically
replace it. A replacement ISB must then be added to the file system and then the Storage Group, triggering
another redistribution.
•If unmirrored workspaces are in use, the data will be damaged on those workspaces in that Storage Group.
.
Workspace Redistribution Batching
Redistributions are performed on 20 Workspaces at a time. If your Storage Group exceeds 20 Workspaces, the
Workspace Status shows “Redistribution In Process” for the first 20 Workspaces and “Redistribution Pending” for
the remainder of Workspaces in that Storage Group. As Workspaces finish with the redistribution, the
“Redistribution Pending” Workspaces start to redistribute until all the Workspaces in that Storage Group have
finished the redistribution.
“Minimum Free Storage Space
Performing a Full Redistribution
In addition to automatic redistribution operations (see “Redistributing Data” on page 81), you can also initiate
redistribution manually; for example, to perform a full redistribution when the Config Changes count exceeds 20.
(For information about Config Changes, see
“Viewing Workspace Details” on page 73.)
83
Page 84
Redistributing Data
When the Config Changes count reaches 20, a message warns you to perform a redistribution.
n
When redistributing files manually, apply the redistribution to all Workspaces in a Storage Group. Avid does not
recommend performing a full redistribution on some Workspaces in a Storage Group and not on others.
You can choose specific Workspaces to redistribute, or select one or more Workspaces from one or more Storage
Groups, and redistribute all the Workspaces associated with those Storage Groups.
To redistribute Workspaces manually:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. Do one of the following:
tSelect specific Workspaces, then click Advanced Commands.
tSelect a single Workspace, then click Advanced Commands.
tSelect one or more Workspaces from different Storage Groups, then click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
3. Do one of the following:
tClick Full Redistribution.
Only the selected Workspaces start redistribution.
tClick Full Redistribution for All.
Redistribution starts for all Workspaces associated with the Storage Groups of the Workspaces you
selected.
A confirmation message box opens.
4. Click OK.
Files are redistributed, and the count in the Config Changes column is reset to zero. The amount of time
required for the redistribution depends on the amount of data in the Workspace.
5. If Storage Managers have rebooted following the completion of a full redistribution, do the following:
a.Click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
b. Select Verify Redistribution, and then click Send.
Suspending and Resuming Redistribution
Under some conditions, you might have to suspend or resume an in-progress redistribution. You can do this with the
Advanced Commands options available on the toolbar in the Workspaces page, which also lets you suspend or
resume redistribution of all Workspaces associated with the same Storage Groups.
To suspend the redistribution on a Storage Group that has more than 20 Workspaces, suspend all the workspaces in
n
that group.
c
Use of the Resume Redistribution and the Suspend Redistribution options can result in degraded system
performance. Suspending redistributions can have serious consequences for the file system if not monitored
closely. These two Advanced Commands options should be used by Avid Customer Support personnel or
under Avid Customer Support direction.
84
Page 85
Redistributing Data
You can also use the Advanced Commands to verify a redistribution. Verification makes sure that all bad blocks on
the appropriate Storage Manager have been deleted and that the redistribution has completed successfully. Use the
Verify Redistribution command whenever Storage Managers are rebooted following a redistribution — for example,
after you upgrade your system. In this case, Storage Managers might report a “Repairing Mirrors” status on reboot;
verifying the redistribution replays the redistribution operation using the current configuration and restores the status
to normal.
Verification causes minimal impact on performance and completes quickly.
n
To suspend a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Do one of the following:
tSelect specific Workspaces, then click Advanced Commands.
tSelect a single Workspace, then click Advanced Commands.
tSelect one or more Workspaces from different Storage Groups, then click Advanced Commands.
c
The Advanced Workspace Commands dialog box opens.
4. Do one of the following:
tClick Suspend Redistribution.
Only the selected Workspaces suspend redistribution.
tClick Suspend Redistribution for All.
Redistribution is suspended for all Workspaces associated with the Storage Groups of the Workspaces you
selected.
A confirmation message box opens.
5. Click Send.
When you manually suspend a redistribution, you must also manually resume it. Suspending redistributions
should be considered temporary — Workspaces should not be left in the suspended state for extended periods
of time.
To resume a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Do one of the following:
tSelect specific Workspaces with suspended redistribution, then click Advanced Commands.
tSelect a single Workspace, then click Advanced Commands.
tSelect one or more Workspaces from different Storage Groups, then click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
4. Do one of the following:
85
Page 86
Redistribution Status Definitions
tClick Resume Redistribution.
Only the selected Workspaces resume redistribution.
tClick Resume Redistribution for All.
Redistribution is resumed for all Workspaces associated with the Storage Groups of the Workspaces you
selected.
A confirmation message box opens.
5. Click Send.
To verify a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15
.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Select the Workspace where the redistribution has completed.
4. Click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
5. Select Verify Redistribution.
6. Click Send.
Redistribution Status Definitions
The following table lists the Status Messages logged by the System Director Service during a redistribution, and a
brief description of the error. Other Storage Manager errors, not strictly related to redistribution, can also occur,
interrupting redistribution or causing it to fail. See
StatusSeverityISIS ModelComments
Initializing
Redistribution
RedistributingWarningAllThe Storage Manager is evenly redistributing data across all the
Redistribution
Details Available
WarningAllThe Storage Manager is in the first phase of the redistribution
Warning7500An ISB is having trouble sending redistribution data to one or
“Storage Manager Status” on page 36.
process, in which it determines which blocks will be moved. The
redistribution status is displayed in the Redistribution Monitor
page.
drives in the Storage Group. The time it takes to redistribute the
data depends on the amount of data in the Storage Group.
more ISBs. Do the following:
•Open the ISB Storage Manager Agent page > Statistics tab >
Redistribution and view the “List of Storage Managers with
Transaction Issues” for problematic ISBs.
•Open the ISB Storage Manager Agent page > Statistics tab >
Network and view the “Top 16 IP Addresses in Receive Error
(Last 30 Minutes)” section.
86
Page 87
StatusSeverityISIS ModelComments (Continued)
Monitoring Redistributions
Stalled
Redistribution
WarningAllThe Storage Manager is currently stalled while trying to move
Monitoring Redistributions
You can display detailed information about the progress of redistributions in the Redistribution Monitor tool.
The Redistribution Monitor tool displays a table listing the status of redistributions, the rate and remaining time of
the redistribution, and other information.
To display details about redistribution:
1. Do one of the following:
tIf a redistribution is in process, click the Redistribution Monitor icon in the Status console.
blocks to other Storage Managers. This might be a temporary
condition; if it persists and the overall redistribution has been
determined to be stalled contact Avid Customer Support.
tIn the Management Console, click Redistribution Monitor under the Tools heading.
87
Page 88
Monitoring Redistributions
tFrom the Workspaces tool, the Storage Managers tool, or the Storage Groups tool, click Redistribution
Monitor in the Related Links section.
The Redistribution Monitor tool opens, displaying the information shown and described below.
HeadingDescription
NameStorage Manager name
ISB Name or Host NameName of the ISB Engine (ISIS | 7500) or the host name of the Storage Manager
(ISIS | 2500 and ISIS | 5500)
StateThe state of the Storage Manager (Active or Standby, bound or spare)
StatusRedistribution status
ProgressWhen a redistribution is in progress, displays a progress bar and the percentage
of redistribution currently complete.
Rate (blocks/hour)Estimated number of blocks that can be moved in one hour
Time RemainingEstimated amount of time for the redistribution to complete, based on system
load, amount of data, and the rate. This is not a guarantee or promise of how long
the redistribution will take.
88
Page 89
Monitoring Redistributions
Heading (Continued)Description (Continued)
Blocks to MoveTotal number of blocks still to be moved
Blocks MovedNumber of blocks that have been moved so far
Status TimeTime that the last status data was retrieved
TypeStorage Manager type (ISB size, ISIS Engine, Nearline Engine)
89
Page 90
6Managing Clients
Client accounts limit access to the file system. This section describes how to assign client accounts with associated
passwords and access privileges for users, groups, and devices.
You must create a client account for any client that needs to access the Avid ISIS shared storage network: users,
groups, and devices. When you create client accounts, you set basic client information, such as user names and
passwords.
Each user and user group account has an associated privilege level that determines what access the user logging in to
that account has when working with files stored in the network.
The ISIS Management Console allows the administrator to create client accounts for each client connected to the
system, and it maintains a record of all attached clients. The client accounts are listed in dialog boxes for each client
type: users, groups, and devices.
The client limits by ISIS model are as follows:
•ISIS | 7500—330 connected clients maximum
•ISIS | 5500—90 connected clients maximum
•ISIS | 2500—200 ISIS clients and unlimited CIFS clients
ISIS systems support a maximum of 5,000 user accounts (including the default Administrator and Guest user
accounts). In addition, ISIS systems support 1,000 groups. A single user can be in one primary group and up to 15
alternate groups.
Some clients might not be able to connect to the shared storage network if the combined bandwidth requirement of
n
connected components equals the system limit for bandwidth use. For information on monitoring bandwidth use, see
“Monitoring Client Bandwidth” on page 110.
Managing Users
The Users page of the ISIS Management Console allows you to create, modify, and delete user accounts; assign
users to specific groups; and manage access privileges for all users.
The Users page contains two sections. On the left side of the dialog box, the Users list displays all the current user
accounts. On the right side of the dialog box, the Details panel displays information about selected users, including
user group membership and Workspace access.
The Details panel is visible only after you select a client in the Users list.
n
90
Page 91
Managing Users
t
r
e
wq
y
1Action button toolbar—Perform actions on selected users
2Details panel—Detailed information on the selected users; see
3User list—Lists all users and related information; see “User Column List” on page 91
4Group membership—Displays information about the group membership for the selected user; see “Adding Users” on
page 93
5Filter panel—Filter the user list display based on conditions you configure; see “Filtering the Display” on page 24
6Workspace access—Displays information about the Workspace access for the selected user; see “Adding Users” on
page 93 and “Modifying Users” on page 94
User Column List
The following table summarizes the information available in the Users list.
HeadingDescription
NameLists the client name
FlagsIndicates the status of client privileges
BandwidthLists the client’s bandwidth allocation
“Viewing User Details” on page 92
and “Modifying Users” on page 94
Setting a bandwidth limit on editing clients, such as an Avid NewsCutter
adversely affect playback performance when the Avid ISIS system is under load.
®
Adrenaline client, can
91
Page 92
To sort the information in the Users panel, click any column heading. For more information on sorting items in
n
columns, see “Sorting Information” on page 24.
Viewing User Details
The Details panel displays all information for the currently selected user.
To view information about a user:
tIn the User list, click to select a user.
The Users page displays all the information for the selected user. If the Details panel is not visible, click Details.
To hide the User Details panel:
tClick the arrow next to the Details title bar.
To close the User Details panel:
tClick Close.
The following table summarizes the information available in the Details panel.
PanelHeadingDescription
Managing Users
Details
User Flag
Group Membership
NameLists the user name
PasswordAllows modification of the password used to log in to the system
VerifyProvides verification for the new password
BandwidthAllows modification of maximum bandwidth requirements
Setting a bandwidth limit on editing clients, such as an Avid
NewsCutter Adrenaline client, can adversely affect playback
performance when the Avid ISIS system is under load.
can resizeEnables or disables user privilege for resizing Workspaces
can modify protectionEnables or disables user privilege for changing protection status of
Workspaces
remote LDAP userEnables or disables user LDAP authentication and group privileges
disable userDisables the user
NameLists the names of available groups
TypeLists the user’s membership status for each group (Member or
Non-Member)
Workspace Access
NameLists the names of available Workspaces
AccessLists the access privileges for the selected user
92
Page 93
PanelHeadingDescription (Continued)
Adding Users
A user is anyone who accesses files stored on the network. User accounts include administrative privilege levels,
group membership types, and Workspace access. There can be more user accounts than connected clients, with a
maximum of 5,000 user accounts (including the default Administrator and Guest accounts).
Users must have access to at least one Workspace before they can use the shared storage network.
n
To create a user account:
1. From the Management Console home page, click Users in the System section.
The Users page opens.
2. Click New.
The Create User dialog box opens.
Managing Users
EffectiveLists the effective access privileges for the selected user
ReasonLists the reason for any difference between the access privileges
and the effective access assigned the selected user
3. Set the user options. The following table summarizes these options.
OptionTypeDescription
NametextIf there is already a user with the name entered in the Name text box, an error
message tells you to type a new name
For information on valid and invalid characters, see “Entering Text” on
n
page 26.
PasswordtextUser password (maximum of 15 characters)
VerifytextRe-type the user password to verify
Bandwidth (MB/sec)text (numeric) Sets a bandwidth limit for the client. The default value of zero denotes unlimited
bandwidth
can resizecheck boxEnables or disables user privilege for resizing Workspaces
can modify protectioncheck boxEnables or disables user privileges for changing protection status of Workspaces.
remote LDAP usercheck boxEnables or disables user LDAP authentication and group privileges
disable usercheck boxDisables the user
4. (Option) In the Group Membership list, select a group, and click Member to make the user a member in the
group. Users can belong to 15 groups.
By default, new users are listed as “Non-Member” in the Type category for each group. As a result, the
Non-Member button is inactive until membership is set.
The Group Membership list updates to show the user as a member of the group.
5. (Option) In the Workspace Access list, select one or more Workspaces and do one of the following:
tClick Read to set read-only Workspace access for the user.
93
Page 94
By default, access privileges for new users are listed as “None” in the Access category for each Workspace.
As a result, the None button is inactive until access is set. (For information on permissions for Workspace
access in the network, see “Managing Workspace Access Privileges” on page 80
tClick Read/Write to set both read and write Workspace access for the user.
The Workspace Access list updates to show the user access privileges for the selected Workspace.
6. Click Apply.
7. (Option) Repeat steps 3 through 6 to create new users.
8. Click Close to close the Create User dialog box and to return to the Users page.
The new user appears in the Users list.
Duplicating Users
When you duplicate user accounts, they inherit the bandwidth allocation and access privileges of the accounts from
which they were created.
To duplicate a user account:
1. In the Users list, select the user account you want to duplicate.
2. Click Duplicate.
Managing Users
.)
The Duplicate User dialog box opens.
3. (Option) Modify any of the attributes of the new user. For information on modifying user accounts, see
“Modifying Users” on page 94.
4. Click Apply to create a new user containing the attributes of the selected user.
The duplicate user appears in the Users page, and the Duplicate User dialog box refreshes to allow you to
duplicate a new user.
The new user account has a default name — user n, where n is an integer that is incremented each time you click
Apply to create another duplicate user account.
5. Click Close to close the Duplicate User dialog box and to return to the Users page.
Modifying Users
You can rename a User account, change the password, change the allocated bandwidth, edit privileges, and change
user membership in groups with the client dialog boxes. For example, you can change user passwords to
accommodate a new user, reestablish access for an existing user who has forgotten the password, or disable access to
an account.
You can modify a User account at any time, even when it is being actively used in your work environment.
To modify a User account:
1. From the User list, do one of the following:
tSelect the User account you want to modify, and click Details.
tDouble-click the client name.
The Details panel displays information about the selected User account.
2. Modify the user options as required. The following table summarizes these options.
94
Page 95
Managing Users
OptionTypeDescription
NametextIf there is already a user with the name entered in the Name text box, an error
message tells you to type a new name
For information on valid and invalid characters, see “Entering Text” on
n
page 26.
PasswordtextUser password (maximum of 15 characters)
VerifytextRe-type the user password to verify
Bandwidth (MB/sec)text (numeric) Sets a bandwidth limit for the client. The default value of zero denotes unlimited
bandwidth
can resizecheck boxEnables or disables user privilege for resizing Workspaces
can modify protectioncheck boxEnables or disables user privileges for changing protection status of Workspaces
remote LDAP usercheck boxEnables or disables user LDAP authentication and group privileges
disable usercheck boxDisables the user
3. Modify Group membership for the user as required:
tClick Member to make the user a member in the user group.
tClick Non-Member to remove the user from the user group.
4. Modify Workspace access for the user as required:
tClick None to remove Workspace access privileges for the client.
tClick Read to set read-only Workspace access for the client.
tClick Read/Write to set both read and write Workspace access for the client.
For information on permissions for Workspace access in the network, see “Managing Workspace Access
Privileges” on page 80
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.
Deleting Users
You can use the ISIS Management Console to delete any User account. If you want to remove the client from the
shared storage network but still maintain the client account, see
c
If you delete the client account, its connection to the System Director is broken immediately and any mounted
Workspaces are unmounted as soon as they are accessed.
To delete a User account:
and “Setting Workspace Access Privileges” on page 80.
“Disabling Users” on page 96.
1. Ensure that the client account to be deleted is not currently active.
2. From the Users list, select the User account you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm that you really want to delete the client.
4. Click OK.
95
Page 96
Disabling Users
t
r
e
wq
y
You can remove Users temporarily from the Avid ISIS shared storage network by using the Disable User option.
Disabling User accounts do not delete them from the list of Users in the Users page. This preserves the client
accounts and allows you to return the clients to the system by enabling the User account at a later time.
To remove a user by disabling the user account:
1. Ensure that the client account to be removed is not currently active.
2. From the Users list, select the client account you want to disable.
3. Do one of the following:
tClick Details.
tDouble-click the client name.
The Details panel displays information about the selected client.
4. Select the “disable user” check box.
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.
7. Click Close to close the Details window.
Managing User Groups
Managing User Groups
Client accounts also allow groups of users to access media stored on your network. These accounts allow users to
mount or map Workspaces on their Avid workstations.
96
Page 97
1Action button toolbar—Perform actions on selected user groups
Managing User Groups
2Details panel—Detailed information on the selected user group; see
3User groups list—Lists all user groups and related information
4User membership panel—Displays information about the membership for the selected user group; see
Groups” on page 98
5Filter panel—Filter the user list display based on conditions you configure; see “Filtering the Display” on page 24
6Workspace access panel—Displays information about the Workspace access for the selected user group; see “Adding
User Groups” on page 98
and “Modifying User Groups” on page 98
Viewing User Group Details
The Details panel displays all information for the currently selected user group.
To view detailed information about a User group:
tIn the Group list, click to select a user group.
The Groups page displays all the information for the selected user group. If the Details panel is not visible, click
Details.
To hide the User Membership or Workspace Access panel:
tClick the arrow next to the Details title bar or the User Access title bar.
To close the Details panel:
“Viewing User Group Details” on page 97
“Adding User
and “Modifying User Groups” on page 98
tClick Close.
The following table summarizes the information available in the Details panel.
PanelHeadingDescription
Group Details
NameLists the user group name
User Membership
NameLists the names of all users
Typ eLists the user’s membership status for each user group (Member or
Non-Member)
Membership CountLists the number of groups in which each user holds membership
(users can belong to no more than 15 user groups)
Workspace Access
NameLists the names of available Workspaces
AccessLists the access privileges for the selected user group
97
Page 98
Adding User Groups
To add a group account:
1. From the Management Console home page, click Groups in the System section.
The Groups page opens.
2. Click New.
The Create Group dialog box opens.
3. Type a user group name in the Name text box.
If there is already a user group with the name entered in the Name text box, an error message tells you to type a
new name.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. (Option) In the User Membership list, select a user and click Member to make the user a member in the user
group. Users can belong to no more than 15 user groups.
By default, new users are listed as “Non-Member” in the Type category for each user group. As a result, the
Non-Member button is inactive until membership is set.
5. (Option) In the Workspace Access list, select a Workspace or click Select All to select all Workspaces, and do
one of the following:
Managing User Groups
tClick Read to set read-only Workspace access for the user group.
tClick Read/Write to set both read and write Workspace access for the user group.
By default, access privileges for new user groups are listed as “None” in the Access category for each
Workspace. As a result, the None button is inactive until access is set. (For information on permissions for
Workspace access in the network, see
6. Click Apply.
7. (Option) Repeat steps 3 through 6 to create new user groups.
8. Click Close to close the Create Group dialog box and to return to the Groups dialog box.
The new user group appears in the Groups list.
Modifying User Groups
You can rename a user group account, change user membership, and modify Workspace access.
You can modify a client account at any time, even when it is being actively used in your work environment.
To modify a user group account:
1. From the Groups list, do one of the following:
tSelect the user group account you want to modify, and click Details.
tDouble-click the user group name.
“Setting Workspace Access Privileges” on page 80.)
The Details panel displays information about the selected user group account.
2. Modify the user group name as required.
If there is already a user group with the name entered in the Name text box, an error message tells you to type a
new name.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
98
Page 99
3. Modify user membership for the user group as required:
tClick Member to make the user a member in the user group.
tClick Non-Member to remove the user from the user group.
4. Modify Workspace access for the user group as required:
tClick None to remove Workspace access privileges for the user group.
tClick Read to set read-only Workspace access for the user group.
tClick Read/Write to set both read and write Workspace access for the user group.
For information on permissions for Workspace access in the network, see “Managing Workspace Access
Privileges” on page 80
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.
Deleting User Groups
You can use the ISIS Management Console to delete any user group account.
To delete a user group account:
Managing LDAP Accounts
and “Setting Workspace Access Privileges” on page 80.
1. Ensure that the user group account to be deleted is not currently active.
2. From the Groups list, select the user group account you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm that you really want to delete the user group.
4. Click OK.
Managing LDAP Accounts
LDAP (Lightweight Directory Access Protocol) is an Internet protocol that some applications use to look up
information — such as account information, user names, and groups — from a server. The LDAP Sync tool allows
ISIS administrators to synchronize ISIS user accounts with existing LDAP user accounts and to create and/or
modify a large number of users and groups within the Avid ISIS system. The LDAP Sync tool lets you:
•Display user accounts available within a given LDAP service but not in the ISIS system, and vice versa
•Add new groups and users to the ISIS system
•Grant user memberships to groups
•Remove user membership from a group in ISIS if user no longer belongs to that group on the LDAP server
•Users synchronized by the LDAP Sync tool will automatically be added as “Remote” users for authentication to
the LDAP server
You can use the LDAP Sync Tool to search for groups and their users on an LDAP server, synchronize users and
groups accounts by adding or removing users and/or groups from ISIS, generate a report of the account actions, and
view a history of the synchronization activity. You must first configure a connection by entering the LDAP server’s
fully qualified name, port, and user distinguished name and password for authentication.
Users imported by the LDAP Sync Tool cannot log into Avid ISIS server until it is configured for external
n
authentication. For more information about configuring external authentication, see “Configuring External
Authentication” on page 30.
99
Page 100
At this time, Avid ISIS currently only supports Microsoft Active Directory. ISIS might not be compatible with other
n
LDAP implementations.
Opening LDAP Sync Tool
You can use the LDAP Sync Tool to configure LDAP connections. If you have not previously configured a
connection, you must enter the connection name and other information specific to the particular LDAP server.
All connection information is stored locally for the connecting user’s account. If you try to connect from a different
n
workstation or as another user, you have to re-enter the ISIS and LDAP login information.
To open LDAP Sync Tool:
1. Do one of the following:
t(Windows) From the Start menu select Avid >LDAPSyncTool > Avid LDAP Sync Tool.
If the LDAP Sync tool is not installed, see “ISIS Toolbox” on page 123.
2. Type the following information in the appropriate text boxes:
FieldValue
HostnameFully qualified name of the LDAP server to which you are connecting
PasswordConnecting user’s LDAP password.
Contact your IT administrator to obtain your LDAP login information. Three failed connection attempts
might result in your LDAP user account being disabled.
3. Click Connect.
-If this is the first time using this tool, the LDAP Group Selection window opens. For more information
about using the LDAP Group Selection window, see
page 102
-If the tool has been used before on this workstation, the main window opens.
.
“Synchronizing LDAP and ISIS Accounts” on
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.