Pinnacle Systems ISIS - 4.7 Administrator’s Guide

Page 1
Avid® ISIS
Administration Guide
®
Page 2
Legal Notices
Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
This product is subject to the terms and conditions of a software license agreement provided with the software. The product may only be used in accordance with the license agreement.
This product may be protected by one or more U.S. and non-U.S patents. Details are available at www.avid.com/patents
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This document is protected under copyright law. An authorized licensee of Avid ISIS 7000 may reproduce this publication for the licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in part, for commercial purposes, such as selling copies of this document or providing support or educational services to others. This document is supplied as a guide for Avid ISIS 7000. Reasonable care has been taken in preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without notice.
Copyright © 2014 Avid Technology, Inc. and its licensors. All rights reserved.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Copyright © 1988–1997 Sam Leffler Copyright © 1991–1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.
.
2
Page 3
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised, knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN ver.
3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:
©1993–1998 Altura Software, Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/
© DevelopMentor
).
This product may include the JCifs library, for which the following notice applies:
JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/). See the LGPL.txt file in the Third Party Software directory on the installation CD.
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
Trademarks
003, 192 Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages, AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID, AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager, ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|24, Command|8, Control|24, Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet, DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander, ExpertRender, Fader Pack, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process, HDpack, Home-to-Hollywood, HYBRID, HyperSPACE, HyperSPACE HDCAM, iKnowledge, Image Independence, Impact, Improv, iNEWS, iNEWS Assign, iNEWS ControlAir, InGame, Instantwrite, Instinct, Intelligent Content Management, Intelligent Digital Actor Technology, IntelliRender, Intelli-Sat, Intelli-sat Broadcasting Recording Manager, InterFX, Interplay, inTONE, Intraframe, iS Expander, iS9, iS18, iS23, iS36, ISIS, IsoSync, LaunchPad, LeaderPlus, LFX, Lightning, Link & Sync, ListSync, LKT-200, Lo-Fi, MachineControl, Magic Mask, Make Anything Hollywood, make manage move | media, Marquee, MassivePack, Massive Pack Pro, Maxim, Mbox, Media Composer, MediaFlow, MediaLog, MediaMix, Media Reader, Media Recorder, MEDIArray, MediaServer, MediaShare, MetaFuze, MetaSync, MIDI I/O, Mix Rack, Moviestar, MultiShell, NaturalMatch, NewsCutter, NewsView, NewsVision, Nitris, NL3D, NLP, NSDOS, NSWIN, OMF, OMF Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Painterly Effects, Palladium, Personal Q, PET, Podcast Factory, PowerSwap, PRE, ProControl, ProEncode, Profiler, Pro Tools, Pro Tools|HD, Pro Tools LE, Pro Tools M-Powered, Pro Transfer, QuickPunch, QuietDrive, Realtime Motion Synthesis, Recti-Fi, Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, Reprise, Res Rocket Surfer, Reso, RetroLoop, Reverb One, ReVibe, Revolution, rS9, rS18, RTAS, Salesview, Sci-Fi, Scorch, ScriptSync, SecureProductionEnvironment, Serv|GT, Serv|LT, Shape-to-Shape, ShuttleCase, Sibelius, SimulPlay, SimulRecord, Slightly Rude Compressor, Smack!, Soft SampleCell, Soft-Clip Limiter, SoundReplacer, SPACE, SPACEShift, SpectraGraph, SpectraMatte, SteadyGlide, Streamfactory, Streamgenie, StreamRAID, SubCap, Sundance, Sundance Digital, SurroundScope, Symphony, SYNC HD, SYNC I/O, Synchronic, SynchroScope, Syntax, TDM FlexCable, TechFlix, Tel-Ray, Thunder, TimeLiner, Titansync, Titan, TL Aggro, TL AutoPan, TL Drum Rehab, TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, tools for storytellers, Transit, TransJammer, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Video the Web Way, VideoRAID, VideoSPACE, VTEM, Work-N-Play, Xdeck, X-Form, Xmon and XPAND! are either registered trademarks or trademarks of Avid Technology, Inc. in the United States and/or other countries.
3
Page 4
Apple, Macintosh, and Safari are either registered trademarks or trademarks of Apple Computer, Inc., registered in the U.S. and other countries. HP is a registered trademark of Hewlett-Packard Company. Intel is a registered trademark of Intel Corporation. Java is a trademark of Sun Microsystems in the United States and/or other countries. Kingston is a registered trademarks of Kingston Technology Corporation. All other marks may be the property of their respective titleholders. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks contained herein are the property of their respective owners.
Avid ISIS Administration Guide • 0175-30980-00 Rev. C• June 2014• Created 6/4/14
4
Page 5

Contents

Using This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Who Should Use This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Symbols and Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
If You Need Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Avid Training Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter 1 Working with the Avid ISIS Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
ISIS Nomenclature Used in this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Before Performing Administrative Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Opening the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Using the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
System Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
System Status Console Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Accessing Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Session Counter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Main Tools Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Organizing Display Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Moving Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Showing and Hiding Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Sorting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Filtering the Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Updating Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Selecting Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Using Context Menus to Perform Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Entering Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 2 Configuring the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Configuring Management Console Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Creating a Log of File Deletions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Configuring External Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Starting, Stopping, and Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Configuring Error Notification Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5
Page 6
Configuring Contact Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Chapter 3 Managing Avid ISIS Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Managing Storage Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Storage Manager Column List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Viewing Storage Manager Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Storage Manager Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Binding Storage Managers to the ISIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Unbinding Storage Managers from the ISIS File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Clearing Network Degraded Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Upgrading Storage Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Removing Storage Managers from the ISIS | 7500 Shared Storage Network . . . . . . . . . . . . . . . . . . . . . 39
Identifying the ISIS | 7500 Storage Managers Prior to Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Preparing to Removing Storage Managers from the Avid ISIS Engine. . . . . . . . . . . . . . . . . . . . . . . 41
Removing Orphaned Storage Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Initiate Block Rectify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Managing ISIS | 7500 Switch Blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
ISIS | 7500 Switch Blades Column List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Viewing ISIS | 7500 Switch Blade Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Upgrading ISIS | 7500 Switch Blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Managing the Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Engine Column List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Engine Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Removing Engines from the Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Upgrading ISIS | 7500 Engine Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Upgrading Individual ISIS | 7500 Engine Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Chapter 4 Avid ISIS Control Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
ISIS Launch Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Opening ISIS Launch Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Minimizing or Closing the ISIS Launch Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
ISIS Launch Pad Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Using Storage Manager Memory Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Avid ISIS System Director Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Opening the System Director Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Starting and Stopping the System Director Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Changing the System Director Virtual Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Monitoring System Director Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
System Director Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Using the ISIS System Director Memory Log Viewer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Working with File System Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Reconfiguring the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
6
Page 7
Creating or Re-creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Monitoring Metadata Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Creating a Metadata Dump File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Resetting the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Managing Active Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Chapter 5 Managing Storage Groups and Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Storage Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Viewing Storage Group and Storage Manager Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Storage Groups on ISIS | 7500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Storage Groups and Chunk Sizes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Storage Managers and Chunk Sizes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
RAID-6 Workspace, Single ISB Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
RAID-6 Workspace, Dual ISB Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Mirrored Workspace, Single ISB Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Matching Chunk Sizes to the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Zone 1 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Storage Groups on ISIS | 5500 and ISIS | 2500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Adding Storage Managers to Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Adding New Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Removing ISIS Storage Managers from Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Adding Storage Managers from Another Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Adding Storage Managers From Another Environment (ISIS | 7500) . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Deleting Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Minimum Free Storage Space Requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Managing Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Workspaces List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Workspace Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Workspace Data Protection (ISIS | 7500 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Workspace Creation (ISIS | 7500). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Workspace Duplication (ISIS | 7500). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Workspace Moves (ISIS | 7500) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Using the Workspace Size Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Viewing Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Adding New Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Duplicating Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Renaming Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Protecting ISIS | 7500 Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Setting ISIS | 7500 Workspace Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Moving Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
7
Page 8
Resizing Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Setting Event Triggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Deleting Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Managing Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Setting Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Redistributing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Configuration Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Redistribution Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Symmetric Configuration Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Automatic Redistribution on Disk Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Workspace Redistribution Batching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Performing a Full Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Suspending and Resuming Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Redistribution Status Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Monitoring Redistributions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Chapter 6 Managing Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
User Column List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Viewing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Modifying Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Managing User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Viewing User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Adding User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Modifying User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Deleting User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Opening LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Using LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Modifying the Account Synchronizer Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Synchronizing LDAP and ISIS Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Importing LDAP Users with Incorrectly Formatted LDAP UIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Connecting and Disconnecting from the ISIS and LDAP servers . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Managing Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Devices Column List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Viewing Device Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Adding Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
8
Page 9
Modifying Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Deleting Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Chapter 7 Managing Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Monitoring Client Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Opening the Bandwidth Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Bandwidth List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Scaling the Bandwidth List Graph Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Opening the Connection Status Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Disconnecting Clients from the Shared Storage Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Monitoring Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Reservations Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Revoking Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Chapter 8 System Monitoring and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Hardware Monitoring Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
System Information Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
System and Administration Log Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Using the Administration Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Using the System Logs Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Viewing System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Clearing System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
ISIS Snapshots Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Creating, Viewing, and Deleting Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Working with Snapshot Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Profiler Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
System Status History Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
LSI Log Aggregator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Using the Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Creating Aggregate Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Viewing Aggregate Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Opening the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Updating the Disk Analyzer Tool Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Running Disk Analyzer Tool Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Saving Disk Analyzer Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Storage Manager Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
9
Page 10
Using the Storage Manager Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Retrieve Storage Manager Flag Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Switch Manager Tool (ISIS | 7500) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Network Utilities Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Monitor Tool (ISIS | 7500) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Accessing the Monitor Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Configuring the Monitor Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Viewing Information in the Monitor Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Displaying Rack Configurations in Separate Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Understanding the Monitor Tool Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Using System View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Using Status Details View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Using Blade Identification View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Using Temperatures View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Using Upgrades View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Agent Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Monitoring Avid ISIS with SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Appendix A Avid ISIS Storage Manager Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Opening the Avid ISIS Storage Manager Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Effect of Changing the Agent SSL Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Understanding the Agent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Statistics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Tools Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Logging Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Managing Storage Manager Agent Profiles (ISIS | 5500) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Creating New Storage Manager Agent Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Viewing Storage Manager Agent Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Deleting Agent Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Changing the Agent Administrator Password (ISIS | 5500 and 2000 only) . . . . . . . . . . . . . . . . . . . . . . 149
Storage Manager Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Using Storage Manager Agent Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Viewing Agent Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Clearing Agent Event Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Resetting the Storage Manager Status (ISIS | 2500) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Enabling and Disabling Storage Manager Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Saving Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Viewing and Deleting Saved Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
10
Page 11
Using the Log Viewer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Appendix B Avid ISIS | 7500 Switch Blade Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Understanding the Switch Agent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Statistics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Tools Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Logging Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Viewing System Information for Individual Chassis Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Setting Chassis Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Resetting an Avid ISIS Engine to Factory Defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Switch Infrastructure Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Counters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Running Switch Infrastructure Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Switch Diagnostics Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Switch Blade Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Using Agent Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Viewing Agent Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Clearing Agent Event Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Appendix C Avid ISIS SNMP MIB Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Appendix D Avid ISIS E-mail Notification List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Appendix E ISIS | 5500 Media Drive LED Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
11
Page 12

Using This Guide

The Avid® ISIS® media network provides a high-performance distributed file system that contains high-capacity shared media storage for workgroups of connected Avid editing workstations. This user’s guide describes how to connect your client system to the media network, mount workspaces, and configure your system for best performance.
Unless noted otherwise, the material in this document applies to the Windows systems.The majority of screen shots in this document were captured on a Windows system, but the information applies to all operating systems. Where differences exist, information on the differences is provided.
The documentation describes the features and hardware of all models. Therefore, your system might not contain
n
certain features and hardware that are covered in the documentation.

Who Should Use This Guide

This user’s guide is intended for users who need to access workspaces on the Avid ISIS media network. You should have a basic understanding of how to use and manage the Windows operating system or the Mac OS X systems, and you should be familiar with basic workgroup and network concepts.
®
, Mac OS® X, and Linux operating

Symbols and Conventions

Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
c
w
> This symbol indicates menu commands (and subcommands) in the order
(Windows), (Macintosh), or (Linux)
Bold font Bold font is primarily used in task instructions to identify user interface
A note provides important related information, reminders, recommendations, and strong suggestions.
A caution means that a specific action you take could cause harm to your computer or cause you to lose data.
A warning describes an action that could cause you physical harm. Follow the guidelines in this document or on the unit itself when handling electrical equipment.
you select them. For example, File > Import means to open the File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list indicate that you perform one of the actions listed.
This text indicates that the information applies only to the specified operating system, either Windows Macintosh OS X or Linux.
items and keyboard sequences.
12
Page 13
Symbol or Convention Meaning or Action
Italic font Italic font is used to emphasize certain words and to indicate variables.

If You Need Help

Courier Bold font
Ctrl+key or mouse action Press and hold the first key while you press the last key or perform the
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation was published.
New information would be found in the ReadMe file supplied on your Avid software kit located on the installation USB. Documentation is available as a PDF in the software kit and through the user interface.
Always check online for the most up-to-date release notes or ReadMe because the online version is updated whenever new information becomes available. To view the online versions, visit the Knowledge
Base at
3. Check the documentation that came with your Avid application or your hardware for maintenance or hardware-related issues.
4. Visit the online Knowledge Base at 7 days per week. Search this online Knowledge Base to find answers, to view error messages, to access troubleshooting tips, to download updates, and to read or join online message-board discussions.
www.avid.com/US/support.
Courier Bold font identifies text that you type.
mouse action. For example, Command+Option+C or Ctrl+drag.
www.avid.com/US/support. Online services are available 24 hours per day,

Accessing the Online Documentation

The Avid ISIS online documentation contains all the product documentation in PDF format. You can access the documentation in the top-level AvidISISDocumentation folder on the Avid ISIS installer software kit.
The documentation describes the features and hardware of all models. Therefore, your system might not contain
n
certain features and hardware that are covered in the documentation.
To access the online documentation from the software installer kit:
1. Insert the Avid ISIS installer USB into the USB port.
2. Navigate to the [drive]:\.AvidISISDocumentation folder, and double-click the PDF file for the document you want to view.

Avid Training Services

Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid understands that the knowledge you need to differentiate yourself is always changing, and Avid continually updates course content and offers new training delivery methods that accommodate your pressured and competitive work environment.
13
Page 14
Avid Training Services
For information on courses/schedules, training centers, certifications, courseware, and books, please visit
www.avid.com/support
and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).
14
Page 15

1 Working with the Avid ISIS Management Console

The Avid ISIS Management Console allows you to access administration functions from any system that has an Ethernet connection to the System Director, as well as from the System Director itself.
c
Performing administrative functions on more than one Administration site at the same time can cause unexpected results.
When you access the Avid ISIS Management Console, the Login page opens, and the site prompts you to supply a user name and password to log in. If you type the wrong password, an error message appears and the Login dialog box reappears.
When you first install the Avid ISIS software, the login password is blank by default. To set a password for the
n
administrator, see “Changing the Administrator Password” on page 29.
Standard ISIS client users can log in to the Management Console, but they will have limited access to the Management Console interface. They can also view certain information about the network through the Client Manager. For more information about the Client Manager, see the Avid ISIS Client Manager Help. The Avid ISIS Client Guide is also included in the AvidISISDocumentation folder in the software kit.

ISIS Nomenclature Used in this Guide

Throughout this guide, any information for the ISIS | 7500 also applies to the ISIS 7000; likewise for the ISIS | 5500 (applies to ISIS 5000), and ISIS | 2500 (applies to ISIS 2000).

Before Performing Administrative Functions

It is critical that clients unmount Workspaces when you do the following:
Stop and restart the System Director (unmount all Workspaces)
Change users’ or user groups’ access (unmount only the affected Workspaces)
Rename or delete Workspaces (unmount only the affected Workspaces)
c
If a client is using a Workspace when the ISIS system is taken offline, the connection to the Workspace is broken and data might be lost.

Opening the Management Console

The Avid ISIS Management Console runs within a web browser window. The following web browsers have been qualified for use with the Management Console:
15
Page 16
Microsoft Windows
Microsoft Internet Explorer
Mozilla Firefox
Google® Chrome
®
Apple Macintosh
Safari
Mozilla Firefox
Google Chrome
Red Hat Linux
Mozilla Firefox
To open the Management Console as Administrator:
1. Open your web browser.
2. In the address bar of your browser, type one of the following:
ISIS Model Option Enter
Opening the Management Console
ISIS | 7500 Name https://[System Director host name]:5015
IP Address
ISIS | 5500 Name
IP Address
ISIS | 2500 Name
IP Address
https://[
http://[
http://[
http://[
http://[
System Director IP address]:5015
System Director host name
System Director IP address
System Director host name
System Director IP address
]
]
]
]
The active System Director host name is one of the following:
- The System Director Windows host name.
- A host name which has been assigned to the active System Director on your network DNS server(s).
Check with your network administrator if you are unsure of which System Director name to use.
When you enter the ISIS | 7500 System Director address, if any site certification warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your network administrator.
The Login dialog box for the ISIS Management Console opens. The “Username” field is automatically populated with the Administrator user name.
3. Type your password.
For information on changing the administrative password, see “Changing the Administrator Password” on
page 29
.
4. Click Login (arrow icon), or press Enter.
The Avid ISIS Home page opens.
16
Page 17
To log out of the ISIS Management Console:
t Click Logout in the upper right corner of the screen.

Using the Management Console Interface

The ISIS Management Console, which you can access on the System Director or on any Ethernet-attached client, has a user interface where controls are grouped by function and are displayed by clicking the appropriate icons.
To use the ISIS Management Console, you must have Adobe® Flash® Player installed on your system.
The following illustrations are from the ISIS | 7500 Management Console. They might include features not available
n
in the ISIS | 5500 and ISIS | 2500. Non-Administrator users will see a subset of the tools available to Administrators, depending on access privileges.
Using the Management Console Interface
1 System Status Console — Provides a snapshot view of several aspects of the Avid ISIS system. See “System Status Console” on
.
page 17
2 Navigation toolbar — Access Management Console tools and bread crumb navigation. See
3 Main tools panel — Click to go to the respective tool pages. See
4 Help link — provides links to various ISIS online documents. See
5 Logout link — Ends the Management Console session and logs the user out of the system. See
Console” on page 15
.
“Main Tools Panel” on page 21.
“Main Tools Panel” on page 21.
“Navigation Toolbar” on page 20.
“Opening the Management

System Status Console

The System Status Console, located on the left side of the Avid ISIS Management Console, contains several components that give you a snapshot view of the Avid ISIS system. These allow you to access additional information about your system and to perform certain administrative tasks, such as monitoring and logging.
17
Page 18
Using the Management Console Interface
Administrators can configure whether or not the System Status Console is visible on the login screen of the
n
Management Console. However, even if it is visible, you must log in to follow links from the tool bar screens (such as the log files).
1 Current system status panel — LEDs for errors, warnings, info, and upgrade statuses will be lit to indicate the presence of system
events. Click a color to open the Status panel. See
2 Status retrieval panel — The Management Console periodically retrieves system status information. The panel displays the results and
the time stamp of the retrieval operation.
3 System Status History panel — Displays the system events that have occurred since the System Director was started, along with the
date and time of the first logged event. Clicking this panel opens the System Status History tool. For more information, see
Status History Page” on page 122
4 Storage capacity panel — displays the total capacity of all bound Storage Managers, capacity allocated to Workspaces, and the
amount of capacity used by data.
5 System Status Console panels — click the panel headings to display the system information panel. For more information, see
Status Console Panels” on page 18
.
.
“System Status Console Panels” on page 18.
“System
“System

System Status Console Panels

The System Status Console contains several panels that provide information about different areas of Avid ISIS operation. Expand and collapse a panel by clicking the panel title.
18
Page 19
Using the Management Console Interface
Panel Description
Status Console Panel Provides a quick summary of the System Director status. If an event in the system log triggers
a status to appear, a link is provided to the System Logs tool. For more information, see
“Using the System Logs Page” on page 119
System Console Panel Provides a summary of hardware, software, and networking information.
An error message is displayed in the Status panel if the system drives (C: and D:) become too full (defined as less than 6 GB free space on drive C:, or less than 16 GB on drive D:).
A warning message is displayed when the C: drive has less than 11 GB, or the D: drive has less than 26 GB.
If the C: or D: drives become too full, the system might not be able to save metadata, and you might not be able to upgrade the ISIS software.
If these events or warnings occur, look on the C: and D: drives on the System Director and delete any old ISIS installation kits, and anything in the /temp folder. You can also delete copies of the PartitionDump.bin file that are more than one month old, and any IndexServer.dmp files.
19
Page 20
Panel Description
Using the Management Console Interface
Performance Console Panel
Bandwidth Console Panel
Provides a summary of the number of messages per second, number of open files, and the names of clients connected to the system.
Displays “Megabytes per second,” information on total and per-client bandwidth.

Navigation Toolbar

The navigation toolbar provides several items to help you navigate through the Management Console interface.
1 Home link—You can click this link from any page to return to the Management Console Home screen
2 Current tool heading—Indicates the tool you are currently using
3 Related links section—Displays links to other Management Console tools relevant to the one you are currently using

Accessing Help

The Help menu, located in the upper right-hand corner of the Management Console window, provides links to the complete set of Avid ISIS online PDF documents.
20
Page 21
PDF documents can open in an external application or browser, depending on your configuration. An
n
Administration Guide HTML Help is only available from the System Director Control Panel and requires Internet Explorer. The Help does not work properly in other browsers.
To access the Help menu:
1. Move the mouse cursor over the Help menu text.
The Help pop-up menu opens.
2. (Option) Click the Help menu text to open the Avid ISIS online document.

Session Counter

Using the Management Console Interface
The user session will time out automatically after two hours of inactivity, after which you must log in again to continue working. The session counter, located in the lower right corner of the Management Console, displays the time remaining in the user session.
The counter is automatically reset to two hours when you click a link or perform an action such as adding or deleting a Workspace. You can also reset the counter manually by clicking it.
If you enable Auto refresh on a tool screen you will not automatically be logged out after two hours, as long as you stay on the page where Auto refresh is enabled, or navigate between tools as described in
on page 25
To manually reset the session counter:
t Click the session counter display.
. Clicking Home disables Auto refresh, and the session counter functionality (automatic logout) resumes.
The session timer is reset to two hours.

Main Tools Panel

The ISIS Management Console main panel is divided into the following sections:
“Updating Information”
The System section, which contains the following tools:
Tool Description
Workspaces View details of, create, delete, duplicate, or change capacity of any Workspace; see
“Managing Workspaces” on page 69 for more information.
21
Page 22
Using the Management Console Interface
Tool Description (Continued)
Users View details of, create, delete, duplicate, or modify Workspace access of any User; see
“Managing Users” on page 90 for more information.
Groups View details of, create, duplicate, modify Workspace access of, or assign User access to any
User Group; see
“Managing User Groups” on page 96 for more information.
Devices View details of, create, delete, or modify descriptions of any device; see
on page 106
Installers Download installers for Avid ISIS Client Manager, Flash, and other software.
Engines View details of Engines, reported serial number, status, uptime and more information, see
“Managing Storage Managers” on page 33.
Switch Blades (7500) View switch IP addresses, Upgrade Switches, or open the switch Agent pages; for more
information, see
Storage Managers View details of, bind, or unbind any Storage Manager; for more information, see
Storage Managers” on page 33
Storage Groups View details of, create, delete, or modify Storage Managers of any Storage Group; for more
information, see
for more information.
“Managing Storage Managers” on page 33.
.
“Managing Storage Groups” on page 61.
“Managing Devices”
The Connectivity section, which contains the following tools:
Tool Description
Connection Status View or disconnect any connected client; for more information, see “Monitoring System
Connection Status” on page 111
Bandwidth View read and write bandwidth of any connected client; for more information, see
“Monitoring Client Bandwidth” on page 110.
.
“Managing
Reservations View and revoke any current bandwidth reservation; for more information, see
Reservations” on page 113
.
“Monitoring
The Tools section, which contains the following tools:
Tool Description
System Status History View historical system status information; for more information, see “System Status History
Page” on page 122
Network Utilities Allows you to retrieve a detailed look at the connected network, or run a ping or traceroute;
for more information, see
.
“Network Utilities Page” on page 131.
The Logging section, which contains the following tools:
22
Page 23

Organizing Display Information

r
Tool Description
System Information Get complete system information: Memory stats, host information, running processes, and Agent
statistics, all on one screen; for more information, see “System Information Page” on page 116.
System Logs View all system messages, info, warnings, and errors at the application, system, and security levels; fo
more information, see “Using the System Logs Page” on page 119.
Administration Logs View current and archived Management Console logs; for more information, see
Administration Logs” on page 118
ISIS Snapshots Create a snapshot of the ISIS system for viewing or downloading; for more information, see
Snapshots Page” on page 120.
Profiler Create and view profiles of the System Director; for more information, see
page 120
.
.
“ISIS Snapshots Page” on
The Advanced section, which contains the following tools:
Tool Description
Preferences Change and save bandwidth, LCT threshold, device creation, disk error threshold, and other
preferences; for more information, see
.
page 28
External Authentication Configure external authentication servers; for more information, see
Authentication” on page 30
Notification Service Configure email notification on specific system events; for more information, see
“Configuring the Notification Service” on page 31.
Agent Settings Modify agent configuration options and trace settings; for more information, see
Settings Page” on page 139
.
.
“Configuring Management Console Preferences” on
“Configuring External
“Agent
“Using the
“ISIS
Administrator Password Change the Management Console Administrator password; for more information, see
“Changing the Administrator Password” on page 29.
Organizing Display Information
You can customize the Main display panel for any option by moving and hiding columns, and by sorting and filtering information.

Moving Columns

To move a column in the Main display panel:
t Click and drag any column to the position you want, and release the mouse button.
The column appears in the new position, and columns to the right are moved to make room.
23
Page 24

Showing and Hiding Columns

rewq t y u
When you open a Management Console tool (for example, the Storage Managers tool), the Main display panel lists items in default columns. Depending on the option selected, there might be other headings available to view. You can select individual or multiple column headings to be displayed or hidden.
To show or hide columns:
t Select one of the options, right-click in the column heading row and select a heading you want to show or hide.
Displayed column headings are marked by a bullet symbol (•). You cannot hide the first column on the left of the Main display panel (usually the Name column).

Filtering the Display

Sorting Information

The ISIS Management Console interface allows you to sort information listed in the Main display panel, or in the Details panel. Sorting the information in columns arranges items in either numerical or alphabetical order. You can also perform a multilevel sort of the displayed information.
To sort information:
t Click the column heading for the column you want to sort.
The information is sorted in ascending order. To reverse the sort order, click the column heading again.
To perform a multilevel sort:
1. Click the column heading for the first column you want to sort.
The items in the column are sorted in ascending order.
2. Click a second column.
The items in the second column are sorted in ascending order. The items in the first column maintain their sort order, but with a lower priority than the second sort.
3. (Option) Click multiple columns to add levels to the sort. To cancel a multilevel sort, click a column heading that has already been sorted.
Filtering the Display
You can limit the items listed in the Main display panel by setting Filter parameters at the bottom of the Management Console window. Filtering the display allows you to focus on only those items that you want to monitor. You can restore all items to the display by clearing the Filter parameters.
24
Page 25
1 Category menu—Select the category to filter
2 “not” operator—Select to exclude items matching the filter rules from the search results
3 Condition menu—Select the filter condition
4 Search term field—Type the text or value to filter
5 Filter button—Perform the filter operation
6 Clear button—Clear the filter settings
7 Filter results counter—Displays the number of filtered results on the page, and in total
You cannot filter the display for the Bandwidth, Connection Status, and Reservation options.
To filter the display:
1. Select a category from the Category menu.
The Category menu lists all of the column headings available for the selected Command menu option.
2. (Option) Select “not” to exclude the items matching the filter rules from the search results.
3. Click the Condition menu and select the filter condition you want to use.

Updating Information

4. In the Filter text box, type the text or value you want to use to filter the display.
5. Click Filter.
The Main display panel updates to display the filtered results. The Filter panel displays the number of filtered items displayed and the total number of items available for display.
To restore all items to the display:
t Click Clear.
The Main display panel updates to display all items.
Updating Information
You can update onscreen information to reflect recent system changes by clicking Refresh. You can also use Auto refresh to automatically refresh information at timed intervals, and prevent your session from timing out.
This setting persists between tools, when you navigate between them using the Related Links, but not between
n
browser sessions, and not if you click Home and then back into the tools. In those cases, Auto refresh reverts to the default (disabled) setting.
To enable Auto refresh:
t Select the check box next to the Refresh.
Auto refresh mode is enabled, and a message is displayed.
While Auto refresh mode is enabled, other functions such as add, delete, and details are not available.
n
25
Page 26
To disable Auto refresh:
t Deselect the check box next to the Refresh.
Auto refresh mode is disabled, and the confirmation message closes.

Selecting Items

You can select multiple items in most Management Console tool windows. The methods for selecting more than one item in a list are similar to those used in Windows Explorer or the Macintosh Finder.
The following table summarizes the methods for selecting items and performing actions.
Actions Selection Method
To select an item Click the item.
To select multiple, non-contiguous items Ctrl+click each item you want to select.
To select multiple, contiguous items Click the first item, then Shift+click on the last item.
Selecting Items

Using Context Menus to Perform Actions

Most Management Console tool windows offer context menus you can use to perform commands on selected items.
To access context menus within the Management Console:
t Right-click (Windows and Linux) or Ctrl+click (Macintosh) selected items.

Entering Text

Follow these guidelines when entering text in Management Console tool text fields:
Names can be a maximum of 31 ASCII characters in length.
Workspace names must use Unicode characters and cannot include a space.
26
Page 27
Entering Text
Passwords can be a maximum of 15 ASCII characters in length.
Do not include a space in the name fields.
Do not use a period (.) as either the first or last character in the names you create.
Avoid using the non-permitted characters listed in the following table in the name fields for workspace, group, file, user, device, or storage group names:
Character Name
^ Circumflex accent
\ Backslash
/ Forward slash
: Colon
* Asterisk
? Question mark
" Double quotation mark
< Less-than sign
> Greater-than sign
| Vertical line
[ Left square bracket
] Right square bracket
+ Plus sign
= Equals sign
% Percent sign
; Semicolon
, Comma
@ Commercial At symbol
The System Director does not support viewing regional language characters in the Management Console.
n
27
Page 28

2 Configuring the Management Console

Avid ISIS provides a number of tools to customize the way the Management Console functions and interacts with the network and other Avid products.

Configuring Management Console Preferences

The Preferences tool allows you to set parameters that apply to the basic functionality of the ISIS Management Console.
To configure Management Console Preferences:
1. From the Management Console home page, click the Preferences icon, located in the Advanced section.
The Preferences tool opens.
2. Configure ISIS preferences. The following table summarizes the ISIS Preferences items.
Option Type Description
Total System Bandwidth (MB/sec)
Default Bandwidth for Auto Created Devices (MB/sec)
Force Manual Device Creation check box If enabled, clients which do not have an entry in the Devices list will not be
Show status prior to login check box When selected, prevents anyone from seeing the Status Console panel on
The following options should only be altered under the direction of qualified Avid service or support personnel.
c
Default LCT Threshold (ms) text
text (numeric)
text (numeric)
(numeric)
Total reservation bandwidth allowed by the system, in MB/sec. Default value is 1,000 MB/sec. When this value has been reached, ISIS will no longer accept bandwidth reservations from clients.
This value does not represent the actual bandwidth capabilities of the
n
ISIS system. For more information about ISIS bandwidth capabilities, see the Avid ISIS Performance Guide.
Reservation bandwidth allowed for devices that are automatically created at connection time. Default value is 0 (zero). Using the default value results in auto-created devices being granted unlimited bandwidth.
allowed to connect. The Administrator must manually create a device account for every client computer that is expected to connect to the ISIS system. Default value is disabled.
the left side before they log in. Only administrators can change this setting. This setting is disabled by default; users can see the Status Console before logging in.
Defines the upper limit of the Long Command Time (LCT) value, above which the Storage Manager will report a Disk Degraded condition to the System Director. Default value is 0 (zero). Using the value of zero sets the LCT threshold to the internal system default of 750ms.
28
Page 29
Option Type Description (Continued)

Changing the Administrator Password

Default Hard Disk Error Threshold
Enable failover if standby has more active NICS
(7500 and 2500)
Auto Remove Redistribution on Disk Failure (7500)
Delete Logging check box Logs all deletes performed in the Storage Groups. For more information
Auto-Rectify check box Automatically reconciles the actual amount of used space and the reported
text (numeric)
check box When enabled, this causes the Active System Director to failover to the
check box Default value is enabled. For more information about Auto Remove
3. (Option) To revert all options to the previously saved values, click Refresh.
4. Click Save Preferences to save your changes.

Creating a Log of File Deletions

Defines the upper limit for number of hard disk errors before the Storage Manager reports a Disk Failure condition to the System Director. Default value is 0 (zero). Using the value of zero sets the LCT threshold to the internal system default of 25 errors).
Standby System Director if the network connection fails. Default value is enabled.
Redistribution, see
about delete logging, see Default value is disabled.
amount of used space on a system.Default value is disabled. Takes effect immediately with no restart required.
“Automatic Redistribution on Disk Failure” on page 83.
“Creating a Log of File Deletions” on page 29.
The delete-logging function is controlled in the Management Console Preferences. When enabled, log files are created and saved in the following location:
D:\Program Files\Avid\ISIS System Director\DeleteLogs
Log file names include name contains the date and time, for example “ISISdeleteLog-07_17_2012_17_59_30_322.csv.” Individual log files are limited to 4 MB in size except where a new log file would have the same name as an existing one. Up to 100 log files are kept then the oldest files are deleted.
®
You can view the delete log files (.csv) using Microsoft
Excel®. The first field does not display the date until you
select the cell and click the text entry box at the top of the spreadsheet.
Each entry in the log file consists of the following fields:
Date and time of the file delete (19 characters)
Name of the ISIS user initiating the delete (32 characters)
Name of the client system the delete was issued from (32 characters)
Full path of deleted file starting with the workspace name
Changing the Administrator Password
The Management Console Administrator password is blank by default; it is highly recommended that you set an Administrator password when you use the Management Console for the first time.
29
Page 30
To change the Administrator password:
1. From the Management Console home page, click the Administrator Password icon, located in the Advanced section.
The Administrator Password tool opens.
2. Type the current Administrator password in the Current Password field (blank by default).
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Change.
- The Administrator Password is changed to the new value.
- A confirmation message appears in the Results area.

Configuring External Authentication

Users added to the system through the LDAP Sync Tool are automatically configured as remote LDAP users in the ISIS system. When a remote LDAP user logs into the ISIS system, ISIS checks with an external LDAP server to authenticate the user instead of the local ISIS user database. Before remote LDAP users can access the ISIS system, you must configure ISIS to use an external LDAP server for authentication.
Configuring External Authentication
For more information on working with LDAP users and groups, see
To configure external Authentication:
1. From the Management Console home page, click the External Authentication icon, located in the Advanced section.
The External Authentication tool opens.
2. Click the Enable check box to select it.
The Domain Name text box becomes active.
3. In the Domain Name text box, enter the domain name of the network which the LDAP server(s) are members of, including subdomains, if applicable.
Use the format subdomain.domain.top-level-domain; for example:
dir.company.com
4. Click the “Server 0” check box to select it.
The Address text box becomes active.
5. In the Address text box, enter the fully-qualified domain name of the LDAP server.
Use the format servername.subdomain.domain.top-level-domain; for example:
server1.dir.company.com
6. (Option) Repeat steps 3 – 5 (using the “Server 1” and “Server 2” check boxes) to configure additional backup LDAP servers, if applicable.
“Managing LDAP Accounts” on page 99.
All of the LDAP servers must be mirrors, and reside on the same subdomain/domain.
n
7. When you have finished entering server information, click Submit.
The domain and LDAP server information is added to the ISIS database, and a confirmation message is displayed in the Results area.
30
Page 31

Configuring the Notification Service

You can use the Notification Service tool to configure System Director to notify you when problems occur. An error notification service regularly polls the Windows System Event log and, if any errors are logged, sends a concise summary of those errors to one or more email accounts.
The Notification Service tool window is divided into three main sections:
Configuration – Start and stop the Notification Service, and configure the Notification Service settings.
Filters – Modify the parameters that define when email notifications are sent to email recipients.
Contacts – Add and modify email recipients.

Starting, Stopping, and Configuring the Notification Service

The configuration information for the notification service (SMTP information, contacts, and filters) is currently stored in the registry on the System Director. This information is not currently replicated to the Dual System Director server, so you must enter configuration information for notification service on both System Directors.
To configure the Notification Service:
1. From the Management Console home page, click the Notification Service icon, located in the Advanced section.
Configuring the Notification Service
The Notification Service tool opens.
2. Click the Enable Service check box to toggle between checked and cleared.
t If the check box is checked, the Notification Service is enabled.
t If the check box is cleared, the Notification Service is disabled.
3. (Option) configure the Notification service settings. The following table summarizes the Notification Service settings.
Option Type Description
SMTP Server text The IP address or host name of your SMTP server.
SMTP Port text (numeric) The port number of your SMTP server. The default value (25) is appropriate in
most instances.
Poll Frequency (seconds) text (numeric) The frequency (in seconds) with which the error notification service checks for
problems.
Return Address text The email address of the Avid ISIS administrator or other primary contact for the
error notification service.
4. (Option) To test the configuration settings, click Test.
The results of the service test are displayed in the Results area.
5. Click Save.
- A confirmation message is displayed in the Results area.
- If you started or stopped the Notification Service, the Service State will change to reflect the new service
state.
6. (Option) Click Reset.
31
Page 32
The changes for the configuration will be lost.

Configuring Error Notification Parameters

The Filters area of the Notification Service tool window allows you to specify the type of error message that triggers an email notification and to set parameters for each type of error message—Error, Warning, and Information messages.
You can configure the ISIS to send notification emails for one or more error types and what severity level on which to be notified.
Configuring the Notification Service
For a complete list of Avid ISIS email notifications, see
To configure error notification parameters:
1. In the Filters section, select or deselect individual notifications by clicking the check boxes corresponding to the error notification.
2. Click Save.
The settings are saved, and a confirmation message is displayed in the Results area.

Configuring Contact Information

You must specify the contact information for all the people you want to receive ISIS notification emails.
To add contacts:
1. In the Contacts section, click New.
Empty User Name and Email fields open.
2. Type a user name into the first text box.
This can be any name you want to assign to the user.
3. Type a valid email address into the second text box.
4. Click Save.
5. Repeat steps 1 – 4 to add more email contacts, if needed.
“Avid ISIS E-mail Notification List” on page 173.
To remove a contact:
1. Click Delete next to the email contact entry.
The contact is removed from the list.
2. Click Save.
32
Page 33

3 Managing Avid ISIS Hardware

This section describes how to configure and manage your storage hardware. You perform all storage management operations from the Avid ISIS Management Console, which allows you to add, remove, configure, and manage your Storage Managers.
For an overview of the ISIS Management Console and information about how to start the tool, see “Opening the
n
Management Console” on page 15.

Managing Storage Managers

The Storage Managers tool coordinates and controls the activity of Storage Managers. The Storage Managers tool allows you to bind/unbind Storage Managers and perform maintenance operations.
Before you start building Storage Groups and Workspaces, you must bind each Storage Manager to the ISIS file system to make Storage Managers available for use.
33
Page 34
1 Action button toolbar — Perform actions on selected Storage Managers
Managing Storage Managers
2 Details panel—Detailed information on the selected Storage Managers; see
page 35
3 Storage Managers list — Lists all configured Storage Managers and related information; see “Storage Manager Column
List” on page 34
4 Filter panel — Filter the Storage Managers list display based on conditions you configure; see “Filtering the Display” on
page 24
5 IP addresses list — Displays the IP addresses of the selected Storage Manager

Storage Manager Column List

The following table summarizes the basic information available when you first open the Storage Manager list. Some columns are hidden by default (see
Heading Description
Name Displays the system-created name of each Storage Manager connected to the system
ISB Name (ISIS | 7500) Displays the name of the ISB in the ISIS | 7500 Engine
Hostname (ISIS | 5500 and ISIS | 2500)
Status Time Lists the last time the System Director logged the Storage Manager’s status
Displays the host name of the Storage Manager (System Director or Engine)
“Viewing Storage Manager Details” on
“Showing and Hiding Columns” on page 24).
Status Displays any change in the working status logged by the System Director (for a description of
status messages, see
State Displays the Storage Manager state (Bound/Unbound)
Uptime Displays the amount of time Storage Manager service has been running (days:hours:min:sec)
Temperature (ISIS | 7500) Displays the temperature of each ISB in the ISIS | 7500 Engine
Type Displays the Storage Manager type (ISIS | 7500 - ISB size, ISIS | 5500 - ISIS Engine,
ISIS 2000 - Nearline Engine)
Capacity Displays the total capacity of all Storage Managers controlled by the selected Storage Manager
Usable Displays the amount of storage space in gigabytes (GB) remaining
Used Displays the amount of used space in gigabytes (GB)
Version Displays the software version number of each Storage Manager
Engine Serial Displays the serial number of the Engine
Slot Number (ISIS | 7500) Displays the slot location of the ISB in the Engine, see
Storage Managers Prior to Removal” on page 41
Domain ID (ISIS | 7500) Displays the domain ID number of the Management Domain (stack) for each Engine (chassis)
in which the Storage Manager is part of.
Domain ID numbers are not displayed until the Storage Managers are bound.
n
Chunk Size Displays the smallest unit of data that can be written to the shared storage network.
“Storage Manager Status” on page 36)
“Identifying the ISIS | 7500
34
Page 35
Managing Storage Managers
Heading Description (Continued)
Storage Group Displays the Storage Group, if any, to which the Storage Manager is allocated.
You can organize the information in the Storage Managers list by showing additional columns or by sorting or
n
filtering displayed items. For more information on modifying the display, see “Organizing Display Information” on
page 23.
A color-coded icon precedes the name of each Storage Manager, providing an indication of the status of the component. The following table describes the color coding system used by the ISIS Management Console.
Icon Color Description
White Indicates the status of the Storage Manager is Unbound (the Storage Manager is not linked to the ISIS
file system)
Green Indicates the Storage Manager is bound to the file system
Yellow Indicates one of the following:
a problem with the Storage Manager
the Storage Manager is experiencing degraded performance
Blue (ISIS | 7500) Indicates that an installation or software upgrade is in progress
Red Indicates a Storage Manager problem, including any of the following:
a hardware error
a failed software installation or upgrade

Viewing Storage Manager Details

The Details panel displays all information for the currently selected Storage Manager. The information displayed is the information as seen by the System Director. Some of the information is embedded in the Storage Manager, and other information is assigned to the Storage Manager by the Avid ISIS software.
The information displayed in the Details panel is the same as that shown in the Storage Managers tool; see
Manager Column List” on page 34
To view detailed information about a Storage Manager:
1. In the Storage Manager list, select a Storage Manager.
2. Do one of the following:
t Click Details.
t Double-click the Storage Manager name.
The Details panel displays all the information for the selected Storage Manager. For more information, see
“Viewing Storage Manager Details” on page 35.
.
“Storage
To close the Details panel:
t Click Details.
35
Page 36

Storage Manager Status

The Status column in the Storage Managers list reports the status of the Storage Managers logged by the System Director. (The Status line in the Details panel reports the same information.) If the Storage Manager maintains a working status, the ISIS Management Console lists no entries in the Status field. When a problem arises, or when the status of the Storage Manager changes, the ISIS Management Console updates the Storage Managers display.
The following table summarizes the Storage Manager status messages, in alphabetical order.
Status Description
Data conversion mode A fully populated ISIS 2000 system is running a one-time data conversion redistribution.
Demonstration mode A system is configured to run in demonstration mode with limited ability. Demonstration
Disk Failure The hard disk error threshold for a disk has been exceeded and the Storage Manager has
Managing Storage Managers
This mode applies only to ISIS v4.5 on ISIS 2000, and is required to upgrade a fully populated ISIS 2000 from v4.5).
mode runs on non-approved hardware (such as a laptop).
taken the disk offline. The default threshold is 25 hard errors.
For the ISIS | 7500, a Storage Manager or disk showing this status should be removed from the Storage Group, triggering a redistribution. Once the redistribution is complete, the Storage Manager on the ISIS | 7500 can then be removed from the file system, and physically removed from the Engine.
For the ISIS | 5500 and ISIS | 2500, the disk should be removed, not the entire Storage Manager. The disks should be left physically in the Engine as the disk participates in the redistribution.
Disk full One or more Storage Managers in a Storage Group has reached its full capacity. Even if
some of the Storage Managers still have available space, the Storage Group is considered full as soon as one Storage Manager is filled. As data is written and deleted, some Storage Managers are filled before others. During redistribution, the data is redistributed evenly among the Storage Managers.
Disk Performance Degraded Disk Performance Degraded: There are two parameters that can trigger this status.
A disk has logged a Long Command Time. The ISIS system periodically clears this log. The Long Command Time counter is also cleared during a reboot.
Once a disk reaches 75% of its hard error threshold, it triggers disk performance degrade. This status is reset only by rebooting the Engine.
If an ISIS | 7500 Storage Manager is reporting this status, remove the ISB from the Storage Group, triggering a redistribution.
Drive controller error (ISIS | 5500) The drive controller has reported an error.
Foreign disk A drive with an existing RAID signature has been inserted into a system and cannot be used
as a spare or as part of a RAID configuration until the signature is cleared. To clear the foreign configuration, see the Avid ISIS Setup Guide. When you click “Format Foreign Disks” the Status is cleared.
Initializing The ISIS | 5500 and ISIS | 2500 RAID set is being initialized. This could take several hours
to several days. You can use the Engine while the RAID set is initializing.
Install failed - Phase # A message displays if the ISIS | 7500 ISB fails during the three phases of the upgrade or
during the two phases of the ISIS | 2500 upgrade.
36
Page 37
Managing Storage Managers
Status (Continued) Description (Continued)
Install needed This message displays if the ISIS | 7500 or ISIS | 2500 Storage Manager (Engine Controller
in ISIS | 2500) is not at the same version of the ISIS System Director software. Select all the storage Managers and click Upgrade.
Install needed - No Connection (ISIS | 7500) This a normal one-time message displayed only during the upgrade from v4.0
and earlier to v4.0.1 and later.
Invalid number of drives The Storage Manager has determined it doesn't have enough drives to run in the bound
operating mode. In this mode the Storage Manager only communicates with the System Director, no clients are allowed to connect, and the Storage Manager is not functional in the Storage Group.
Once the Administrator has addressed the issue in the Storage Manager, the Storage Manager must be restarted via the Storage Manager agent.
Invalid spare drive A replacement drive installed to become the new spare is not qualified as an acceptable spare
drive for this Engine. Obtain another replacement drive. When a valid replacement drive is installed, it becomes the new spare and the status is cleared.
Memory Error The Storage Manager runs a memory test when it starts or restarts reports any errors; this
status is persistent. Replace the Storage Manager as soon as possible.
Metadata error (ISIS | 7500) The Storage Manager experienced an error loading metadata from the disk or
writing new metadata to the disk (if mirrored in the ISIS | 7500, the data on the mirrored Storage Manager is still available and no actual data loss occurs); this indicates that the Storage Manager should be replaced.
Reboot the Storage Manager with this status. If “Metadata Error” status exists after a reboot, replace the Storage Manager. If the Metadata Error status clears after a reboot, then no further action is required.
Missing spare drive (ISIS | 5500 and ISIS | 2500) A rebuild automatically occurs on drive failure by using a spare
disk in the Engine. When the spare has been used to replace a failed disk, this warning message is displayed in the Management Console. Obtain a replacement drive for the failed drive. When the replacement drive is installed, it becomes the new spare and the status is cleared. There is one spare drive in each ISIS | 5500 Engine and two spare drives in each ISIS | 2500 Engine.
Network degraded The IP interfaces on the Storage Manager have failed or the Storage Manager experiences at
least a 10% error rate (usually due to lost packets), indicating a network communication problem.
Although the Storage Manager is reporting and detecting the errors, it is usually not the Storage Manager itself that is the problem. Seating issues, slot issues, midplane problems, switch problems, stacking issues, or anything that contributes to bad data getting to the Storage Manager can cause this status. See the tech note “How to troubleshoot Network Degraded” for further details on how to handle this status.
Offline (ISIS | 7500) The Storage Manager has been taken offline. It is good practice to take a
Storage Manager offline before reseating or removing it.
Rectifying Files The Storage Manager is cleaning up deleted files and verifying existing files. This occurs
every time the Storage Manager restarts and every 10 days thereafter, and also when manually initiated. Each Storage Manager staggers their process so that they do not run simultaneously.
Redistribution details available A problem with redistribution occurred. Open the Agent page for the Storage Manager to see
the details.
37
Page 38
Status (Continued) Description (Continued)
Repairing Mirrors (ISIS | 7500) The Storage Manager is repairing mirrored blocks with a single point of failure.
This Storage Manager has 25 or more blocks that it cannot mirror to another ISB. This can occur due to transient conditions like another ISB rebooting, network problems, or a redistribution in progress. If this condition persists, further troubleshooting is required.
Server Performance Degraded The Storage Manager chassis needs to be rebooted as soon as possible.
Test Mode The disks in the Storage Manager are in test mode. This is an Error Insertion function that
should only be done by Avid Customer Support.

Binding Storage Managers to the ISIS File System

Before you start building Storage Groups and Workspaces, you must bind each Storage Manager to the ISIS file system to make Storage Managers available for use.
To bind a Storage Manager to the ISIS file system:
1. Click to select the Storage Manager you want to bind.
2. Click Bind.
Managing Storage Managers
A Bind Settings dialog appears.
3. Enter the appropriate chunk size for the Storage Manager (for more information, see
Chunk Sizes” on page 63
4. Click OK to bind the Storage Manager.
The selected Storage Manager is added to the ISIS file system, and its state is changed to Active - Bound.
).

Unbinding Storage Managers from the ISIS File System

Avid strongly recommends that you wait until any redistribution process completes before unbinding Storage Managers. Redistribution can take a long time; use the Redistribution Monitor tool (see
Redistributions” on page 87
You cannot unbind a Storage Manager that is part of a Storage Group. You must remove the Storage Manager from
n
its Storage Group first so the system can redistribute data before unbinding the Storage Manager from the file system. For more information about removing Storage Managers from a Storage Group, see “Removing ISIS
Storage Managers from Storage Groups” on page 66.
Before you can unbind a Storage Manager from the ISIS file system, it must be in the Spare state.
To unbind a Storage Manager from the ISIS file system:
1. Click to select the Storage Manager you want to unbind.
2. Click Unbind.
) to track the progress and estimate the time remaining.
“Storage Groups and
“Monitoring
A confirmation dialog appears.
3. Click Yes to confirm.
The selected Storage Manager is removed from the ISIS file system and its state changes to Unbound.
38
Page 39

Clearing Network Degraded Status Messages

You can use the Issue Command button to clear all Network Degraded status messages from the Storage Managers list. Network Degraded status indicates a high number of errors detected by the Storage Manager (see
“Storage Manager Status” on page 36). If correcting the problem does not clear the status messages, use the Issue
Command button to clear the messages and reset the error count.
Managing Storage Managers
c
Correct the cause of the Network Degraded status messages before you clear them from the ISIS Management Console.
To clear all Network Degraded messages in the Storage Managers list:
1. Select one or more Storage Managers from the Storage Managers list.
You can use the Shift and Control keys to select multiple items. For more information, see
page 26
2. Click Issue Command.
The Issue Storage Manager(s) Command window opens.
3. Click Clear Network Degraded, and then click Send.
.

Upgrading Storage Managers

On ISIS | 7500 and ISIS | 2500 systems, you can use the Storage Managers tool to upgrade the Storage Manager software installed in an Engine and connected to the shared storage network.
On ISIS | 7500 systems, you can also use the Engines page to upgrade Storage Managers (Blades) and switches. For
n
more information, see “Upgrading ISIS | 7500 Engine Components” on page 47.
To upgrade a Storage software:
1. Select the Storage Managers you want to upgrade.
“Selecting Items” on
2. Click Upgrade.
The Upgrade Storage Managers dialog box opens.
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
The ISIS Management Console installs the necessary upgrade for the selected Storage Manager. You can monitor the progress of the upgrade either in the Details panel of the Storage Manager tool or in the ISIS | 7500 System Monitor tool.

Removing Storage Managers from the ISIS | 7500 Shared Storage Network

You can remove and replace Storage Managers without stopping the System Director or turning off other components of the network. There are two principal reasons for removing Storage Managers from the system:
The Manager has a high number of unrecoverable errors
The Manager has failed or has been removed from the system
39
Page 40
Managing Storage Managers
If you do not have a replacement for a failed or failing Storage Manager, Avid recommends that you physically leave
n
it in the Engine (ISIS | 7500 only), even after it has been removed from the file system. Proper airflow cannot be guaranteed if a Storage Manager slot is left open.
Before you remove an Avid ISIS Storage Manager from the network, you must redistribute the data stored on the Storage Manager to other Storage Managers in the system. The redistribution occurs before you physically remove the Storage Manager, and the process entails moving data to the remaining drives within the Storage Group. Once you redistribute the data, you add a new Storage Manager to the system and then perform a redistribution again to place data onto the new Storage Manager.
c
n
n
c
If you physically remove a Storage Manager from the shared storage network before redistribution is complete, data loss can occur.
Maintain an unused block of storage equivalent to one Storage Manager within the Storage Group to allow redistribution from a failing Storage Manager to other Storage Managers within the group.
If possible, redistribute data while the drive is experiencing problems but has not yet been removed from the system. This allows the Storage Manager having problems to participate in the redistribution process by offering its data to both clients and to other Storage Managers.
Often the Storage Manager is still functional, but its performance is slightly degraded — for example, the Storage Manager might have an unrecoverable error on one of its disks, or it might have long I/O times.
If the Storage Manager fails, or if it has been removed from the system, you can perform a redistribution from the mirrored or RAID locations associated with the Storage Manager. However, if any other mirrored location experiences a failure while performing a redistribution, the system can lose data.
If the failed Storage Manager was part of an unprotected Workspace, data loss is likely.
Consider the following when planning a redistribution:
A one-to-one replacement of Storage Managers might leave you with less storage space in the Storage Group than you require. Instead, plan for using more Storage Managers than you need for storage and bandwidth for each Storage Group. This way, you can keep an optimal amount of available storage space allocated to the Storage Group. This allows you to quickly perform redistribution, rather than attempting a redistribution with only one spare Storage Manager.
In general, the removal of a Storage Manager is quicker than an addition. This is because all of the other Storage Managers in a Storage Group participate in redistribution by moving a copy of any block held by the Manager to another location. The more Storage Managers in the Storage Group, the more the workload is shared. A single Storage Manager addition is slower than a removal because the Storage Manager receiving the data acts as a limiting factor for the redistribution.
When you add a new Storage Manager to the Avid ISIS file system and then add it to a Storage Group, the system redistributes data from the existing drives in the Storage Group to the new Storage Manager. This redistribution maintains all previously stored data, but the data might not reside on the same Storage Managers.
The following steps list the actions necessary for removing a Storage Manager:
1. Identify the Storage Manager to replace.
2. Remove the Storage Manager from the Storage Group.
3. View the status of the redistribution and wait for redistribution to finish.
4. Unbind the Storage Manager from the Storage Group.
5. Physically remove and replace the Storage Manager.
40
Page 41
6. Add the new Storage Manager to the file system.
ISIS slot numbering
01 23
456 7
89
10 11
12 13 14 15
7. Add the new Storage Manager to a Storage Group.
For more information on the process of redistributing data and how redistribution affects system performance, see “Redistribution Guidelines” on page 82
Redistributing while adding a Storage Manager takes longer than redistributing while removing an ISB.
n

Identifying the ISIS | 7500 Storage Managers Prior to Removal

To identify the Storage Manager to be removed and replaced:
1. Locate the failing or failed Storage Manager. For information on Storage Manager status, see “Storage Manager
Status” on page 36
2. Select the Storage Manager, and do one of the following:
t Click Details.
t Double-click the name of the Storage Manager.
The Details panel opens.
The Details panel lists the Engine Serial number and the Slot Number of the selected Storage Manager. The slot number identifies the Storage Manager to be physically removed.
.
.
Managing Storage Managers
The slot numbers for Storage Managers begin at zero (0).
n

Preparing to Removing Storage Managers from the Avid ISIS Engine

After you have identified the Storage Manager you want to remove, remove it from the Storage Group before you physically remove it from the Engine.
c
You must finish the redistribution before you physically remove the Storage Manager. If you do not wait until the redistribution finishes, shared storage network clients might receive multiple errors.
To physically remove a Storage Manager from your shared storage network:
1. Remove the Storage Manager from its Storage Group. For information on removing Storage Managers, see
“Removing ISIS Storage Managers from Storage Groups” on page 66.
2. Open the Workspaces tool by clicking the Workspaces icon in the System section of the Management Console home page.
The Workspaces tool opens.
3. Select the Workspace for the appropriate Storage Group.
4. Monitor the Status column for to update the display.
41
Page 42
Managing Storage Managers
The Status column displays no status message when the redistribution is complete. Alternatively, because redistribution can take a long time, you can track the progress of the redistribution in the Storage Managers Monitor tool (see “Monitoring Redistributions” on page 87
).
c
Do not remove the Storage Manager before the redistribution has completed.
5. Unbind the Storage Manager from the ISIS file system; see “Unbinding Storage Managers from the ISIS File
System” on page 38
6. In the Storage Manager list, select the Storage Manager you want to remove and then click Issue Command.
The Issue Storage Manager(s) Command dialog box opens.
7. Select Take Offline, and then click Send.
If you remove an active Storage Manager by mistake, the System Director restores the Storage Manager to the
n
Storage Manager list the next time it polls the shared storage network (usually within 20 seconds).
The system spins down the drives in the selected Storage Manager and changes the status in the Storage Managers list to Offline.
8. Disconnect the Storage Manager from the network, as described in the Avid ISIS Setup Guide.
.

Removing Orphaned Storage Managers

Orphaned Managers are Storage Managers connected to a file system which is not currently in use. This can happen when a Storage Manager is moved from one ISIS environment to another, or when you use the System Director Control Panel to create a new active partition on a system that already includes bound Storage Managers. The “Force Remove” command will remove the file system binding from the Storage Manager and make it available for use in the current file system.
c
To remove orphaned Storage Managers, you must force-remove them from the system.
Removing Storage Managers causes all data stored on them to be erased. Do not remove disconnected Storage Managers unless you are certain they contain no data you want to save.
To remove orphaned Storage Managers:
1. From the Management Console home page, click the Storage Managers icon, located in the System section.
The Storage Managers tool opens.
2. Select the orphaned Manager you want to force-remove.
3. Click Force Remove.
A message warns you that removing Storage Managers erases all data on the component.
4. Click Yes.
The Force Removal Text Confirmation dialog box opens.
5. Type
Remove
The orphaned Storage Manager is unbound from the ISIS file system and removed from the Orphaned Managers list.
in the text box, and then click Remove.
42
Page 43

Initiate Block Rectify

Once you have added Storage Managers to your network and configured them for storage, the Storage Manager periodically checks the status of stored files, cleaning up deleted files and verifying existing files. This process, called “rectifying files,” allows the Storage Managers to communicate with the System Director to monitor the state of its storage and clean up any files that the Storage Managers no longer need to store. Rectifying files occurs randomly and asynchronously during normal system operation to minimize any potential decrease in system performance. The process is indicated for each affected Storage Manager in the Status column in the Storage Manager list.
Storage Managers also rectify files when starting or restarting. When this happens, data stored on the Storage Managers might not be in sync with the data in the file system itself. Also, if a client, such as the asset manager, cannot communicate with the Storage Manager, there might appear to be more data allocated to the Storage Managers than the file system has allocated. To correct this, you can manually send the Storage Manager a command to rectify its files.
To rectify files:
1. Select one or more Storage Managers from the Storage Managers list.

Managing ISIS | 7500 Switch Blades

You can use the Shift and Control keys to select multiple items. For more information, see
page 26
.
2. Click Issue Command.
The Issue Storage Manager(s) Command dialog box opens.
3. Select Initiate Block Rectify, and then click Send.
The system rectifies files on the selected Storage Managers and changes the status in the Storage Managers list to Rectifying Files.
Managing ISIS | 7500 Switch Blades
The Switch Blades tool of the ISIS Management Console allows you to monitor and upgrade all Switch Blades connected to the shared storage network. You can also launch the Agents for the selected Switch Blades to view details and change configuration.

ISIS | 7500 Switch Blades Column List

The following table summarizes the information available in the Switch Blades list.
Heading Description
In band IP Displays the internal IP addresses assigned to the CPU on the switch
“Selecting Items” on
Status Time The time at which the current status display was reported
Status Displays changes in the working status of the switch
Version Displays the software version number of each switch
Type Identifies the switch as one of the following:
Integrated (ISS)
Expansion (IXS)
43
Page 44
Heading Description (Continued)
Temp Lists the last logged temperature of the switch, in degrees Celsius
Chassis Master Indicates if an ISS or an IXS module is used as a master switch in the Engine
Base IP The base IP addresses of the switch, which are assigned during system configuration; for more information,
see the Avid ISIS Setup Guide
Out of band IP The IP address of the Switch Blade management port; for more information about the management port,
see the Avid ISIS Setup Guide
Engine Serial Displays the serial number of the Engine

Viewing ISIS | 7500 Switch Blade Details

You can view detailed information on Switch Blades using Avid ISIS Switch Blade Agents, which can be accessed through the Switch Blades tool. For more information about Avid ISIS Switch Blade Agents, see
Switch Blade Agent” on page 155
To launch Avid ISIS Switch Blade Agents:
1. From the Switch Blades list, select a Switch Blade.
.
Managing ISIS | 7500 Switch Blades
“Avid ISIS | 7500
2. Click Show Info.
The Avid ISIS Switch Blade Agent opens.
The default switch Agent page password is se-admin.
n

Upgrading ISIS | 7500 Switch Blades

You can use the Switch Blades tool to upgrade the software for Switch Blades installed in an Engine and connected to the shared storage network.
You can also use the Engine page to upgrade Switch Blades. For more information, see “Upgrading ISIS | 7500
n
Engine Components” on page 47.
To upgrade Switch Blades:
1. From the Management Console home page, click the Switch Blades icon, located in the System section.
The Switch Blades tool opens.
2. Select the Switch Blade you want to upgrade.
3. Click Upgrade Switches.
The Upgrade Switch Blades dialog box opens.
4. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid support personnel. Doing so can result in system degradation and data loss.
5. Click Upgrade.
44
Page 45
The ISIS Management Console installs the necessary upgrade for the selected Switch Blade. You can monitor the progress of the upgrade either in the Details panel of the Switch Blades tool or in the Avid ISIS System Monitor tool.

Managing the Engine

The Engines page of the ISIS Management Console allows you to view details and to monitor the status of all Engine connected to the shared storage network, as well as ISIS | 7500 Storage Managers, ISIS | 7500 Integrated switches (ISS), ISIS | 7500 Expansion Integrated switches (IXS), ISIS | 7500 and ISIS | 5500 power blades, and ISIS 7500 | 7000 upgrades.

Engine Column List

The following table summarizes the information available in the Engine list.
Heading Description
Serial Number Serial number of the Engine
Status Time The last time the System Director logged the status of the Engine
Managing the Engine
Status Displays changes in the working status of Storage Manager components due to upgrade
installation or failure.
On the ISIS | 7500 it also displays changes in the working status of ISS and IXS modules due to upgrade installation or failure.
Uptime (ISIS | 5500) Displays the length of time that the Storage Manager has been running continuously
Available Lists the number of available Storage Managers in each Engine
Spare Lists the number of spare Storage Managers in each Engine
Active Lists the number of active Storage Managers in each Engine
Storage Blades (ISIS | 7500) Lists the number of Storage Manager components installed in each Engine
Switch Blades (ISIS | 7500) Lists the number of ISS and IXS modules for each Engine
Power Blades (ISIS | 7500 and ISIS | 5500)
Free Memory (ISIS | 5500 and ISIS | 2500)
Total Memory (ISIS | 5500 and ISIS | 2500)
Product Serial (ISIS | 5500) Displays the Avid part number for the ISIS | 5500 product. The ISIS 5500 | 5000 has
Lists the number of power supply units for each Engine
Displays the amount of memory not in use
Displays the total amount of available memory
more than one ISIS | 5500 Engine configuration.
Product Part Number (ISIS | 2500) Displays the Avid part number for the ISIS | 2500 product.
45
Page 46

Engine Details

The Details panel displays all information for the currently selected Engines. The panel is divided into three sections:
Engine Details — displays the same information as in the Engine list
Switches (ISIS | 7500) — lists basic configuration and status information of all ISS and IXS modules connected to the shared storage network
Storage Managers — displays information also available in the Storage Managers list
The information displayed is as seen by the System Director. Some of the information is embedded in the Engine, and other information is assigned to the Engine by the Avid ISIS software.
You can sort the information in the Switches and Storage Managers sections of the Details panel by clicking any column heading. For more information on sorting items in columns, see
You can view more detailed information on Engine components by using the Avid ISIS Agent tool. For more
n
information, see “Avid ISIS Storage Manager Agent” on page 141 and “Avid ISIS Storage Manager Agent” on
page 141.
To view information about an Engine:
Managing the Engine
“Sorting Information” on page 24.
1. In the Engine list, select an Engine.
2. Do one of the following:
t Click Details.
t Double-click the Engine name.
The Details panel displays all the information for the selected Engine.
To close the Details panel:
t Click Details.

Removing Engines from the Engine List

If you need to replace an Engine, you can use the ISIS Management Console to remove the connection history of the inactive or inoperative Engine from the list in the Engines page. Once the Engine is removed from the ISIS file system, you can physically remove it from the network.
For information on removing Engines from the network, see the Avid ISIS Setup Guide.
To remove an Engine from the Engine list:
1. In the Engine list, select the Engine to remove.
2. Click Remove Status.
The Engine is removed from the Engine list.
If you remove an active Engine by mistake, the System Director restores the Engine to the Engine list the next time it
n
polls the shared storage network (usually within 20 seconds).
46
Page 47

Upgrading ISIS | 7500 Engine Components

On an ISIS | 7500 system, you can use the Engines page to upgrade the software for all Storage Managers and all Switch Blades installed in an Engine and connected to the shared storage network. You can also upgrade individual Storage Managers and switches.
You might lose network connectivity temporarily when you upgrade Switch Blades while the upgrade process
n
reboots the switches.
To upgrade all Storage Managers and switches in an Engine:
1. In the Engine list, select the Engine to upgrade.
2. Do one of the following:
t Click Upgrade Blades.
t Click Upgrade Switches.
The Upgrade Storage Managers dialog box or the Upgrade Switch Blades dialog box opens.
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Managing the Engine
c
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
The ISIS Management Console installs the necessary upgrades for all Storage Managers or for all Switch Blades for the selected Engine. You can monitor the progress of the upgrade either in the Details panel of the Engine page or in the Avid ISIS System Monitor tool.

Upgrading Individual ISIS | 7500 Engine Components

You can upgrade individual Storage Managers and Switch Blades in the Engine page. You can also upgrade Storage Managers by using the Storage Managers page and Switch Blades by using the Switch Blades page. For more information on Storage Manager upgrades, see information on Switch Blade upgrades, see
To upgrade individual Storage Managers and switches in an Engine:
1. In the Details panel of the Engine page, do one of the following:
t Select the switch you want to upgrade.
t Select the Storage Manager you want to upgrade.
2. Click Upgrade.
The Upgrade Storage Elements dialog box or the Upgrade Switches dialog box opens.
“Upgrading ISIS | 7500 Switch Blades” on page 44.
“Upgrading Storage Managers” on page 39. For more
c
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Do not enter any text in the Command or Options fields except under the supervision of qualified Avid support personnel. Doing so can result in system degradation and data loss.
4. Click Upgrade.
47
Page 48
Managing the Engine
The ISIS Management Console installs the necessary upgrade for the selected Storage Manager or Switch Blade. You can monitor the progress of the upgrade either in the Details panel of the Storage Managers page or in the Avid ISIS System Monitor page.
48
Page 49

4 Avid ISIS Control Panels

When you log into the Avid ISIS System Director desktop, there are several tools available to help you access ISIS tools and perform diagnostic and maintenance tasks.
ISIS Launch Pad provides buttons for quick access to various ISIS tools.
Avid ISIS System Director Control Panel provides low-level, performance-monitoring functions.

ISIS Launch Pad

ISIS Launch Pad provides buttons for quick access to various ISIS tools. The Launch Pad window remains “docked” to the upper right corner of the System Director desktop, but may be collapsed to a smaller size if needed (see
“Minimizing or Closing the ISIS Launch Pad” on page 51).
49
Page 50
The following information is displayed in the Launch Pad for all ISIS models:
Status Data:
- Whether the System Director is running
- The presence or absence of warning events
- Whether reconfiguration is required
- The number of client licenses in use
- The virtual name of the System Director
- The version number of the installed software on the System Director
Metadata:
- Whether the metadata was successfully loaded by the System Director
- Metadata status
- Percentage of allocated memory in use
- Date and time the metadata was last saved
- Date and time the metadata was last verified
Redundancy:
ISIS Launch Pad
- Whether redundancy is enabled between dual System Directors
- Redundancy mode of the current System Director (Active or Standby)
- Replication state of the System Directors
- Status of the failover network ports
Performance:
- Number of messages transmitted per second
- Total Write bandwidth in Mb/s
- Total Read bandwidth in Mb/s
- Total number of open files in all Workspaces
On the ISIS | 5500, the following additional information for the Storage Manager is displayed:
Status (running or not)
Fan status
System drive status
Power supply status
Software version number (ideally, same as the System Director version)

Opening ISIS Launch Pad

ISIS Launch Pad starts with Windows on the System Director and usually remains on the desktop at all times. If it was shut down, you can restart the ISIS Launch Pad from the System Director Windows Start Menu.
To open ISIS Launch Pad on the ISIS | 7500 and ISIS | 2500:
t Click Start > All Programs > Avid > ISIS System Director > ISIS Launch Pad.
50
Page 51
To open ISIS Launch Pad on the ISIS | 5500:
t Click Start > All Programs > Avid > ISIS Storage Manager > ISIS Launch Pad.

Minimizing or Closing the ISIS Launch Pad

The ISIS Launch Pad window remains “pinned” to the upper right corner of the System Director desktop, but may be collapsed to a smaller size if needed.
To minimize the ISIS Launch Pad:
t Right-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Minimize.
To restore the ISIS Launch Pad:
t Right-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Restore.
To quit the ISIS Launch Pad:
t Right-click the Avid ISIS Launch Pad icon on the right side of the Windows Taskbar and select Quit.

ISIS Launch Pad Buttons

The following table describes the ISIS Launch Pad buttons. You can also hold the cursor over the button and get a tool tip on the button function.
ISIS Launch Pad
Button Function
System Director
Starts the System Director. The button is blue when the System Director is stopped. The button is gray when the System Director is running.
Stops the System Director. The button is blue when the System Director is running. The button is gray when the System Director is stopped.
Opens the Avid ISIS Management Console in a web browser window (the default browser is Microsoft Internet Explorer). For more information about using the Management Console, see
Management Console” on page 15
Opens the Avid ISIS System Director Control Panel. For more information, see
Control Panel” on page 52
Opens the System Director Memory Log Viewer tool. For more information, see
Director Memory Log Viewer” on page 56
Opens the Avid ISIS Profiler. Gathers system and version information on the System Director, System Manager, or client. This tool detects the system if is being run on and selects the components automatically. For more information, see
Storage Manager (ISIS | 5500)
“Opening the
.
“Avid ISIS System Director
.
“Using the ISIS System
.
“Profiler Page” on page 122.
Starts the Storage Manager. The button is blue when the Storage Manager is stopped. The button is gray when the Storage Manager is running.
51
Page 52
Button Function (Continued)
Stops the Storage Manager. The button is blue when the Storage Manager is running. The button is gray when the Storage Manager is stopped.

Avid ISIS System Director Control Panel

Opens the Agent Management page. For more information, see
Agent” on page 141
Opens the Network Configuration Tool. This tool is used to set the IP addresses for the network ports on the ISIS | 5500 System Director. For more information, see the Avid ISIS 5500 Setup Guide.
Opens the Storage Manager Memory Log Viewer. For more information, see
Memory Log Viewer” on page 52
Opens the Avid ISIS Profiler. Gathers system and version information on the System Director, System Manager, or client. This tool detects the system if is being run on and selects the components automatically. For more information, see
.
.
“Profiler Page” on page 122.

Using Storage Manager Memory Log Viewer

The Storage Manager Memory Log Viewer is a valuable tool that allows you to view the Storage Manager log as it is buffered in memory. This log provides detailed status information that is especially useful to Avid Customer Support personnel for monitoring Storage Manager status during prolonged operations.
To open the Storage Manager Memory Log Viewer:
t Do one of the following:
- In the Storage Manager section of the ISIS Launch Pad, click Storage Manager Memory Log Viewer icon.
“Opening the Avid ISIS Storage Manager
“Using Storage Manager
- From the System Director desktop, click Start > Programs > Avid > ISIS Storage Manager >
Memory Log Viewer
- From the Storage Manager Agent page, click Console viewer in the Tools section (see
Viewer Tool” on page 153
.
Avid ISIS System Director Control Panel
The Avid ISIS System Director Control Panel provides low-level performance monitoring functions. Using the Control Panel, you can view the following:
The current status of connected clients, including name, type, ID number, and active or inactive status
The status of communications between the System Director and the clients
Information on the metadata maintained by the System Director
The System Director Control Panel is used to start, stop, and monitor the Avid ISIS System Director, the application running on the System Director server that manages the overall operation of the network. You can also use the Control Panel to configure general or Dual System Director parameters, and to set some administrative options.

Opening the System Director Control Panel

The System Director Control Panel is a Windows application that can be accessed from the Windows Start menu and from the ISIS Launch Pad.
“Using the Log
52
Page 53
Avid ISIS System Director Control Panel
To open the Control Panel, do one of the following:
t In the ISIS Launch Pad, click ISIS Control Panel icon.
t From the System Director desktop, select Start > Programs > Avid > ISIS System Director > Control Panel.
The System Director Control Panel opens.
The buttons on the System Director control panel do the following:
- —Start and stop the System Director windows service
- —Dump metadata
- —Change the virtual server name for the System Director
- —Reset the ISIS password
The following table summarizes the functions available in the Control Panel.
Panel Tab Function
Status (NA) Displays the local and virtual machine names and a summary of
the system and metadata status
53
Page 54
Avid ISIS System Director Control Panel
Panel Tab Function
Configure File System This panel is active only when the System Director is stopped.
Allows you to:
Create a new active file system on the System Director
Create a new active file system using information imported from another System Director
Create a Standby System Director in a Dual System Director configuration
Reconfigure the existing file system
Delete the file system
Configure Dual System Director This panel allows you to configure a Dual System Director
configuration, specifying:
Virtual and local addresses
Local and remote machine routing parameters
Active Clients The Active Clients tab displays the identity of the Avid ISIS
clients known to the System Director, and all active Storage managers.
Click Refresh to refresh the display.
Click Disconnect to disconnect the selected clients.

Starting and Stopping the System Director Service

The System Director software runs as a Windows service that starts automatically whenever the System Director is online. However, various maintenance and administration functions require that you shut down the System Director engine and then restart it.
Maintaining metadata integrity is very important to ensure you do not lose any data files. Avid recommends you use the following procedure prior to System Director engine shutdown to avoid problems with metadata integrity.
c
In a Dual System Director configuration, Avid recommends that you shut down the standby System Director before shutting down the active System Director. Otherwise, the active System Director fails over to the standby System Director as the active System Director shuts down.
To prevent errors, make sure that clients unmount all Workspaces before you stop the System Director.
n
To stop the System Director service:
1. Do one of the following:
t In the ISIS Launch Pad, click Stop System Director.
t From the ISIS Control Panel, click Stop System Director.
A dialog box opens, prompting you to confirm that you really want to stop the System Director.
2. Click OK.
The System Director Shutdown dialog box opens stating that it is saving multiple copies of the metadata.
Wait for the process to finish and for the dialog box to close. When the System Director has shut down, the System Director Status tab lists the System Director status as “Not running.”
54
Page 55
Avid ISIS System Director Control Panel
3. (Option) If you are upgrading or modifying the system, make sure the System Director software has successfully written a local copy of the metadata file:
a. Open the folder D:\Program Files\Avid\ISIS System Director
b. Make sure the files Partition0, Partition1, and PartitionDump.bin exist and have the date and time of when
you stopped the System Director. If they do not, call Avid Customer Support.
c
Pay special attention to the date and time of the Partitiondump.bin file before importing it to recreate a file system. If the PartitionDump.bin file is more than a few hours old, it could cause loss of data or data corruption. Call Avid Customer Support before importing this file to recreate the file system.
c. Copy (not move) these files to a temporary folder to be used in case there is a problem with the upgrade.
To start or restart the System Director service, do one of the following:
t In the ISIS Launch Pad, click Start System Director.
t From the System Director control panel, click Start System Director.

Changing the System Director Virtual Name

The System Director virtual name is the name that is used for the Shared Storage network and appears in the System Director list in the Avid ISIS Client Manager application. The System Director virtual name is set to the Windows computer name by default, but you can change it to a different value.
The System Director virtual name is used only within the Shared Storage network. It has no effect on Windows
n
networking.
To change the virtual System Director name:
1. In the Control Panel toolbar, click Change Virtual System Director Name.
The Change Virtual System Director Name dialog box opens.
2. Type a name for the System Director in the Virtual System Director Name text box.
In a Dual System Director configuration, you must specify the same virtual System Director name for both System Directors.
The naming conventions are the same for the System Director virtual name as they are for Windows network computer names:
- No more than 31 characters in length
- Cannot use the following characters: " \ / [ ] : | < > + = ; , ?
- Cannot use ASCII control characters in range 0x00 through 0x1F
3. Click OK.

Monitoring System Director Status

The System Director Status panel provides status displays that provide a summary of your network and controls that allow you to start and stop the System Director, and reset the event log.
55
Page 56

System Director Status Indicators

When the shared storage network is functioning normally, a green indicator is displayed with the following messages:
•Active Mode
No warning events logged
Reconfiguration not required
Single System Director — Redundant operation not Enabled; Dual System Directors — Both paths are up
Single System Director — Replication not Enabled; Dual System Directors — Replicated
If your network does not use a Dual System Director configuration, a gray indicator is displayed next to the
n
message, “Redundant operation is not enabled.”
If the indicator is yellow or red, the message changes. Use the following information to correct the problem:
System Director is not running — start the System Director by clicking Start System Director.
Check event log — logged significant events related to the System Director are also logged in the Logging tab of the ISIS Management Console. For information on how to extract data in the system logs, see
Administration Log Pages” on page 118
Avid ISIS System Director Control Panel
“System and
.
The following error messages indicate metadata replication status:
- Replication failed — Indicates that there was an error replicating the metadata to or from a standby
System Director.
- Replication unknown — Indicates that the current replication status has not been determined.
- Replication status not available — Indicates that the status is unknown. Most likely, the System Director is
not running.

Using the ISIS System Director Memory Log Viewer

The System Director Memory Log Viewer allows you to view the System Director log as it is buffered in memory. This log provides detailed status information that is especially useful to Avid Customer Support personnel for monitoring system status during prolonged operations.
To open the System Director Memory Log Viewer:
t Do one of the following:
- Click the Memory Log Viewer icon under System Director on the Launch Pad
- From the System Director desktop, click Start > Programs > Avid > ISIS System Director >
Memory Log Viewer

Working with File System Operations

c
The File System tab in the Control Panel allows you to create Active and Standby partitions, as well as to reconfigure existing file systems. You can also use the Control Panel to delete file systems.
Deleting the file system erases all data stored on the System Director.
For information on creating partitions, see the Avid ISIS Setup Guide.
56
Page 57

Reconfiguring the File System

You can reconfigure the internal memory configuration of the System Director — for example, if you want to adjust the memory usage to take advantage of expanded memory capabilities. Reconfiguring the file system entails the following:
Validating the export file
Creating new metadata
Importing the metadata
Reconfiguring an existing file system does not delete any data.
n
To reconfigure the file system:
1. On the Control panel, click Stop System Director.
A dialog box opens, prompting you to confirm that you want to stop the System Director.
2. Click OK.
The System Director Shutdown dialog box opens stating that it is saving multiple copies of the metadata.
3. Click the File System tab, if it is not selected.
4. In the “Active File System Actions” section, click “Reconfigure File System.”
Avid ISIS System Director Control Panel
A dialog box opens, prompting you to confirm that you want to reconfigure the existing file system.
5. Click OK.
The system reconfigures its metadata and restarts the System Director.

Creating or Re-creating a File System

You might need to create or re-create a file system if you are:
Setting up a System Director for the first time
Adding a second System Director
Upgrading your System Director hardware
Deleting and re-creating the System Director file system to recover from an error
For more information about creating, deleting and re-creating file systems on the System Director, see the Avid ISIS Setup Guide.

Monitoring Metadata Status

The System Director Status panel displays information about the System Director’s internal description of the file system. This metadata memory is used to record descriptions of Workspaces, folders, and files.
All of this metadata information is also is displayed in the ISIS Launch Pad.
n
To guard against corruption of the metadata due to a system failure, the metadata is saved to disk every 20 seconds. The metadata save operations alternate between two files, Partition0 and Partition1. This guarantees the existence of one known good file if a failure occurs while writing to one of the files. The System director automatically chooses the best copy to load when it starts up.
57
Page 58
Avid ISIS System Director Control Panel
Metadata memory is also saved automatically to the Partition0 and Partition1 files when the System Director stops normally and without error. A third file, PartitionDump.bin, containing an alternate representation of the file system metadata is also created. The PartitionDump.bin file should be used only when adding memory to a System director or moving to a newer System Director with more memory, unless otherwise instructed by Avid Customer Support.
The Metadata Status box shows when the metadata was last verified and saved, and replicated. A green indicator means no problem has been detected. A yellow indicator means the status is uncertain. A red indicator means that a problem exists.
The following tables lists the status messages displayed in the Metadata Status box.
Status Category Messages Additional Notes
Overall Status Metadata loaded
Validating
No Metadata loaded
Loading nn.n MBps
State Unknown
Verification •Not Active
Verified
Verify Failed
State Unknown
Saving •Saving
•Saved
Unknown State
•Not Active
Save Failed
Replication Sending
Receiving
Unknown State
•Not Active
Replication Failed
System Director is running
Occurs periodically
System Director is stopped or metadata is unable to load for some reason
System Director is restarting
When the System Director is in standby mode, the Verify indicator is disabled.
When the System Director is not in a Dual System Director configuration, the Replicate indicator is disabled.

Creating a Metadata Dump File

You can use the “Dump Metadata” function to write all metadata information to a text file.
This operation should be used only as a diagnostic aid. You cannot restore ISIS metadata from a metadata dump file.
n
c
When you write metadata to a file, the resulting file is extremely large and takes a long time to create. Do not use this option unless instructed to do so by Avid Customer Support.
To write the contents of metadata to a text file in the System Director directory:
t In the System Director toolbar, click Dump Metadata.
A text file called PartitionDump.txt is created in the System Director’s data directory:
58
Page 59
“D:\Program Files\Avid\ISIS System Director”

Resetting the Administrator Password

The Control Panel allows you to reset the ISIS administrator's password in the event that it is forgotten. This feature does not affect the Windows operating system password. Windows administrator’s privileges are required to reset the password.
To change the administrator’s password, use the ISIS Management Console. For more information, see “Changing
n
the Administrator Password” on page 29.
To reset the administrator’s password:
1. In the Control Panel toolbar, click Reset ISIS Password.
A dialog box warns you that this action removes the administrator’s password from the System Director’s account.
2. Click Yes to clear the password.

Managing Active Clients

The Active Clients tab displays the identity of the Avid ISIS clients known to the System Director. Use the information listed in this tab to determine if obsolete numeric identifiers (IDs) exist in the System Director.
Avid ISIS System Director Control Panel
The Active Clients tab displays all active Storage Managers as well as connected client accounts. You can use the Bandwidth dialog box in the ISIS Management Console to view only the active client accounts. For more information, see
The System Director reports the current client status as described in the following table.
Heading Description
Name Name of the client
ID An internal numeric identifier used by the System Director to represent each client that has a Workspace
“Monitoring Client Bandwidth” on page 110.
mounted. These identifiers are assigned when a client first contacts the System Director and remain valid until the client unmounts all Workspaces
59
Page 60
Avid ISIS System Director Control Panel
Heading Description (Continued)
Type Client type (Admin, Client, Storage Manager or System Director)
OS Operating system on the client
License Number of licenses registered to the client
Last seen Date and time when each client last sent its status to the System Director. The System Director removes the
entry when all Workspaces are unmounted from the client desktop
The area below the active clients list indicates the number of licenses being used by the clients currently connected to the shared storage network.
If a client fails without unmounting all Workspaces, the System Director maintains the numeric identifiers. Typically, this is not a problem because the same identifier is reused when that client mounts a Workspace the next time. However, it is possible for a client to leave a Workspace mounted, shut down the client system, and never be seen by the System Director again. If that client system is then physically removed or renamed, the numeric identifiers are not removed from the identification table. If enough obsolete entries accumulate, new clients might not be able to obtain numeric identifiers.
To check the license status of an active or an inactive client:
t Select the client in the active client list, and click Refresh.
To disconnect an active or an inactive client:
t Select the client in the active client list, and click Disconnect Client.
Inform the client you are temporarily disconnecting them and that the connection will return after a few seconds.
n
60
Page 61

5 Managing Storage Groups and Workspaces

Storage Groups are collections of Storage Managers. Storage Groups give you flexibility in allocating storage capacity among groups with different functional areas, workflow requirements, or as a means of mitigating the risk of various drive failure scenarios. Workspaces are virtual volumes that exist on Storage Groups and can be resized dynamically. Workspaces allow you to segment your Storage Groups easily to accommodate projects and users.

Managing Storage Groups

The Storage Groups page of the ISIS Management Console allows you to add and delete Storage Groups, to rename Storage Groups, and to configure and manage Storage Groups.
1 Action button toolbar—Perform actions on selected Storage Groups
2 Details panel—Detailed information on the selected Storage Groups; see
Details” on page 62
3 Storage Groups list—Lists all configured Storage Groups and related information; see “Storage Groups List” on page 62
4 Filter panel—Filter the Storage Groups list display based on conditions you configure; see “Filtering the Display” on
page 24
5 Storage Managers list—Displays Storage Managers bound to the selected Storage Group
61
“Viewing Storage Group and Storage Manager
Page 62

Storage Groups List

The following table summarizes the information available in the Storage Groups list. This information is also displayed in the Details panel for a selected Storage Group.
Heading Description
Name Displays the name of the currently selected Storage Group
Capacity Displays the storage capacity in gigabytes (GB) of the selected Storage Group
Effective Displays the effective (available) storage capacity in gigabytes (GB) of the selected Storage Group
Used Displays the amount of storage space in gigabytes (GB) that currently has data written on it in the
Unused Displays the total amount of storage space in gigabytes (GB) that currently has no data written on it
Allocated Displays the amount of storage space in gigabytes (GB) reserved for use by Workspaces in the
Unallocated Displays the amount of storage space in gigabytes (GB) available on the Storage Managers and not
Managing Storage Groups
selected Storage Group
in the Storage Managers assigned to the selected Storage Group
selected Storage Group
currently reserved for the selected Storage Group
Chunk Size Displays the size of segmented media files sent over the network
Files Displays the number of files in the selected Storage Group
Directories Displays the number of directories in the selected Storage Group
You can sort the information in the Storage Groups page by clicking any column heading. For more information on sorting items in columns, see
“Sorting Information” on page 24.

Viewing Storage Group and Storage Manager Details

The Details and Storage Managers panels display information about the currently selected Storage Group and the Storage Managers it contains. The information displayed is the information as seen by the System Director. Some of the information is embedded in the Storage Manager, and other information is assigned to the Storage Manager by the Avid ISIS software.
To sort the information in the Storage Managers panel, click any column heading. For more information on sorting
n
items in columns, see “Sorting Information” on page 24.
To view information about a Storage Group:
t In the Storage Groups list, select a Storage Group.
The Storage Groups page displays all the information for the selected Storage Group. If the Details panel is not visible, click Details.
To close the Details panel:
t Click Details.
The Storage Managers panel lists the Storage Managers allocated to the currently selected Storage Group, as well as the Storage Managers available for allocation to the Storage Group.
62
Page 63
For information about what is shown in the Storage Managers panel, see “Storage Manager Column List” on
page 34
. Some columns are hidden by default (see “Showing and Hiding Columns” on page 24).

Storage Groups on ISIS | 7500

Storage Groups are created from bound Storage Managers. First, you bind Storage Managers to the system, then you create one or more Storage Groups using the Storage Managers. A Storage Manager can belong to only one Storage Group.
Once you have a Storage Group you can create Workspaces.

Storage Groups and Chunk Sizes

Storage Managers are combined to create Storage Groups in the ISIS file system. When you bind a Storage Manager you must select either 512 KB (default) or 256 KB chunk sizes. Earlier Avid ISIS releases used 256 KB chunk sizes. These bound Storage Managers must all be of the same chunk size when you configure your Storage Group.
Avid ISIS switch hardware shipped with v1.x (ISS1000 and IXS1000) does not support 512 KB chunk sizes. If you
n
have Avid ISIS v2.x software running on v1.x switches, you must select the 256 KB chunk size when adding Storage Managers to the file system to create Storage Groups.
You cannot change the chunk size of an existing Storage Group. If you need to change the chunk size of a Storage Group, you must delete it and create a new one with the desired chunk size, using Storage Managers that use that chunk size. The chunk size selection is available only when binding the Storage Managers.
Managing Storage Groups

Storage Managers and Chunk Sizes

There are two drives in all Avid ISIS | 7500 ISBs. ISBs are identified by the total amount of storage in the ISB; for example, an ISB with the two 1 terabyte (TB) drives is referred to as an i2000. The supported chunk size available on each ISB type is listed below:
256 KB—i500 and i1000 only
512 KB—All (i500, i1000, i2000, i4000, i8000); Requires v2.x switch hardware (ISS2000 and IXS2000)

RAID-6 Workspace, Single ISB Failure

When there is a single ISB failure in an ISIS Workspace configured with RAID-6 protection, the Workspace continues to function normally but at a lower bandwidth. For more information, see
ISB Failure” on page 64
After confirming the failure of an ISB, Avid highly recommends that you initiate the remove redistribution process immediately. There are two benefits to doing this:
Immediately upon initiation of the remove redistribution, all new writes to the Workspace have the full benefit of RAID-6 protection (dual-parity protection).
Upon completion of the remove redistribution process, existing data in the Workspace is once again fully protected. Prior to completion, if another ISB were to fail, the Workspace would be in an unprotected state (though no data would be lost).

RAID-6 Workspace, Dual ISB Failure

.
“Mirrored Workspace, Single
An “unprotected state” occurs if two ISBs fail in a RAID-6 Workspace. In an unprotected state with no additional failures, read operations continue to function normally at a lower bandwidth.
63
Page 64
However, in an unprotected state, due to the distributed architecture of the ISIS file system (optimized for real-time performance), it is possible under certain circumstances that the system would not be able to correctly update the parity information when writing new data. As a result under these circumstances, the file system could return a failure status when writing. While the failure rate percentage on the total number of write operations is low, heavy workloads on the system would result in enough write failures to disrupt operations.
This issue only applies when the Workspace is in an unprotected state and the remove redistribution process on the failed ISBs has not been initiated. Therefore, Avid highly recommends that you initiate the remove redistribution process immediately upon confirmation of any ISB failure. This ensures immediate protection (RAID-6 or mirroring) of new data being written, and full protection of all stored data at the earliest possible time.

Mirrored Workspace, Single ISB Failure

An “unprotected state” occurs when you have a single ISB failure in a mirrored Workspace. In an unprotected state with no additional failures, read operations continue to function normally.
However, in an unprotected state a subsequent or infrastructure failure will cause operational issues which could result in failures when writing new data or prevent you from accessing data in the Workspace. An additional ISB failure can compromise data accessibility. Networking issues, on the other hand, will not cause accessibility issues on previously written data but might prevent the successful completion of an active write operation.
This issue only applies when the Workspace is in an unprotected state and the remove redistribution process on the failed ISBs has not been initiated. Therefore, Therefore, Avid highly recommends that you initiate the remove redistribution process immediately upon confirmation of any ISB failure. This ensures immediate protection (RAID-6 or mirroring) of new data being written, and full protection of all stored data at the earliest possible time.
Managing Storage Groups

Matching Chunk Sizes to the File System

If you add an ISB (displays as an available Storage Manager) to your file system, make sure you match the chunk size of the new Storage Manager to the chunk size of the existing Storage Group. New Storage Managers are added with a default chunk size of 512 KB on mirrored Storage Groups (256 KB with i1000 ISBs). You cannot mix the chunk sizes within a Storage Group. To change the chunk size of an ISB, you must remove the Storage Manager from the file system and add the Storage Manager again (rebind it), selecting the same protection and chunk size as the existing Storage Group.

Zone 1 Switches

The ISIS v2.x generation IXS and ISS switches install in the same engines as earlier releases; the chassis has not changed. However, all the switches in the engines must be of the same generation. The two new switches are labeled IXS2000 and ISS2000. The new switches cannot be mixed in ISIS Engines with earlier versions of the switches (labeled IXS1000 and ISS1000). If your IXS and ISS switches are not labeled, consider them the earlier versions. The ISS2000 switches are required for 10 Gb clients and 512 KB chunk size, see
on page 63
.
The Avid ISIS documentation refers to IXS2000 and ISS2000 switches as v2.x hardware and IXS1000 and ISS1000 switches as v1.x hardware.

Storage Groups on ISIS | 5500 and ISIS | 2500

For both ISIS | 5500 and ISIS | 2500, each Engine is a Storage Manager. You can assign all of your Engines to one large Storage Group, or each Engine can be a Storage Group. An Engine can be assigned to only one Storage Group.
“Storage Groups and Chunk Sizes”
64
Page 65
Avid ISIS | 5500 provides RAID-5 data protection with an active hot spare and Avid ISIS | 2500 provides RAID-6 data protection.

Adding Storage Managers to Storage Groups

You can add unassigned Storage Managers to a Storage Group to increase its storage capacity. This is typically done when adding a new Engine to your Avid ISIS system. This process initiates a redistribution of the files in the existing Storage Group to include the new Storage Manager. For more information, see
page 81
To add Storage Managers to a Storage Group:
.
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. In the Storage Groups list, select the Storage Group where you want to add Storage Managers, and then do one of the following:
t Click Details.
t Double-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the spare Storage Managers you want to add to the Storage Group.
Managing Storage Groups
“Redistributing Data” on
If you have two Management Domains in the ISIS | 7500, check the Domain ID column and select Storage Managers
n
from the same domain. You cannot add Storage Managers to a Storage Group with a different Domain ID. Storage Groups cannot span Management Domains.
4. Click Add to add the selected spare Storage Managers to the Storage Group.
The Storage Managers panel refreshes to display the selected Storage Managers added to the Storage Group.
5. (Option) Click Revert to undo any modifications made to the Storage Group information.
6. Click Apply.
The Storage Managers are added to the Storage Group.
- The shared storage network performs a redistribution of any data on the Storage Managers. The amount of
time required for the redistribution depends on the amount of data in the Storage Group.
- The configuration change counter for all affected Workspaces is incremented by one.
After 20 configuration changes, the system advises you to perform a full redistribution. You can suspend and resume
n
the redistribution as needed. For more information, see “Suspending and Resuming Redistribution” on page 84.

Adding New Storage Groups

A Storage Group is a set of physical Storage Managers that store a subset of the complete set of media files accessible within a shared storage environment. You can create up to 32 Storage Groups.
You must add Storage Managers to the file system before you can create any Storage Groups. For more information,
n
see “Binding Storage Managers to the ISIS File System” on page 38.
If you have bound Storage Managers to the ISIS file system but you have not created any Storage Groups, the Create
n
Storage Groups dialog box opens by default when you select the Storage Groups list.
65
Page 66
To add a new Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. Click New.
The Create Storage Group dialog box opens.
3. In the Name text box, type a name for the Storage Group.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. In the Storage Managers panel, select the Storage Managers you want to assign to the new Storage Group.
5. Click Add.
The Storage Managers are allocated to the Storage Group. You can click Remove to remove Storage Managers from the Storage Group.
6. (Option) Before you create your Storage Group, you can click Revert to undo any modifications made to the Storage Group information.
7. Click Apply to create a new Storage Group containing all the selected Storage Managers.
If there is already a Storage Group with the same name, an error message is displayed.
Managing Storage Groups
The new Storage Group appears in the Storage Groups list, and the Create Storage Group dialog box refreshes to show the Storage Managers still available for additional Storage Groups.
8. (Option) Repeat steps 3 through 8 to create new Storage Groups.
9. Click Close to close the Create Storage Group dialog box and to return to the Storage Groups page.

Removing ISIS Storage Managers from Storage Groups

You can remove Storage Managers from your Storage Group, as long as the following conditions continue to apply after the operation:
The Storage Group contains at least the minimum number of Storage Managers remain. For more information,
“Adding New Storage Groups” on page 65.
see
If the ISIS | 7500 Storage Group includes RAID-6 Workspaces in the Storage Group, you must have at least 8
Storage Managers in the Storage Group.
The Storage Group contains enough Storage Managers to support the space allocated to your Workspaces.
This is the total amount of storage allocated to the Workspaces, not the actual amount of data stored on the
n
Workspaces.
Storage Managers removed from the Storage Group are returned to the system’s pool of spare Storage Managers.
c
When Storage Managers are removed, a redistribution is initiated. If you start the Storage Manager removal during high client usage, it might reduce performance on your clients. This can include dropped frames, underruns, and failed captures. Remove Storage Managers during periods of light client activity.
You can suspend and resume a redistribution as needed.
To remove Storage Managers from a Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
66
Page 67
2. In the Storage Groups list, select the Storage Group from which you want to remove Storage Managers, and then do one of the following:
t Click Details.
t Double-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the Storage Managers you want to remove from the Storage Group.
4. Click Remove.
The Storage Managers panel refreshes and displays the selected Storage Managers as Spare.
You cannot remove Storage Managers if it would cause the capacity of the Storage Group to fall below either the
n
used space or the allocated space. You must reduce the amount of space allocated to the Workspaces. For more information on modifying Workspaces, see “Resizing Workspaces” on page 78.
5. (Option) Click Revert to undo any modifications made to the Storage Group information.
6. Click Apply.
The Storage Managers are added to the Storage Group.

Adding Storage Managers from Another Storage Group

Managing Storage Groups
If you want to reassign Storage Managers from one Storage Group to another, you must remove the Storage Managers from the current Storage Group before adding them to a new one.
To add Storage Managers previously used in another Storage Group to your current Storage Group:
1. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
2. In the Storage Groups list, select the Storage Group which contains the Storage Managers you want to reassign, and then do one of the following:
t Click Details.
t Double-click the Storage Group name.
The Details panel displays all the information on the selected Storage Group.
3. In the Storage Managers panel, select all the Storage Managers you want to move to another Storage Group.
4. Click Remove.
The Storage Managers panel refreshes to display the selected Storage Managers as Spare.
5. Click Apply.
The selected Storage Managers are removed from the Storage Group, and the shared storage network performs a redistribution of any data on the Storage Managers.
6. In the Storage Groups list, click the Storage Group to which you want to add the Storage Managers.
The Details panel displays all the information on the selected Storage Group.
7. In the Storage Managers panel, select all the spare Storage Managers you want to add to the new Storage Group.
If you have two Management Domains, check the Domain ID column and select Storage Managers from the same
n
domain. You cannot add Storage Managers to a Storage Group with a different Domain ID. Storage Groups cannot span Management Domains.
67
Page 68
8. Click Add to add the selected Storage Managers to the Storage Group.
The Storage Managers panel refreshes to display the selected Storage Managers added to the new Storage Group.
9. (Option) Click Revert to undo any modifications made to the Storage Group information.
10. Click Apply.
The selected Storage Managers are added to the Storage Group, and the shared storage network performs a redistribution of any data on the Storage Managers. The amount of time required for the redistribution depends on the amount of data in the Storage Group.

Adding Storage Managers From Another Environment (ISIS | 7500)

If adding Storage Managers that were previously used in another environment, first connect them to your Avid ISIS shared storage network, and then bind them to the ISIS using the Storage Manager page.
To add the Storage Managers to your current Storage Group:
1. Make sure the new Storage Managers are connected to the network. For information on connecting Storage Managers, see the Avid ISIS Setup Guide.
2. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
Managing Storage Groups
3. Click Storage Manager in the System panel.
The Storage Manager page opens.
If the ISIS Management Console was open when you added the Storage Manager, click Refresh to view the newly added Storage Manager.
If the Storage Managers are not listed, something might be wrong with their physical connections; see the Avid ISIS Setup Guide.
4. Add the new Storage Managers to your Storage Group (see
page 65
).
5. Click Apply.
A dialog box opens asking you to confirm the action.
6. Click Yes.
The selected Storage Managers are added to the Storage Group.

Deleting Storage Groups

You can delete any Storage Group that does not have any Workspaces on it. As a result, all Storage Managers previously assigned to the Storage Group return to the system’s pool of spare Storage Managers.
To delete a Storage Group:
1. If any Workspaces exist on the Storage Group you want to delete, first delete the Workspaces (see “Deleting
Workspaces” on page 79
“Adding Storage Managers to Storage Groups” on
).
2. From the Management Console home page, click Storage Groups in the System section.
The Storage Groups page opens.
3. In the Storage Groups list, select the Storage Group you want to delete.
4. Click Delete.
68
Page 69

Minimum Free Storage Space Requirement

tr
e
wq
A dialog box opens asking you to confirm the action.
5. Click Yes.
The Storage Group is deleted.
After the Storage Group is deleted, all of the Storage Managers previously in your Storage Group will appear in the Storage Managers panel as Spare.
Minimum Free Storage Space Requirement
Avid recommends that you maintain a minimum threshold of free space in each Storage Group. The amount differs depending on the ISIS model:
On the ISIS | 7500, keep at least 7% of free space in each Storage Group. Exceeding 93% used space can produce severe performance issues in some situations.
On the ISIS | 5500 and ISIS | 2500, keep at least 5% of free space in each Storage Group.
To calculate the right amount of free space, log into the ISIS management Console and navigate to the Storage Group window. For each Storage Group, multiply the Effective number by 0.07 or 0.05 (depending on your ISIS system) to determine your recommended free space in GBs. Create a new workspace of that size in this Storage Group and label it “Headroom” and do not give anyone access to this workspace.

Managing Workspaces

This section describes how to create, rename, and delete Workspaces. and how to manipulate the amount of storage allocated to each Workspace.
69
Page 70
1 Action button toolbar—Perform actions on selected Workspaces
Managing Workspaces
2 Details panel—Detailed information on the selected Workspaces; see
3 Workspaces list—Lists all configured Workspaces and related information; see “Workspaces List” on page 70
4 Filter panel—Filter the Workspaces list display based on conditions you configure; see “Filtering the Display” on
page 24
5 User access panel—Displays users who have access to the selected Workspace and details about their access privileges;
“Managing Workspace Access Privileges” on page 80
see

Workspaces List

The Workspaces list displays all Workspaces, the Storage Groups on which they reside, and details about each Workspace.
Heading Description
Name Lists the names of all Workspaces in the selected Storage Groups
Capacity Lists the total storage capacity of each Workspace in gigabytes (GB)
Resize slider Displays a graphical representation of the used and available space for each Workspace (for information
Maximum Lists the maximum amount of storage space in gigabytes (GB) available for the Workspace on the network
on using the Workspace Size graph, see
“Viewing Workspace Details” on page 73
“Using the Workspace Size Graph” on page 72)
Protection Mode Displays the type of protection applied:
Avid ISIS | 7500 provides “mirrored” and “RAID-6” data protection modes, as well as an “unprotected” mode.
Avid ISIS | 5500 provides RAID-5 data protection with an active hot spare, called “HW RAID.”
Avid ISIS | 2500 provides RAID-6 data protection, called “SW RAID.”
Used Displays the amount of storage space in gigabytes (GB) that currently has data written on it in each
Workspace
% Used Displays the percentage (%) of storage space currently storing data on the Workspace
Reserved Displays the amount of storage space in gigabytes (GB) that has been reserved by a client application
Unused Lists the amount of storage space in gigabytes (GB) that currently has no data written on it in each
Workspace
Status Displays the status of any current redistribution:
In Progress
Stalled
Pending
Suspended
Requires Full Redistribution
Config Changes Displays the number of changes to a Storage Group that involve moving data — for example, the number
of times a Storage Manager has been added or removed
Storage Group For each Workspace, lists the Storage Group on which it is located
70
Page 71
Heading Description
Files Lists the total number of files stored on the network for each Workspace
To sort the information in the Storage Managers panel, click any column heading. For more information on sorting
n
items in columns, see “Sorting Information” on page 24.

Workspace Considerations

Before you create Workspaces:
Consider how you want to allocate them. For example, do you want to allocate them to accommodate projects, groups, individual clients, streaming bit rates, media types, media distributors, or a combination of these?
Determine how much storage each Workspace requires and allocate space accordingly. This might be a function of project size or the number of clients, or it might be a function of media duration or media resolution.
In a multiple Workspace configuration, consider reserving some space rather than assigning all of it immediately. Once space is allocated, it tends to be filled quickly and you might need space later to accommodate a new project or client or to extend or protect an existing Workspace. In these situations, it is easier to use space held in reserve than to take it away from an existing Workspace.
Managing Workspaces
When allocating and sizing Workspaces, also consider whether access restrictions are required and whether protection for data integrity is necessary for each Workspace.
The sections below describe Workspace considerations that apply only to ISIS | 7500 because of the different Workspace protection modes available. On ISIS | 5500, the only data protection mode is hardware RAID; on ISIS | 2500, the only protection mode is software RAID.

Workspace Data Protection (ISIS | 7500 only)

Avid ISIS | 7500 supports two types of Workspace data protection: mirrored and redundant array of independent disks (RAID-6), which in turn depends on the number of Storage Managers in the Storage Group:
For Mirrored Workspaces there must be at least two Storage Managers in the Storage Group
For RAID-6 Workspaces there must be at least eight Storage Managers in the Storage Group, and the Chunk Size must be 512 KB. RAID-6 storage provides more storage at a lower cost per GB.

Workspace Creation (ISIS | 7500)

The following table describes what protection modes you can apply to a Workspace in a Storage Group on an ISIS | 7500 depending on what the Storage Group already contains.
If the Storage Group contains: You can create:
No Workspaces Mirrored, unprotected, or RAID-6 Workspaces
Unprotected Workspaces Mirrored or unprotected Workspaces
Mirrored Workspaces Mirrored or unprotected Workspaces
RAID-6 Workspaces RAID-6 Workspaces (only)
71
Page 72

Workspace Duplication (ISIS | 7500)

e
wq
r t
You can duplicate a Workspace in a Storage Group on an ISIS | 7500 that supports the same protection mode as the source Workspace, as described in the following table.
Protection Mode of Workspace to Duplicate: Target Storage Group can Contain:
Unprotected Workspace Mirrored, unprotected, or no Workspaces
Mirrored Workspaces Mirrored, unprotected, or no Workspaces
RAID-6 Workspaces RAID-6 or no Workspaces

Workspace Moves (ISIS | 7500)

When moving a Workspace on an ISIS | 7500, the Storage Group list contains Storage Groups with the same protection mode as the Workspace you are moving. If moving a RAID-6 Workspace, only Storage Groups that support RAID-6 workspaces appear in the list. If the Workspace is mirrored, only Storage Groups that support mirrored or unprotected Workspaces appear in the list.

Using the Workspace Size Graph

Managing Workspaces
The Workspaces Size graph provides a quick way to view how much storage capacity is currently allocated to each Workspace and how much of that storage space currently has data written on it. The graph represents the following:
Workspace size—total drive space in the Storage Group allocated to each Workspace
Used space—used drive space in the Workspace
Unused space—unused drive space in the Workspace
Maximum Workspace size—total of Workspace size + drive space in the Storage Group still available for allocation to each Workspace
1 Decrease/Increase buttons—Increases or decreases the scale of the graph
2 Resize handle—Click and drag to increase or decrease the Workspace size; see
3 Used Space
4 Unused space
“Resizing Workspaces” on page 78
5 Maximum Workspace size—total of Workspace size + drive space in the Storage Group still available for allocation to
each Workspace
To resize the Workspaces Size graph, do one of the following:
t Click Decrease Size to reduce the size of the graph.
72
Page 73
t Click Increase Size to expand the size of the graph.

Viewing Workspace Details

The Details panel and the User Access panels display all information for the currently selected Workspace.
To view detailed information about a Workspace:
t In the Workspaces list, select a Workspace.
The Workspaces page displays all the information for the selected Workspace. If the Details panel is not visible, click Details.
To close the Details panel:
t Click Details.
The Details panel contains the same information as the Workspaces column list (except for the Resize slider and the Maximum storage space; see
Heading Description
Directories Displays the number of directories used by the selected Workspace
Managing Workspaces
“Workspaces List” on page 70), but includes the following additional information:
Warning Event Trigger Displays the value in used percentage (%) or unused gigabytes (GB) of storage at which a
warning event is written to the Event Log
Error Event Trigger Displays the value in used percentage (%) or unused gigabytes (GB) of storage at which an
error event is written to the Event Log
Chunk Size The smallest unit of data that can be written to the disks
The User Access panel lists all users and user groups and their access privileges. (For information on access privileges, see
Heading Description
Name Lists the names of the users and user groups on the network
Type Displays the client category (user or user group) for each client in the Name list
Access Lists the access privileges for each client in the Name list
Effective Lists the effective access privileges for each client in the Name list
Reason Lists the reason for any difference between the access privileges assigned to a user and the effective access
To sort the information in the User Access panel, click any column heading. For more information on sorting items
n
in columns, see “Sorting Information” on page 24.
“Managing Workspace Access Privileges” on page 80.)
assigned to a user as a member of a user group

Adding New Workspaces

Workspaces are locations to store and segregate data. You can allow users to access some or all of the Workspaces, and you can assign permissions for how each user can access the data in a Workspace. You can create up to 1024 Workspaces, divided among all your Storage Groups.
73
Page 74
Managing Workspaces
If you have created Storage Groups but you have not created any Workspaces, the Create Workspace dialog box
n
opens by default when you select the Workspaces list.
To add a new Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. Click New.
The Details panel opens.
3. In the Name text box, type a name for the Workspace.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. Click the Storage Group menu, and select the Storage Group in which you want to create the Workspace.
The Storage Group name appears in the Storage Group text box.
5. (ISIS | 7500 Option) Click the Protection menu and select a Workspace protection option (depends on the protection modes available for the Storage Group you selected).
6. Type a size for the Workspace in the Capacity text box. The default size (200 GB) is listed in the Capacity text box, and the maximum size is listed next to the Capacity text box.
The minimum Workspace size is 1 GB.
n
If all storage in the Storage Group is allocated to existing Workspaces, you can make an existing Workspace smaller. For information on resizing Workspaces, see
7. (Option) To set a Warning event trigger, select the type of trigger from the drop-down list (either Used % > or Unused GB <), then type in a value.
8. (Option) To set an Error event trigger, select the type of trigger from the drop-down list (either Used % > or Unused GB <), then type in a value.
For more information about setting Event triggers, see “Setting Event Triggers” on page 78.
n
9. In the User Access panel, set the User and User Group access privileges (for more information, see “Setting
Workspace Access Privileges” on page 80
10. Click Apply.
The new Workspace appears in the Workspace dialog box, and the Create Workspace dialog box refreshes to allow you to create a new Workspace.
If there is already a Workspace with the same name, an error occurs.
11. (Option) Repeat steps 3 through 10 to create new Workspaces.
12. Click Close.
The new Workspace appears in the Workspaces list.
).
“Resizing Workspaces” on page 78.

Duplicating Workspaces

When you duplicate Workspaces, they inherit the attributes of the Workspace from which they were created.
The contents of the original Workspace are not duplicated.
n
74
Page 75
Managing Workspaces
To duplicate a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspace list, select the Workspace you want to duplicate.
3. Click Duplicate.
The Duplicate Workspace dialog box opens.
4. (Option) Modify any of the attributes of the new Workspace. For information on modifying Workspaces, see the following topics:
- “Resizing Workspaces” on page 78
- “Renaming Workspaces” on page 75
- “Protecting ISIS | 7500 Workspaces” on page 76
- “Managing Workspace Access Privileges” on page 80
5. Click Apply.
The duplicate Workspace appears in the Workspace list, and the Duplicate Workspace list refreshes to allow you to duplicate a new Workspace. The new Workspace has a default name — Workspace n, where n is an integer that is incremented each time you click Apply to create another duplicate Workspace.
If there is no room for a Workspace of the same size as the original, the Capacity column displays a red line and the Apply button remains inactive.
6. Click Close.

Renaming Workspaces

You can rename a Workspace at any time, even when it is being used by client workstations and mapped to a local drive or by letterless mapping (to a Universal Naming Convention path) on the client system. The only effect on users is that the Workspace name will be different the next time they need to access it.
To rename a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, click the Workspace name you want to change.
3. If the Details panel is not visible, do one of the following:
t Click Details.
t Double-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. Type a new name in the Name text box.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
5. (Option) Click Revert to undo any modifications made to the Workspace information.
6. Click Apply.
75
Page 76

Protecting ISIS | 7500 Workspaces

Because of the potential impact of a drive failure, Avid recommends protecting all your Workspaces whenever possible. On the ISIS | 7500, workspace protection is optional. If you want to ensure protection of your files at all times, always choose a Protection option when creating new Workspaces (before any files are stored on the Workspace).
If you are not sure that all files on a given Workspace are protected, select the Workspace and enable the available Protection option for the Workspace. This protects all new files added to the Workspace, and adds protection to any existing files in the Workspace that are not already protected. Using RAID-6 protection on Workspaces has the following advantages:
Migration from mirrored to RAID-6 Workspaces can become part of your normal workflow. You can move the data that is no longer used in the mirrored Workspaces to RAID-6 Workspaces for long term storage. This frees up faster Storage Managers for higher performance work.
RAID-6 Workspaces allow you to use low bit-rate data, at less cost.
The following table summarizes the advantages and disadvantages of the different protection types:
Type Advantages Disadvantages
Managing Workspaces
Mirrored Maximizes performance of protected
Workspaces
Supports high-resolution workflows
RAID-6 Maximizes protected storage capacity
Tolerates two Storage Manager failures
RAID-6 Workspaces have the following restrictions:
Require a Storage Group with a 512 KB chunk size (256 KB chunk sizes are not supported).
Require a Storage Group with at least 8 Storage Managers.
Require ISIS v2.x generation switches (ISS2000/IXS2000) in the ISIS Engines (these switches are also required for 512 KB chunk sizes).
Support only resolutions that draw 16 MB/s (50 Mb/s) or less.
For example, you can run two streams of DV 50 or DNxHD 36. Bandwidths are listed by resolution and number of
n
streams on the Avid Knowledge Base. Search the Avid Knowledge Base for the Avid ISIS Performance Guide.
If a RAID-6 Workspace experiences two disk failures, capturing (or writing) to the Workspace is not supported until the error condition is corrected.
Before you perform a full redistribution, all clients must stop using that Storage Group and unmount the Workspaces in that Storage Group.
Mirrored Workspaces use twice as much space as unprotected Workspaces
Tolerates single Storage Manager failure
Supports low bit-rate (<=50 Mbs) workflows

Setting ISIS | 7500 Workspace Protection

You can use the Workspaces page to enable or disable Workspace protection.
To enable protection for a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
76
Page 77
Managing Workspaces
2. In the Workspaces list, click the Workspace you want to protect.
3. If the Details panel is not visible, do one of the following:
t Click Details.
t Double-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. Click Protection menu and select Mirrored.
In order to enable Workspace protection, there must be enough unallocated space in the Storage Group to which the
n
Workspace is assigned. Mirrored protection requires an amount of unallocated space equal to the size of the Workspace.
5. (Option) Click Revert to undo any modifications made to the Workspace information.
6. Click Apply.
Protection is enabled for the Workspace, and the Protection heading changes from unprotected to the type of protection you selected.
To disable protection for a Workspace:
1. In the Workspaces list, click the Workspace from which you want to remove protection.
2. In the Details panel, click the Protection menu and select unprotected from the list to remove protection from the Workspace.
Protection is disabled for the Workspace, and the Protection field for the Workspace changes to Unprotected.
3. Click Apply.

Moving Workspaces

You can move a Workspace and all of its contents by assigning it to another Storage Group in the Details panel of the Workspaces page, as long as the destination Storage Group has Workspaces using compatible protection modes. For example, you can move a mirrored or unprotected Workspace to a Storage Group that contains other mirrored or unprotected Workspaces, and you can move a RAID-6 Workspace to a Storage Group that contains RAID-6 Workspaces.
On the ISIS | 7500 system, moving a Workspace requires that the source and destination Storage Groups contain Storage Managers of the same chunk size or moving a smaller chunk size to a larger chunk size.
If you are moving between chunk sizes, you cannot do any I/O to the Workspace while the move is in progress. The
n
Management Console displays a warning when you start the move and if you ignore the warning, the I/O fails. You can do I/Os in other Workspaces in both the source and destination Storage Groups during the move.
If moving a larger chunk size Workspace to a Storage Group with a smaller chunk size, you must create a new Workspace in the destination Storage Group and manually transfer the files from the source to the destination using an external copy method.
To move a Workspace and all of its contents to another Storage Group:
1. In the Workspaces list, select the Workspace you want to move.
2. If the Details panel is not visible, do one of the following:
t Click Details.
t Double-click the Workspace name.
77
Page 78
The Workspaces Details panel displays all the information on the selected Workspace.
3. Click the Storage Group menu, and select the Storage Group to which you want to move the Workspace.
4. (Option) Click Revert to undo any modifications made to the Workspace information.
5. Click Apply.
The Workspace is moved, and the Details panel updates to show the new Storage Group assignment. Existing files are moved, and new files written to the Workspace are written to the destination Storage Group.

Resizing Workspaces

There are occasions when you must change the size of Workspaces. For example, you might need to make a Workspace larger to create room for a capture procedure planned for later in the day or for some new media files. Alternatively, you might need to make a Workspace smaller to create space for other Workspaces or to reserve storage for another day.
To adjust the size of a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select a Workspace.
Managing Workspaces
3. Do one of the following:
t Click the handle of the Workspaces Size graph, and drag it to resize the graphical display. The Workspace
size listed in the Capacity text box updates as you drag the handle.
t Click Details and type a new value for the Workspace size in the Capacity text box in the Workspace Details
panel.
4. Click Apply.
You cannot increase Workspace size above the storage space listed as the maximum size.
n

Setting Event Triggers

You can set event triggers that will write events to the Event log when Workspace capacity (in gigabytes) is less than the specified value, or when used Workspace capacity exceeds the specified percentage. You can create triggers for both Warning and Error events.
If you have email notifications enabled, you can select the ISIS General Error and Warning subcodes to receive email notifications when Workspace capacity events are written to the Windows Event Log. For more information on email notifications, see
To set an event trigger:
1. In the Workspaces list, select the Workspace for which you want to set a trigger.
2. If the Details panel is not visible, do one of the following:
“Configuring the Notification Service” on page 31.
t Click Details.
t Double-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
78
Page 79
Managing Workspaces
3. (Option) Select one of the following from the Warning Event Trigger “used” list:
Option Description
Unused GB < Trigger a warning when unused capacity falls below the specified value, in gigabytes
Used % > Trigger a warning when used capacity exceeds the specified percentage value
4. Type a value in the text field for the used or unused capacity at which you want a warning event to be written to the Event Log.
5. (Option) Select one of the following from the Error Event Trigger “used” list:
Option Description
Unused GB < Trigger an error when unused capacity falls below the specified value, in gigabytes
Used % > Trigger an error when used capacity exceeds the specified percentage value
6. Type a value in the text field for the used or unused capacity at which you want an error event to be written to the Event Log.
7. Click Apply.
8. Click Close.

Deleting Workspaces

You can delete Workspaces that are not currently accessed by any clients. You can also delete Workspaces whether or not they have media files stored on them. You can delete multiple Workspaces at one time.
Before deleting a Workspace, make sure that its media is no longer needed, is moved, or is backed up. You then can safely delete the Workspace.
If you delete a Workspace that has been mapped to a local drive by a client, the client cannot access that Workspace. Clients should unmap the deleted Workspace using the Avid ISIS Client Manager. For information on using the Client Manager, see the Avid ISIS Client Guide or the Client Manager Help.
c
When a Workspace is deleted, a redistribution is initiated. If you start the delete on an ISIS during high client usage, it might reduce performance on your clients. This can include dropped frames, underruns, and failed captures. Delete Workspaces during periods of light client activity.
You can suspend and resume a redistribution as needed.
To delete a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select the Workspace you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm the operation.
4. Click Yes.
The Workspace is deleted.
79
Page 80

Managing Workspace Access Privileges

You can set privileges for user and user group access to Workspaces in the Workspaces page. There are three levels of access available to clients of the network, described in the following table.
Access Level Description
Read/Write Workspace can be read and written to.
Read Workspace can be read but not written to.
None Workspace cannot be read, written to, or mounted.
Managing Workspace Access Privileges
By default, new client accounts do not have access privileges until an administrator assigns them (see
Users” on page 93
For example, you might need to increase the access privileges for a user who does not have write access to the appropriate Workspace, or for a Workspace that does not provide the appropriate access to one or more users. To do so, you can either modify an individual client’s access privileges in the Users dialog box (see
page 94
You also can assign users access privileges different from those originally assigned to the group. If a user group is given a more permissive level of access than some members of the group, the group members then can have an effective access different from their assigned access. This can be useful for projects that require users with a variety of permissions to be able to write to certain Workspaces. You can also have users who have more permissive access than a user group in which they are members. Using the Workspaces page, the administrator can assign the necessary privileges.
Consider the following for access privileges:
As access privileges are increased, the newly accessible Workspaces are immediately available.
If a client has Read privileges to a Workspace and is granted Read/Write privileges, the new privileges apply
If a client is already at the Workspace selection stage when the access privileges are removed, then newly
If a client has Read/Write privileges to a Workspace and access privileges are reduced to read, the new
), or you can use the Workspace dialog box (see “Setting Workspace Access Privileges” on page 80).
immediately, without modifying the Workspace.
inaccessible Workspaces remain in the display. However, attempting to access the Workspaces will be unsuccessful.
privileges apply immediately, without modifying the Workspace. If a file is open for writing, the client retains write privilege to that file until it is closed.
). You can customize access for each client to every Workspace, if necessary.
“Modifying Users” on
“Adding
If a client has privileges to a Workspace and those privileges are reduced to None, then the Workspace is unavailable the next time the client attempts to access it.

Setting Workspace Access Privileges

You can set access privileges for users and user groups when the client accounts are first created (see “Adding
Users” on page 93 “Modifying Users” on page 94). The Workspaces page, however, allows you to set, modify, and monitor access
privileges to Workspaces without having to modify individual client accounts.
and “Adding User Groups” on page 98). You can also change access in the Users dialog box (see
80
Page 81

Redistributing Data

To set user or user group access to a Workspace:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. In the Workspaces list, select a Workspace.
3. If the Details panel is not visible, do one of the following:
t Click Details.
t Double-click the Workspace name.
The Workspaces Details panel displays all the information on the selected Workspace.
4. In the User Access panel, select a user or a user group. Ctrl+click (Windows and Linux) or Cmd+click (Macintosh) to select multiple users and user groups. You can select all users and user groups by clicking Select All.
5. Do one of the following:
t Click Read/Write to set both read and write Workspace access for the client.
t Click Read to set read-only Workspace access for the client.
t Click None to remove Workspace access privileges for the client.
6. (Option) Click Revert to undo any modifications made to the user access information.
7. Click Apply.
Redistributing Data
Redistribution is an operation that ensures all files on a Workspace are balanced evenly across the Storage Managers in the Storage Group to provide optimal file system performance. Data chunks are distributed across multiple Storage Managers to ensure redundancy and protect against data loss. When redistributing files in a Storage Group, the redistribution applies to all Workspaces in that Storage Group.
There are several operations that involve redistribution of data:
Adding or removing Storage Managers from a Storage Group
Deleting or moving Workspaces
Switching Workspaces between Mirrored protection and Unprotected

Configuration Changes

The configuration of a Storage Group is based on the Storage Managers that make up that group. When you add or remove Storage Managers from the Storage Group two things happen: a configuration change is made and an incremental redistribution is performed to balance the files in the Storage Group across the Storage Managers. Deleting and moving Workspaces result in a redistribution but do not cause a configuration change. You can view the number of configuration changes that have been applied to a Workspace in the Details panel of the Workspaces page. For more information, see
“Viewing Workspace Details” on page 73.
After 20 configuration changes, the Workspaces page displays a warning to perform a full redistribution. You can manually initiate a Full Redistribution at any time using the Workspaces page in the Management Console. If you do not do so, the system continues to function, but the affected Workspaces, and System Status Panel general status will both remain at Warning until a full redistribution is performed. For more information on performing a full redistribution, see
“Performing a Full Redistribution” on page 83.
81
Page 82
Redistributing Data
c
After 30 configuration changes without a full redistribution, the system will perform a full redistribution automatically. This could significantly reduce system performance until the redistribution operation has completed.

Redistribution Guidelines

The ISIS | 7500 and ISIS | 5500 support add, remove, and full redistributions under load.
The ISIS | 2500 supports add redistributions under load.
- A load condition exists when the Workspace has active clients (reading and writing to the Workspace).
- A no load condition exists when a Workspace has inactive clients (the Workspace is mounted but clients are
not performing reads or writes).
ISIS | 2500 systems do not support “remove” or “full” redistribution of Storage Managers (Engines) to a Storage Group.
When redistributing under load, allow the redistribution to complete before initiating a second redistribution.
System performance can degrade significantly during redistribution in a Storage Group with the maximum client count. Reducing the number of clients allows the active clients using the Storage Group to function normally, with successful playback and captures. Perform redistributions during periods of light client activity, or reduce the overall load if client performance degrades (for example, the client experiences dropped frames, underruns, and failed captures). Limitations on expected client performance during redistribution include the following:
- Reducing audio tracks from 8 to 4 during playback might be required during redistribution. (Normal
operation supports 2 streams of video 8 tracks of audio.)
- Reducing the number of video streams from 2 to 1 might be required during redistribution. (Normal
operation supports 2 streams of video.)
You can suspend and resume a redistribution as needed. See the Avid ISIS Performance Guide for more information.
The amount of time a redistribution takes depends on whether the Workspace is in a load or a no load condition, whether you are adding or removing a Storage Manager, and how much data in the Storage Group must be redistributed. For more information on redistribution times, see the Avid ISIS Performance Guide.
Do not physically remove a Storage Manager until it has been removed from the Storage Group, the redistribution is complete, and it has been unbound as a Storage Manager.
c
c
If you physically remove a Storage Manager from the shared storage network before redistribution is complete, or if you physically remove more than one Storage Manager from a Storage Group before performing a redistribution, data loss can occur.
If you turn off any of the Engines before redistribution is complete, data loss can occur.

Symmetric Configuration Redistribution

Full redistributions happen faster on workspaces that have had symmetric configuration changes. For example, the same number of ISBs that were removed from a storage group are also added in a single configuration change. For more examples of symmetric configuration changes search the Avid Knowledge Base for the Avid ISIS Performance and Redistribution Guide. As with all full redistributions, all workspaces in the storage group should be selected for the full redistribution.
A full redistribution is still recommended at 20 configuration changes. At 30 configuration changes the Avid ISIS software automatically performs a full redistribution.
82
Page 83

Automatic Redistribution on Disk Failure

Avid ISIS performs an automatic redistribution on Disk Failure notification. Storage Managers continuously monitor disk status and sends a “Disk Failed” notification to the System Director upon determination that a disk is not usable. The System Director then removes the Storage Manager from its associated Storage Group. The removal of the Storage Manager from the Storage Group initiates redistributions on all workspaces associated with that Storage Group. The System Director then prevents the Storage Manager that reported the disk failure from being added to a Storage Group.
The Automatic Removal feature is controlled by a system preference that is configured using the ISIS Management Console Preferences tool. The preference is called “Auto Remove Redistribution on Disk Failure” The default setting is “enabled.” The Storage Manager is only removed from the Storage Group. It is not unbound from the ISIS Systems for the following reasons:
The Storage Manager participates in the removal redistribution. This is required to prevent data loss when full redundancy has not been attained for all data blocks.
The Storage Manager continues to report status, such as physically replacing the blade.
Auto removal status is reported by way of the System Event Log. A sequence of event log entries are generated for the initial report of the failure, the decision to remove the Storage Manager, and subsequent success or failure. Events are also logged for the start and stop of all the workspace redistributions.
Redistributing Data
When using Automatic Redistribution:
Keep a certain percentage of your Storage Group unused at all times. Failure to do so can cause the system to run out of space after an automatic redistribution has initiated and cause a client outage. The recommended amount of free space varies by ISIS platform; for more information, see
Requirement” on page 69
If an automatic redistribution of a Storage Group is started during a critical time the overall system performance can degrade significantly and be disruptive. For more information on understanding the performance characteristics during remove redistribution, see the Avid ISIS Performance and Redistribution Guide.
An automatic redistribution removes the Storage Manager from the Storage Group but not from the file system. Once an automatic redistribution has occurred and completed, the removed Storage Manager should be removed from the file system. You must first remove the Storage Manager with the software and then physically replace it. A replacement ISB must then be added to the file system and then the Storage Group, triggering another redistribution.
If unmirrored workspaces are in use, the data will be damaged on those workspaces in that Storage Group.
.

Workspace Redistribution Batching

Redistributions are performed on 20 Workspaces at a time. If your Storage Group exceeds 20 Workspaces, the Workspace Status shows “Redistribution In Process” for the first 20 Workspaces and “Redistribution Pending” for the remainder of Workspaces in that Storage Group. As Workspaces finish with the redistribution, the “Redistribution Pending” Workspaces start to redistribute until all the Workspaces in that Storage Group have finished the redistribution.
“Minimum Free Storage Space

Performing a Full Redistribution

In addition to automatic redistribution operations (see “Redistributing Data” on page 81), you can also initiate redistribution manually; for example, to perform a full redistribution when the Config Changes count exceeds 20. (For information about Config Changes, see
“Viewing Workspace Details” on page 73.)
83
Page 84
Redistributing Data
When the Config Changes count reaches 20, a message warns you to perform a redistribution.
n
When redistributing files manually, apply the redistribution to all Workspaces in a Storage Group. Avid does not recommend performing a full redistribution on some Workspaces in a Storage Group and not on others.
You can choose specific Workspaces to redistribute, or select one or more Workspaces from one or more Storage Groups, and redistribute all the Workspaces associated with those Storage Groups.
To redistribute Workspaces manually:
1. From the Management Console home page, click Workspaces in the System section.
The Workspaces page opens.
2. Do one of the following:
t Select specific Workspaces, then click Advanced Commands.
t Select a single Workspace, then click Advanced Commands.
t Select one or more Workspaces from different Storage Groups, then click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
3. Do one of the following:
t Click Full Redistribution.
Only the selected Workspaces start redistribution.
t Click Full Redistribution for All.
Redistribution starts for all Workspaces associated with the Storage Groups of the Workspaces you selected.
A confirmation message box opens.
4. Click OK.
Files are redistributed, and the count in the Config Changes column is reset to zero. The amount of time required for the redistribution depends on the amount of data in the Workspace.
5. If Storage Managers have rebooted following the completion of a full redistribution, do the following:
a. Click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
b. Select Verify Redistribution, and then click Send.

Suspending and Resuming Redistribution

Under some conditions, you might have to suspend or resume an in-progress redistribution. You can do this with the Advanced Commands options available on the toolbar in the Workspaces page, which also lets you suspend or resume redistribution of all Workspaces associated with the same Storage Groups.
To suspend the redistribution on a Storage Group that has more than 20 Workspaces, suspend all the workspaces in
n
that group.
c
Use of the Resume Redistribution and the Suspend Redistribution options can result in degraded system performance. Suspending redistributions can have serious consequences for the file system if not monitored closely. These two Advanced Commands options should be used by Avid Customer Support personnel or under Avid Customer Support direction.
84
Page 85
Redistributing Data
You can also use the Advanced Commands to verify a redistribution. Verification makes sure that all bad blocks on the appropriate Storage Manager have been deleted and that the redistribution has completed successfully. Use the Verify Redistribution command whenever Storage Managers are rebooted following a redistribution — for example, after you upgrade your system. In this case, Storage Managers might report a “Repairing Mirrors” status on reboot; verifying the redistribution replays the redistribution operation using the current configuration and restores the status to normal.
Verification causes minimal impact on performance and completes quickly.
n
To suspend a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Do one of the following:
t Select specific Workspaces, then click Advanced Commands.
t Select a single Workspace, then click Advanced Commands.
t Select one or more Workspaces from different Storage Groups, then click Advanced Commands.
c
The Advanced Workspace Commands dialog box opens.
4. Do one of the following:
t Click Suspend Redistribution.
Only the selected Workspaces suspend redistribution.
t Click Suspend Redistribution for All.
Redistribution is suspended for all Workspaces associated with the Storage Groups of the Workspaces you selected.
A confirmation message box opens.
5. Click Send.
When you manually suspend a redistribution, you must also manually resume it. Suspending redistributions should be considered temporary — Workspaces should not be left in the suspended state for extended periods of time.
To resume a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Do one of the following:
t Select specific Workspaces with suspended redistribution, then click Advanced Commands.
t Select a single Workspace, then click Advanced Commands.
t Select one or more Workspaces from different Storage Groups, then click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
4. Do one of the following:
85
Page 86

Redistribution Status Definitions

t Click Resume Redistribution.
Only the selected Workspaces resume redistribution.
t Click Resume Redistribution for All.
Redistribution is resumed for all Workspaces associated with the Storage Groups of the Workspaces you selected.
A confirmation message box opens.
5. Click Send.
To verify a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS Management Console, see
“Opening the Management Console” on page 15
.)
2. Click Workspaces in the System Area.
The Workspaces page opens.
3. Select the Workspace where the redistribution has completed.
4. Click Advanced Commands.
The Advanced Workspace Commands dialog box opens.
5. Select Verify Redistribution.
6. Click Send.
Redistribution Status Definitions
The following table lists the Status Messages logged by the System Director Service during a redistribution, and a brief description of the error. Other Storage Manager errors, not strictly related to redistribution, can also occur, interrupting redistribution or causing it to fail. See
Status Severity ISIS Model Comments
Initializing
Redistribution
Redistributing Warning All The Storage Manager is evenly redistributing data across all the
Redistribution Details Available
Warning All The Storage Manager is in the first phase of the redistribution
Warning 7500 An ISB is having trouble sending redistribution data to one or
“Storage Manager Status” on page 36.
process, in which it determines which blocks will be moved. The redistribution status is displayed in the Redistribution Monitor page.
drives in the Storage Group. The time it takes to redistribute the data depends on the amount of data in the Storage Group.
more ISBs. Do the following:
Open the ISB Storage Manager Agent page > Statistics tab > Redistribution and view the “List of Storage Managers with Transaction Issues” for problematic ISBs.
Open the ISB Storage Manager Agent page > Statistics tab > Network and view the “Top 16 IP Addresses in Receive Error (Last 30 Minutes)” section.
86
Page 87
Status Severity ISIS Model Comments (Continued)

Monitoring Redistributions

Stalled Redistribution
Warning All The Storage Manager is currently stalled while trying to move
Monitoring Redistributions
You can display detailed information about the progress of redistributions in the Redistribution Monitor tool.
The Redistribution Monitor tool displays a table listing the status of redistributions, the rate and remaining time of the redistribution, and other information.
To display details about redistribution:
1. Do one of the following:
t If a redistribution is in process, click the Redistribution Monitor icon in the Status console.
blocks to other Storage Managers. This might be a temporary condition; if it persists and the overall redistribution has been determined to be stalled contact Avid Customer Support.
t In the Management Console, click Redistribution Monitor under the Tools heading.
87
Page 88
Monitoring Redistributions
t From the Workspaces tool, the Storage Managers tool, or the Storage Groups tool, click Redistribution
Monitor in the Related Links section.
The Redistribution Monitor tool opens, displaying the information shown and described below.
Heading Description
Name Storage Manager name
ISB Name or Host Name Name of the ISB Engine (ISIS | 7500) or the host name of the Storage Manager
(ISIS | 2500 and ISIS | 5500)
State The state of the Storage Manager (Active or Standby, bound or spare)
Status Redistribution status
Progress When a redistribution is in progress, displays a progress bar and the percentage
of redistribution currently complete.
Rate (blocks/hour) Estimated number of blocks that can be moved in one hour
Time Remaining Estimated amount of time for the redistribution to complete, based on system
load, amount of data, and the rate. This is not a guarantee or promise of how long the redistribution will take.
88
Page 89
Monitoring Redistributions
Heading (Continued) Description (Continued)
Blocks to Move Total number of blocks still to be moved
Blocks Moved Number of blocks that have been moved so far
Status Time Time that the last status data was retrieved
Type Storage Manager type (ISB size, ISIS Engine, Nearline Engine)
89
Page 90

6 Managing Clients

Client accounts limit access to the file system. This section describes how to assign client accounts with associated passwords and access privileges for users, groups, and devices.
You must create a client account for any client that needs to access the Avid ISIS shared storage network: users, groups, and devices. When you create client accounts, you set basic client information, such as user names and passwords.
Each user and user group account has an associated privilege level that determines what access the user logging in to that account has when working with files stored in the network.
The ISIS Management Console allows the administrator to create client accounts for each client connected to the system, and it maintains a record of all attached clients. The client accounts are listed in dialog boxes for each client type: users, groups, and devices.
The client limits by ISIS model are as follows:
ISIS | 7500—330 connected clients maximum
ISIS | 5500—90 connected clients maximum
ISIS | 2500—200 ISIS clients and unlimited CIFS clients
ISIS systems support a maximum of 5,000 user accounts (including the default Administrator and Guest user accounts). In addition, ISIS systems support 1,000 groups. A single user can be in one primary group and up to 15 alternate groups.
Some clients might not be able to connect to the shared storage network if the combined bandwidth requirement of
n
connected components equals the system limit for bandwidth use. For information on monitoring bandwidth use, see
“Monitoring Client Bandwidth” on page 110.

Managing Users

The Users page of the ISIS Management Console allows you to create, modify, and delete user accounts; assign users to specific groups; and manage access privileges for all users.
The Users page contains two sections. On the left side of the dialog box, the Users list displays all the current user accounts. On the right side of the dialog box, the Details panel displays information about selected users, including user group membership and Workspace access.
The Details panel is visible only after you select a client in the Users list.
n
90
Page 91
Managing Users
t
r
e
wq
y
1 Action button toolbar—Perform actions on selected users
2 Details panel—Detailed information on the selected users; see
3 User list—Lists all users and related information; see “User Column List” on page 91
4 Group membership—Displays information about the group membership for the selected user; see “Adding Users” on
page 93
5 Filter panel—Filter the user list display based on conditions you configure; see “Filtering the Display” on page 24
6 Workspace access—Displays information about the Workspace access for the selected user; see “Adding Users” on
page 93 and “Modifying Users” on page 94

User Column List

The following table summarizes the information available in the Users list.
Heading Description
Name Lists the client name
Flags Indicates the status of client privileges
Bandwidth Lists the client’s bandwidth allocation
“Viewing User Details” on page 92
and “Modifying Users” on page 94
Setting a bandwidth limit on editing clients, such as an Avid NewsCutter adversely affect playback performance when the Avid ISIS system is under load.
®
Adrenaline client, can
91
Page 92
To sort the information in the Users panel, click any column heading. For more information on sorting items in
n
columns, see “Sorting Information” on page 24.

Viewing User Details

The Details panel displays all information for the currently selected user.
To view information about a user:
t In the User list, click to select a user.
The Users page displays all the information for the selected user. If the Details panel is not visible, click Details.
To hide the User Details panel:
t Click the arrow next to the Details title bar.
To close the User Details panel:
t Click Close.
The following table summarizes the information available in the Details panel.
Panel Heading Description
Managing Users
Details
User Flag
Group Membership
Name Lists the user name
Password Allows modification of the password used to log in to the system
Verify Provides verification for the new password
Bandwidth Allows modification of maximum bandwidth requirements
Setting a bandwidth limit on editing clients, such as an Avid NewsCutter Adrenaline client, can adversely affect playback performance when the Avid ISIS system is under load.
can resize Enables or disables user privilege for resizing Workspaces
can modify protection Enables or disables user privilege for changing protection status of
Workspaces
remote LDAP user Enables or disables user LDAP authentication and group privileges
disable user Disables the user
Name Lists the names of available groups
Type Lists the user’s membership status for each group (Member or
Non-Member)
Workspace Access
Name Lists the names of available Workspaces
Access Lists the access privileges for the selected user
92
Page 93
Panel Heading Description (Continued)

Adding Users

A user is anyone who accesses files stored on the network. User accounts include administrative privilege levels, group membership types, and Workspace access. There can be more user accounts than connected clients, with a maximum of 5,000 user accounts (including the default Administrator and Guest accounts).
Users must have access to at least one Workspace before they can use the shared storage network.
n
To create a user account:
1. From the Management Console home page, click Users in the System section.
The Users page opens.
2. Click New.
The Create User dialog box opens.
Managing Users
Effective Lists the effective access privileges for the selected user
Reason Lists the reason for any difference between the access privileges
and the effective access assigned the selected user
3. Set the user options. The following table summarizes these options.
Option Type Description
Name text If there is already a user with the name entered in the Name text box, an error
message tells you to type a new name
For information on valid and invalid characters, see “Entering Text” on
n
page 26.
Password text User password (maximum of 15 characters)
Verify text Re-type the user password to verify
Bandwidth (MB/sec) text (numeric) Sets a bandwidth limit for the client. The default value of zero denotes unlimited
bandwidth
can resize check box Enables or disables user privilege for resizing Workspaces
can modify protection check box Enables or disables user privileges for changing protection status of Workspaces.
remote LDAP user check box Enables or disables user LDAP authentication and group privileges
disable user check box Disables the user
4. (Option) In the Group Membership list, select a group, and click Member to make the user a member in the group. Users can belong to 15 groups.
By default, new users are listed as “Non-Member” in the Type category for each group. As a result, the Non-Member button is inactive until membership is set.
The Group Membership list updates to show the user as a member of the group.
5. (Option) In the Workspace Access list, select one or more Workspaces and do one of the following:
t Click Read to set read-only Workspace access for the user.
93
Page 94
By default, access privileges for new users are listed as “None” in the Access category for each Workspace. As a result, the None button is inactive until access is set. (For information on permissions for Workspace access in the network, see “Managing Workspace Access Privileges” on page 80
t Click Read/Write to set both read and write Workspace access for the user.
The Workspace Access list updates to show the user access privileges for the selected Workspace.
6. Click Apply.
7. (Option) Repeat steps 3 through 6 to create new users.
8. Click Close to close the Create User dialog box and to return to the Users page.
The new user appears in the Users list.

Duplicating Users

When you duplicate user accounts, they inherit the bandwidth allocation and access privileges of the accounts from which they were created.
To duplicate a user account:
1. In the Users list, select the user account you want to duplicate.
2. Click Duplicate.
Managing Users
.)
The Duplicate User dialog box opens.
3. (Option) Modify any of the attributes of the new user. For information on modifying user accounts, see
“Modifying Users” on page 94.
4. Click Apply to create a new user containing the attributes of the selected user.
The duplicate user appears in the Users page, and the Duplicate User dialog box refreshes to allow you to duplicate a new user.
The new user account has a default name — user n, where n is an integer that is incremented each time you click Apply to create another duplicate user account.
5. Click Close to close the Duplicate User dialog box and to return to the Users page.

Modifying Users

You can rename a User account, change the password, change the allocated bandwidth, edit privileges, and change user membership in groups with the client dialog boxes. For example, you can change user passwords to accommodate a new user, reestablish access for an existing user who has forgotten the password, or disable access to an account.
You can modify a User account at any time, even when it is being actively used in your work environment.
To modify a User account:
1. From the User list, do one of the following:
t Select the User account you want to modify, and click Details.
t Double-click the client name.
The Details panel displays information about the selected User account.
2. Modify the user options as required. The following table summarizes these options.
94
Page 95
Managing Users
Option Type Description
Name text If there is already a user with the name entered in the Name text box, an error
message tells you to type a new name
For information on valid and invalid characters, see “Entering Text” on
n
page 26.
Password text User password (maximum of 15 characters)
Verify text Re-type the user password to verify
Bandwidth (MB/sec) text (numeric) Sets a bandwidth limit for the client. The default value of zero denotes unlimited
bandwidth
can resize check box Enables or disables user privilege for resizing Workspaces
can modify protection check box Enables or disables user privileges for changing protection status of Workspaces
remote LDAP user check box Enables or disables user LDAP authentication and group privileges
disable user check box Disables the user
3. Modify Group membership for the user as required:
t Click Member to make the user a member in the user group.
t Click Non-Member to remove the user from the user group.
4. Modify Workspace access for the user as required:
t Click None to remove Workspace access privileges for the client.
t Click Read to set read-only Workspace access for the client.
t Click Read/Write to set both read and write Workspace access for the client.
For information on permissions for Workspace access in the network, see “Managing Workspace Access
Privileges” on page 80
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.

Deleting Users

You can use the ISIS Management Console to delete any User account. If you want to remove the client from the shared storage network but still maintain the client account, see
c
If you delete the client account, its connection to the System Director is broken immediately and any mounted Workspaces are unmounted as soon as they are accessed.
To delete a User account:
and “Setting Workspace Access Privileges” on page 80.
“Disabling Users” on page 96.
1. Ensure that the client account to be deleted is not currently active.
2. From the Users list, select the User account you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm that you really want to delete the client.
4. Click OK.
95
Page 96

Disabling Users

t
r
e
wq
y
You can remove Users temporarily from the Avid ISIS shared storage network by using the Disable User option. Disabling User accounts do not delete them from the list of Users in the Users page. This preserves the client accounts and allows you to return the clients to the system by enabling the User account at a later time.
To remove a user by disabling the user account:
1. Ensure that the client account to be removed is not currently active.
2. From the Users list, select the client account you want to disable.
3. Do one of the following:
t Click Details.
t Double-click the client name.
The Details panel displays information about the selected client.
4. Select the “disable user” check box.
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.
7. Click Close to close the Details window.

Managing User Groups

Managing User Groups
Client accounts also allow groups of users to access media stored on your network. These accounts allow users to mount or map Workspaces on their Avid workstations.
96
Page 97
1 Action button toolbar—Perform actions on selected user groups
Managing User Groups
2 Details panel—Detailed information on the selected user group; see
3 User groups list—Lists all user groups and related information
4 User membership panel—Displays information about the membership for the selected user group; see
Groups” on page 98
5 Filter panel—Filter the user list display based on conditions you configure; see “Filtering the Display” on page 24
6 Workspace access panel—Displays information about the Workspace access for the selected user group; see “Adding
User Groups” on page 98
and “Modifying User Groups” on page 98

Viewing User Group Details

The Details panel displays all information for the currently selected user group.
To view detailed information about a User group:
t In the Group list, click to select a user group.
The Groups page displays all the information for the selected user group. If the Details panel is not visible, click Details.
To hide the User Membership or Workspace Access panel:
t Click the arrow next to the Details title bar or the User Access title bar.
To close the Details panel:
“Viewing User Group Details” on page 97
“Adding User
and “Modifying User Groups” on page 98
t Click Close.
The following table summarizes the information available in the Details panel.
Panel Heading Description
Group Details
Name Lists the user group name
User Membership
Name Lists the names of all users
Typ e Lists the user’s membership status for each user group (Member or
Non-Member)
Membership Count Lists the number of groups in which each user holds membership
(users can belong to no more than 15 user groups)
Workspace Access
Name Lists the names of available Workspaces
Access Lists the access privileges for the selected user group
97
Page 98

Adding User Groups

To add a group account:
1. From the Management Console home page, click Groups in the System section.
The Groups page opens.
2. Click New.
The Create Group dialog box opens.
3. Type a user group name in the Name text box.
If there is already a user group with the name entered in the Name text box, an error message tells you to type a new name.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
4. (Option) In the User Membership list, select a user and click Member to make the user a member in the user group. Users can belong to no more than 15 user groups.
By default, new users are listed as “Non-Member” in the Type category for each user group. As a result, the Non-Member button is inactive until membership is set.
5. (Option) In the Workspace Access list, select a Workspace or click Select All to select all Workspaces, and do one of the following:
Managing User Groups
t Click Read to set read-only Workspace access for the user group.
t Click Read/Write to set both read and write Workspace access for the user group.
By default, access privileges for new user groups are listed as “None” in the Access category for each Workspace. As a result, the None button is inactive until access is set. (For information on permissions for Workspace access in the network, see
6. Click Apply.
7. (Option) Repeat steps 3 through 6 to create new user groups.
8. Click Close to close the Create Group dialog box and to return to the Groups dialog box.
The new user group appears in the Groups list.

Modifying User Groups

You can rename a user group account, change user membership, and modify Workspace access.
You can modify a client account at any time, even when it is being actively used in your work environment.
To modify a user group account:
1. From the Groups list, do one of the following:
t Select the user group account you want to modify, and click Details.
t Double-click the user group name.
“Setting Workspace Access Privileges” on page 80.)
The Details panel displays information about the selected user group account.
2. Modify the user group name as required.
If there is already a user group with the name entered in the Name text box, an error message tells you to type a new name.
For information on valid and invalid characters, see “Entering Text” on page 26.
n
98
Page 99
3. Modify user membership for the user group as required:
t Click Member to make the user a member in the user group.
t Click Non-Member to remove the user from the user group.
4. Modify Workspace access for the user group as required:
t Click None to remove Workspace access privileges for the user group.
t Click Read to set read-only Workspace access for the user group.
t Click Read/Write to set both read and write Workspace access for the user group.
For information on permissions for Workspace access in the network, see “Managing Workspace Access
Privileges” on page 80
5. (Option) Click Revert to undo any modifications made to the client information.
6. Click Apply.

Deleting User Groups

You can use the ISIS Management Console to delete any user group account.
To delete a user group account:

Managing LDAP Accounts

and “Setting Workspace Access Privileges” on page 80.
1. Ensure that the user group account to be deleted is not currently active.
2. From the Groups list, select the user group account you want to delete.
3. Click Delete.
A dialog box opens, prompting you to confirm that you really want to delete the user group.
4. Click OK.
Managing LDAP Accounts
LDAP (Lightweight Directory Access Protocol) is an Internet protocol that some applications use to look up information — such as account information, user names, and groups — from a server. The LDAP Sync tool allows ISIS administrators to synchronize ISIS user accounts with existing LDAP user accounts and to create and/or modify a large number of users and groups within the Avid ISIS system. The LDAP Sync tool lets you:
Display user accounts available within a given LDAP service but not in the ISIS system, and vice versa
Add new groups and users to the ISIS system
Grant user memberships to groups
Remove user membership from a group in ISIS if user no longer belongs to that group on the LDAP server
Users synchronized by the LDAP Sync tool will automatically be added as “Remote” users for authentication to the LDAP server
You can use the LDAP Sync Tool to search for groups and their users on an LDAP server, synchronize users and groups accounts by adding or removing users and/or groups from ISIS, generate a report of the account actions, and view a history of the synchronization activity. You must first configure a connection by entering the LDAP server’s fully qualified name, port, and user distinguished name and password for authentication.
Users imported by the LDAP Sync Tool cannot log into Avid ISIS server until it is configured for external
n
authentication. For more information about configuring external authentication, see “Configuring External
Authentication” on page 30.
99
Page 100
At this time, Avid ISIS currently only supports Microsoft Active Directory. ISIS might not be compatible with other
n
LDAP implementations.

Opening LDAP Sync Tool

You can use the LDAP Sync Tool to configure LDAP connections. If you have not previously configured a connection, you must enter the connection name and other information specific to the particular LDAP server.
All connection information is stored locally for the connecting user’s account. If you try to connect from a different
n
workstation or as another user, you have to re-enter the ISIS and LDAP login information.
To open LDAP Sync Tool:
1. Do one of the following:
t (Windows) From the Start menu select Avid >LDAPSyncTool > Avid LDAP Sync Tool.
t (Macintosh) Select Applications > Avid ISIS Tools > LDAP Sync Tool.
The Avid ISIS Login dialog box opens.
Managing LDAP Accounts
n
c
If the LDAP Sync tool is not installed, see “ISIS Toolbox” on page 123.
2. Type the following information in the appropriate text boxes:
Field Value
Hostname Fully qualified name of the LDAP server to which you are connecting
Password Connecting user’s LDAP password.
Contact your IT administrator to obtain your LDAP login information. Three failed connection attempts might result in your LDAP user account being disabled.
3. Click Connect.
- If this is the first time using this tool, the LDAP Group Selection window opens. For more information
about using the LDAP Group Selection window, see
page 102
- If the tool has been used before on this workstation, the main window opens.
.
“Synchronizing LDAP and ISIS Accounts” on
100
Loading...