Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
This product is subject to the terms and conditions of a software license agreement provided with the software. The product may
only be used in accordance with the license agreement.
Avid ISIS products or portions thereof are protected by one or more of the following United States Patents: 6,374,336; 6,415,373;
6,449,688; 6,760,808; 6,785,768; 7,111,115; 7,487,309; 7,660,947, 7,844,775. Other patents are pending.
Avid products or portions thereof are protected by one or more of the following European Patents: 1040419; 1770508.
Other patents are pending.
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This document is protected under copyright law. An authorized licensee of Avid ISIS 7000 may reproduce this publication for the
licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in part, for
commercial purposes, such as selling copies of this document or providing support or educational services to others. This document
is supplied as a guide for Avid ISIS 7000. Reasonable care has been taken in preparing the information it contains. However, this
document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. does not accept
responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without
notice.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is
hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the
software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or
publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE,
INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are
duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and
use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be
used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS
PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
2
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice
appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice
appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the
above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting
documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to distribution of the software
without specific, written prior permission. Daniel Dardailler makes no representations about the suitability of this software for any
purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire
notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the
supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR,
NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code
equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable
for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or operation of
reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect, special or
consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products or the
software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised,
knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with
respect to its merchantability or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by
Videomedia, Inc. and V-LAN ver. 3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this
software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source
Code:
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection
with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or
“commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf of a
unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms of the
License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
Trademarks
003, 192 Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant
Station, AudioPages, AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid
DNxHD, Avid DS Assist Station, Avid Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote
Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID, AvidShare, AVIDstripe, AVX, Axiom, Beat Detective, Beauty
Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Boom, Bruno, C|24, CaptureManager, ChromaCurve,
ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|24, Command|8, Conectiv,
Control|24, Cosmonaut Voice, CountDown, d2, d3, DAE, Dazzle, Dazzle Digital Video Creator, D-Command, D-Control, Deko,
DekoCast, D-Fi, D-fx, Digi 003, DigiBase, DigiDelivery, Digidesign, Digidesign Audio Engine, Digidesign Development Partners,
Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet, DigiRack, DigiSerial,
DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange,
DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase,
Expander, ExpertRender, Fader Pack, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame
Chase, FXDeko, HD Core, HD Process, HDPack, Home-to-Hollywood, HYBRID, HyperControl, HyperSPACE, HyperSPACE
HDCAM, iKnowledge, Image Independence, Impact, Improv, iNEWS, iNEWS Assign, iNEWS ControlAir, Instantwrite, Instinct,
Intelligent Content Management, Intelligent Digital Actor Technology, IntelliRender, Intelli-Sat, Intelli-sat Broadcasting Recording
Manager, InterFX, Interplay, inTONE, Intraframe, iS Expander, ISIS, IsoSync, iS9, iS18, iS23, iS36, ISIS, IsoSync, KeyRig,
KeyStudio, LaunchPad, LeaderPlus, LFX, Lightning, Link & Sync, ListSync, LKT-200, Lo-Fi, Luna, MachineControl, Magic Mask,
Make Anything Hollywood, make manage move | media, Marquee, MassivePack, Massive Pack Pro, M-Audio, M-Audio Micro,
Maxim, Mbox, Media Composer, MediaFlow, MediaLog, MediaMatch, MediaMix, Media Reader, Media Recorder, MEDIArray,
MediaServer, MediaShare, MetaFuze, MetaSync, MicroTrack, MIDI I/O, Midiman, Mix Rack, MixLab, Moviebox, Moviestar,
MultiShell, NaturalMatch, NewsCutter, NewsView, Nitris, NL3D, NLP, Nova, NRV-10 interFX, NSDOS, NSWIN, Octane, OMF, OMF
Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Ozone, Ozonic, Painterly Effects, Palladium,
Personal Q, PET, Pinnacle, Pinnacle DistanTV, Pinnacle GenieBox, Pinnacle HomeMusic, Pinnacle MediaSuite, Pinnacle Mobile
Media, Pinnacle Scorefitter, Pinnacle Studio, Pinnacle Studio MovieBoard, Pinnacle Systems, Pinnacle VideoSpin, Podcast Factory,
PowerSwap, PRE, ProControl, ProEncode, Profiler, Pro Tools LE, Pro Tools M-Powered, Pro Transfer, Pro Tools, QuickPunch,
QuietDrive, Realtime Motion Synthesis, Recti-Fi, Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, Reprise, Res Rocket
Surfer, Reso, RetroLoop, Reverb One, ReVibe, Revolution, rS9, rS18, RTAS, Salesview, Sci-Fi, Scorch, Scorefitter, ScriptSync,
SecureProductionEnvironment, Serv|LT, Serv|GT, Session, Shape-to-Shape, ShuttleCase, Sibelius, SIDON, SimulPlay,
SimulRecord, Slightly Rude Compressor, Smack!, Soft SampleCell, Soft-Clip Limiter, Solaris, SoundReplacer, SPACE, SPACEShift,
SpectraGraph, SpectraMatte, SteadyGlide, Streamfactory, Streamgenie, StreamRAID, Strike, Structure, Studiophile, SubCap,
Sundance Digital, Sundance, SurroundScope, Symphony, SYNC HD, Synchronic, SynchroScope, SYNC I/O, Syntax, TDM
FlexCable, TechFlix, Tel-Ray, Thunder, Titansync, Titan, TL Aggro, TL AutoPan, TL Drum Rehab, TL Everyphase, TL Fauxlder, TL In
Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, tools for storytellers, Torq, Torq Xponent, Transfuser, Transit, TransJammer,
Trigger Finger, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Velvet, Video the Web Way, VideoRAID, VideoSPACE, VideoSpin,
VTEM, Work-N-Play, Xdeck, X-Form, Xmon, XPAND!, Xponent, X-Session, and X-Session Pro are either registered trademarks or
trademarks of Avid Technology, Inc. in the United States and/or other countries.
Apple, Macintosh, and Safari are either registered trademarks or trademarks of Apple Computer, Inc., registered in the U.S. and
other countries. HP is a registered trademark of Hewlett-Packard Company. Intel is a registered trademark of Intel Corporation. Java
is a trademark of Sun Microsystems in the United States and/or other countries. Kingston is a registered trademarks of Kingston
Technology Corporation. All other marks may be the property of their respective titleholders. Windows is either a registered
trademark or trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks contained herein
are the property of their respective owners.
Avid ISIS 7000 Administration Guide •0130-30623-01 Rev. B• July 2011 • Created 7/27/11
The Avid ISIS® media network provides a high-performance distributed file system that contains
high-capacity shared media storage for workgroups of connected Avid
The documentation describes the features and hardware of all models. Therefore, your system
n
might not contain certain features and hardware that are covered in the documentation.
Who Should Use This Guide
This administration guide is intended for system administrators responsible for the setup and
day-to-day management of an Avid ISIS media network, as well as for users who need to access
Workspaces on the network. You should have a basic understanding of how to use and manage
the Windows
workgroup and network concepts.
®
operating system and Mac OS® X systems, and you should be familiar with basic
Symbols and Conventions
Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
A note provides important related information, reminders,
recommendations, and strong suggestions.
®
editing workstations.
c
w
>This symbol indicates menu commands (and subcommands) in the
A caution means that a specific action you take could cause harm to
your computer or cause you to lose data.
A warning describes an action that could cause you physical harm.
Follow the guidelines in this document or on the unit itself when
handling electrical equipment.
order you select them. For example, File > Import means to open the
File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list
indicate that you perform one of the actions listed.
Symbol or Convention Meaning or Action
(Windows), (Windows
only), (Macintosh), or
(Macintosh only)
Bold fontBold font is primarily used in task instructions to identify user interface
Italic fontItalic font is used to emphasize certain words and to indicate variables.
Courier Bold font
Ctrl+key or mouse actionPress and hold the first key while you press the last key or perform the
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It
is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation
was published:
-If the latest information for your Avid product is provided as printed release notes,
they are shipped with your application and are also available online.
This text indicates that the information applies only to the specified
operating system, either Windows or Macintosh OS X.
items and keyboard sequences.
Courier Bold font identifies text that you type.
mouse action. For example, Command+Option+C or Ctrl+drag.
14
-If the latest information for your Avid product is provided as a ReadMe file, it is
supplied on your Avid installation CD or DVD as a PDF document
(README_product.pdf) and is also available online.
You should always check online for the most up-to-date release notes or ReadMe
because the online version is updated whenever new information becomes
available. To view these online versions, select ReadMe from the Help menu, or visit
the Knowledge Base at www.avid.com/readme.
3. Check the documentation that came with your Avid application or your hardware for
maintenance or hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/onlinesupport. Online services are
available 24 hours per day, 7 days per week. Search this online Knowledge Base to find
answers, to view error messages, to access troubleshooting tips, to download updates,
and to read or join online message-board discussions.
Accessing the Online Documentation
Accessing the Online Documentation
The Avid ISIS online documentation contains all the product documentation in PDF format. You
can access the documentation in the top-level AvidISISDocumentation folder on the Avid ISIS
installer DVD.
The documentation describes the features and hardware of all models. Therefore, your system
n
might not contain certain features and hardware that are covered in the documentation.
To access the online documentation from the installer DVD-ROM:
1. Insert the Avid ISIS installer DVD-ROM into the drive.
2. Navigate to the [DVD drive]:\.AvidISISDocumentation folder, and double-click the PDF file
for the document you want to view.
Avid Training Services
Avid makes lifelong learning, career advancement, and personal development easy and
convenient. Avid understands that the knowledge you need to differentiate yourself is always
changing, and Avid continually updates course content and offers new training delivery methods
that accommodate your pressured and competitive work environment.
For information on courses/schedules, training centers, certifications, courseware, and books,
please visit www.avid.com/support and follow the Training links, or call Avid Sales at
800-949-AVID (800-949-2843).
15
1Using the Avid ISIS 7000 Management
Console
The Avid ISIS Management Console allows you to access administration functions from any
system that has an Ethernet connection to the System Director, as well as from the System
Director itself.
c
Performing administrative functions on more than one Administration site at the same
time can cause unexpected results.
When you access the Avid ISIS Management Console, the Login dialog opens, and the site
prompts you to supply a user name and password to log in. If you type the wrong password, an
error message appears and the Login dialog box reappears.
When you first install the Avid ISIS software, the login password is blank by default. To set a
n
password for the administrator, follow the procedure described in “Changing the Administrator
Password” on page 33.
Regular users can log in to the Management Console, but they will have limited access to the
Management Console interface. They can also view certain information about the network
through the Client Manager. For more information about the Client Manager, see the Avid ISIS
Client Manager Help or the Avid ISIS 7000 Quick Start Card.
Before Performing Administrative Functions
It is critical that clients unmount Workspaces when you do the following:
•Stopping and restarting the System Director (unmount all Workspaces)
•Rebooting the System Director (unmount all Workspaces)
•Changing users’ or user groups’ access (unmount only the affected Workspaces)
c
If a client is using a Workspace when the ISIS system is taken offline, the connection to the
Workspace is broken and data might be lost.
Opening the Avid ISIS Management Console
Opening the Avid ISIS Management Console
The Avid ISIS Management Console runs within a web browser window. The following web
browsers have been qualified for use with the Management Console:
•Microsoft Windows — Microsoft Internet Explorer, v6.x and newer
•Apple Macintosh OS X — Safari, v3.2 and newer
To open the Management Console as Administrator:
1. Open your web browser.
2. In the address bar of your browser, type the address of the active System Director:
https://[
The active System Director host name is one of the following:
-The System Director Windows host name.
-A host name which has been assigned to the active System Director on your network
DNS server(s).
Check with your network administrator if you are unsure of which System Director name to
use.
When you enter the System Director address, if any Web site certification warnings open,
click Yes to accept the certificate. If you are not sure about the security requirements of your
media network, see your network administrator.
The Login dialog box for the ISIS Management Console opens. The “Username” field is
automatically populated with the Administrator username.
3. Type your password.
For information on changing the administrative password, see “Changing the Administrator
Password” on page 33.
4. Click the Login button (arrow icon).
The Avid ISIS Home page opens.
To log out of the ISIS Management Console:
tClick the Logout button, located in the upper right corner of the screen.
System Director host name
]:5015
17
1 Using the Avid ISIS 7000 Management Console
qwe
r
t
q
w
e
Understanding the ISIS Management Console
Interface
The ISIS Management Console, which you can run on the System Director or on any
Ethernet-attached client, has a user interface where controls are grouped by function and are
displayed by clicking the appropriate icons.
To use the ISIS Management Console, you need to have Adobe® Flash® Player installed on
n
your system.
Non-Administrator users will see a subset of the tools available to Administrators,
n
depending on access privileges.
Navigation toolbar—Access Management Console tools and bread crumb navigation. See
“Navigation Toolbar” on page 19.
Tools area links—Click to go to the respective tool pages. See “Main Tools Area” on page 25.
System at a Glance toolbar—Provides a snap shot view of several aspects of the Avid ISIS
system. See “System at a Glance Toolbar” on page 19.
18
Logout button—Ends the Management Console session and logs the user out of the system. See
r
t
e
w
q
q
w
e
“Opening the Avid ISIS Management Console” on page 17.
Session counter—Displays the time remaining in the current Management Console session. See
“Session Counter” on page 24.
Navigation Toolbar
The navigation toolbar provides several items to help you navigate through the Management
Console interface.
Understanding the ISIS Management Console Interface
Breadcrumb navigation links help you keep track of where you are in the menu structure.
Additionally, the breadcrumb links also provide their own pop up menus if that menu level
contains more than one link.
Related links—Management Console tools that are related to the one you are currently using are
provided when relevant.
Pop up navigation menu—quick navigation directly to any of the links provided on the
Management Console home page.
System at a Glance Toolbar
The System at a Glance toolbar, located in the upper right corner of the Avid ISIS Management
Console, contains seven icons with drop down menus that give you a snapshot view of the Avid
ISIS system. These icons allow you to access additional information about your system and to
perform certain administrative tasks, such as monitoring and logging.
The System Overview Toolbar is available from the Login window, even if you are not logged in
n
to the Management Console, but you have to log in to follow links from the tool bar screens, such
as the log files.
19
1 Using the Avid ISIS 7000 Management Console
The Status menu provides a quick summary of the system director status as well as a link to
the system logs.
IconMeaning
Green—System status is normal.
White—Information notification.
Blue—One or more ISIS components are updating.
20
Yellow—One or more ISIS components are in a warning state.
Red—One or more ISIS components are in an error state.
Understanding the ISIS Management Console Interface
The Performance menu provides a summary of the following information:
•Messages Per Second
•Megabytes Per Second
•Number of open files during the current session by a graph display
21
1 Using the Avid ISIS 7000 Management Console
The Details menu provides a summary of the following system details information:
•Total number of Storage Blades, how many are connected, active, available, and so on.
•System capacity, and availability
•Storage Group count, capacity and available space
•Workspace count, allocation, and available space
•The number of folders/files, the space used, and available
22
The System menu provides a summary of the following information:
•Server State
•Status mode (Active if the System Director is running)
•Virtual and System name
•Enabled options
•Port number
•Software version number
•Licensing information
•Memory
•Interface IP addresses
Understanding the ISIS Management Console Interface
The Metadata menu provides a summary of the Metadata information:
The Failover menu provides information on whether Failover is enabled.
23
1 Using the Avid ISIS 7000 Management Console
The Help Links menu provides links to Avid ISIS online help as well as the complete set of
PDF documents.
This information is also available in the System Director Control Panel. For more
n
information, see “Avid ISIS 7000 System Director Control Panel” on page 172.
Session Counter
The user session will time out automatically after two hours of inactivity, after which the
user will need to log in again to continue working. The session counter, located in the upper
right corner of the Management Console, displays the time remaining in the user session.
24
The counter is automatically reset to two hours when a link is clicked, or an action is
performed such as adding or deleting a Workspace. The counter can also be reset manually.
To manually reset the session counter:
tClick the session counter display.
The session timer is reset to two hours.
Main Tools Area
The ISIS Management Console main area is divided into the following sections:
•The System section, which allows you to set up and administer Storage Groups and view and
manage Workspaces.
•The Hardware section, which contains the tools used for performing basic hardware
functions, monitoring bandwidth usage and system and connection status.
•The Tools section, which contains links to a various software tools for monitoring and
managing.
•The Advanced section, which allows you to set system preferences, perform logging
functions, and update software.
The tool link icons use several visual cues to inform you of the type of tool you are opening:
•Each icon contains a brief description of the tool you are launching.
•Icons containing a coffee cup icon open a Java WebStart tool
•Icons that lead to sub menus contain a small sub-menu icon in the upper right corner of the
title bar. The icon body also contains text links to the items in the sub menu.
Organizing Display Information
Organizing Display Information
You can customize the Main display area for any option by moving and hiding columns, and by
sorting and filtering information.
For detailed descriptions of these procedures, see the following topics:
•“Moving and Rearranging Columns” on page 25
•“Showing and Hiding Columns” on page 26
•“Sorting Information” on page 26
•“Filtering the Display” on page 27
Moving and Rearranging Columns
To move a column in the Main display area:
tClick and drag any column to the position you want, and release the mouse button.
The column appears in the new position, and columns to the right are moved to make room.
25
1 Using the Avid ISIS 7000 Management Console
Showing and Hiding Columns
When you open an option (for example, the Storage Elements option), the Main display area
lists items in default columns. Depending on the option selected, there might be other
headings available to view. You can select individual or multiple column headings to be
displayed or hidden.
To show or hide column headings:
tSelect one of the options, right-click in the column heading row and select a heading
you want to show or hide.
Displayed column headings are marked by a bullet symbol (•). You cannot hide the first
column on the left of the Main display area (usually the Name column).
Sorting Information
The ISIS Management Console interface allows you to sort information listed in the Main
display area, or in the Details area. Sorting the information in columns arranges items in
either numerical or alphabetical order. You can also perform a multilevel sort of the
displayed information.
To sort information:
tSelect an option, and click the column heading for the category of information you want
to sort.
The information is sorted in ascending order. To reverse the sort order, click the column
heading again.
To perform a multilevel sort:
1. Select an option, and click the column heading for the first category of information you
want to sort.
The items in the column are sorted in ascending order.
26
2. Click a second column.
ytrewqu
q
w
e
r
t
y
u
The items in the second column are sorted in ascending order. The items in the first column
maintain their sort order, but with a lower priority than the second sort.
3. (Option) Click multiple columns to add levels to the sort. To cancel a multilevel sort, click a
column heading that has already been sorted.
Filtering the Display
You can limit the items listed in the Main display area by setting Filter parameters. Filtering the
display allows you to focus on only those items that you want to monitor. You can restore all
items to the display by clearing the Filter parameters.
Category menu—Select the category to filter
Filtering the Display
“Not” operator—Select to exclude items matching the filter rules from the search results
Condition menu—Select the filter condition
Search term field—Type the text or value to filter
Filter button—Perform the filter operation
Clear button—Clear the filter settings
Filter results counter—Displays the number of filtered results on the page, and in total
You cannot filter the display for the Bandwidth, Connection Status, and Preferences options.
n
27
1 Using the Avid ISIS 7000 Management Console
To filter the display:
1. Select a category from the Category menu.
The Category menu lists all of the column headings available for the selected Command
menu option.
2. (Option) Select “Not” to exclude the items matching the filter rules from the search
results.
3. Click the Condition menu and select the filter condition you want to use.
4. In the Filter text box, type the text or value you want to use to filter the display.
5. Click Filter.
The Main display area updates to display the filtered results. The Filter area displays the
number of filtered items displayed and the total number of items available for display.
To restore all items to the display:
tClick Clear.
The Main display area updates to display all items.
Updating Information
28
You can update onscreen information to reflect recent system changes by clicking the
Refresh button. You can also use Auto refresh to automatically refresh information at timed
intervals, and prevent you session from timing out.
This setting persists between Management Console sessions, but not browser sessions. If you
n
close the browser application, Auto refresh will revert to the default (disabled) setting.
To enable Auto refresh:
tSelect the check box next to the Refresh button.
Auto refresh mode is enabled, and a message is displayed.
While Auto refresh mode is enabled, other functions such as add, delete, and details are not
n
available.
To disable Auto refresh:
tSelect the check box next to the Refresh button.
Auto refresh mode is disabled, and the confirmation message closes.
Selecting Items and Performing Actions
Selecting Items and Performing Actions
You can select multiple items in most Management Console tool windows. The methods for
selecting more than one item in a list are similar to those used in Windows Explorer or the
Macintosh Finder.
The following table summarizes the methods for selecting items and performing actions.
ActionsSelection Method
To select an itemSingle click the item.
To select multiple, non-contiguous items Ctrl+click each item you want to select.
To select multiple, contiguous itemsClick the first item, then Shift+click on the last item.
Context Menus
Most Management Console tool windows offer context menus you can use to perform
commands on selected items.
To access context menus within the Management Console:
tRight-click (Windows) or Ctrl+click (Macintosh) selected items.
29
1 Using the Avid ISIS 7000 Management Console
Entering Text
The following are guidelines for entering text in Management Console tool text fields:
•Names can be a maximum of 32 characters in length.
•You should not include a space in the name fields.
•You should not use a period (.) as either the first or last character in the names you
create.
•You should not include non-permitted characters in the name fields.
The following table summarizes characters that are not permitted in text fields in the
Management Console name text fields:
CharacterName
^Circumflex accent
\Blackslash
/Forward slash
:Colon
*Asterisk
?Question mark
"Double quotation mark
<Less-than sign
>Greater-than sign
|Vertical line
[Left square bracket
]Right square bracket
+Plus sign
=Equals sign
;Semicolon
,Comma
@Commercial At symbol
30
Accessing the Help System
You can get comprehensive task-oriented, background, and reference information through the
ISIS Management Console Help.
To open the Help:
tClick the Help button.
The Help sub-menu appears with a list of help document links.
Help links will open in a separate window. PDF documents might open in an external
n
application, depending on your browser configuration.
Accessing the Help System
31
2Configuring the Management Console
Avid ISIS provides a number of tools to customize the way the Management Console functions
and interacts with the network and other Avid products.
Configuring ISIS Preferences
The Preferences tool allows you to set parameters that apply to the basic functionality of the ISIS
Management Console.
To set Management Console Preferences:
1. From the Management Console home page, do one of the following:
tClick Preferences in the ISIS Setup icon, located in the Advanced section.
tClick ISIS Setup in the Advanced section, then click Preferences in the ISIS Setup page.
tClick ISIS Setup in the pop up navigation menu, then click Preferences in the ISIS
Setup page.
The Preferences tool opens.
2. Configure ISIS preferences. The following table summarizes the ISIS Preferences items:
OptionTypeDescription
Total System Bandwidth
(MB/sec)
Default Bandwidth for Auto
Created Devices (MB/sec)
text
(numeric)
text
(numeric)
Total reservation bandwidth allowed by the system, in
MB/sec. Default value is 1,000 MB/sec. When this value
has been reached, ISIS will no longer accept bandwidth
reservations from clients.
This value does not represent the actual bandwidth
n
capabilities of the ISIS system.
Reservation bandwidth allowed for devices that are
automatically created at connection time. Default value is
0 (unlimited).
Changing the Administrator Password
OptionTypeDescription (Continued)
Force Manual Device
Creation
The following options should only be altered under the direction of qualified Avid service
c
or support personnel.
Default LCT Threshold (ms) text
Default Hard Disk Error
Threshold
Enable failover if standby has
more active NICS
Auto Remove Redistribution
on Disk Failure
check box If enabled, clients which do not have an entry in the
Devices list will not be allowed to connect. The
Administrator must manually create a device account for
every client computer that is expected to connect to the
ISIS system. Default value is disabled.
Defines the upper limit of the Long Command Time
(numeric)
text
(numeric)
check box Default value is enabled.
check box Default value is enabled. For more information about Auto
(LCT) value, above which the Storage Element will report
a Network Degraded condition to the System Director.
Default value is 0 (default, 750ms).
Defines the upper limit for number of hard disk errors
before the Storage Element reports a Disk Failure
condition to the System Director Default value is 0
(default, 25 errors).
Remove Redistribution, see “Automatic Redistribution on
Disk Failure” on page 69.
3. (Option) To revert all options to the previously saved values, click the Refresh button.
4. Click the Save Preferences button to save your changes.
Changing the Administrator Password
The Management Console Administrator password is blank by default; it is highly recommended
that you set an Administrator password when you use the Management Console for the first time.
To change the Administrator password:
1. From the Management Console home page, do one of the following:
tClick Change Password in the ISIS Setup icon, located in the Advanced section.
tClick ISIS Setup in the Advanced section, then click Change Password in the ISIS Setup
page.
tClick ISIS Setup in the pop up navigation menu, then click Change Password in the ISIS
Setup page.
The Change Password tool opens.
33
2 Configuring the Management Console
2. Type the current Administrator password in the Current Password field.
The Administrator password is blank by default.
n
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Change.
-The Administrator Password is changed to the new value.
-A confirmation message will appear in the Results area.
Configuring External Authorization
Users added to the system via the LDAP Sync Tool are automatically configured as remote
users in the ISIS system. When a remote user logs into the ISIS system, ISIS checks with an
external LDAP server to authenticate the user instead of the local ISIS user database. Before
remote users can access the ISIS system, you must configure ISIS to use an external LDAP
server for authentication.
For more information on working with LDAP users and groups, see “Managing LDAP
Accounts” on page 112.
34
To configure ISIS for external authorization:
1. Open the ISIS Management Console (see “Opening the Avid ISIS Management
Console” on page 17).
2. Click the ISIS Setup icon from the Advanced Area.
The ISIS Setup window opens.
3. Click the External Authorization icon from the Service Setup area.
The External Authorization tool opens.
4. Click the Enable check box to select it.
The Domain Name text box becomes active.
5. In the Domain Name text box, enter the domain name of the network which the LDAP
server(s) are members of, including subdomains, if applicable.
Use the format subdomain.domain.top-level-domain; for example:
dir.company.com
6. Click the “Server 0” check box to select it.
The Address text box becomes active.
Starting and Stopping the ISIS Interplay Health Monitoring Service
7. In the Address text box, enter the fully-qualified domain name of the LDAP server.
Use the format servername.subdomain.domain.top-level-domain; for example:
server1.dir.company.com
8. (Option) Repeat this procedure (using the “Server 1” and “Server 2” check boxes) to
configure additional backup LDAP servers, if applicable.
All of the LDAP servers must be mirrors, and reside on the same subdomain/domain.
n
9. When you have finished entering server information, click the Submit button.
The domain and LDAP server information is added to the ISIS database, and a confirmation
message is displayed in the Results area.
Starting and Stopping the ISIS Interplay Health
Monitoring Service
The ISIS Interplay Health Monitoring Service allows you to view the health of the Avid
workgroup network at a glance using the Avid Interplay Health Monitor.
The Avid Interplay workgroup environment uses asset management applications to access and
organize media assets stored in the Avid ISIS system. Interplay utilizes the media assets within
the Avid ISIS media network.
The Health Monitor displays a variety of information provided by each of the registered Avid
components on your media network and notifies you with a warning or critical indication if a
component goes beyond its normal operating range. Different Avid services can supply custom
health information to the monitor tailored to their specific functionality.
If your media network has a failover configuration, you must enable the Health Monitoring
Service on both the active System Director and the standby System Director.
For more information on the Avid Interplay Health Monitor, see the Avid Interplay Framework User’s Guide.
To configure the Interplay Health Monitoring Service:
1. Open the ISIS Management Console (see “Opening the Avid ISIS Management Console” on
page 17).
2. Click the ISIS Setup icon from the Advanced Area.
The ISIS Setup window opens.
3. Click the Interplay Health Monitor icon from the Service Setup area.
The Interplay Health Monitoring Status tool opens.
4. Select or deselect Enable the ISIS Interplay Health Monitoring Service.
35
2 Configuring the Management Console
5. Type the name of the workgroup your system is configured to monitor in the Interplay
Workgroup Name text box.
6. Click Submit.
The service starts or stops, depending on the current status.
To configure the Interplay Health Monitoring Service in a failover configuration:
1. On the active System Director, open the ISIS Management Console, and click the
System tab.
The System window opens.
2. Select System Director > Interplay Health Monitoring.
The Interplay Health Monitoring Status dialog box opens.
3. Select Enable the ISIS Interplay Health Monitoring Service.
4. Type the name of the workgroup your system is configured to monitor in the Interplay
Workgroup Name text box.
5. Click Submit.
The service starts on the active System Director.
6. From the active System Director desktop, select Start > Programs > Avid Unity ISIS
System Director > System Director Control Panel.
The System Director Control Panel opens.
7. Click the System Director Status tab, and press the Stop System Director button.
The active System Director stops, and the standby System Director becomes active.
8. On the newly-active System Director desktop, repeat steps 1 through 5.
9. (Option) If you want to return the failover configuration to its original state, repeat steps
6 and 7 to return the System Directors to their original status.
Configuring the Notification Service
You can use the Notification Service tool to configure System Director to notify you when
problems occur. An error notification service regularly polls the client log file and, if any
errors are logged, sends a concise summary of those errors to one or more e-mail accounts.
36
Configuring the Notification Service
The Notification Service Control tool window is divided into three main sections:
•Service Configuration–Start and stop the Notification Service, and configure the
Notification Service settings.
•ISIS SubCode Configuration–Modify the parameters that define when email notifications
are sent to email recipients.
•Contact Configuration–Add and modify email recipients.
Starting, Stopping, and Configuring the Notification Service
The configuration information for the notification service (SMTP information, contacts, and
filters) is currently stored in the registry on the System Director. This information is not currently
replicated to the failover server, so you need to enter configuration information for notification
service on both System Directors.
To configure the Notification Service:
1. From the Management Console home page, do one of the following:
tClick Notification Service in the ISIS Setup icon, located in the Advanced section.
tClick ISIS Setup in the Advanced section, then click Notification Service in the ISIS
Setup page.
tClick ISIS Setup in the pop up navigation menu, then click Notification Service in the
ISIS Setup page.
The Notification Service tool opens.
2. Click the Enable Service check box to toggle between checked and cleared.
tIf the check box is checked, the Notification Service is enabled.
tIf the check box is cleared, the Notification Service is disabled.
3. (Option) configure the Notification Service settings. The following table summarizes the
Notification Service settings:
OptionTypeDescription
SMTP ServertextThe IP address or host name of your SMTP server.
SMTP Porttext
(numeric)
Poll Frequency
(seconds)
Return AddresstextThe e-mail address of the Avid ISIS administrator or other
text
(numeric)
The port number of your SMTP server. The default value (25) is
appropriate in most instances.
The frequency (in seconds) with which the error notification
service checks for problems.
primary contact for the error notification service.
37
2 Configuring the Management Console
4. (Option) To test the configuration settings, click the Test Service button.
The results of the service test are displayed in the Results area.
5. Click Save Settings.
-A confirmation message is displayed in the Results area.
-If you started or stopped the Notification Service, the Service State will change to
reflect the new service state.
Configuring Error Notification Parameters
The ISIS SubCode Configuration area of the Notification Service tool window allows you to
specify the type of error message that triggers an e-mail notification and to set parameters
for each type of error message—Error, Information, and Warning messages.
You can configure the ISIS SubCodes to send notification emails for all events of one or
more error types, or for more granular control you can specify both which SubCode events
and which severity levels generate notifications.
For a complete list of Avid ISIS email notifications, see “Avid ISIS E-mail Notification List”
on page 217.
To configure error notification parameters:
1. From the Management Console home page, do one of the following:
tClick Notification Service in the ISIS Setup icon, located in the Advanced section.
tClick ISIS Setup in the Advanced section, then click Notification Service in the
ISIS Setup page.
tClick ISIS Setup in the pop up navigation menu, then click Notification Service in
the ISIS Setup page.
The Notification Service tool opens.
2. Do one of the following:
tTo select or deselect all Sub Codes, click the check box next to the error notification
type.
tTo select or deselect individual SubCodes, click the check boxes corresponding to
the Sub Codes in the error notification type columns.
3. Click the Save Settings button.
The settings are saved, and a confirmation message is displayed in the Results area.
38
Configuring Contact Information
You must specify the contact information for all the people you want to receive ISIS notification
emails.
To add contacts:
1. From the Management Console home page, do one of the following:
tClick Notification Service in the ISIS Setup icon, located in the Advanced section.
tClick ISIS Setup in the Advanced section, then click Notification Service in the ISIS
Setup page.
tClick ISIS Setup in the pop up navigation menu, then click Notification Service in the
ISIS Setup page.
The Notification Service tool opens.
2. In the Contact Configuration section, click New.
Empty “User Name” and Email fields open.
3. Type a user name into the “User Name” field.
This can be any name you want to assign to the user.
Configuring the Notification Service
4. Type a valid email address into the Email field.
5. (Option) Repeat this procedure to add more email contacts.
6. Click Save Settings.
A confirmation message is shown in the Results section.
To remove a contact:
tClick the Delete button next to the email contact entry.
The contact is removed from the list.
39
3Managing Avid ISIS 7000 Hardware
tr
e
wq
This chapter describes how to configure and manage your storage hardware. You perform all
storage management operations from the Avid ISIS Management Console, which allows you to
add, remove, configure, and manage your Storage Elements.
For an overview of the ISIS Management Console and information about how to start the tool,
n
see “Opening the Avid ISIS Management Console” on page 17.
Managing Storage Elements
The Storage Elements tool allows you to add and remove Storage Elements, upgrade the Storage
Element software, and monitor Storage Element operation.
Action button toolbar—Perform actions on selected Storage Elements
q
w
e
r
t
Details area—Detailed information on the selected Storage Elements; see “Viewing Storage
Element Details” on page 43, and “Storage Element Details” on page 43
Storage Elements list—Lists all configured Storage Elements and related information; see
“Storage Element Descriptions” on page 41.
Filter area—Filter the Storage Elements list display based on conditions you configure; see
“Filtering the Display” on page 27
IP addresses list—Displays the IP addresses of the selected Storage Elements
Storage Element Descriptions
The following table summarizes the basic information available when you first open the Storage
Elements list. Some columns are hidden by default (see “Showing and Hiding Columns” on
page 26 and “Storage Element Details” on page 43).
Managing Storage Elements
HeadingDescription
NameDisplays the system-created name of each Storage Element connected to the
system
ISB NameDisplays the computer name of each Storage Element connected to the system
Status TimeLists the last time the System Director logged the Storage Element’s status
StatusDisplays any change in the working status logged by the System Director (for a
description of status messages, see “Storage Element Status” on page 45)
Up TimeDisplays the length of time that the Storage Element has been running
continuously
TypeDisplays the Storage Element category of each Storage Element (see “Storage
Element Details” on page 43):
•Available
•Spare
•Active
UsedDisplays the amount of storage space in gigabytes (GB) in use by each Storage
Element
41
3 Managing Avid ISIS 7000 Hardware
HeadingDescription (Continued)
Storage GroupDisplays the Storage Group, if any, to which the Storage Element is allocated
CapacityDisplays the storage capacity in gigabytes (GB) of each Storage Element
Chunk sizeDisplays the size of segmented media files sent over the network
ProtectionDisplays the type of protection applied
Domain IDDisplays the domain ID number of the Management Domain (stack) for each
engine (chassis) in which the Storage Element is part of.
Domain ID numbers are not displayed until the Storage Elements are
n
bound.
VersionDisplays the software version number of each Storage Element
Serial NumberDisplays the identification number of each Storage Element
Crate SerialDisplays the identification number of the unit that holds each Storage Element
Slot NumberDisplays the slot number of each Storage Element
You can organize the information in the Storage Elements list by showing additional
n
columns or by sorting or filtering displayed items. For more information on modifying the
display, see “Organizing Display Information” on page 25.
42
A color-coded icon precedes the name of each Storage Element, providing an indication of
the status of the component. The following table describes the color coding system used by
the ISIS Management Console.
Icon ColorDescription
WhiteIndicates the status of the Storage Element is Available (the Storage Element is not
linked to the ISIS file system)
GreenIndicates the status of the Storage Element is either Spare (the Storage Element is
not allocated to a Storage Group) or Active (allocated to a Storage Group)
YellowIndicates one of the following:
•a problem with the Storage Element
•the Storage Element experiences degraded performance due to a reboot during
an upgrade operation
BlueIndicates that an installation or software upgrade is in progress
Icon ColorDescription (Continued)
RedIndicates a Storage Element problem, including any of the following:
•a hardware error
•a failed software installation or upgrade
•a Storage Element disconnected due to a reboot during an upgrade operation
Viewing Storage Element Details
The Details area displays all information for the currently selected Storage Element. The
information displayed is the information as seen by the System Director. Some of the
information is embedded in the Storage Element, and other information is assigned to the
Storage Element by the Avid ISIS software.
You can view more detailed information on Storage Elements by using the Avid ISIS Agent tool.
n
For more information, see “Avid ISIS 7000 Storage Blade Agent” on page 185.
To view information about a Storage Element:
1. In the Storage Elements list, select a Storage Element.
Managing Storage Elements
2. Do one of the following:
tClick the Details button.
tDouble-click the Storage Element name.
The Details area displays all the information for the selected Storage Element. For more
information, see “Storage Element Details” on page 43.
To hide the Details area:
tClick the arrow next to the Storage Element Details title bar.
To close the Details area:
tClick the Close button.
Storage Element Details
The following table summarizes the information available in the Details area.
HeadingDescription
NameDisplays the system-created name of the selected Storage Element
ISB NameDisplays the computer name of the selected Storage Element
43
3 Managing Avid ISIS 7000 Hardware
HeadingDescription (Continued)
Status TimeLists the last time the System Director logged the Storage Element’s status
StatusDisplays any change in the working status logged by the System Director. For a
description of status messages, see “Storage Element Status” on page 45.
Up timeDisplays the length of time that the Storage Element has been running
continuously
TemperatureDisplays the last logged temperature of the Storage Element
TypeDisplays the Storage Element category of the selected Storage Element:
•Available—Indicates Storage Elements that are available for use but have not
yet been added to a Storage Group.
•Spare—Indicates Storage Elements that have been added to the Avid ISIS file
system but are not allocated for a specific purpose; spare but inactive Storage
Elements cannot be used until allocated to a Storage Group
•Active—Indicates active Storage Elements added to a server and allocated to
a Storage Group
ProtectionDisplays the type of protection applied
Storage GroupDisplays the Storage Group, if any, to which the Storage Element is allocated
Blade TypeLists the Storage Element model:
•i500
•i1000
•i2000
CapacityDisplays the storage capacity in gigabytes (GB) of the selected Storage Element
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data
written on it in the selected Storage Element
UnusedDisplays the amount of storage space in gigabytes (GB) available for use in the
selected Storage Element
Chunk SizeDisplays the size of segmented media files sent over the network
VersionDisplays the software version number of each Storage Element
Serial NumberDisplays the identification number of each Storage Element
44
HeadingDescription (Continued)
Domain IDDisplays the domain ID number of the Management Domain (stack) for each
engine (chassis) in which the Storage Element is part of.
n
Crate SerialDisplays the identification number of the unit that holds each Storage Element
Offline Timeout Indicates the amount of time (in seconds) a Storage Element is offline before the
System Director logs an error message
Slot NumberDisplays the slot number of each Storage Element
IP AddressesDisplays the IP addresses of the selected Storage Element in a separate area. To
hide this area, click the arrow in the IP Addresses title bar.
Storage Element Status
The Status column in the Storage Elements list reports the status of the Storage Element logged
by the System Director. (The Status line in the Details area reports the same information.) If the
Storage Element maintains a working status, the ISIS Management Console lists no entries in the
Status field. When a problem arises, or when the status of the Storage Element changes, the ISIS
Management Console updates the Storage Elements display.
Managing Storage Elements
Domain ID numbers are not displayed until the Storage Elements are
bound.
The following table summarizes the Storage Element status messages.
CategoryStatus
Disk Status•Disk in test mode
•Metadata error
45
3 Managing Avid ISIS 7000 Hardware
CategoryStatus (Continued)
General Status•Rectifying files: the Storage Element is cleaning up deleted files and
•No connection: the System Director cannot communicate with the
•Repairing mirrors: the Storage Element is repairing mirrored blocks
•Disk failure: the Storage Element is unusable for data storage and
•Redistributing: data is being redistributed to Storage Elements in the
•Disk performance degraded: the Storage Element’s performance is
•Network degraded: the IP interfaces on the Storage Element has failed
•Memory error: the memory test that runs when the Storage Element
•Metadata error: the Storage Element experienced an error loading
•Disk in test: the Storage Element is in disk test mode
•Offline: the Storage Element has been taken offline, usually in
verifying existing files
Storage Element; this could be due to a networking infrastructure
issue or Storage Element failure
with a single point of failure
must be replaced
Storage Group
below the threshold for input/output functions and might impact the
performance of the system
or the Storage Element experiences at least a 10% error rate (usually
due to lost packets), indicating a network communication problem
starts or restarts reports an error; this status is persistent and indicates
that the Storage Element has failed and should be replaced
metadata from the disk or writing new metadata to the disk (if
mirrored, the data on the mirrored Storage Element is still available
and no actual data loss occurs); this indicates that the Storage Element
should be replaced.
If you have an Storage Element with this status, reboot the Storage
Element. If “Metadata Error” status exists after a reboot, then the
Storage Element should be replaced. If the Metadata Error status
clears after a reboot, then the Storage Element is fine and no further
action is required.
preparation for removal
46
Temperature status•Temperature above threshold: the temperature of the Storage Element
exceeds 60°C (140°F)
CategoryStatus (Continued)
Upgrade Status•Install failed
•Downloading Phase 0
•Installing Phase 1
•Installing Phase 2
•Installing Phase 3
•Install Waiting
Connection Status•No Connection
Adding Storage Elements to the File System
The Storage Group defines the Storage Elements that the network can use to store data. In order
to finish configuring your Avid ISIS media network, you must add Storage Elements to the ISIS
file system, and then you must create a Storage Group from the available Storage Elements.
To add a Storage Element to the ISIS file system:
1. From the Management Console home page, do one of the following:
Managing Storage Elements
tClick the Storage Elements icon, located in the System section.
tClick Storage Elements in the pop up navigation menu.
The Storage Elements tool opens.
2. To select the Storage Elements you want to add to the file system, do one of the following:
tClick to select one or more available Storage Elements you want to add to a server.
You can only add Storage Elements that are marked as Available.
n
tClick the Select All menu, and select “Select All Available.”
3. Click the Add button.
The Storage Element Settings dialog appears.
For more information about Storage Groups, see “Managing Storage Groups” on page 70.
4. Select the chunk size to be used for the Storage Element(s).
The choices that appear in the Chunk Size list are dependent upon the capabilities of the
n
installed Storage Blades. See the Performance Guide for the latest recommendations for
choosing chunk size.
47
3 Managing Avid ISIS 7000 Hardware
5. Select the protection type you want to apply:
OptionDescription
MirroredSupports high resolution workflows, but significantly impacts available disk
space
RAIDMaximizes available disk space with greater fault tolerance, but supports low
resolution workflows
Storage Elements can only be added to Storage Groups with the same chunk size and
n
protection type. For more information on protection types, see “Storage Group Protection”
on page 68.
6. Click Ok.
The “Add Storage Element Confirmation” dialog appears.
7. Click Yes.
-The selected Storage Elements are added to the ISIS file system.
-The selected Storage Element icons are changed to green.
-The selected Storage Element names are changed from isb-xx to SExx.
-The status of the selected Storage Elements is changed from Available to Spare.
You might have to click the Refresh button to see the changes you have made.
n
Rectifying Files
Once you have added Storage Elements to your network and configured them for storage,
the Storage Elements — Avid ISIS Storage Blades (ISB) — periodically check the status of
stored files, cleaning up deleted files and verifying existing files. This process, called
“rectifying files,” allows the ISBs to communicate with the System Director to monitor the
state of its storage and clean up any files that the ISB no longer needs to store. Rectifying
files occurs randomly and asynchronously during normal system operation to minimize any
potential decrease in system performance. The process is indicated for each affected ISB in
the Status column in the Storage Elements list.
Storage Elements also rectify files when the ISB starts or restarts. When this happens — for
example, when an ISB loses connectivity to the network — data stored on the ISB might not
be in sync with the data in the file system itself. Also, if a client, such as the asset manager,
cannot communicate with the ISB, there might appear to be more data allocated to the ISB
than the file system has allocated. To correct this, you can manually send the Storage
Element a command to rectify its files.
48
Managing Storage Elements
You can also use the Issue Command button to clear all Network Degraded status messages from
the Storage Elements list. Network Degraded status indicates a high number of errors detected
by the ISB (see “Storage Element Status” on page 45). Correcting the problem might not clear
the status messages, so you can use the Issue Command button to clear the messages and reset
the error count.
c
You should correct the cause of the Network Degraded status messages before you clear
them from the ISIS Management Console.
To rectify files:
1. From the Storage Elements list, do one of the following:
tClick to select the available Storage Elements you want to block rectify.
tClick the Select All button to select all Storage Elements.
tClick the Select All menu, and select one of the following options:
OptionDescription
Select All AvailableSelects all Storage Elements displayed, regardless of status.
Select All SpareSelects all Storage Elements marked as spares.
Select All ActiveSelects all active Storage Elements.
[Select all in] chassisSelects all Storage Elements within a specified Engine.
2. Click the Issue Command button.
The Issue Storage Element(s) Command dialog box opens.
3. Select Initiate Block Rectify, and then click Send.
The system rectifies files on the selected Storage Elements and changes the status in the
Storage Elements list to Rectifying Files.
To clear all Network Degraded messages in the Storage Elements list:
tSelect Clear Network Degraded, and then click Send.
Removing Storage Elements from the File System
When you remove Storage Elements from the Avid ISIS file system, or when you move Storage
Elements from one system to another, you need to remove Storage Elements from the file
system.
49
3 Managing Avid ISIS 7000 Hardware
You cannot remove a Storage Element that is part of a Storage Group. You must remove the
n
Storage Element from its Storage Group first so the system can redistribute data before
unlinking the Storage Element from the file system. For more information about removing
Storage Elements from a Storage Group, see “Removing Storage Elements from Storage
Groups” on page 76.
Avid strongly recommends that you wait until any redistribution process completes before
removing Storage Elements.
To remove a Storage Element from the ISIS file system:
1. From the Storage Elements list, do one of the following:
tClick to select the available Storage Elements you want to remove from the file
system.
tClick the Select All menu, and select All Spare.
If the Storage Element status shows a redistribution in progress, you should wait until the
n
redistribution completes before removing the Storage Element from the file system.
2. Click Remove.
A confirmation dialog appears.
3. Click Yes.
The Storage Elements list refreshes and displays the Storage Element(s) as Available.
Managing Orphaned Storage Elements
Orphaned Elements are Storage Elements connected to a file system which is not currently
in use. This can happen when a Storage Element is moved from one ISIS environment to
another, or when you use the System Director Control Panel to create a new active partition
on a system that already includes bound Storage Elements. The “force remove” command
will remove the file system binding from the Storage Element and make it available for use
in the current file system.
c
Removing Storage Elements causes all data stored on them to be erased. Do not remove
disconnected Storage Elements unless you are certain they contain no data you want to
save.
50
Managing Storage Elements
e
w
q
q
w
e
Orphaned Elements List
Action button toolbar—Perform actions on selected orphaned elements
Orphaned elements list—Lists all orphaned elements and related information; see “Orphaned
Elements List” on page 51
Filter area—Filter the orphaned elements list display based on conditions you configure; see
“Filtering the Display” on page 27
The following table summarizes the basic information available in the Orphaned Elements list.
HeadingDescription
NameDisplays the name of each Storage Element connected to the system
StatusDisplays any change in the working status logged by the System Director (for a
description of status messages, see “Storage Element Status” on page 45)
51
3 Managing Avid ISIS 7000 Hardware
HeadingDescription (Continued)
Blade TypeDisplays the Storage Element category of each Storage Element:
•Available
•Spare
•Active
CapacityDisplays the storage capacity in gigabytes (GB) of each Storage Element
Chunk sizeDisplays the size of segmented media files sent over the network
VersionDisplays the software version number of each Storage Element
Crate SerialDisplays the identification number of the unit that holds each Storage Element
Slot NumberDisplays the slot number of each Storage Element
Removing Orphaned Storage Elements
To remove orphaned Storage Elements, you must force-remove them from the system.
c
Removing Storage Elements causes all data stored on them to be erased. Do not remove
disconnected Storage Elements unless you are certain they contain no data you want to
save.
To remove orphaned Storage Elements:
1. From the Management Console home page, do one of the following:
tClick the Orphaned Elements icon, located in the Hardware section.
tClick Orphaned Elements in the pop up navigation menu.
The Orphaned Elements tool opens.
2. Select the orphaned element(s) you want to force-remove.
3. Click the Force Remove button.
A message warns you that removing Storage Elements erases all data on the component.
4. Click Yes.
The Force Removal Text Confirmation dialog box opens.
5. Type
Remove
in the text box, and then click Remove.
The Storage Element is unbound from the ISIS file system and removed from the
Orphaned Elements list.
52
Upgrading Storage Elements
You can use the Storage Elements tool to upgrade the software for Storage Elements installed in
an Engine and connected to the media network.
You can also use the Chassis tool to upgrade Storage Elements. For more information, see
n
“Upgrading Engine Components” on page 64.
To upgrade a Storage Element:
1. From the Management Console home page, do one of the following:
tClick the Storage Elements icon, located in the System section.
tClick Storage Elements in the pop up navigation menu.
The Storage Elements tool opens.
2. Select the Storage Element(s) you want to upgrade.
3. Click the Upgrade button.
The Upgrade Storage Elements dialog box opens.
4. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Managing Storage Elements
c
Do not enter any text in the Command or Options fields except under the supervision of
qualified Avid support personnel. Doing so can result in system degradation and data loss.
5. Click the Upgrade button.
The ISIS Management Console installs the necessary upgrade for the selected Storage
Element. You can monitor the progress of the upgrade either in the Details area of the
Storage Elements tool or in the Avid ISIS System Monitor tool.
Removing Storage Elements from the Media Network
You can remove and replace Storage Elements without stopping the System Director or turning
off other components of the network. There are two principal reasons for removing Storage
Elements from the system:
•The element has a high number of unrecoverable errors
•The element has failed or has been removed from the system
53
3 Managing Avid ISIS 7000 Hardware
Before you remove an Avid ISIS Storage Blade (ISB) from the network, you must
redistribute the data stored on the ISB to other ISBs in the system. The redistribution occurs
before you physically remove the ISB, and the process entails moving data to the remaining
drives within the Storage Group. Once you redistribute the data, you add a new ISB to the
system and then perform a redistribution again to place data onto the new ISB.
c
n
n
c
If you physically remove an ISB from the media network before redistribution is
complete, data loss can occur.
You should maintain an unused block of storage equivalent to one ISB within the Storage
Group to allow redistribution from a failing ISB to other ISBs within the group.
If possible, you should redistribute data while the drive is experiencing problems but has not
yet been removed from the system. This allows the ISB having problems to participate in the
redistribution process by offering data that it has to both clients and to other ISBs.
Often the ISB is still functional, but its performance is slightly degraded — for example, the
ISB might have an unrecoverable error on one of its disks, or it might have long I/O times.
If the ISB fails, or if it has been removed from the system, you can perform a redistribution
from the mirrored or RAID locations associated with the ISB. However, if any other
mirrored location experiences a failure while performing a redistribution, the system can
lose data.
If the failed ISB was part of an unprotected Workspace, data loss is likely.
Consider the following when planning a redistribution:
•A one-to-one replacement of ISBs might leave you with less storage space in the
Storage Group than you require. Instead, plan for using more ISBs than you need for
storage and bandwidth for each Storage Group. This way, you can keep an optimal
amount of available storage space allocated to the Storage Group. This allows you to
quickly perform redistribution, rather than attempting a redistribution with only one
spare ISB.
54
•In general, the removal of an ISB is quicker than an addition. This is because all of the
other ISBs in a Storage Group participate in redistribution by moving a copy of any
block held by the element to another location. The more ISBs in the Storage Group, the
more the workload is shared. A single ISB addition is slower than a removal because the
ISB receiving the data acts as a limiting factor for the redistribution.
•When you add a new ISB to the Avid ISIS file system and then add it to a Storage
Group, the system redistributes data from the existing drives in the Storage Group to the
new element. This redistribution maintains all previously stored data, but the data might
not reside on the same Storage Elements.
If you do not have a replacement for a failed or failing ISB, Avid recommends that you physically
n
leave it in the Engine, even after it has been removed from the file system. Proper airflow can be
disturbed if an ISB slot is left open.
The following steps list the actions necessary for removing a Storage Element:
1. Identify the Storage Element you want to replace.
2. Remove the Storage Element from the Storage Group.
3. View the status of the redistribution and wait for redistribution to finish.
4. Remove the Storage Element from the file system.
5. Physically remove and replace the Storage Element.
6. Add new Storage Element to the file system.
7. Add the new Storage Element to a Storage Group.
For more information on the process of redistributing data and how redistribution affects
system performance, see “Redistribution Guidelines” on page 95.
Redistributing while adding an ISB takes longer than redistributing while removing an ISB.
n
Identifying Storage Elements Prior to Removal
Managing Storage Elements
To identify the Storage Element to be removed and replaced:
1. From the Management Console home page, do one of the following:
tClick the Storage Elements icon, located in the System section.
tClick Storage Elements in the pop up navigation menu.
The Storage Elements tool opens.
2. Locate the failing or failed Storage Element. For information on Storage Element status, see
“Storage Element Descriptions” on page 41 and “Storage Element Status” on page 45.
3. Select the Storage Element, and do one of the following:
tClick the Details button.
tDouble-click the name of the Storage Element.
The Details area opens.
55
3 Managing Avid ISIS 7000 Hardware
ISIS slot numbering
01 2 3
456 7
89
1011
12131415
The Details area lists the Crate Serial number and the Slot Number of the selected
Storage Element. This address identifies the ISB to be physically removed.
The slot numbers for Storage Elements begin at zero (0).
n
Removing Storage Elements
After you have identified the Storage Element you want to remove, you need to remove the
element from the Storage Group and monitor the redistribution of data.
c
c
56
You must finish the redistribution before you physically remove the Storage Element. If
you do not wait until the redistribution finishes, media network clients might receive
multiple errors.
To physically remove a Storage Element from your media network:
1. Remove the Storage Element from its Storage Group. For information on removing
Storage Elements, see “Removing Storage Elements from Storage Groups” on page 76.
2. Select the Workspaces option from the System Area.
The Workspaces tool opens.
3. Select the Workspace for the appropriate Storage Group.
4. Monitor the Status column for the progress of the redistribution operation. Click the
Refresh button until the redistribution finishes.
The Status column displays no status message when the process is complete.
Do not remove the Storage Element before the redistribution has completed.
5. Remove the Storage Element from the ISIS file system. For information on removing
Storage Elements, see “Removing Storage Elements from the File System” on page 49.
6. In the Storage Element list, select the Storage Element you want to remove and then
click the Issue Command button.
The Issue Storage Element(s) Command dialog box opens.
7. Select Take Offline, and then click Send.
e
w
q
If you remove an active Storage Element by mistake, the System Director restores the Storage
n
Element to the Storage Element list the next time it polls the media network (usually within 20
seconds).
The system spins down the drives in the selected Storage Element and changes the status in
the Storage Elements list to Offline.
8. Disconnect the Storage Element from the network, as described in the Avid ISIS 7000 Setup Guide.
Managing Switch Blades
The Switch Blades tool of the ISIS Management Console allows you to monitor and upgrade all
Switch Blades connected to the media network. You can also launch the Agents for the selected
Switch Blades to view details and change configuration.
Managing Switch Blades
57
3 Managing Avid ISIS 7000 Hardware
q
w
e
Action button toolbar—Perform actions on selected Switch Blades
Switch Blades list—Lists all Switch Blades and related information; see “Switch Blades List”
on page 58
Filter area—Filter the Switch Blades list display based on conditions you configure; see
“Filtering the Display” on page 27
Switch Blades List
The following table summarizes the information available in the Switch Blades list.
HeadingDescription
In band IPDisplays the internal IP addresses assigned to the CPU on the switch
Status TimeThe time at which the current status display was reported
StatusDisplays changes in the working status of the switch
VersionDisplays the software version number of each switch
TypeIdentifies the switch as one of the following:
•Integrated (ISS)
•Expansion (IXS)
TempLists the last logged temperature of the switch, in degrees Celcius
Chassis Master Indicates if an ISS or an IXS module is used as a master switch in the Engine
Base IPThe base IP addresses of the switch, which are assigned during system
configuration; for more information, see the Avid ISIS 7000 Setup Guide
Out of band IP The IP address of the Switch Blade management port; for more information about
the management port, see the Avid ISIS 7000 Setup Guide
Crate SerialDisplays the serial number of the unit that contains the switches
Viewing Switch Blade Details
You can view detailed information on Switch Blades using Avid ISIS Switch Blade Agents,
which can be accessed through the Switch Blades tool. For more information about Avid
ISIS Switch Blade Agents, see “Avid ISIS Switch Blade Agent” on page 195.
58
To launch Avid ISIS Switch Blade Agents:
1. From the Switch Blades list, select the Switch Blade for which you want to launch the
Agent.
2. Click the Show Info button.
The Avid ISIS Switch Blade Agent opens.
Upgrading Switch Blades
You can use the Switch Blades tool to upgrade the software for Switch Blades installed in an
Engine and connected to the media network.
You can also use the Chassis tool to upgrade Switch Blades. For more information, see
n
“Upgrading Engine Components” on page 64.
To upgrade Switch Blades:
1. From the Management Console home page, do one of the following:
tClick the Switch Blades icon, located in the Hardware section.
tClick Switch Blades in the pop up navigation menu.
The Switch Blades tool opens.
Managing Switch Blades
c
2. Select the Switch Blade you want to upgrade.
3. Click Upgrade Switches.
The Upgrade Switch Blades dialog box opens.
4. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Do not enter any text in the Command or Options fields except under the supervision of
qualified Avid support personnel. Doing so can result in system degradation and data loss.
5. Click the Upgrade button.
The ISIS Management Console installs the necessary upgrade for the selected Switch Blade.
You can monitor the progress of the upgrade either in the Details area of the Switch Blades
tool or in the Avid ISIS System Monitor tool.
59
3 Managing Avid ISIS 7000 Hardware
t
re
wq
y
q
w
e
r
Managing the Avid ISIS 7000 Engine
The Chassis tool of the ISIS Management Console allows you to view details and to monitor
the status of all Engine connected to the media network, as well as upgrade any Avid ISIS
Storage Blade (ISB), any Avid ISIS Integrated switch (ISS), or any Avid ISIS Expansion
Integrated switch (IXS).
60
Action button toolbar—Perform actions on selected Engines
Details area—Detailed information on the selected Engines; see “Viewing Engine Details” on
page 61, and “Engine Details” on page 62
Chassis list—Lists all Engines and related information; see “Chassis List” on page 61
Switches area—Displays information about the Switch Blades associated with the selected
Engines; see “Viewing Engine Details” on page 61
Filter area—Filter the Engine list display based on conditions you configure; see “Filtering the
t
y
Display” on page 27
Storage Elements area—Displays information about the Storage Elements for the selected
Engines; see “Viewing Engine Details” on page 61
Chassis List
The following table summarizes the basic information available in the Chassis list.
HeadingDescription
Serial NumberLists the serial number of the Engine
Status TimeLists the last time the System Director logged the status of the Engine
Storage Blade StatusDisplays changes in the working status of ISB components due to upgrade
Switch Blade StatusDisplays changes in the working status of ISS and IXS modules due to
AvailableLists the number of available Storage Elements in each Engine
Managing the Avid ISIS 7000 Engine
installation or failure
upgrade installation or failure
SpareLists the number of spare Storage Elements in each Engine
ActiveLists the number of active Storage Elements in each Engine
Storage BladesLists the number of ISB components installed in each Engine
Switch BladesLists the number of ISS and IXS modules for each Engine
Power BladesLists the number of power supply units for each Engine
Viewing Engine Details
The Details area displays all information for the currently selected Engines. The area is divided
into three sections:
•Chassis Details — displays information also available in the Chassis list
•Switches — lists basic configuration and status information of all ISS and IXS modules
connected to the media network
•Storage Elements — displays information also available in the Storage Elements list
61
3 Managing Avid ISIS 7000 Hardware
The information displayed is the information as seen by the System Director. Some of the
information is embedded in the Engine, and other information is assigned to the Engine by
the Avid ISIS software.
You can sort the information in the Switches and Storage Elements sections of the Details
area by clicking any column heading. For more information on sorting items in columns, see
“Sorting Information” on page 26.
You can view more detailed information on Engine components by using the Avid ISIS Agent
n
tool. For more information, see “Avid ISIS 7000 Storage Blade Agent” on page 185 and
“Avid ISIS Switch Blade Agent” on page 195.
To view information about an Engine:
1. In the Engine list, select an Engine.
2. Do one of the following:
tClick the Details button.
tDouble-click the Engine name.
The Details area displays all the information for the selected Engine. For information on
the Details area, see “Engine Details” on page 62
To hide the Details area:
tClick the arrow next to the Details title bar.
To close the Details area:
tClick the Close button.
Engine Details
The following table summarizes the information available in the Details area.
SectionHeadingDescription
Chassis Details
Serial NumberLists the serial number of the Engine
Status TimeLists the last time the System Director logged the status
of the Engine
Storage Blade Status Displays changes in the working status of ISB
components due to upgrade installation or failure
62
Managing the Avid ISIS 7000 Engine
SectionHeadingDescription (Continued)
Switch Blade StatusDisplays changes in the working status of switches due
to upgrade installation or failure
Storage BladesLists the number of ISB components installed in each
Engine
AvailableLists the number of available Storage Elements in each
Engine
SpareLists the number of spare Storage Elements in each
Engine
ActiveLists the number of active Storage Elements in each
Engine
Switch BladesLists the number of switches for each Engine
Power BladesLists the number of power blades for each Engine
Switches
In band IPDisplays the internal IP addresses assigned to the CPU
on the switch
Storage Elements
StatusDisplays changes in the working status of the switch
Ve r si o nDisplays the software version number of each switch
Typ eIdentifies the switch as one of the following:
•Integrated (ISS)
•Expansion (IXS)
Tem pLists the last logged temperature of the switch
Chassis MasterIndicates if an ISS or an IXS module is used as a master
switch in the Engine
Base IPDisplays the base IP addresses of the switch, which are
assigned during system configuration (for more
information on IP addresses, see the Avid ISIS 7000
Setup Guide)
Out of band IPDisplays the IP addresses for the management port on the
switch
NameDisplays the name of each Storage Element connected to
the system
63
3 Managing Avid ISIS 7000 Hardware
SectionHeadingDescription (Continued)
Status TimeLists the last time the System Director logged the
StatusDisplays any change in the working status logged by the
TypeDisplays the Storage Element category of each Storage
Storage GroupDisplays the Storage Group, if any, to which the Storage
CapacityDisplays the storage capacity in gigabytes (GB) of each
UsedDisplays the amount of storage space in gigabytes (GB)
Storage Element’s status
System Director (for a description of status messages,
see “Storage Element Status” on page 45)
Element:
•Available
•Spare
•Active
Element is allocated
Storage Element
in use by each Storage Element
Chunk sizeDisplays the size of segmented media files sent over the
Ve r si o nDisplays the software version number of each Storage
Crate SerialDisplays the identification number of the unit that holds
Slot NumberDisplays the slot number of each Storage Element
Upgrading Engine Components
You can use the Chassis tool to upgrade the software for all Storage Elements and all Switch
Blades installed in an Engine and connected to the media network. You can also upgrade
individual Storage Elements and switches.
You might lose network connectivity temporarily when you upgrade Switch Blades while the
n
upgrade process reboots the switches.
64
network
Element
each Storage Element
Managing the Avid ISIS 7000 Engine
To upgrade all Storage Elements and switches in an Engine:
1. In the Chassis list, select the Engine you want to upgrade.
2. Do one of the following:
tClick the Upgrade Blades button.
tClick the Upgrade Switches button.
The Upgrade Storage Elements dialog box or the Upgrade Switch Blades dialog box opens.
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
c
Do not enter any text in the Command or Options fields except under the supervision of
qualified Avid support personnel. Doing so can result in system degradation and data loss.
4. Click the Upgrade button.
The ISIS Management Console installs the necessary upgrades for all Storage Elements or
for all Switch Blades for the selected Engine. You can monitor the progress of the upgrade
either in the Details area of the Chassis tool or in the Avid ISIS System Monitor tool.
Upgrading Individual Engine Components
You can upgrade individual Storage Elements and Switch Blades in the Chassis tool. You can
also upgrade Storage Elements by using the Storage Elements tool, and Switch Blades by using
the Switch Blades tool. For more information on Storage Element upgrades, see “Upgrading
Storage Elements” on page 53. For more information on Switch Blade upgrades, see “Upgrading
Switch Blades” on page 59.
To upgrade individual Storage Elements and switches in an Engine:
1. In the Details area of the Chassis tool, do one of the following:
tSelect the switch you want to upgrade.
tSelect the Storage Element you want to upgrade.
2. Click Upgrade.
The Upgrade Storage Blades dialog box or the Upgrade Switches dialog box opens.
c
3. Select the upgrade installer from the list in the right column.
The Command text box displays the location of the upgrade installer.
Do not enter any text in the Command or Options fields except under the supervision of
qualified Avid support personnel. Doing so can result in system degradation and data loss.
4. Click the Upgrade button.
65
3 Managing Avid ISIS 7000 Hardware
The ISIS Management Console installs the necessary upgrade for the selected Storage
Element or Switch Blade. You can monitor the progress of the upgrade either in the
Details area of the Storage Elements tool or in the Avid ISIS System Monitor tool.
Removing Engines from the Chassis List
If you need to replace an Engine, you can use the ISIS Management Console to remove the
connection history of the inactive or inoperative Engine from the Chassis list in the Chassis
tool. Once the Engine is removed from the ISIS file system, you can physically remove it
from the network.
For information on removing Engines from the network, see the Avid ISIS 7000 Setup Guide.
To remove an Engine from the Chassis list:
1. In the Chassis list, select the Engine you want to remove.
2. Click the Remove Status button.
The Engine is removed from the Chassis list.
If you remove an active Engine by mistake, the System Director restores the Engine to the
n
Chassis list the next time it polls the media network (usually within 20 seconds).
66
4Managing Storage Groups and
Workspaces
Storage Groups are collections of Storage Elements. Storage Groups give you flexibility in
allocating storage capacity among groups with different functional areas, workflow
requirements, or as a means of mitigating the risk of various drive failure scenarios. Workspaces
are virtual volumes that exist on Storage Groups and can be resized dynamically. Workspaces
allow you to segment your Storage Groups easily to accommodate projects and users.
Storage Group Usage Guidelines
You can assign all of your Storage Elements to one large Storage Group, or you can divide your
Storage Elements among multiple Storage Groups. (Storage Elements can be assigned to only
one Storage Group.) To optimize performance, you can use Storage Groups to configure your
Avid ISIS file system.
Avid recommends that you use all Storage Elements in an Avid ISIS Engine when creating a
Storage Group, and you size larger Storage Groups in increments of whole ISIS Engines. While
Storage Groups can be created with a partial ISIS Engine, performance and sizing scalability
cannot be guaranteed.
You can divide very large Storage Groups (over 60 Storage Elements) into several Storage
n
Groups to minimize the risk of two Storage Elements used in a protected Workspace failing at the
same time. When you assign Storage Elements to different Storage Groups, however, you must be
careful how you allocate bandwidth reservations for the different groups as the available
bandwidth allocations for individual Storage Groups might differ from the total system
bandwidth, depending on the number of Storage Elements assigned to each group.
If your environment supports clients with very high bandwidth requirements, you need to set up
specific hardware and Storage Group configurations to support them. For more information, see
the Avid ISIS 7000 Setup Guide.
In such an environment, you can use Storage Groups to isolate clients that need very high
bandwidth and thus eliminate the competition from other clients trying to access the same
Storage Elements. For example, when high-definition (HD) media is in its own Storage Group
and a single client is using the HD media, that client is serviced independently from any other
clients in the workgroup. This logic can also be applied to separating audio and video media.
4 Managing Storage Groups and Workspaces
In other situations, Storage Groups are more flexible, allowing you to assign Storage
Elements in your file system configuration to Storage Groups with few limitations.
Storage Group Protection
Avid ISIS supports two types of data protection. Besides mirrored Storage Groups, you can
now create redundant array of independent disks (RAID) Storage Groups. RAID storage
offers more value in that it provides more storage at a lower cost per GB. Using the Avid
Interplay Copy/Move service, data files can be moved from mirrored Storage Groups to and
from RAID Storage Groups. The following are two obvious advantages to using RAID
Storage Groups:
•Migration from mirrored to RAID Workspaces can become part of your normal
workflow. You can move the data that is no longer used in the mirrored Workspaces to
RAID Workspaces for long term storage. This frees up faster Storage Elements for
higher performance work.
•RAID Storage Groups allow you to use low bit-rate data, at less cost.
When you have two Management Domains, the Storage Groups in both Management
n
Domains must be Mirrored (RAID Storage Groups are planned for a future release).
The following table summarizes the advantages and disadvantages of the different protection
types:
68
TypeAdvantagesDisadvantages
Mirrored•Maximizes performance of protected
Workspaces
•Supports high-resolution workflows
RAID•Maximizes protected storage capacity
•Tolerates two Storage Element
failures
Mirrored Storage Groups are
n
required when you have two
Management Domains, RAID
Storage Groups are not supported.
Certain restrictions and limitations apply when using RAID Storage Groups and
n
Workspaces. For more information, see the Avid ISIS 7000 ReadMe.
•Mirrored Workspaces use twice as
much space as unprotected
Workspaces
•Tolerates single Storage Element
failure
•Supports low bit-rate (<=50 Mbs)
workflows
Automatic Redistribution on Disk Failure
Avid ISIS v2.1 now performs an automatic redistribution on Disk Failure notification. Storage
Elements continuously monitors disk status and sends a “Disk Failed” notification to the System
Director upon determination that a disk is not usable. The System Director then removes the
Storage Element from its associated Storage Group. The removal of the Storage Element from
the Storage Group initiates redistributions on all Workspaces associated with that Storage Group.
The System Director then prevents the Storage Element that reported disk failure from being be
added to a Storage Group.
The Automatic Removal feature is controlled by a system preference that is configured using the
ISIS Management Console Preferences tool. The preference is called “Auto Remove
Redistribution on Disk Failure” The default setting is “enabled.” The Storage Element is only
removed from the Storage Group. It is not unbound from the ISIS Systems for the following
reasons:
•The Storage Element participates in the removal redistribution. This is required to prevent
data loss when there are un-protected Workspaces or when full redundancy has not been
attained for all data blocks.
•The Storage Element continues to report status, such as physically replacing the blade.
Auto removal status is reported by way of the System Event Log. A sequence of event log entries
are generated for the initial report of the failure, the decision to remove the Storage Element, and
subsequent success or failure. Events are also logged for the start and stop of all the Workspace
redistributions.
Storage Group Usage Guidelines
The following are important considerations when using Automatic Redistribution:
•When automatic redistribution is enabled, be sure to keep at least 7% of your Storage Group
unused at all times. Failure to do so can cause the system to run out of space after an
automatic redistribution has initiated and cause client outage.
•If an automatic redistribution of a Storage Group is started during a critical time the overall
system performance can degrade significantly and be disruptive. For more information on
understanding the performance characteristics during remove redistribution, see the Avid ISIS Performance and Redistribution Guide.
•An automatic redistribution removes the Storage Element from the Storage Group but not
from the file system. Once an automatic redistribution has occurred and completed, the
removed Storage Element should be removed from the file system. You must first removed
the Storage Element with the software and then physically replace it. A replacement ISB
must then be added to the file system and then the Storage Group, triggering another
redistribution.
•If unmirrored Workspaces are in use, the data will be damaged on those Workspaces in that
Storage Group.
69
4 Managing Storage Groups and Workspaces
tr
e
wq
q
w
e
r
t
Managing Storage Groups
You use the Storage Groups tool of the ISIS Management Console to add and delete Storage
Groups, to rename Storage Groups, and to configure and manage Storage Groups. The
Storage Groups tool contains three sections. On the left side, the Storage Groups list
displays all the Storage Groups available to the current user. On the right side, the Details
area displays technical information about selected Storage Groups, and the Storage
Elements area displays all Storage Elements available to the current user.
70
Action button toolbar—Perform actions on selected Storage Groups.
Details area—Detailed information on the selected Storage Groups; see “Viewing Storage
Group Details” on page 71, and “Storage Group Details” on page 72.
Storage Groups list—Lists all configured Storage Groups and related information; see “Storage
Groups List” on page 71.
Filter area—Filter the Storage Groups list display based on conditions you configure; see
“Filtering the Display” on page 27
Storage Elements list—Displays Storage Elements bound to the selected Storage Group.
Storage Groups List
The following table summarizes the information available in the Storage Groups list.
HeadingDescription
NameDisplays the name of the currently selected Storage Group
ProtectionDisplays the type of protection for each Storage Group
CapacityDisplays the storage capacity in gigabytes (GB) of the selected Storage Group
EffectiveDisplays the effective (available) storage capacity in gigabytes (GB) of the selected
Storage Group
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data
written on it in the selected Storage Group
UnusedDisplays the total amount of storage space in gigabytes (GB) that currently has no
data written on it in the Storage Element(s) assigned to the selected Storage Group
AllocatedDisplays the amount of storage space in gigabytes (GB) reserved for use by
Workspaces in the selected Storage Group
Managing Storage Groups
UnallocatedDisplays the amount of storage space in gigabytes (GB) available on the Storage
Elements and not currently reserved for the selected Storage Group
Chunk SizeDisplays the size of segmented media files sent over the network
FilesDisplays the number of files in the selected Storage Group
DirectoriesDisplays the number of directories in the selected Storage Group
You can sort the information in the Storage Groups tool by clicking any column heading. For
more information on sorting items in columns, see “Sorting Information” on page 26.
Viewing Storage Group Details
The Details area and the Storage Elements area display all information for the currently selected
Storage Group and all information for the available Storage Elements. The information displayed
is the information as seen by the System Director. Some of the information is embedded in the
Storage Element, and other information is assigned to the Storage Element by the Avid ISIS
software.
You can sort the information in the Storage Elements area by clicking any column heading. For
n
more information on sorting items in columns, see “Sorting Information” on page 26.
71
4 Managing Storage Groups and Workspaces
To view information about a Storage Group:
tIn the Storage Groups list, select a Storage Group.
The Storage Groups tool displays all the information for the selected Storage Group. If
the Details area is not visible, click the Details button.
To hide the Details area or the Storage Elements area:
tClick the arrow next to the Details title bar or the Storage Elements title bar.
To close the Details area:
tClick Close.
Storage Group Details
The following table summarizes the information available in the details panels for Storage
Groups and Storage Elements.
HeadingDescription
NameDisplays the name of the currently selected Storage Group
ProtectionDisplays the type of protection for each Storage Group
72
CapacityDisplays the storage capacity in gigabytes (GB) of the selected Storage Group
EffectiveDisplays the effective (available) storage capacity in gigabytes (GB) of the
selected Storage Group
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data
written on it in the selected Storage Group
UnusedDisplays the amount of storage space in gigabytes (GB) that currently has no data
written on it in the selected Storage Group
AllocatedDisplays the amount of storage space in gigabytes (GB) reserved for use by
Workspaces in the selected Storage Group
UnallocatedDisplays the amount of storage space in gigabytes (GB) available on the Storage
Elements and not currently reserved for the selected Storage Group
Chunk SizeDisplays the size of segmented media files sent over the network
FilesDisplays the number of files in the selected Storage Group
DirectoriesDisplays the number of directories in the selected Storage Group
Managing Storage Groups
The Storage Elements area lists the Storage Elements allocated to the currently selected Storage
Group, as well as the Storage Elements available for allocation to the Storage Group. The
following table summarizes the information available in the Storage Elements area. Some
columns are hidden by default (see “Showing and Hiding Columns” on page 26).
HeadingDescription
NameDisplays the name of the selected Storage Element
ISB NameDisplays the computer name of each Storage Element connected to the system
TypeDisplays the Storage Element category of the selected Storage Element:
•Available—Indicates Storage Elements that are not appropriately initialized for
use in a Storage Group; these Storage Elements can be used for other purposes
in your environment
•Spare—Indicates Storage Elements that have been added to the Avid ISIS file
system but are not allocated for a specific purpose; spare but inactive Storage
Elements cannot be used until allocated to a Storage Group
•Active—Indicates active Storage Elements added to a server and allocated to a
Storage Group
Chunk SizeDisplays the size of segmented media files sent over the network
Blade TypeLists the Storage Element model:
•i500
•i1000
•i2000
ProtectionDisplays the type of protection for each Storage Element.
Crate SerialDisplays the identification number of the unit that holds each Storage Element
Slot NumberDisplays the slot number of each Storage Element
Status TimeLists the last time the System Director logged the Storage Element’s status
StatusDisplays the working status logged by the System Director
Up TimeDisplays the length of time that the Storage Element has been running
continuously
Storage GroupDisplays the Storage Group, if any, to which the Storage Element is allocated
CapacityDisplays the storage capacity in gigabytes (GB) of the selected Storage Element
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data
written on it in the selected Storage Element
VersionDisplays the software version number of each Storage Element
73
4 Managing Storage Groups and Workspaces
Creating New Storage Groups
A Storage Group is a set of physical Storage Elements that store a subset of the complete set
of media files accessible within a shared storage environment and which can accommodate
different Storage Element types, as well as clients with different privileges and media
requirements (for instance, clients that use low-resolution media and ones that use
high-resolution media).
You need to add Storage Elements to the file system before you can create any Storage
n
Groups. For more information, see “Adding Storage Elements to the File System” on
page 47.
If you have bound Storage Elements to the ISIS file system but you have not created any
n
Storage Groups, the Create Storage Groups dialog box opens by default when you select the
Storage Groups list.
To create a new Storage Group:
1. From the Management Console home page, do one of the following:
tClick Storage Groups in the ISIS Setup icon, located in the System section.
tClick Storage Groups in the pop up navigation menu.
The Storage Groups tool opens.
2. Click the New button.
The Create Storage Group dialog box opens.
3. In the Name text box, type a name for the Storage Group.
For more information about entering text in name fields, see “Entering Text” on page 30.
n
If there is already a Storage Group with the name entered in the Name text box, an error
message tells you to type a new name.
4. Select Mirror or RAID from the Protection list.
The table below summarizes the minimum assigned Storage Elements required for each
protection type.
Protection TypeMin. Storage Elements
Mirror2
RAID8
The Storage Elements list updates to show only Storage Elements with the same
protection type you specified for the Storage Group.
74
Managing Storage Groups
5. In the Storage Elements area, select the Storage Elements you want to assign to the new
Storage Group.
If you have two Management Domains you need to check the Domain ID column and select
n
Storage Elements from the same domain, you cannot add Storage Elements to a Storage Group
with a different Domain ID. Storage Groups cannot span across Management Domains.
6. Click the Add button.
The Storage Elements are allocated to the Storage Group. You can use the Remove button to
remove Storage Elements from the Storage Group.
7. (Option) Before you create your Storage Group, you can use the Revert button to undo any
modifications made to the Storage Group information.
8. Click the Apply button to create a new Storage Group containing all the selected Storage
Elements.
The new Storage Group appears in the Storage Groups list, and the Create Storage Group
dialog box refreshes to show the Storage Elements still available for additional Storage
Groups.
9. (Option) Repeat steps 3 through 8 to create new Storage Groups.
10. Click the Close button to close the Create Storage Group dialog box and to return to the
Storage Groups tool.
Adding Storage Elements to Storage Groups
You can add unassigned Storage Elements to a Storage Group at any time to increase its storage
capacity.
To add Storage Elements to a Storage Group:
1. From the Management Console home page, do one of the following:
tClick Storage Groups in the ISIS Setup icon, located in the System section.
tClick Storage Groups in the pop up navigation menu.
The Storage Groups tool opens.
2. In the Storage Groups list, select the Storage Group where you want to add Storage
Elements, and then do one of the following:
tClick the Details button.
tDouble-click the Storage Group name.
The Details area displays all the information on the selected Storage Group.
3. In the Storage Elements area, select all the spare Storage Elements you want to add to the
Storage Group.
75
4 Managing Storage Groups and Workspaces
If you have two Management Domains you need to check the Domain ID column and select
n
Storage Elements from the same domain, you cannot add Storage Elements to a Storage
Group with a different Domain ID. Storage Groups cannot span across Management
Domains.
4. Click the Add button to add the selected spare Storage Elements to the Storage Group.
The Storage Elements area refreshes to display the selected Storage Elements added to
the Storage Group.
5. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the Storage Group information.
6. Click the Apply button.
-The Storage Elements are added to the Storage Group.
-The media network performs a redistribution of any data on the Storage Elements.
The amount of time required for the redistribution depends on the amount of data in
the Storage Group.
-The configuration change counter for all affected Workspaces is incremented by
one.
After ten configuration changes, the system prompts you to perform a full redistribution. For
n
more information, see “Redistributing Data” on page 95.
Removing Storage Elements from Storage Groups
You can remove Storage Elements from your Storage Group, as long as the following
conditions are met after you have done so:
•The Storage Group contains a sufficient number of Storage Elements so that after the
remove operation, at least the minimum number of Storage Elements for the specified
protection type remain. For more information, see “Creating New Storage Groups” on
page 74.
•The Storage Group contains enough Storage Elements to support the space allocated to
your Workspaces.
This is the total amount of storage allocated to the Workspaces, not the actual amount of
n
data stored on the Workspaces.
Storage Elements removed from the Storage Group are returned to the system’s pool of
spare Storage Elements.
76
Managing Storage Groups
To remove Storage Elements from a Storage Group:
1. From the Management Console home page, do one of the following:
tClick Storage Groups in the ISIS Setup icon, located in the System section.
tClick Storage Groups in the pop up navigation menu.
The Storage Groups tool opens.
2. In the Storage Groups list, select the Storage Group from which you want to remove Storage
Elements, and then do one of the following:
tClick the Details button.
tDouble-click the Storage Group name.
The Details area displays all the information on the selected Storage Group.
3. In the Storage Elements area, select all the Storage Elements you want to remove from the
Storage Group.
4. Click the Remove button.
The Storage Elements area refreshes and displays the selected Storage Elements as Spare.
You cannot remove Storage Elements if it would cause the capacity of the Storage Group to fall
n
below either the used space or the allocated space. You must reduce the amount of space
allocated to the Workspace(s). For more information on modifying Workspaces, see “Adjusting
Workspace Size” on page 90.
5. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the Storage Group information.
6. Click the Apply button.
-The Storage Elements are added to the Storage Group.
-The media network performs a redistribution of any data on the Storage Elements. The
amount of time required for the redistribution depends on the amount of data in the
Storage Group.
-The configuration change counter for all affected Workspaces is incremented by one.
After ten configuration changes, the system prompts you to perform a full redistribution. For
n
more information, see “Redistributing Data” on page 95.
Adding Storage Elements from Another Storage Group
If you want to reassign Storage Elements from one Storage Group to another, you must remove
the Storage Elements before adding them to a new Storage Group.
77
4 Managing Storage Groups and Workspaces
To add Storage Elements previously used in another Storage Group to your current
Storage Group:
1. From the Management Console home page, do one of the following:
tClick Storage Groups in the ISIS Setup icon, located in the System section.
tClick Storage Groups in the pop up navigation menu.
The Storage Groups tool opens.
2. In the Storage Groups list, select the Storage Group which contains the Storage
Elements you want to reassign, and then do one of the following:
tClick the Details button.
tDouble-click the Storage Group name.
The Details area displays all the information on the selected Storage Group.
3. In the Storage Elements area, select all the Storage Elements you want to move to
another Storage Group.
4. Click the Remove button.
The Storage Elements area refreshes to display the selected Storage Elements as Spare.
5. Click the Apply button.
The selected Storage Elements are removed from the Storage Group, and the media
network performs a redistribution of any data on the Storage Elements.
6. In the Storage Groups list, click the Storage Group to which you want to add the Storage
Elements.
The Details area displays all the information on the selected Storage Group.
7. In the Storage Elements area, select all the spare Storage Elements you want to add to
the new Storage Group.
If you have two Management Domains you need to check the Domain ID column and select
n
Storage Elements from the same domain, you cannot add Storage Elements to a Storage
Group with a different Domain ID. Storage Groups cannot span across Management
Domains.
8. Click the Add button to add the selected Storage Elements to the Storage Group.
The Storage Elements area refreshes to display the selected Storage Elements added to
the new Storage Group.
9. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the Storage Group information.
78
Managing Storage Groups
10. Click the Apply button.
The selected Storage Elements are added to the Storage Group, and the media network
performs a redistribution of any data on the Storage Elements. The amount of time required
for the redistribution depends on the amount of data in the Storage Group.
Adding Storage Elements Previously Used with Another Network
If the Storage Elements you want to add to your Storage Group were used previously in another
environment, you must first connect them to your Avid ISIS media network, and then you must
add them to the ISIS file system.
To add the Storage Elements to your current Storage Group:
1. Make sure the new Storage Elements are connected to the network. For information on
connecting Storage Elements, see the Avid ISIS 7000 Setup Guide.
2. Open the ISIS Management Console. (For information on opening the ISIS Management
Console, see “Opening the Avid ISIS Management Console” on page 17.)
3. Click the Storage Elements icon from the System area.
The Storage Elements tool opens.
If the ISIS Management Console is open when you add the Storage Elements, click the
Refresh button to view the newly added Storage Elements in the Storage Elements dialog
box.
If the Storage Elements are not listed, something might be wrong with their physical
connections. Do not proceed any further, and see the Avid ISIS 7000 Setup Guide.
4. Add the new Storage Elements to the ISIS file system (see “Adding Storage Elements to
Storage Groups” on page 75).
5. Add the new Storage Elements to your Storage Group (see “Adding Storage Elements to
Storage Groups” on page 75).
6. Click the Apply button.
A dialog box opens asking you to confirm the action.
7. Click Yes.
The selected Storage Elements are added to the Storage Group.
Deleting Storage Groups
You can delete any Storage Group that does not have any Workspaces on it. As a result, all
Storage Elements previously assigned to the Storage Group return to the system’s pool of spare
Storage Elements.
79
4 Managing Storage Groups and Workspaces
To delete a Storage Group:
1. If any Workspaces exist on the Storage Group you want to delete, first delete the
Workspace (see “Deleting Workspaces” on page 92).
2. From the Management Console home page, do one of the following:
tClick Storage Groups in the ISIS Setup icon, located in the System section.
tClick Storage Groups in the pop up navigation menu.
The Storage Groups tool opens.
3. In the Storage Groups list, select the Storage Group you want to delete.
4. Click the Delete button.
A dialog box opens asking you to confirm the action.
5. Click Yes.
The Storage Group is deleted.
After the Storage Group is deleted, all of the Storage Elements previously in your Storage
Group will appear in the Storage Elements area as Spare.
80
Managing Workspaces
tr
e
wq
q
w
e
r
t
This section describes how to create, rename, and delete Workspaces. It also tells you how to
manipulate the amount of storage allocated to each Workspace, how to move a Workspace and its
contents to another Storage Group, and how to protect a Workspace against drive failure.
Managing Workspaces
Action button toolbar—Perform actions on selected Workspaces.
Details area—Detailed information on the selected Workspaces; see “Viewing Workspace
Details” on page 84, and “Workspace Details” on page 85
Workspaces list—Lists all configured Workspaces and related information; see “Workspaces
List” on page 83
Filter area—Filter the Storage Groups list display based on conditions you configure; see
“Filtering the Display” on page 27
User access area—Displays Storage Elements bound to the selected Storage Group; see
“Managing Workspace Access Privileges” on page 93
81
4 Managing Storage Groups and Workspaces
Allocating Workspaces
Before you create Workspaces, you should consider how you want to allocate them. For
example, do you want to allocate them to accommodate projects, groups, individual clients,
streaming bit rates, media types, media distributors, or a combination of these?
Once you create a plan to allocate Workspaces, you’ll need to determine how much storage
each Workspace requires and allocate space accordingly. This might be a function of project
size or the number of clients, or it might be a function of media duration or media resolution.
When sizing Workspaces in a multiple Workspace configuration, you should consider
reserving some space rather than assigning all of it immediately. Once space is allocated, it
tends to be filled quickly and you might need space later to accommodate a new project or
client or to extend or protect an existing Workspace. In these situations, it is easier to use
space held in reserve than to take it away from an existing Workspace.
When allocating and sizing Workspaces, you should also consider whether access
restrictions are required and whether protection for data integrity is necessary for each
Workspace.
Protecting Workspaces
82
Because of the potential impact of a drive failure, Avid recommends protecting all your
Workspaces whenever possible. If you want to ensure protection of your files at all times,
always choose a Protection option when creating new Workspaces (before any files are
stored on the Workspace).
If you are not sure that all files on a given Workspace are protected, select the Workspace
and enable the available Protection option for the Workspace. This protects all new files
added to the Workspace, and adds protection to any existing files in the Workspace that are
not already protected.
Workspaces must use the same protection type as the containing Storage Group.
n
Workspaces List
The Workspaces list displays all Workspaces, the Storage Groups on which they reside, and
details about each Workspace.
The following table describes the information in the Workspaces list.
HeadingDescription
NameLists the names of all Workspaces in the selected Storage Groups
CapacityLists the total storage capacity of each Workspace in gigabytes (GB)
Resize sliderDisplays a graphical representation of the used and available space for each
MaximumLists the maximum amount of storage space in gigabytes (GB) available for the
ProtectionDisplays the type of protection for each Workspace, or displays “unprotected” if
UsedDisplays the amount of storage space in gigabytes (GB) that currently has data
Managing Workspaces
Workspace (for information on using the Workspace Size graph, see “Using the
Workspace Size Graph” on page 84)
Workspace on the network
there is no protection on a Workspace
written on it in each Workspace
ReservedDisplays the amount of storage space in gigabytes (GB) that has been reserved
by a client application
UnusedLists the amount of storage space in gigabytes (GB) that currently has no data
written on it in each Workspace
StatusDisplays the status of any current redistribution:
•In Progress
•Stalled
•Pending
•Requires Full Redistribution
Config ChangesDisplays the number of changes to a Storage Group that involve moving data —
for example, the number of times an ISB has been added or removed; for more
information about config changes, see “Redistributing Data” on page 95
Storage GroupFor each Workspace, lists the Storage Group on which it is located
FilesLists the total number of files stored on the network for each Workspace
You can sort the information in the Workspaces list by clicking any column heading. For more
n
information on sorting items in columns, see “Sorting Information” on page 26.
83
4 Managing Storage Groups and Workspaces
e
wq
r
q
w
e
r
Using the Workspace Size Graph
The Workspaces Size graph provides a quick way to view how much storage capacity is
currently allocated to each Workspace and how much of that storage space currently has data
written on it. The graph represents the following:
•Used space: total drive space in the Storage Group allocated to each Workspace
•Unused space: total drive space in the Storage Group still available for allocation to each
Workspace
Decrease/Increase buttons—Increases or decreases the scale of the graph
Resize handle (see inset for detail)—Click and drag to increase or decrease the Workspace
size; see “Adjusting Workspace Size” on page 90
Used Space
Unused space
To resize the Workspaces Size graph, do one of the following:
tClick the Decrease Size button to reduce the size of the graph.
tClick the Increase Size button to expand the size of the graph.
Viewing Workspace Details
The Details area and the User Access panels display all information for the currently
selected Workspace.
84
To view information about a Workspace:
tIn the Workspaces list, select a Workspace.
The Workspaces tool displays all the information for the selected Workspace. If the Details
area is not visible, click the Details button.
Workspace Details
The following table summarizes the information available in the Details area.
HeadingDescription
NameDisplays the name of the currently selected Workspace
ProtectionLists the Protection type for the select Workspace.
Storage GroupLists the Storage Group on which the selected Workspace was created
CapacityDisplays the storage capacity in gigabytes (GB) of the selected
UsedDisplays the amount of storage space in gigabytes (GB) that currently has
Managing Workspaces
Workspace; the maximum limit for Workspace size is listed next to the
Size text box
data written on it in the selected Workspace
ReservedDisplays the amount of storage space in gigabytes (GB) that has been
reserved by a client application
UnusedDisplays the amount of storage space in gigabytes (GB) that currently has
no data written on it and is available to the selected Workspace
FilesDisplays the number of files used by the selected Workspace
DirectoriesDisplays the number of directories used by the selected Workspace
Config ChangesDisplays the number of changes to a Storage Group that involve moving
data — for example, the number of times an ISB has been added or
removed
StatusDisplays the status of any current redistribution:
•In Progress
•Stalled
•Pending
•Requires Full Redistribution
Warning Event TriggerDisplays the value in used percentage (%) or unused gigabytes (GB) of
storage at which a warning event is written to the Event Log
85
4 Managing Storage Groups and Workspaces
HeadingDescription (Continued)
Error Event TriggerDisplays the value in used percentage (%) or unused gigabytes (GB) of
storage at which an error event is written to the Event Log
The User Access area lists all users and user groups and their access privileges. (For
information on access privileges, see “Managing Workspace Access Privileges” on page 93.)
The following table summarizes the information available in the User Access area.
HeadingDescription
NameLists the names of the users and user groups on the network
TypeDisplays the client category (user or user group) for each client in the Name list
AccessLists the access privileges for each client in the Name list
EffectiveLists the effective access privileges for each client in the Name list
ReasonLists the reason for any difference between the access privileges assigned to a user and
the effective access assigned to a user as a member of a user group
You can sort the information in the User Access area by clicking any column heading. For
n
more information on sorting items in columns, see “Sorting Information” on page 26.
Creating New Workspaces
Workspaces are locations to store and segregate data. You can allow users to access some or
all of the Workspaces, and you can assign permissions for how each user can access the data
in a Workspace.
If you have created Storage Groups but you have not created any Workspaces, the Create
n
Workspace dialog box opens by default when you select the Workspaces list.
To create a new Workspace:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. Click the New button.
The Create Workspace dialog box opens.
3. In the Name text box, type a name for the Workspace.
86
Managing Workspaces
For more information about entering text in name fields, see “Entering Text” on page 30.
n
If there is already a Workspace with the name entered in the Name text box, an error
message tells you to type a new name.
4. (Option) Click the Protection menu and select the available Workspace protection option.
The protection type available for the Workspace depends upon the protection type specified for
n
the Storage Group it is assigned to. For more information on types of protection, see “Storage
Group Protection” on page 68.
5. Click the Storage Group menu, and select the Storage Group in which you want to create the
Workspace.
The Storage Group name appears in the Storage Group text box.
6. Type a size for the Workspace in the Capacity text box. The minimum size (1.0) is listed in
the Capacity text box, and the maximum size is listed next to the Capacity text box.
If all storage in the Storage Group is allocated to existing Workspaces, you can make an
existing Workspace smaller. For information on resizing Workspaces, see “Adjusting
Workspace Size” on page 90. For more information on allocating Workspaces, see
“Allocating Workspaces” on page 82.
7. (Option) In the Warning Event Trigger text box, do one of the following:
tTo set a warning event trigger based on percentage of used storage, type in a percentage
value and select ‘%’.
tTo set a warning event trigger based on gigabytes (GB) of unused storage, type in a
gigabyte value and select ‘GB’.
8. (Option) In the Error Event Trigger text box, do one of the following:
tTo set an error event trigger based on percentage of used storage, type in a percentage
value and select ‘%’.
tTo set an error event trigger based on gigabytes (GB) of unused storage, type in a
gigabyte value and select ‘GB’.
9. In the User Access area, set the User and User Group access privileges.
10. Click the Apply button to create a new Workspace containing the selected Storage Group
and users.
The new Workspace appears in the Workspace dialog box, and the Create Workspace dialog
box refreshes to allow you to create a new Workspace.
11. (Option) Repeat this procedure to create new Workspaces.
12. Click the Close button to close the Create Workspace dialog box to return to the Workspaces
tool.
87
4 Managing Storage Groups and Workspaces
The new Workspace appears in the Workspaces list.
Duplicating Workspaces
When you duplicate Workspaces, they inherit the attributes (Storage Group, capacity, and
protection status) of the Workspace from which they were created.
The contents of the original Workspace are not duplicated.
n
To duplicate a Workspace:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. In the Workspace list, select the Workspace you want to duplicate.
3. Click the Duplicate button.
The Duplicate Workspace dialog box opens.
4. (Option) Modify any of the attributes of the new Workspace. For information on
modifying Workspaces, see the following topics:
88
-“Adjusting Workspace Size” on page 90
-“Renaming Workspaces” on page 89
-“Protecting Workspaces” on page 82
-“Managing Workspace Access Privileges” on page 93
5. Click the Apply button to create a new Workspace containing the attributes of the
selected Workspace.
The duplicate Workspace appears in the Workspace dialog box, and the Duplicate
Workspace dialog box refreshes to allow you to duplicate a new Workspace. The new
Workspace has a default name — Workspace n, where n is an integer that is incremented
each time you click the Apply button to create another duplicate Workspace.
If there is no room for a Workspace of the same size as the original, the operation fails
and displays a “Not enough unallocated space on the partition” error message.
6. Click the Close button to close the Duplicate Workspace dialog box and to return to the
Workspaces tool.
Renaming Workspaces
You can rename a Workspace at any time, even when it is being used by client workstations and
mapped to a local drive or by letterless mapping (to a Universal Naming Convention path) on the
client system. The only effect on users is that the Workspace name will be different the next time
they need to access it.
To rename a Workspace:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. In the Workspaces list, click the Workspace name you want to change.
3. If the Details area is not visible, do one of the following:
tClick the Details button.
tDouble-click the Workspace name.
The Workspaces Details area displays all the information on the selected Workspace.
Managing Workspaces
4. Type a new name in the Name text box. The following characters are illegal in workgroup
names: \ / = @ [ ] * ? + | : “ ; , < >. You also should not use a period (.) as either the first or
last character in the names you create, and you should not include a space in the names.
5. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the Workspace information.
6. Click the Apply button.
Setting Workspace Protection
You can use the Workspaces tool to enable or disable Workspace protection if the containing
Storage Group uses Mirrored protection. For more information, see “Storage Group Protection”
on page 68.
If the containing Storage Group uses RAID protection, Workspaces must also use RAID
n
protection.
Mirrored Storage Groups are required when you have two Management Domains, RAID Storage
n
Groups are not supported.
89
4 Managing Storage Groups and Workspaces
To enable protection for a Workspace:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. In the Workspaces list, click the Workspace you want to protect.
3. If the Details area is not visible, do one of the following:
tClick the Details button.
tDouble-click the Workspace name.
The Workspaces Details area displays all the information on the selected Workspace.
4. Click the Protection menu and select Mirrored.
In order to enable Workspace protection, there must be enough unallocated space in the
n
Storage Group to which the Workspace is assigned. Mirrored protection requires an amount
of unallocated space equal to the size of the Workspace.
5. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the Workspace information.
6. Click the Apply button.
Protection is enabled for the Workspace, and the Protection heading changes from
unprotected to the type of protection you selected.
To disable protection for a Workspace:
1. In the Workspaces list, click the Workspace from which you want to remove protection.
2. In the Details area, click the Protection menu and select unprotected from the list to
remove protection from the Workspace.
Protection is disabled for the Workspace, and the Protection field for the Workspace
changes to Unprotected.
3. Click the Apply button.
Adjusting Workspace Size
There are occasions when you must change the size of Workspaces. For example, you might
need to make a Workspace larger to create room for a capture procedure planned for later in
the day or for some new media files. Alternatively, you might need to make a Workspace
smaller to create space for other Workspaces or to reserve storage for another day.
90
To adjust the size of a Workspace:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. In the Workspaces list, select a Workspace.
3. Do one of the following:
tClick the handle of the Workspaces Size graph, and drag it to resize the graphical
display. The Workspace size listed in the Capacity text box updates as you drag the
handle.
tClick the Details button, and type a new value for the Workspace size in the Capacity
text box in the Workspace Details area.
4. Click the Apply button.
You cannot increase Workspace size above the storage space listed as the maximum size.
n
Managing Workspaces
Setting Event Triggers
You can set event triggers that will write events to the Event log when Workspace capacity (in
gigabytes) is less than the specified value or when used Workspace capacity exceeds the
specified percentage. You can create triggers for both Warning and Error events.
If you have email notifications enabled, you can select the ISIS General Error and Warning
subcodes to receive email notifications when Workspace capacity events are written to the
Windows Event Log. For more information on email notifications, see “Configuring the
Notification Service” on page 36.
To set an event trigger:
1. In the Workspaces list, select the Workspace for which you want to set a trigger.
2. If the Details area is not visible, do one of the following:
tClick the Details button.
tDouble-click the Workspace name.
The Workspaces Details area displays all the information on the selected Workspace.
91
4 Managing Storage Groups and Workspaces
3. Select one of the following from the Warning Event Trigger type list:
OptionDescription
GBUnused capacity, in gigabytes
%Used capacity, in percentage
4. In the value field, type in a value for the used or unused capacity at which you want an
event to be written to the Event Log.
5. (Option) Repeat steps 1 through 4 to set an Error event trigger.
6. Click Apply to commit your changes.
7. Click Close to close the Details window.
Deleting Workspaces
You can delete Workspaces that are not currently accessed by any clients. You can also
delete Workspaces whether or not they have media files stored on them. You can delete
multiple Workspaces at one time.
If you need to delete a Workspace, make sure that its media is no longer needed, is moved, or
is backed up. You then can safely delete the Workspace.
If you delete a Workspace that has been mapped to a local drive by a client, the client cannot
access that Workspace. Clients should unmap the deleted Workspace by using the Avid ISIS
Client Manager. For information on using the Client Manager, see the Avid ISIS 7000 Client Manager User’s Guide or the Client Manager Help.
Once the Workspace has been deleted, the system will perform a redistribution.
To delete a Workspace:
1. Open the ISIS Management Console. (For information on opening the ISIS
Management Console, see “Opening the Avid ISIS Management Console” on page 17.)
2. Click the Workspaces icon from the System Area.
The Workspaces tool opens.
3. In the Workspaces list, select the Workspace you want to delete.
4. Click the Delete button.
A dialog box opens, prompting you to confirm that you really want to delete the
Workspace.
5. Click Yes.
The Workspace is deleted.
92
Managing Workspace Access Privileges
Managing Workspace Access Privileges
You can set privileges for user and user group access to Workspaces in the Workspaces tool.
There are three levels of access available to clients of the network. The following table describes
the kinds of access privileges available to users and user groups.
Access LevelDescription
Read/WriteWorkspace can be read and written to.
ReadWorkspace can be read but not written to.
NoneWorkspace cannot be read, written to, or mounted.
By default, new client accounts do not have access privileges until an administrator assigns them
(see “Creating User Accounts” on page 102). You can customize access for each client to every
Workspace, if necessary.
For example, you might need to increase the access privileges for a user who does not have write
access to the appropriate Workspace, or for a Workspace that does not provide the appropriate
access to one or more users. To do so, you can either modify an individual client’s access
privileges in the Users dialog box (see “Modifying User Accounts” on page 105), or you can use
the Workspace dialog box (see “Setting Workspace Access Privileges” on page 94).
It is also possible to assign users access privileges different from those originally assigned to the
group. If a user group is given a more permissive level of access than some members of the
group, the group members then can have an effective access different from their assigned access.
This can be useful for projects that require users with a variety of permissions to be able to write
to certain Workspaces. You can also have users who have more permissive access than a user
group in which they are members. Using the Workspaces tool, the administrator can assign the
necessary privileges.
Consider the following for access privileges:
•As access privileges are increased, the newly accessible Workspaces are immediately
available.
•If a client has Read privileges to a Workspace and is granted Read/Write privileges, the new
privileges apply immediately, without modifying the Workspace.
•If a client is already at the Workspace selection stage when the access privileges are
removed, then newly inaccessible Workspaces remain in the display. However, attempting to
actually access the Workspaces will be unsuccessful.
93
4 Managing Storage Groups and Workspaces
•If a client has Read/Write privileges to a Workspace and access privileges are reduced to
read, the new privileges apply immediately, without modifying the Workspace. If a file
is open for writing, the client retains write privilege to that file until it is closed.
•If a client has privileges to a Workspace and those privileges are reduced to None, then
the Workspace is unavailable the next time that Workspace is accessed.
Setting Workspace Access Privileges
You can set access privileges for users and user groups when the client accounts are first
created (see “Creating User Accounts” on page 102 and “Creating Group Accounts” on
page 109). You can also change access in the Users dialog box (see “Modifying User
Accounts” on page 105). The Workspaces tool, however, allows you to set, modify, and
monitor access privileges to Workspaces without having to modify individual client
accounts.
To set user or user group access to a Workspace:
1. Open the ISIS Management Console. (For information on opening the ISIS
Management Console, see “Opening the Avid ISIS Management Console” on page 17.)
2. Click the Workspaces icon from the System Area.
The Workspaces tool opens.
94
3. In the Workspaces list, select a Workspace.
4. If the Details area is not visible, do one of the following:
tClick the Details button.
tDouble-click the Workspace name.
The Workspaces Details area displays all the information on the selected Workspace.
5. In the User Access area, select a user or a user group. Ctrl+click (Windows) or
Cmd+click (Macintosh) to select multiple users and user groups. You can select all users
and user groups by using the Select All button.
6. Do one of the following:
tClick the Read/Write button to set both read and write Workspace access for the
client.
tClick the Read button to set read-only Workspace access for the client.
tClick the None button to remove Workspace access privileges for the client.
7. (Option) Before you apply your changes, you can use the Revert button to undo any
modifications made to the user access information.
8. Click the Apply button.
Redistributing Data
Redistribution is an operation that ensures all files on a Workspace are balanced evenly across
the Storage Elements in the Storage Group to provide optimal file system performance. Data
chunks are distributed across multiple Storage Elements to ensure redundancy and protect
against data loss.
There are several operations that involve a redistribution of data:
•Adding or removing Storage Elements from a Storage Group
•Deleting or moving Workspaces
•Switching Workspaces between Mirrored protection and Unprotected
When you add or remove one or more Storage Elements from a Storage Group, the system
performs an incremental redistribution on the affected Workspace(s) in order to have minimal
impact on system performance. Each one of these incremental redistributions is counted as a
configuration change. You can view the number of configuration changes that have been applied
to a Workspace in the Details area of the Workspaces tool. For more information, see “Viewing
Workspace Details” on page 84.
After ten configuration changes, the system prompts you to perform a full redistribution. You can
manually initiate a Full Redistribution at any time using the Workspaces tool in the Management
Console. If you do not do so, the system continues to function, but the affected Workspaces, and
System at a Glance general status will both remain at Warning until a full redistribution is
performed. For more information on performing a full redistribution, see “Performing a Full
Redistribution” on page 96.
Redistributing Data
c
After 32 configuration changes without a full redistribution, the system will perform a full
redistribution automatically. This could significantly reduce system performance until the
redistribution operation has completed.
Redistribution Guidelines
You can start a redistribution when a Workspace is in a load or a no load condition:
•A load condition occurs when the Workspace has active clients (clients reading and writing
to the Workspace).
•A no load condition occurs when a Workspace has inactive clients (clients that have the
Workspace mounted but are not performing reads or writes).
95
4 Managing Storage Groups and Workspaces
Whenever you perform a redistribution, you should observe the following guidelines:
•When redistributing under load, allow the redistribution to complete before initiating a
second redistribution.
•System performance can degrade significantly during redistribution in a Storage Group
with maximum client count. Reducing the number of clients allows the active clients
using the Storage Group to function normally, with successful playback and captures.
Reducing the overall load might be needed in the event of client performance
degradation. See the Avid ISIS Performance and Redistribution Guide for more
information.
•The amount of time a redistribution takes varies depending on whether the Workspace is
in a load or a no load condition, whether you add or remove an ISB, and how much data
in the Storage Group must be redistributed. For more information on redistribution
times, see the Avid ISIS 7000 ReadMe.
•Do not physically remove an Storage Element until it has been removed from the
Storage Group, the redistribution is complete, and it has been removed from the file
system.
c
If you physically remove an Storage Element from the media network before
redistribution is complete, or if you physically remove more that one Storage Element
from a Storage Group before performing a redistribution, data loss can occur.
Limitations on expected client performance during redistribution include the following:
•Reducing audio tracks from 8 to 4 during playback might be required during
redistribution. (Normal operation supports 2 streams of video 8 tracks of audio.)
•Reducing the number of video streams from 2 to 1 might be required during
redistribution. (Normal operation supports 2 streams of video.)
Performing a Full Redistribution
In addition to automatic redistribution operations (see “Redistributing Data” on page 95),
redistribution can also be invoked manually. The most common situation where you need to
perform a full redistribution is when the Config Changes count exceeds 10. (For information
about Config Changes, see “Viewing Workspace Details” on page 84.)
When the Config Changes count reaches 10, a message warns you to perform a
n
redistribution.
When redistributing files manually, you should apply the redistribution to all Workspaces.
Avid does not recommend performing a full redistribution on some Workspaces and not on
others.
96
Redistributing Data
To redistribute Workspaces manually:
1. From the Management Console home page, do one of the following:
tClick Workspaces in the ISIS Setup icon, located in the System section.
tClick Workspaces in the pop up navigation menu.
The Workspaces tool opens.
2. Select the Workspaces whose files you want to redistribute. When undertaking a full
redistribution, select all Workspaces.
3. Click the Full Redistribution button.
A confirmation message box opens.
4. Click OK.
Files are redistributed, and the count in the Config Changes column is reset to zero. The
amount of time required for the redistribution depends on the amount of data in the
Workspace.
5. If Storage Elements have rebooted following the completion of a full redistribution, do the
following:
a.Click the Advanced Commands button.
The Advanced Workspace Commands dialog box opens.
b. Select Verify Redistribution, and then click Send.
Using Advanced Redistribution Commands
Under some conditions, you might have to suspend or resume an in-progress redistribution. You
can do this with the Advanced Commands options available on the toolbar in the Workspaces
tool.
c
Use of the Resume Redistribution and the Suspend Redistribution options can result in
degraded system performance. Suspending redistributions can have serious consequences
for the file system if not monitored closely. These two Advanced Commands options should
be used by Avid Customer Support personnel or under Avid Customer Support direction.
You can also use the Advanced Commands to verify a redistribution. Verification checks that all
bad blocks on the appropriate Storage Element have been deleted and that the redistribution has
completed successfully. You should use the Verify Redistribution command whenever Storage
Elements are rebooted following a redistribution—for example, after you upgrade your system.
In this case, Storage Elements might report a “Repairing Mirrors” status on reboot; verifying the
redistribution replays the redistribution operation using the current configuration and restores the
status to normal.
Verification causes minimal impact on performance and completes quickly.
n
97
4 Managing Storage Groups and Workspaces
To suspend a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS
Management Console, see “Opening the Avid ISIS Management Console” on page 17.)
2. Click the Workspaces icon from the System Area.
The Workspaces tool opens.
3. Select the Workspace whose files are currently being redistributed.
4. Click the Advanced Commands button.
The Advanced Workspace Commands dialog box opens.
5. Select Suspend Redistribution.
6. Click Send.
c
When you manually suspend a redistribution, you must also manually resume it.
Suspending redistributions should be considered temporary — Workspaces should not
be left in the suspended state for extended periods of time.
To resume a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS
Management Console, see “Opening the Avid ISIS Management Console” on page 17.)
2. Click the Workspaces icon from the System Area.
The Workspaces tool opens.
3. Select the Workspace whose redistribution status is Stalled.
4. Click the Advanced Commands button.
The Advanced Workspace Commands dialog box opens.
5. Select Resume Redistribution.
6. Click Send.
To verify a redistribution:
1. Open the ISIS Management Console. (For information on opening the ISIS
Management Console, see “Opening the Avid ISIS Management Console” on page 17.)
2. Click the Workspaces icon from the System Area.
The Workspaces tool opens.
98
3. Select the Workspace where the redistribution has completed.
4. Click the Advanced Commands button.
The Advanced Workspace Commands dialog box opens.
5. Select Verify Redistribution.
6. Click Send.
5Managing Client Accounts
Client accounts limit access to the file system. This section describes how to assign client
accounts with associated passwords and access privileges for users, groups, and devices.
You must create a client account for any client that needs to access the Avid ISIS media network:
users, groups, and devices. When you create client accounts, you set basic client information,
such as names and passwords.
Each user and user group account has an associated privilege level that determines what access
the user logging in to that account has when working with files stored in the network.
The ISIS Management Console allows the administrator to create client accounts for each client
connected to the system, and it maintains a record of all attached clients. The client accounts are
listed in dialog boxes for each client type: users, groups, and devices.
The Avid ISIS system supports a maximum of 330 connected clients. The system also supports a
maximum of 5,638 user accounts (including the default Administrator and Guest user accounts).
In addition, the system supports 1,000 groups. A single user can be in a maximum of 16 groups.
Some clients might not be able to connect to the media network if the combined bandwidth
n
requirement of connected components equals the system limit for bandwidth use. For information
on monitoring bandwidth use, see “Monitoring Client Bandwidth” on page 128.
Managing User Accounts
The Users tool of the ISIS Management Console allows you to perform the following actions:
•Create, modify, and delete user accounts
•Assign users to specific groups
•Manage access privileges for all users
The Users tool contains two sections. On the left side of the dialog box, the Users list displays all
the current user accounts. On the right side of the dialog box, the Details area displays
information about selected users, including user group membership and Workspace access.
The Details area is visible only after you select a client in the Users list.
n
5 Managing Client Accounts
t
re
wq
y
q
w
e
r
t
y
100
Action button toolbar—Perform actions on selected users
Details area—Detailed information on the selected users; see “Viewing User Details” on
page 101, and “User Details” on page 101
User list—Lists all users and related information; see “User List” on page 101
Group membership—Displays information about the group membership for the selected user;
see “Creating User Accounts” on page 102 and “Modifying User Accounts” on page 105
Filter area—Filter the user list display based on conditions you configure; see “Filtering the
Display” on page 27
Workspace access—Displays information about the Workspace access for the selected user; see
“Creating User Accounts” on page 102 and “Modifying User Accounts” on page 105
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.