Docu 93216
Docu 93216
Docu 93216
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY
KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE
DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their
respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
http://www.DellEMC.com
Contents
Chapter 1 Introduction.............................................................................. 13
Overview of the Cloud Tiering Appliance .....................................................................14
File tiering and migration ........................................................................................14
Block archiving ........................................................................................................15
Cloud Tiering Appliance/VE (CTA/VE) .....................................................................15
High Availability for CTA and CTA/VE......................................................................15
CTA implementation with VNX or Unity file primary storage ......................................16
CTA implementation with NetApp primary storage ....................................................17
CTA implementation with Unity block snapshots ........................................................19
CTA and CTA/VE tasks ..................................................................................................19
Using CTA and CTA/VE .................................................................................................21
Chapter 2 Cloud Tiering Appliance Hardware and Port Configurations ....... 23
Cloud Tiering Appliance 12.1.0 qualified hardware .....................................................24
Cloud Tiering Appliance High Availability types......................................................26
Contents of the appliance .......................................................................................27
Appliance diagrams ......................................................................................................28
Port details ...................................................................................................................28
Chapter 3 Installing the Cloud Tiering Appliance........................................ 29
Appliance setup ............................................................................................................30
Installing the virtual edition .........................................................................................30
CTA and CTA/VE for high availability............................................................................31
High availability with VNX or Unity primary storage ..............................................32
High availability with NetApp primary storage .......................................................32
Network console management for Gen 8 models .......................................................33
Using CTA CLI commands ........................................................................................34
Rebooting the system .............................................................................................34
Performing a CD clean install on the appliance ...........................................................34
Performing a CD clean install on a generic server .......................................................35
Adding the CTA serial number .....................................................................................36
Configuring CTA ............................................................................................................36
Configure the CTA network.....................................................................................37
Configure the hostname, domain, and DNS server ................................................38
3
Internal Use - Confidential
Contents
Configure iSCSI IQN targets (Unity block archiving and restore only) ....................38
Update the hosts file ...............................................................................................38
File Encryption..............................................................................................................39
Enabling keystore replication..................................................................................39
Configuring and using file encryption .....................................................................39
Graphical user interface ...............................................................................................40
Command line interface ...............................................................................................41
Chapter 4 Deploying the Cloud Tiering Appliance ...................................... 43
Deployment process for archiving ...............................................................................44
Step 1: Set up CTA from the CTA CLI .......................................................................45
Step 2: Configure the archive environment ............................................................45
Step 3: Configure the destination ...........................................................................46
Step 4: Define policies.............................................................................................46
Step 5: Create a task ...............................................................................................46
Step 6: Run the simulation task (optional) .............................................................46
Step 7: Run the policy task ......................................................................................46
Supported platforms ....................................................................................................46
Deploying CTA with VNX ..............................................................................................47
Prerequisites for using VNX as a file migration source or destination ...................47
Prerequisites for VNX as an archive source ............................................................48
Adding VNX to the CTA configuration .....................................................................49
Configure name resolution for archiving ................................................................51
Configuring VNX to Centera or cloud archiving on the CTA ...................................52
Prerequisite tasks on the VNX Control Station for file migration or archiving .......53
Deploying CTA with NetApp .........................................................................................58
Prerequisites for using NetApp as a file migration source .....................................58
Prerequisites for using NetApp as an archiving source ..........................................59
vFiler configuration .................................................................................................61
Configuring NetApp archiving on the CTA ..............................................................61
Adding NetApp filer to the CTA configuration ........................................................62
Verify the FPolicy configuration for CTA .................................................................64
Deploying CTA with a VNXe .........................................................................................65
Prerequisites for using VNXe as a file migration destination .................................65
Adding VNXe to the CTA configuration ...................................................................65
Deploying CTA with Unity ............................................................................................66
Prerequisites for using Unity as an archive source .................................................66
Prerequisites for using Unity as a file migration destination..................................67
Configure name resolution for archiving ................................................................67
Configuring Unity to cloud archiving on the CTA ....................................................68
Adding a Unity file server to the CTA configuration ...............................................68
4
Internal Use - Confidential
Contents
5
Internal Use - Confidential
Contents
6
Internal Use - Confidential
Contents
7
Internal Use - Confidential
Figures
Figures
8
Internal Use - Confidential
Introduction
Tables
9
Internal Use - Confidential
Preface
Preface
As part of an effort to improve and enhance the performance and capabilities of its
product lines, product hardware and software are periodically released. Therefore, some
functions described in this document may not be supported by all versions of the
software or hardware currently in use. For the most up-to-date information on product
features, refer to your product release notes.
If a product does not function properly or does not function as described in this
document, please contact your Customer Support representative.
Audience
This document is part of the Cloud Tiering Appliance and Cloud Tiering Appliance/VE
documentation set. The documentation is intended for use by:
• Storage management administrators who are new to the Cloud Tiering Appliance
and Cloud Tiering Appliance/VE.
• Existing customers who are new to version 12.x.
Related documents
The following publications provide additional information:
10
Internal Use - Confidential
Preface
11
Internal Use - Confidential
Chapter 1 Introduction
13
Internal Use - Confidential
Overview of the Cloud Tiering Appliance
The Cloud Tiering Appliance (CTA) provides a full range of features including the ability
to:
CTA is meant to be used to tier or archive cold data (rarely accessed data), not for hot
data (frequently accessed data). Otherwise, there might be an impact in the recall
performance.
Depending on the type of task, CTA supports a variety of platforms. The CTA
Interoperability Matrix found on Online Support describes the latest supported platforms
for archiving and file migration.
As an example, a CTA may be configured to locate all NAS data that has not been
accessed in one year and move that data to secondary storage. For each file it moves,
the appliance will leave behind a small space-saving stub file that points to the real data
on the secondary storage device. When a user tries to access the data in its original
location on the primary NAS, the user will be transparently provided with the actual data
that the stub points to, from secondary storage.
If a multi-tier policy is used, the appliance may be configured to move files from a
secondary storage device tier to a tertiary storage device tier. This can be particularly
useful in cases where the secondary storage device represents a tier that is smaller,
faster, and more expensive to maintain than a larger, slower, and cheaper storage used
in the tertiary tier. Once the files are moved, the space-saving stub file on the primary
NAS tier would be updated to point to the data’s new location on the tertiary storage
tier.
14
Internal Use - Confidential
In addition to tiering data from primary to secondary storage and leaving a stub behind
on the primary server for recall later, the CTA can also permanently migrate files from a
source to a destination without leaving a stub.
Block archiving
CTA leverages the Unity snapshot differentials API to efficiently take backups of block
data to the cloud. You can archive a full copy of a LUN, consistency group or thin clone to
the cloud and perform incremental archives using subsequent snapshots. You can also
customize the Common Base Frequency attribute in the CTA management GUI to decide
the spacing of full copies.
Block snapshots that have been archived to the cloud, are independent of the base
resource on the source and are not altered by the archiving. Instead they share blocks
with the baseline snapshot established by CTA. Once the LUN/snapshot is archived, it can
be deleted from the source array to free up space.
Virtual appliances are prebuilt software solutions, comprised of one or more virtual
machines that are packaged, updated, maintained, and managed as a unit. Unlike a
traditional hardware appliance, these software appliances allow customers to acquire,
deploy, and manage pre-integrated solution stacks more quickly and easily.
The CTA-HA is a dedicated machine that runs the VNX, Unity or NetApp callback agents
and is delivered preloaded with software. Installation instructions for the CTA-HA differ
slightly from the CTA. The CTA/VE-HA provides the same functionality as the CTA-HA but
is installed on a virtual appliance like the CTA/VE. A virtual HA can be deployed with a
physical CTA and vice versa. In this way, a network with a physical CTA does not need a
second piece of hardware to provide HA, it can use a CTA/VE-HA.
15
Internal Use - Confidential
High-availability appliances are not needed in all tiered source and destination
combinations. The CTA and CTA/VE Interoperability Matrix provides more details.
Circled numbers correspond to the following steps that illustrate the recall process in the
VNX or Unity implementation:
Clients send read/write operations for files that have been archived. These stub files
contain information about where the file has been archived to. These operations are
intercepted by the DHSM layer on the VNX or Unity system prior to being serviced
from the file system.
If the file has been archived to Dell EMC Centera® or cloud storage (such as Dell EMC
Atmos™, Amazon S3, ECS/S3, or Microsoft Azure), the VNX or Unity resolves the fully
qualified domain name (FQDN) stored in the stub file to the IP address of the CTA or
CTA-HA.
16
Internal Use - Confidential
The storage system then uses HTTP to read the archived data from the appliance,
which in turn reads it from cloud storage by using the platform API. If an appliance
does not respond to the HTTP read requests, the VNX or Unity system uses an
alternate IP address of another appliance configured in DNS. Every callback server
(CTA, CTA-HA, CTA/VE, or CTA/VE-HA) has its IP address associated with a single
hostname in DNS. The FQDN uses that hostname, which may have multiple IP
addresses associated with it.
If the file has been archived to an NFS or CIFS repository, the VNX opens a
connection to the repository and reads back the data.
The VNX responds to the client operation as usual if the recall was successful, or the
client receives a message that the file cannot be opened if the recall fails.
Note When VNX data has been archived to a VNX, VNXe, NetApp, Data
Domain, Isilon, or Microsoft Windows repository, the CTA or CTA/VE is
not involved in the recall process, and a high availability appliance is not
used.
17
Internal Use - Confidential
Circled numbers correspond to the following steps that illustrate the archive and recall
process in the NetApp implementation:
Clients send read/write operations for files that have been archived. These
operations are intercepted by the FPolicy layer on the NetApp prior to being serviced
from the Write Anywhere File Layout (WAFL) filesystem.
The NetApp is configured with the following groups:
a. A primary group of callback servers, such as a CTA and possibly one or more
CTA-HAs.
b. A secondary group, such as one or more physical or virtual HAs.
The NetApp will send FPolicy callbacks to servers registered in the primary group in
round-robin fashion. If a server does not reply to the callback, it is removed from its
group. If there are no servers in the primary group, the callbacks are distributed in a
round-robin fashion among the servers in the secondary group.
For CTA/VE, the primary group of callback servers consists of virtual machines such
as a CTA/VE and possibly one or more CTA/VE-HAs. The secondary group consists of
one or more CTA/VE-HAs.
The appliance connects to the filer by using CIFS to read the contents of the stub file.
The stub file points to where the file data is stored. The appliance then connects to
the NFS repository, CIFS repository, Centera, or cloud storage where the data was
archived. It then reads the data by using the native protocol and the file data is
written back to the NetApp.
The filer responds to the client operation as usual if the recall was successful, or with
an "access denied" message if the recall failed.
Note It is a requirement that the software versions of all the appliances match. For
example, do not deploy a configuration with a CTA that is running version 8.0
and a CTA-HA that is running version 7.4. While the software does not perform
any explicit checks to ensure the versions are compatible, the running of
different software versions has not been tested and may result in unexpected
behavior.
18
Internal Use - Confidential
CTA implementation with Unity block snapshots
Figure 3 shows the architecture of CTA implementation with Unity block snapshots.
• Tiering or archiving
• Deleting orphaned data
• Auxiliary tasks, such as stub scanning and backup
• Migration tasks such as repository migration and file migration
For archiving, deleting and migrating files, the software leverages a policy engine to
select the files. Users can combine and evaluate multiple rules together in a single policy.
Several rule types are available.
Before running the archive, delete, or migration task, the running of a simulation allows
administrators to review real-time results without executing the task. The results will
return:
Run a simulation to gain insight into the efficiency of a task before running the task. This
practice is notably important for the delete tasks, since these tasks remove data. A
report displays results of the task.
19
Internal Use - Confidential
Archive tasks may be one of three types:
• Archive (with policy) — Archives regular (non-stub) files. Files are selected for
archiving based on the archive policy.
• Multi-tier (with policy) — For this archiving task, regular and stub files are
evaluated with the multi-tier policy.
a. If a regular file matches the policy, it is archived.
b. If a stub file matches the policy, archived data is moved to a different
storage tier and the stub is updated to point to the new location.
• Multi-tier stub (with policy) — For this archiving task, only stub files are
evaluated with the multi-tier stub policy. If a stub file matches the policy,
archived data is moved to a different storage tier and the stub is updated to
point to the new location. Otherwise, the archived data remains in the current
storage tier.
In addition, CTA can perform an archive task on an imported list of files.
Delete tasks may be one of two types:
• Delete orphan with policy — Deletes orphans on secondary storage that match
the delete orphans’ policy.
• Delete stub with policy — The delete stub task deletes stubs that match the
delete stubs policy. Stubs on primary storage and files on the second tier that are
no longer under retention or that were defined without any retention period are
automatically deleted.
Auxiliary tasks are:
• Scan stubs — When a file is archived, a stub file remains on the source and an
entry is added to the CTA database, and maps the name and location of the
archived file to its stub. The stub scanning task tracks the stub file information.
When a stub has not been detected on a CIFS share or NFS export for 30 or more
days, the corresponding archived file is designated as an orphan. If stub files are
moved from the original archive location to another location, manually run a
stub scanner task on the new location so that the CTA does not consider these
files orphans.
• Backup — The backup task performs periodic backups of the CTA configuration
and database. Schedule backup tasks as part of a regular maintenance program.
Only one backup task may be scheduled.
Migration tasks are:
20
Internal Use - Confidential
definition. The task evaluates both normal and stub files based on the migrate
file policy with a resulting action of either migrate or don’t migrate.
The CTA software also has the capability to recover stub files accidentally deleted by
client systems. It can even recover prior versions of files archived to any secondary
storage destination.
Note Do not duplicate stubs, because CTA does not support them. Repository
migration and Orphan deletion tasks will randomly detect and manage the first
occurrence of a stub and will ignore the duplicates. This can lead to data
unavailability and data loss.
Technical system details that are not related to the GUI, but are required to configure
the CTA or CTA/VE, are provided in the following chapters and appendixes:
21
Internal Use - Confidential
Chapter 2 Cloud Tiering Appliance Hardware and
Port Configurations
23
Internal Use - Confidential
Cloud Tiering Appliance 12.1.0 qualified hardware
• Dell R630 G13 server is qualified with CTA 12.1.0. User must perform a CD clean
install of CTA and CTA-HA after purchasing these servers.
• Table 1 lists the Gen 13 hardware configuration of the Dell R630 server qualified
for CTA
• It is recommended to use the virtual CTA. The Migrating from CTA to CTA/VE
section provides the steps to migrate from a physical CTA to a virtual one.
Table 1. Dell R630 G13 hardware qualified for CTA
Component Dell Power Edge R630 G13
Chassis Chassis with up to 8, 2.5" hard drives, 3 PCIe slots
Size 1U
Disks Four 1.2TB 10K RPM SAS 12Gbps 2.5" Hot-plug hard drives in a
RAID-1 configuration with two hot spares. SATA or Nearline SAS
hard drives are an option.
CD-ROM Internal SATA DVD-ROM that can read CD or DVD material for
system install or upgrade.
Network Two 10/100/1000 Mbps and two 100 Mbps/1 Gbps/10 Gbp
interfaces
VGA Two 15-pin B10VGA ports on the front and back panels to
connect the system to a VGA display for system console.
Keyboard Two 4-pin, USB 2.0-compliant ports on the front and back panels
connector to connect a standard USB keyboard for system console.
Mouse Two 4-pin, USB 2.0-compliant ports on the front and back panels
connector to connect a standard USB mouse for system console.
Serial port One standard DB9 serial connector on the back panel for a serial-
terminal system.
• Table 2 lists the Gen 13 hardware configuration of the Dell R630 server qualified
for CTA-HA
Table 2. CTA-HA that is based on Dell R630 G13
Component Dell Power Edge R630 G13
Chassis Chassis with up to 8, 2.5" hard drives, 3 PCIe slots
24
Internal Use - Confidential
Component Dell Power Edge R630 G13
Size 1U
Disks Two 1.2TB 10K RPM SAS 12Gbps 2.5" Hot-plug hard drives in a
RAID-1 configuration. SATA or Nearline SAS hard drives are an
option.
CD-ROM Internal SATA DVD-ROM that can read CD or DVD material for
system install or upgrade.
Network Two 10/100/1000 Mbps and two 100 Mbps/1 Gbps/10 Gbp
interfaces
VGA Two 15-pin B10VGA ports on the front and back panels to
connect the system to a VGA display for system console.
Keyboard Two 4-pin, USB 2.0-compliant ports on the front and back panels
connector to connect a standard USB keyboard for system console.
Mouse Two 4-pin, USB 2.0-compliant ports on the front and back panels
connector to connect a standard USB mouse for system console.
Serial port One standard DB9 serial connector on the back panel for a serial-
terminal system.
• Table 3 lists the Gen 8 hardware configuration for the CTA that is based on the
Intel C1U hardware.
Table 3. CTA that is based on Intel C1U
Component CTA8-APL
Chassis The appliance is based on Intel C1U Kylin node hardware.
Power Dual 750 watt. Item (b) in Figure 4. Power button and
identification light is item (f) in Figure 5.
CPUs Dual Intel Sandy Bridge Six Core AES 256 HW encryption.
25
Internal Use - Confidential
Component CTA8-APL
Disks Four 900 GB 2.5-inch, 10K RPM hard drives in a RAID-5
configuration. Items (b) through (e) in Figure 5.
CD-ROM Read-only DVD that can read CD or DVD material for system
upgrades. Item (a) in Figure 5.
Memory 16 GB
VGA Standard VGA video connector for a system console. Item (a) in
Figure 5.
Keyboard Standard USB keyboard connector for a system console. Item (d)
connector in Figure 5.
Mouse Standard USB mouse connector for a system console. Item (c) in
connector Figure 5.
CPU Single Intel Sandy Bridge Six Core AES 256 HW encryption.
CD-ROM Read-only DVD that can read CD or DVD material for system
upgrades. Item (a) in
Memory 16 GB.
26
Internal Use - Confidential
Component CTA8-HA-APL
Network Four on-board gigabit 10/100/1000 TX Ethernet copper ports
interfaces with RJ45 connectors. Item (e).
Two 10GbE optical ports provided with the Intel mezzanine
module. Item (g).
One dedicated management port. Item (f).
All items in Figure 4.
VGA Standard VGA video connector for a system console. Item (a) in
Figure 4.
Keyboard Standard USB keyboard connector for a system console. Item (d)
connector in Figure 4
Mouse Standard USB mouse connector for a system console. Item (c) in
connector Figure 4.
Models CTA8-APL and CTA8-HA-APL support four on-board gigabit Ethernet copper
10/100/1000TX ports, two 10 gigabit Ethernet SR (short range) optical ports, and one
dedicated management port (MGMT). Network console management for Gen 8 models
describes how to use the management port.
27
Internal Use - Confidential
Appliance diagrams
These diagrams illustrate configurations of the CTA and CTA-HA.
Port details
Models CTA8-APL and CTA8-HA-APL support four on-board gigabit Ethernet copper
10/100/1000TX ports, two 10 gigabit Ethernet SR (short range) optical ports, and one
dedicated management port (MGMT). Network console management for Gen 8 models
describes how to use the management port.
28
Internal Use - Confidential
Chapter 3 Installing the Cloud Tiering Appliance
29
Internal Use - Confidential
Appliance setup
Before an appliance may be used to perform tasks, the appliance and the software must
be properly configured:
• If a Cloud Tiering Appliance (CTA) is being deployed, port details that are used to
connect the appliance to the network are provided in Chapter 2, Cloud Tiering
Appliance Hardware and Port Configurations.
• If a Cloud Tiering Appliance/VE (CTA/VE) is being deployed, follow the
instructions in Installing the virtual edition.
• If a Cloud Tiering Appliance for High Availability (CTA-HA) or Cloud Tiering
Appliance/VE for High Availability (CTA/VE-HA) is being deployed, CTA and
CTA/VE for high availability describes configuration considerations.
• Follow the instructions in Network console management for Gen 8 models.
• The CTA software is preinstalled on every new appliance. If the software must be
reinstalled and no previous CTA information or data needs to be retained, follow
the instructions provided in Performing a CD clean install on the appliance.
• To install the appliance on the network, follow instructions provided in
Configuring CTA.
• If a CTA-HA or CTA/VE-HA is deployed and encryption is to be used, follow the
instructions provided in File Encryption. CTA uses AES 256 in CTR mode for
encryption.
• If the system requires security hardening or any other special configuration,
Chapter 6, Cloud Tiering Appliance System Settings provides information for all
system settings.
Then proceed to configure the appliance for your environment as described in Chapter 4,
Deploying the Cloud Tiering Appliance.
Note If VMware snapshots will be used, reserve extra disk space when creating the
VMware datastore during installation. To estimate the total amount of disk
space to reserve for the datastore, add thirty percent of the size of the CTA/VE
VMDK file for each snapshot.
The following example shows the steps to install the CTA/VE or CTA/VE HA virtual
appliance using vSphere 6.x:
30
Internal Use - Confidential
Open the vSphere Client.
a. Click the Hosts tab. To find the appliance with the most free space, consider
%CPU and %Memory.
b. Select the line with the ESXi server for the installation. A summary of the
CPU, memory, and data store capacities appears.
If the ESXi Server has enough CPU and memory available to install the CTA/VE,
per the requirements stated in the latest CTA Interoperability Matrix on Online
Support, proceed to the next step.
Import the OVA file. Instructions differ depending upon VMware version.
a) Select File > Deploy OVF Template.
b) On the Deploy OVF Template screen, click Browse to locate the OVA file.
c) Click Next through several screens until the Storage screen appears. Select the
destination storage on the appliance.
Note: By default, CTA uses Thick Provisioning. It can be changed to Thin
Provisioning depending the requirement without any impact on the CTA.
d) Click Next through several screens until the Ready to Complete screen appears.
Validate the information and click Finish.
The import may take 3–30 minutes depending on the network connection between
the VI Client and the VMware ESXi Server. Approximately 1 GB will initially be
transferred across the network.
When using CTA-HA or CTA/VE-HA for recall, callback services are configured on the
appliance or the virtual appliance.
This configuration eliminates a single point of failure for the primary callback service and
ensures transparent client access to archived data.
To fulfill requirements for high availability, recall operations can be handled by a group
of appliances such as CTAs, CTA-HAs, CTA/VEs, or CTA/VE-HAs.
31
Internal Use - Confidential
High availability with VNX or Unity primary storage
For VNX primary storage archived to a Centera, Atmos, or VNX, or Unity files archived to
Amazon S3 servers, ECS/S3, or Azure, the Data Movers/NAS servers resolve an HTTP fully
qualified domain name (FQDN) to the IP addresses of the appliances. If a Data
Mover/NAS server identifies multiple IP addresses mapped to the same FQDN, it will
select the first address it finds and attempt to send the recall request. If the IP address is
not responsive, the Data Mover/NAS server will select subsequent addresses for the
FQDN and attempt to send the recall requests to those addresses.
All recall requests generated by a Data Mover/NAS server when resolving the FQDN are
sent to a single appliance even if multiple IP addresses are found. Each Data Mover/NAS
server can be configured to send recall requests to a preferred appliance which provides
coarse-grained load balancing of recall requests at the Data Mover/NAS server level. For
more information, see Deploying CTA with Unity.
To ensure that the Data Mover/NAS server will contact CTAs and CTA-HAs for recall, first
create a DNS record for the CTA, then add the IP addresses of all CTA-HAs to that record.
The same name points to the IP addresses of the CTA and all HA recall devices. Configure
name resolution for archiving provides details on how to use local hostname resolution
or DNS to add the HA appliances.
Run ccdsetup on all CTA-HAs or CTA/VE-HAs that will process recall requests from the
VNX Data Movers. Run acdsetup on all CTA-HAs or CTA/VE-HAs that will process recall
requests from the VNX Data Movers or Unity NAS servers. These scripts link multiple
appliances to process recall requests from a common set of VNX or Unity Data
Movers/NAS servers. Configuring VNX to Centera or cloud archiving on the CTA provides
details on ccdsetup and acdsetup.
No additional appliances are involved in recall when the CTA or CTA/VE archives data
from VNX primary storage to NAS repositories serving as secondary storage. The Data
Movers use the CIFS and NFS protocols to recall data directly from secondary storage.
For NetApp primary storage, multiple appliances can register in the primary or secondary
FPolicy groups of the filer. In the event that a registered server becomes unresponsive, it
is removed from its group. Recall requests will be sent by the filer in a round-robin
fashion to the IP addresses registered in the primary group. If there are no responsive IP
addresses in the primary group, then the requests are load-balanced across the servers
in the secondary group.
Run fpsetup on the CTA-HAs or CTA/VE-HAs that will process recall requests. Use this
script to link together multiple appliances that will process recall requests that are sent
from a common set of NetApp Filers. Later, when configuring NetApp filers, you will have
the option to select specific appliances that will register in the primary and secondary
groups. Configuring NetApp archiving on the CTA provides details on fpsetup.
32
Internal Use - Confidential
Appliances are always involved in recall when the CTA or CTA/VE archives data from
NetApp primary storage to any secondary storage location. NetApp filers do not recall
data directly from VNX, Unity, Centera, or NetApp storage.
Note If file encryption is not in use, a single CTA-HA or CTA/VE-HA can provide
redundancy for multiple CTAs or CTA/VEs. A single CTA or CTA/VE can have
multiple CTA-HAs or CTA/VE-HAs registered to provide redundancy. Do not use a
CTA to provide redundancy for another CTA or a CTA/VE to provide redundancy
for another CTA/VE.
Use the local console to configure the CTA for network console management and to
change the BMC Web Console Management User password.
33
Internal Use - Confidential
Select the Configuration tab.
Select Users.
a. Under User Name, select root.
b. Click Modify User. The Modify User page appears.
Type and confirm a password for the root user.
Before starting the installation, check to see if the CTA is connected to another appliance
for HA, another CTA, or a stand-alone appliance with a callback daemon running. If so,
stop all callback daemons with the following commands:
fpolicycallback stop
atmoscallback stop
celerracallback stop
34
Internal Use - Confidential
a. Run md5sum to verify the image integrity.
The output of the md5sum commands is in the README file that is posted to
Online Support, with all the downloads. Where to Get Help provides
information on how to access Online Support.
The ISO files are named:
cta-11.0.0-xxx.x86_64.iso
ctaha-11.0.0-xxx.x86_64.iso
35
Internal Use - Confidential
Insert disc for CTA or CTA/HA depending on the server you are installing.
Boot the server from the inserted disc.
When the server boots, choose Install/Restore_cta.
Choose Yes, when the Destroying ALL data on /dev/sda, continue prompt appears.
The appropriate packages are installed.
A restart occurs after installation completes and the login prompt appears.
Log in with username root and password rain.
Use the Cloud Tiering Appliance setup tool menu that appears to configure the time
and network settings.
If the CTA will be configured for VNX to Centera or cloud archiving, use FileMover
Settings as described in step 7 of Adding a VNX to the CTA configuration.
Configure the single set of credentials for recall before running ccdsetup.sh or
acdsetup.sh as described in Configuring VNX to Centera or cloud archiving on the
CTA.
where EMCSERIALNUMBER is located on a pull out card on the front of the appliance or
printed on the media kit label for CTA/VE versions of the product.
For CTA 12.0.1 systems, which are bundled with Unity, use the Unity serial number. To
obtain the Unity serial number, ssh to the management IP as service and run the
svc_diag command.
Configuring CTA
Before proceeding with the setup, ensure that you have the following information for
each appliance:
• IP address
• Subnet mask
• Hostname
36
Internal Use - Confidential
• Default gateway IP
• DNS server IP — If specifying multiple IP addresses, use spaces to separate IP
addresses.
• CTA serial number from CTA packaging
Set up the appliance:
a. For a CTA or CTA-HA, connect the keyboard and monitor to the appliance.
Connect the power cord and power on the appliance. If a keyboard and
monitor are not available, connect a PC or laptop using a crossover cable
connected to the MGMT port for Gen 8 models.
b. For a CTA/VE, power on the appliance.
Log in to the appliance by using the local keyboard and monitor. Type root as the
login name. Type rain as the password. Provide a new password for the root user
and confirm the new password.
The Cloud Tiering Appliance setup tool appears. This tool performs basic setup tasks
that are not available through the CTA GUI.
Select Configure Cloud Tiering Appliance Networking. The network configuration
menu appears.
Use the menu to:
a. Configure the CTA network. Follow the steps in the “Configure the CTA
network” section.
b. Configure the hostname, domain, and DNS server. Follow the steps in the
“Configure the hostname, domain, and DNS server” section.
Select Configure date and time (including timezone). The current date/time and a
list of current NTP servers are displayed.
Use the menu to set the time zone and date for the appliance and configure an NTP
server.
Note When archiving to the cloud (for example, Atmos, Amazon S3, or Azure), the CTA
clock must be accurate and in sync with the cloud service. Therefore, it is
required to have an NTP server configured when archiving to these destinations.
Select option 1 from the Network Configuration menu. The Cloud Tiering Appliance
Network Setup, Main Menu appears.
On the list of available physical interfaces on the appliance, eth0 appears highlighted.
To highlight a different interface, use the up arrow and down arrow keys.
With eth0 highlighted, press Enter. The configuration menu for the eth0 interface
appears:
a. Use the up arrow and down arrow keys to highlight the IP address field.
Press Enter and type a new IP address value into the New Value column.
Press Enter.
37
Internal Use - Confidential
b. Repeat the process to provide the subnet mask, gateway, and MTU settings.
When the configuration for this interface is complete, press the left arrow key to exit
the eth0 interface configuration.
To save the interface configuration, select Yes and press Enter. Note that the
changes are saved but will not be implemented until the Cloud Tiering Appliance
Network Setup menu is exited.
Press the left arrow key to exit from the Cloud Tiering Appliance Network Setup,
Main Menu. When prompted, select Yes to save your changes.
Select option 2 from the Network Configuration Menu. The following menu appears:
EMC Cloud Tiering Appliance Setup Tool (Configure Hostname,
Domain and DNS Server(s))
Hostname = fm
Domain =
DNS Server =
Type Y. Use the menu to configure the hostname, domain, and DNS servers.
The new hostname, domain, and DNS server information is summarized after all the
changes are entered, and you are given the ability to accept or make further changes
to these settings. To keep the new settings and return to the network configuration
menu, press Enter.
Verify that the network configuration has been saved and network connectivity can
be established properly.
Configure iSCSI IQN targets (Unity block archiving and restore only)
To use the block archiving and block restore features, the CTA need to have ISCSI IQN
targets configured.
Auto generating ISCSI IQN for the first time ... iqn.1992-
04.com.emc:cta:fm-0
38
Internal Use - Confidential
Select option 4 from the Network Configuration Menu to import changes from
/etc/hosts.local into /etc/hosts.
Note If /etc/hosts is customized, maintain /etc/hosts.local to preserve those
customizations and restore /etc/hosts if needed.
File Encryption
Archiving to cloud services such as Atmos or Amazon S3 is a means of archiving at rest
data. However, there is a risk of compromising sensitive data stored in the cloud unless
file encryption is used.
To archive to the cloud with file encryption, a primary CTA or CTA/VE must be deployed
with a CTA-HA or CTA/VE-HA. The HA appliance is configured with a keystore that
replicates the keystore on the primary appliance. As long as a key is active and the
keystores on the HA and primary appliances are in sync, policy-based file level encryption
is enabled.
This stores the IP address of the main CTA or CTA/VE and the timestamp of the most
recently replicated keystore in the configuration file:
/opt/rainfinity/filemanagement/conf/krd.xml
Then it starts the keystore replication daemon that automatically keeps the keystore on
the high availability appliance in sync with the primary appliance.
To archive to a cloud service with file encryption on, click Encrypted when adding a rule
to an archive policy. If no key is active, Encryption is grayed out.
To migrate secondary storage tier data to a cloud service with file encryption on, click
Encryption when selecting the destination for the repository migration task.
If an active key has not been replicated to the CTA-HA or CTA/VE-HA, an error appears
indicating that file encryption is not enabled.
39
Internal Use - Confidential
The Advanced Encryption Standard (AES) 256 Encryption is used to encrypt and decrypt
data blocks. The block cipher algorithm AES is used in CTR mode. This algorithm is
implemented in the OpenSSL FIPS 140-2 library.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Note: For Admin user, a window is displayed to change the password.
Change the password and re-login with new password.
40
Internal Use - Confidential
Command line interface
As an alternative to the GUI, you can use a command line interface to send commands to
the filemanagement daemon.
To log in to the CLI by using SSH, the default username and password are:
• Username: root
• Password: rain
The most commonly used commands are:
41
Internal Use - Confidential
Chapter 4 Deploying the Cloud Tiering Appliance
43
Internal Use - Confidential
Deployment process for archiving
Figure 6 illustrates how the Cloud Tiering Appliance (CTA) or Cloud Tiering Appliance/VE
is deployed for archiving.
Note The first time you install and configure the CTA system, click the Add Task
Wizard in the CTA dashboard to guide you through the steps of configuring your
system, archiving, or migration task.
44
Internal Use - Confidential
Note For VNX to NAS configuration, NAS repositories can be VNX, VNXe, Windows,
Isilon, NetApp, or Data Domain.
For details on deploying the CTA or CTA/VE in various environments, see the following
sections. Steps in the five boxes at the bottom of the flowchart are performed by using
the CTA GUI. The online help describes these steps in detail.
a. Get the URL endpoint, Access Key ID, and Secret Key ID.
b. Navigate to the CTA GUI and add the cloud provider under Configuration
> Server. Provide the URL endpoint, Access Key ID, Secret Key ID, and
bucket name, as described in the previous steps to add the cloud
provider to CTA.
c. Configure Unity settings under Common API Settings.
d. Initialize recall services from the CTA CLI.
f. Add the Unity under Configuration > Server. For Unity, CTA enables
DHSM in the NAS Server as part of the first archive task run. If CTA is not
able to configure DHSM on the NAS Server, the user is required to enable
DHSM on the NAS Server.
45
Internal Use - Confidential
Configure VNX settings under Common API Settings.
VNX to NAS
Configure VNX properties.
Configure VNX settings under Common API Settings.
Configure DHSM.
NetApp
Configure ONTAPI.
Configure vFilers, if applicable.
Initialize recall services.
Configure NetApp properties.
Supported platforms
Platform support varies depending on the task performed. Refer to the latest CTA
Interoperability Matrix on Online Support for the latest supported platforms for archiving
and file migration.
VNX, VNXe, Unity, Windows, Isilon, NetApp, and Data Domain are collectively referred to
as NAS repositories, as described in Configuring a NAS-based repository.
46
Internal Use - Confidential
For File migration, stub retention for Windows is not supported. The destination must be
offline until migration is complete. Otherwise there is a risk of data loss or damage.
With VNX as a source, the deployment requirements vary with task type.
• CTA requires access through both CIFS and NFS to complete a file migration (KB
Article Number 000464016).
• For NFS, CTA has root access with read/write permission on source and
destination exports.
• CIFS user has local administrator access on all source and destination shares and
is part of the Backup Operators group.
• If migrating files from a source that is shared and exported, CTA has root access
with read/write permission to both shares and exports.
• If migrating dedupe files from VNX to Isilon, set the backup data threshold for
VNX File Deduplication and Compression on a Data Mover to 0 before migration:
$fs_dedupe -default -set <movername> -backup_data_threshold 0
47
Internal Use - Confidential
Note Do not run any other backup applications on the Data Mover while migration is
running because this is a global parameter that will cause all other backup
applications to inflate dedup files.
Direct command line access to the VNX Control Station is not used by the CTA.
When configuring VNX Data Mover properties on the CTA, plan to provide:
• Credentials for a Common API user. This single set of credentials is used for both
archive and recall.
• Control Station IP address.
• (For CIFS archiving only) The NetBIOS name of the file server or Kerberos FQDN.
• (For CIFS archiving only) Credentials for Windows domain user.
When archiving to a NAS repository, virus scanning can have the following effects:
• Virus scanning on the destination will negatively impact CTA performance and
should be disabled.
• Virus scanning on the destination can also delete files, leaving stub files on
primary storage that cannot be opened.
To disable virus scanning on the VNX, mount the file system with the noscan option.
48
Internal Use - Confidential
Adding VNX to the CTA configuration
Note The VNX Properties page is not displayed.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select VNX. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
49
Internal Use - Confidential
Step Description
no action and the prerequisite tasks must be
performed manually.
50
Internal Use - Confidential
Step Description
Review the Summary and click Finish to define the VNX file server.
Select Configuration and Common API Settings. The Common API Settings page is
displayed.
Type the username and password for the FileMover Credentials. The system uses
this username and password to create an HTTP connection by using XML API. This
same username and password are used when creating the FileMover user in
Prerequisite tasks on the VNX Control Station for file migration or archiving
The FileMover setting applies to all VNX file servers configured on the CTA. If all VNX
file servers are archive targets only, the FileMover setting is not required.
Note Because CTA migrates data using NDMP, it can migrate both NFS and CIFS
metadata in a single protocol migration, provided that the NDMP format does
not require conversion. For example, when both the source and destination are
VNX systems, no conversion is necessary. However, to migrate NFS and CIFS
metadata between systems that require NDMP format conversion, you must
both export and share the file system. For example, CTA cannot migrate CIFS
data in an NFS migration involving systems other than VNX. This is because after
CTA converts the NDMP data stream, it can only migrate CIFS metadata using
CIFS protocol.
Note These instructions pertain only to configuring the hosts file on the VNX.
Configuring CTA provides information on how to configure the CTA hosts file.
• To use DNS:
a. Create a DNS entry for the callback daemon that points to the appliance.
As a best practice, the CTA hostname and CCD hostname should be different.
Using the same hostname for both can raise issues when trying to login to the
appliance.
b. Create multiple entries by the same name for each callback appliance.
51
Internal Use - Confidential
c. For each entry that is created, select the checkbox for Create associated
pointer (PTR) record to ensure that it will be included in the Reverse
Lookup Zones list.
Note The VNX FileMover supports DNS HA failover. If the DNS server resolves the
callback daemon hostname to multiple IP addresses, the VNX FileMover
transparently switches to the server at the next available IP address.
• DNS is the preferred method for name resolution. If using DNS is not feasible,
use local hostname resolution:
a. Log in to the VNX Control Station as root and mount the Data Mover to
edit the local hosts file with vi:
mount server_2:/ /mnt/source
cd /mnt/source/.etc
vi hosts
where:
− rainccd.domain is the FQDN that will be used to create the HTTP DHSM
connection described in Adding VNX to the CTA configuration (see
description for CCD DNS Name).
− rainacd.domain is the FQDN that will be used to create the HTTP DHSM
connection described in Adding VNX to the CTA configuration (see
description for ACD DNS Name).
c. Save the file and confirm that the VNX Control Station is not mounted to
the Data Mover:
cd ~
umount /mnt/source
52
Internal Use - Confidential
Type n when the following message appears:
By default the Celerra Callback Daemon will connect to the
CTA service on the local machine.
Do you wish to configure another CTA? (y/n)
If there is a secondary callback agent such as a CTA-HA, log in on that agent as root,
and repeat steps 2 and 3. In step 3, type y to provide the IP address and the root
password of the CTA.
If an invalid IP address is provided, the CCD.log file located in
/var/log/rainfinity/filemanagement/recall will fill with errors to indicate that there
was no response from the primary agent. To correct the problem, repeat steps 2
through 4 of this procedure.
Configure the callback service to recall from the cloud
To configure recall from the cloud service such as Atmos or Amazon S3:
If there is a secondary callback agent such as a CTA-HA, log in on that agent as root,
and repeat steps 2 and 3. In step 3, type y to provide the IP address and root
password of the primary callback agent.
If an invalid IP address is provided, the ACD.log file located in
/var/log/rainfinity/filemanagement/recall will fill with errors to indicate that there
was no response from the primary agent. To correct the problem, repeat steps 2
through 4 of this procedure.
Prerequisite tasks on the VNX Control Station for file migration or archiving
If a VNX has not been configured as a source for file migration or archiving, perform the
following steps:
53
Internal Use - Confidential
where CTA_IP_ADDR is the IP address of your appliance. Add an entry for
each CTA. HA appliances are not added.
For example, if the IP address is 10.10.18.1, type:
::10.10.18.1::: CTA requires no translation (UTF-8)
Create the FileMover user. Log in to the VNX Control Station CLI as root and type the
command:
/nas/sbin/server_user <data_mover> -add -md5 -passwd <user>
Enable DHSM (FileMover) for the Data Mover. To enable DHSM and keep it enabled
if the Data Mover reboots, run the following command once:
server_http <data_mover> –service dhsm –start
Enable DHSM for specific filesystems that will be used as archiving sources. To
enable DHSM and keep it enabled if the Data Mover reboots, run the following
command once per filesystem.
fs_dhsm -modify <primary_fs> -state enabled
54
Internal Use - Confidential
For example: fs_dhsm -modify fileSystem1 -state enabled
Ensure that the DHSM offline attribute is enabled for filesystems that will be used for
archiving. To verify that the offline attribute is on, run the command:
fs_dhsm -i <fs_name> | grep ’offline attr’
Caution Once the offline attribute is set to on, it must remain on. Disabling the
offline attributes after executing archive tasks can lead to data
loss.
Create one or more connections from the Data Mover to the secondary storage locations
for each filesystem that will be archived. Each CIFS or NFS repository used to store
archived data needs to be configured as a DHSM connection for the VNX filesystem. If
data will be archived to a Centera or cloud storage service, a DHSM connection that uses
the HTTP protocol must be configured for that filesystem to the CTA or callback FQDN.
To configure this feature, perform the following steps as root user on the VNX and the
appliance:
Run the commands on the VNX as root user, and not as nasadmin.
Check to see if the XML API server is running on the VNX, type:
ps -ef | grep start_xml_api_server | grep -v grep
55
Internal Use - Confidential
If the XML API server still fails to start, contact VNX support.
Create a new system user for the XML API. Use the API GUI on the VNX Control
Station.
For a new user on a VNX running DART 7.x:
a. Log into Unisphere as root. For Scope, select Global.
b. Select: Settings > Security > Local Users > Create. The New User
screen appears.
For a new user on a VNX running DART 7.1.x:
a. Log into Unisphere as sysadmin. For scope, select Global.
b. Select: Settings > Security > User Management > Local Users for File
> Create. The New User screen appears.
Use the same username and password that was defined for the Common API
user in Prerequisite tasks on the VNX Control Station for file migration or
archiving.
When a user password is updated or changed on the VNX Control Station,
update the FileMover Credentials under Common API settings for the VNX
Properties on the appliance as in Adding VNX to the CTA configuration and
update the DHSM connection password with the command:
fs_dhsm -connection <primary_fs> -modify <cid> -password
<new_password>
Define VNX Data Mover properties on the CTA or CTA/VE. Adding VNX to the CTA
configuration describes the following properties in greater detail:
a. For Control Station, provide the Control Station IPs.
b. For FileMover Settings, type the username and password that were created
for the new system user.
If DHSM connections do not exist, the CTA automatically creates the connections before
running each archiving task.
• When archiving CIFS data to NAS, you archive to a CIFS repository configured on
the appliance.
Create a connection to each CIFS repository that will hold archived data. This setting
applies to any repository that is part of a multi-tier destination. Log in to the CLI of
the VNX Control Station and type the command:
56
Internal Use - Confidential
fs_dhsm -connection <primary_fs> -create -type cifs –admin
‘<fqdn>\<domain_administrator>’ –secondary
‘\\<fqdn_of_secondary_server>\<repository_path>’ -local_server
<local_cifs_server>
• When archiving NFS data to NAS, you archive to an NFS repository configured on
the appliance.
Create a connection to each NFS repository that will hold archived data. Log in to the
CLI of the VNX Control Station, and type the command:
fs_dhsm -connection <primary_fs> -create -type nfsv3 –secondary
‘<fqdn_of_secondary_server>:/<repository_path>’ -proto TCP –
useRootCred True
57
Internal Use - Confidential
the CTA configuration. The FQDN must be distinct even if the
VNX and cloud callback daemons are running on the same
appliance.
f. The same user and password credentials are used for
FileMover Credentials under Common API Settings in Adding
VNX to the CTA configuration.
Regardless of the type of connection (CIFS, NFS, or HTTP), the target of a connection
should be specified as a hostname or FQDN in the command:
fs_dhsm -connection <primary_fs> -create
With NetApp as a source, the deployment requirements vary with task type.
• For NFS, CTA has root access with read/write permission on source exports.
• CIFS user has local administrator access on all source shares and exports.
• If migrating files from a source that is shared and exported, CTA has root access
with read/write permission to both shares and exports.
58
Internal Use - Confidential
• Create unicode and convert unicode options on the volume are enabled from the
NetApp console with the vol options command.
• NDMP is enabled from the NetApp console by typing:
ndmpd on
options ndmpd.authtype plaintext
• For NetApp filers running Data ONTAP 7.2 or later, disable duplicate session
detection by typing:
options cifs.client.dup-detection off
Note CTA works best with duplicate session detection disabled. However, if
the network environment requires duplicate session detection, the
option can be set to name.
• NDMP specific settings are specified for every NetApp filer configured on the
CTA.
Adding NetApp filer to the CTA configuration provides details on configuring a
NetApp server.
59
Internal Use - Confidential
Local administrator’s credentials are required because ONTAPI access is used to send API
calls. If a user other than root is specified, the following option must be set:
options httpd.admin.hostsequiv.enable on
• Can be resolved to its IP addresses in the local /etc/hosts file of the NetApp filer.
• Maps to a user with privileges to access the ONTAPI interface in the
/etc/hosts.equiv file on the filer.
Additional configuration prerequisites vary, depending upon the existing network
environment.
If using a vFiler, precede all options commands with vfiler run <vfiler_name>.
Note CTA works best with duplicate session detection disabled. However, if the
network environment requires duplicate session detection, the option can
be set to name.
• To properly support stub files, NetApp FPolicy requires a particular CIFS offline
bit attribute on the stub files:
a. The CIFS protocol must be enabled on the NetApp filer to archive either
CIFS or NFS datasets. An active CIFS license must be installed on all file
servers that are archive sources.
b. NFS-only exports must be shared as well.
• To properly recall stub files, FPolicy must be enabled (options fpolicy.enable on)
and rfpolicy must be the only screen policy registered for reads and writes. If a
policy that monitors stub files on the NetApp filer was previously installed,
manually delete it.
60
Internal Use - Confidential
• To configure NFS archiving, perform the following steps on the NFS-only source
directories:
c. Create a share at the qtree or volume level for qtree sources.
d. Create a share at the volume level for non-qtree sources, that is, those
not part of any qtree.
e. Add access to only the CTA user.
Note The CTA does not support name clashes on qtrees. For example, QTREE1 against
qtree1.
• Configure the NetApp source for UTF-8 language encoding with the command:
vol lang <vol> <language_encoding>
vFiler configuration
To use NetApp vFilers with the CTA, ensure that:
• vFiler name and netbios name should be the same because ONTAPI https
communication goes to the Host Filer and is then directed to the vFiler.
• The CTA can access both the vFiler and the hosting NetApp filer.
• vFilers and main filers are in IP spaces that can reach each other.
If NetApp vFilers are being used for file migration, the root password is not the same as
the NDMP password. Before configuring NDMP for the vFiler on the CTA, use the NetApp
CLI to retrieve the NDMP password by typing:
ndmpd password root
Either use this password, or create a new NDMP username and password when
configuring NDMP in Adding NetApp filer to the CTA configuration.
61
Internal Use - Confidential
At the prompt that appears, select the interface on which the FPolicy callback
daemon should listen for callbacks from NetApp filers. If there is only one interface,
it will be selected automatically:
a. If this is the primary callback agent in the environment, type n.
b. If this machine is being configured as the secondary callback agent, type
y. When prompted, type the IP address and the root password of the
primary agent.
Step Description
Basic File Type the NetBIOS server name.
Server
Information
62
Internal Use - Confidential
Step Description
CIFS Specific This is the Windows domain user to be used by the appliance. To avoid
Settings permission issues during archiving, recall, and migration, add this user
who is a domain user to the backup operator group. Log in as root on
the NetApp and type:
useradmin domainuser add <user> -g "Backup Operators"
where user is the Windows domain username for login.
If this user is not in the domain administrator group, add it to the file
server's local administrators group. Log in as root on the NetApp and
type:
useradmin domainuser add <user> -g administrators
where user is the Windows domain username for login.
Windows domain user provides more information on administering
domain users.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
NDMP For file migration, type the username and password for an NDMP user
Specific on the NetApp source. By default, the port for NDMP traffic is 10000.
Settings The NDMP user must belong to the backup operators group. To create a
user in the backup operators group, log in as root on the NetApp, and
type:
useradmin user add <user> -g "Backup Operators"
where user is the username for login.
The command will prompt for a password, but this is not the NDMP
password and is not used for the NDMP specific settings.
The NDMP password is automatically created when the user is created.
Use the NetApp CLI to retrieve the NDMP password by typing:
ndmpd password <user>
where user is a user in the backup operators group. Use this password
for the NDMP specific settings.
For a NetApp filer, the root username and password can also be used as
the NDMP username and password. However for a vFiler, the NDMP
password is different from the root password. vFiler configuration
provides instructions on how to find the NDMP password for the root
user on a vFiler.
NetApp as This option configures the CTA to archive data from the NetApp filer. If
Source multiple appliances are connected to the same NetApp filer, only one
appliance should be configured with the NetApp as Source. These
options are not required if this NetApp is used as a destination.
63
Internal Use - Confidential
Step Description
NetApp Local Type the username and password of a user on the NetApp filer. The
Admin user must be a member of the NetApp local administrator’s group.
This step
appears if
NetApp as
Source is yes.
Directory These are the directories to exclude for all tasks that use scanning. The
Exclusion List CTA ignores all system directories such as, etc, lost+found, and ckpt by
default.
This step Verify that stub files are not in the excluded directories. CTA will not
appears if access the excluded directories and the stub files will become orphans.
NetApp as
Source is yes.
NetApp The primary agent recalls all files when it is registered with the NetApp.
FPolicy A secondary agent recalls files when the primary is unavailable.
callback If the FPolicy callback agent is not explicitly configured as a secondary
agents agent, then it is a primary agent and the NetApp file server will load
This step balance between the registered primary agents.
appears if If no primary agents respond, then the NetApp filer will contact any of
NetApp as the registered secondary agents. When one of the primary agents is
Source is yes. responsive again, the NetApp filer will automatically fail back to the
primary agent.
For the primary agent, select the agent that is on the same subnet as
the NetApp machine. For the secondary agent, select another agent on
the same subnet. If no such agent exists, select an agent on the next
physically closest subnet. Up to two secondaries are supported.
Primary or secondary agents may include CTA-HAs. If the CTA-HA is a
primary, the recall is load balanced between the CTA-HA and other
primary agents. If the CTA-HA is selected as a secondary, it is only used
for recall if the CTA goes down.
Review the Summary and click Finish to define the NetApp filer.
To verify that:
a. FPolicy is enabled — Screen shows "CIFS file policy is enabled".
b. rfpolicy is enabled — Screen shows "File policy rfpolicy (file screening) is
enabled".
c. If an HA has been configured, the IP address is listed.
64
Internal Use - Confidential
If the settings are not correct, manually configure the fpolicy settings with the
commands:
fpolicy create rfpolicy screen
fpolicy enable rfpolicy
fpolicy options rfpolicy required on
where ip is the IP address of the CTA-HA. If there are multiple CTA-HAs, separate the
IP addresses with commas.
• For NFS, CTA has root access with read/write permission on destination exports.
• CIFS user has local administrator access on all destination shares.
• VNXe does not support stubs so CTA stub aware migration to a VNXe is not
supported. To use a VNXe as a destination, recall all stubs to the source before
starting a migration.
• For every server, properties are configured on the CTA for the NDMP username
and password
Adding VNXe to the CTA configuration provides details on configuring a VNXe server.
In the navigation field of the web browser, type the IP address of the CTA. The CTA GUI
appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select VNXe. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
65
Internal Use - Confidential
Step Description
Basic File Type the NetBIOS server name.
Server
Information
CIFS Specific This is the Windows domain user to be used by the appliance. The
Settings domain user must be a member of the local Administrator group and
part of the Backup Operators group on the VNXe. Windows domain user
provides more information on administering domain users.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
NDMP For file migration, type the username and password for an NDMP user
Specific on the destination servers. By default, the port for NDMP traffic is
Settings 10000.
If no NDMP user exists on the VNXe, use the VNXe GUI to create a new
user with username and password.
CTA file archiving for Unity is supported by Unity version 4.1.x and higher. CTA block
archiving for Unity and CTA file migration are supported by Unity version 4.2.x and
higher.
With Unity as a source, CTA currently supports only archiving tasks. When performing
archive tasks from Unity, the destination can only be cloud (AmazonS3, ECS/S3, IBM
Cloud Object Storage (Cleversafe), or Azure).
66
Internal Use - Confidential
• Root access with read/write export permissions for all NFS data that will be
archived.
To archive CIFS data, the CTA needs SMB over NetBIOS (TCP port 139).
• Credentials for Management and DHSM. These credentials are used for both
archive and recall.
• Management IP address.
• (For CIFS archiving only) The NetBIOS name of the Unity NAS server credentials
for the Windows domain user.
When archiving, virus scanning can be enabled on the source, but scanning on read can
cause time-out conditions with no reply errors on the source if CTA is the first application
to access a file.
• CTA requires access through both CIFS and NFS to complete a file migration (KB
Article Number 000464016).
• For NFS, CTA has root access with read/write permission on source and
destination exports.
• CIFS user has local administrator access on all source and destination shares and
is part of the Backup Operators group.
• If migrating files from a source that is shared and exported, CTA has root access
with read/write permission to both shares and exports.
• For every server, properties are configured on the CTA for:
− Management IP address for Unity
− NDMP username and password
Adding Unity to CTA configuration provides details on configuring a Unity server.
Note Configuring CTA provides information on how to configure the CTA hosts file.
To use DNS:
Create a DNS entry for the callback daemon that points to the appliance.
As a best practice, the CTA hostname and ACD hostname should be different. Using
the same hostname for both can cause issues when trying to log into the appliance.
Create multiple entries by the same name for each callback appliance.
67
Internal Use - Confidential
For each entry that is created, select the checkbox for Create associated pointer
(PTR) record to ensure that it will be included in the Reverse Lookup Zones list.
Note The Unity NAS server supports DNS HA failover. If the DNS server resolves the
callback daemon hostname to multiple IP addresses, the Unity NAS server
transparently switches to the server at the next available IP address.
DNS is the preferred method for name resolution. If using DNS is not feasible, use local
hostname resolution.
If there is a secondary callback agent such as a CTA-HA, log in on that agent as root,
and repeat steps 2 and 3. In step 3, type y to provide the IP address and root
password of the primary callback agent.
If an invalid IP address is provided, the ACD.log file, located in
/var/log/rainfinity/filemanagement/recall, will contain errors to indicate that there
was no response from the primary agent. To correct the problem, repeat steps 2
through 4 of this procedure.
Configuring automatically created DHSM connections for archiving
The CTA or CTAVE will automatically create DHSM connections for Unity systems running
OE version 4.1.x and higher.
When archiving any type of data to cloud storage server, recall requests will flow from
the Unity NAS server to CTA, CTA-HA, or CTAVE.
68
Internal Use - Confidential
On the Create Server page that appears, select Unity under NAS File Servers. Click
OK.
For each step in the Create Server wizard, provide the required information.
Step Description
Basic File Type the NetBIOS server name.
Server
Information
CIFS Specific This is the Windows domain user to be used by the appliance. The
Settings domain user must be a member of the local Administrator group and part
of the Backup Operators group on the Unity NAS Server. For more
information, see Windows domain user.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow the steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
The CIFS credential is not required if the Unity system performs only NFS
archiving.
Unity as This option configures the CTA to archive data from the Unity NAS server.
Source If multiple appliances are connected to the same Unity NAS server, only
one appliance should be configured with the Unity as Source. This option
is required only if the Unity is serving as a source for archiving.
Multiple appliances can be configured to archive data from a single Unity
NAS server, but only one CTA or CTA/VE can be used to archive data from
a single file system.
Unity The ACD DNS Name is required for archiving to a cloud storage server.
Callback For the ACD DNS name, type the FQDN of the Cloud Callback DNS entry.
Agent If a callback name is not specified, archive tasks to the destination will
settings not start. The FQDN is case-sensitive.
This step
appears if
Unity as
source is yes
69
Internal Use - Confidential
Step Description
Directory The directories to exclude for all tasks that use scanning. The CTA ignores
Exclusion List all system directories such as, etc, lost+found, and ckpt by default.
Verify that stub files are not in the excluded directories. If they are in the
excluded directories, CTA will not access the excluded directories, and
the stub files will become orphans.
Review the Summary and click Finish to define the Unity file server.
Select Configuration and Common API Settings. The Common API Settings page
appears.
Type the username and password for Management Credentials and DHSM
Credentials under Unity Settings. CTA uses these credentials to create a secondary
HTTP DHSM connection using the REST API.
The Unity settings apply to all Unity servers configured on the CTA. If all Unity
servers are archive targets only, the Unity Settings are not required.
Notes:
Step Description
Basic Block Name Name of the block server (Unity system).
Server
Information
70
Internal Use - Confidential
Step Description
ISCSI Target ISCSI Targets Select the ISCSI targets. Select more than one target
for multipath I/O.
CHAP Use Hex Format If the selected ISCSI targets require CHAP credentials,
Credentials Username select whether you want to use Hex format for the
Password CHAP password. Then type the CHAP user name and
CHAP secret
Mutual CHAP Username If the ISCSI targets require mutual CHAP credentials,
Credentials Password type the CHAP user name and CHAP secret.
Review the Summary and click Finish to define the Unity block server.
Select Configuration and Common API Settings. The Common API Settings page
appears.
Type the username and password for Management Credentials.
The Unity settings apply to all Unity servers configured on the CTA. If all Unity
servers are archive targets only, the Unity Settings are not required.
Note: It is not possible to perform a snapshot restore if CTA is down. It is advisable to
perform daily CTA backups when performing block archive tasks to avoid any
snapshot restore failures.
71
Internal Use - Confidential
Select the server type, name, protocol, and path of the file server that contains the
file to archive or recall.
Select the policy to use for archiving or recalling.
Select the archive/recall destination and fill in the appropriate fields.
Fill in the fields for a Time Based schedule.
Click Finish.
• The amount of free disk space on the Windows source is enough to hold a
snapshot of the volume during migration. To estimate the amount of space
required, estimate the amount of change to the data since the previous
snapshot. For example, if 25% of the data has changed, ensure that 25% of the
disk space is free.
• The amount of free disk space on the destination is enough to hold the source
data. If there is not enough disk space, the migration task will complete without
error, but some data will not be migrated.
72
Internal Use - Confidential
• CTA supports Windows cluster servers as a file migration source. However,
because the Microsoft Volume Snapshot Service (VSS) is not cluster aware, if a
failover occurs, the migration will fail.
Step Description
Basic File Type the NetBIOS server name.
Server
Information
CIFS Specific This is the Windows domain user to be used by the appliance. The
Settings domain user must be a member of the local Administrator group and
part of the Backup Operators group on the Windows server. Windows
domain user provides more information on administering domain users.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
Review the Summary and click Finish to define the Windows server.
Note NDMP is not used for file migration from a Windows server as a source and
NDMP specific settings are not included as Windows properties.
73
Internal Use - Confidential
Installing the EMWS copy agent for CTA
To perform CIFS file migration from a Windows source to a VNX or VNXe destination,
install the EMWS copy agent on the Windows server.
Log in to the Windows server as administrator with full backup, restore, and security
permissions.
Go to the Dell EMC Online Support web site: https://www.dell.com/support
To download the EMWS copy agent:
a. For CTA, select Downloads. Search for Cloud Tiering Appliance.
Download Dell EMC CTA Migration Windows Service (EMWS).
b. For CTA/VE, select Downloads. Search for Cloud Tiering Appliance/VE.
Download Dell EMC CTA Migration Windows Service (EMWS).
To install EMWS type:
emws_V1_install /user <domain>\<user> /passwd <password> where domain is the
local machine name and user is an administrator. Both are required.
a. To update an installation, type: emws_V1_install
b. To uninstall, type: emws_V1_install/uninstall
The LGDUP utility merges the users and groups from the source with the users and
groups on the destination. Install the LGDUP utility on the Windows machine and run it
to configure the users and groups on the source and destination before running a file
migration task.
Note For VNXe, creation of local users is not supported, so CTA only migrates local
groups to VNXe. SID translation of local users to VNXe is not supported.
Log in to the Windows machine as administrator with full backup, restore, and
security permissions.
Go to the Dell EMC Online Support web site: https://www.dell.com/support
To download the LGDUP utility, select Downloads. Search for VNX. Download
CIFSTools.zip.
Unzip the file. In the resulting directory, click down to locate the lgdup.exe file.
Note The LGDUP utility is a 32-bit command line application. If the Windows
server is running a 64-bit operating system, run LGDUP in 32-bit
compatibility mode.
To merge the local users and local groups database from the Windows source with
the destination and replicate privileges to the target:
a. For migration to VNX, type:
74
Internal Use - Confidential
lgdup.exe –v –u -l lgdup_log.txt \\<src_server_name>
\\<dst_server_name>
75
Internal Use - Confidential
For CTA to communicate with the Isilon using CIFS protocol, SMB service on the Isilon
must be enabled. Check the SMB service settings on the Isilon.
a. In the navigation field of the web browser, type the IP address of the
Isilon. The Isilon Administration GUI appears.
b. Log in to the Isilon with administrator privileges.
c. Select File Sharing > SMB > Settings.
− For Service status, verify that Enable is selected. If not, select it.
− For Security mode, verify that User is selected. If not, select it.
If any changes are made, click Submit.
From the Isilon console, verify that the NetBIOS Name Service (NBNS) is running.
a. Check that the NBNS is enabled with the command:
isi services | grep nbns
c. Even if the NBNS is enabled, it may not be running. To verify that the
NBNS is running, check whether the Isilon is listening on port 139 with
the command:
netstat -an | grep LISTEN | grep 139
d. If the Isilon is not listening on port 139, disable and re-enable the NBNS
with the commands:
isi services -a nbns disable
isi services -a nbns enable
From the Isilon Administration GUI, create a CIFS share for the CTA destination
directory.
a. Select File Sharing > SMB > Add Share.
− For Share name, type the name of the share or export created, for
example, CTADir.
− For Directory to share, click Browse. Select the path to the
directory created in step 2, for example, /ifs/data/CTADir. Click
OK.
− For Directory ACLs, select Do not change existing permissions.
b. Under Users and Groups, select Add. The Choose Users and Groups
screen appears.
− For From the location, select the domain, such as rain.prv that
was referenced in step 1.
76
Internal Use - Confidential
− For Name, type Administrator. This is the same Windows domain
user that CTA will use.
− Click Search. Search results list the Administrator user of the
domain.
− Select the Administrator user and click Choose. Under Users and
Groups, the Administrator is listed with the checkbox selected.
c. Click Edit permissions. The permissions screen appears.
− Select Run as root. All permissions are set to Allow.
− Click OK.
d. Click Submit. The SMB Summary appears with the share added.
Note Before creating the NFS export for the CTA destination directory, you must configure
the Isilon server so that it provides CTA with root CIFS access permissions. You
can do this running specific Isilon-specific CLI commands that add "run-as-root"
permissions for the CTA domain user on every Isilon CIFS share used by CTA
system. The following example shows Isilon CLI commands used to do this for a
single CIFS share:
In the navigation field of the web browser, type the IP address of the Isilon. The
Isilon Administration GUI appears.
Log in to the Isilon with administrator privileges.
Select File Sharing > NFS > Settings.
a. For Service status, verify that Enable is selected. If not, select it.
b. For NFSv4 Support, verify that Disable is selected. If not, select it.
If any changes are made, click Submit.
Select File Sharing > NFS > Add Export.
a. Under Settings:
b. For Directories, click Browse. Select the path to the directory. Click OK.
c. For Permissions, select Enable write access and select Enable mount
access to subdirectories.
77
Internal Use - Confidential
d. Under Access Control:
e. For User name, type root.
f. For Group names, type everyone.
Click Submit. The NFS Summary appears with the export added.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Isilon. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the NetBIOS server name.
Server
Information
CIFS Specific This is the Windows domain user to be used by the appliance. The
Settings domain user must be a member of the local Administrator group and
part of the Backup Operators group. Windows domain user provides
more information on administering domain users.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
If the Isilon is an NFS export destination only, this setting is not used.
78
Internal Use - Confidential
CTA and Isilon SmartConnect
When an Isilon cluster is configured to use Dell EMC Isilon SmartConnect, Isilon load
balances SMB and NFS client access among a number of nodes in the cluster.
SmartConnect uses DNS delegation, allowing the DNS server to delegate authority for the
DNS name to a collection of IP addresses.
For example, if a three node Isilon cluster is configured to use SmartConnect with:
When configuring this Isilon cluster as in Adding Isilon to the CTA configuration, the
settings are:
Configure CTA with all the SmartConnect Pool IPs, but not the SmartConnect Service IP
(such as 10.4.0.89). The SmartConnect Service IP address is only used for DNS delegation.
CTA will not be able to correctly load balance its access to the Isilon cluster if the
cluster’s IP Pool does not match the configuration in CTA. If Isilon nodes or SmartConnect
Pool IP addresses are added to or removed from an Isilon cluster, edit the corresponding
CTA configuration to add or remove the IPs.
To verify that forward DNS lookup resolves the Isilon cluster name to one of the IPs
configured in the SmartConnect IP Pool, at the CTA CLI prompt, type:
79
Internal Use - Confidential
nslookup <name>
If the Isilon cluster is configured using the SmartConnect round-robin option, repeated
nslookup name to IP requests should cycle through all the addresses configured in the
SmartConnect IP Pool.
For example, if a three node Isilon cluster is configured to use SmartConnect with:
If nslookup fails or returns an IP that is not in the SmartConnect IP Pool, the DNS server is
not correctly configured to delegate to the Isilon SmartConnect Server IP. See the Isilon
documentation to configure forward DNS lookup and use nslookup to test the
configuration again.
To verify that reverse DNS lookup resolves all of the IPs configured in the SmartConnect
IP Pool to the DNS name of the Isilon cluster, at the CTA CLI prompt, type:
nslookup <IP>
For example:
Note If either the forward DNS or reverse DNS lookup tests fail, do not use an Isilon
server configured with SmartConnect in CTA for archiving, repository migration,
or file migration.
Note CTA supports Data Domain CIFS and NFS destination starting from Data Domain
5.3. However, CTA requires admin privileges to access CIFS shares and
80
Internal Use - Confidential
successfully create all files on Data Domain for archiving and repository
migration.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Data Domain. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the NetBIOS server name.
Server
Information
CIFS Specific This is the Windows domain user to be used by the appliance. The
Settings domain user must be a member of the local Administrator group and
part of the Backup Operators group. Windows domain user provides
more information on administering domain users.
Specify either a NetBIOS domain or a Kerberos FQDN. The Kerberos
FQDN is a CTA server configuration setting, and if selected, the same
FQDN applies to all servers. Before selecting the Kerberos FQDN option,
follow steps in Configuring Windows for Kerberos to configure your
Fully Qualified Domain on the CTA.
If the Data Domain is an NFS export destination only, this setting is not
used.
Review the Summary and click Finish to define the Data Domain.
81
Internal Use - Confidential
Note The appliance must have read/write access to any share or export that may be
used as an archive source or destination. In addition, the appliance must have
read/write permission for any file that it may archive.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and NAS Repository. The NAS Repository List appears. Click
Add. The NAS Repository Properties dialog box appears.
You can either:
a. Add an existing server and repository.
b. Add a new server and repository.
To add an existing server and repository, specify the following:
a. Type — Select a type of NAS server from the list.
b. Name — Select a file server of that type from the list.
Note The file server must have a proper DNS entry defined that links the file
server name with the IP address.
c. Protocol — Select NFS or CIFS. The source and repository protocol types
must match.
d. If the source protocol is CIFS, the NAS repository protocol must be CIFS.
e. If the source protocol is NFS, the NAS repository protocol must be NFS.
If the CIFS protocol is selected, use the CIFS user in the filesystem CIFS DHSM
connection string for CIFS specific settings when configuring the primary storage
on the appliance:
f. Path — Click Browse to select an existing path.
Once the path is specified, a name in the form of Repository at <path> appears
in the Name field.
g. Maximum limit of disk usage — Type a percentage value for disk usage.
Default value is 90%.
To add a new server, select the Type and click Add Server. Follow instructions to add
the server as outlined in:
a. Adding VNX to the CTA configuration
b. Adding NetApp filer to the CTA configuration
c. Deploying CTA with a VNXe
d. Deploying CTA with Unity
e. Deploying CTA with a Windows server
82
Internal Use - Confidential
f. Deploying CTA with Isilon
g. Deploying the CTA with Data Domain
Click OK to finish defining the NAS repository.
Note The Amazon S3 account manager uses the Amazon Web Services (AWS)
Management Console to generate the Web Service Specific Settings which are
Access Key ID, Secret Access Key, and Bucket Name.
An Access Key ID and Secret Access Key are required to sign requests that you
make using CTA. You can create new access keys from the My Security Credentials
page under Identity and Access Management (IAM). For more information, see
the AWS S3 documentation.
CTA version 12.1 and later supports AWS S3 buckets using Signature Version 2
and Version 4.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Amazon S3. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the logical server name. Each file server is configured separately
Server with a unique name and is associated with a single Amazon S3 bucket.
Information
83
Internal Use - Confidential
Step Description
Web Service URL — URL corresponding to the Amazon S3 bucket as displayed in the
Specific AWS Management Console.
Settings For example: s3.us-east-2.amazonaws.com
Access Key ID — Type the key that CTA uses to gain REST access to the
Amazon S3 bucket. The Amazon S3 account manager generates the key.
For example: [email protected]
Secret Access Key — Type the secret credential used with the Access
Key ID. The Secret Access Key is generated with the Access Key ID.
For example: ABcd4efgh08Rabcdtc2r/AB+cdeghIJKLMNo
Review the Summary and click Finish to define the Amazon S3.
Note When archiving to the cloud (for example, Atmos, Amazon S3, or Azure), the CTA
clock must be accurate and in sync with the cloud service. Therefore, it is
required to have an NTP server configured when archiving to these destinations.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
84
Internal Use - Confidential
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Atmos. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the name to identify the Atmos.
Server
Information
Web Service DNS Name — Specify the name used to resolve the IP addresses in the
Specific Atmos cluster.
Settings Port — The GUI access method. HTTPS is the default and is typically
used when the Atmos is deployed remotely. Select HTTPS or HTTP to
specify the communication protocol. The default port number for HTTPS
(10080) or HTTP (80) automatically appears. If your Atmos connects to
HTTPS or HTTP through a different port, type the number.
Username — Type the UID within a given Subtenant on the Atmos. CTA
uses this UID to access storage on the cluster. If there is a subtenant,
specify the username as: <Subtenant_ID>/<UID>, where Subtenant _ID
is an alphanumeric string generated by the Atmos.
The UID is not the Tenant Name, the Subtenant Name, or the Subtenant
ID.
Password — Type the Shared Secret associated with the UID on the
Subtenant Information page of the Atmos.
• The certificate must be in PEM file format. The Atmos administrator can provide
the file.
• On the CTA, the name of the certificate must be atmos_trusted_CAs.pem
• Install the certificate under:
/opt/rainfinity/filemanagement/conf/ATMOS_certs/<atmos_DNS>
85
Internal Use - Confidential
where atmos_DNS is the DNS name of the Atmos configured on the CTA. The names
are case-sensitive and must match exactly. Adding Atmos to the CTA configuration
provides details on configuring the DNS name on the CTA.
To run a CTA script that installs the PEM certificate file in the correct directory, type:
/opt/rainfinity/filemanagement/bin/atmoscert.pl
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Azure. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the name to identify the Azure.
Server
Information
Web Service Container Name — Type the destination where CTA adds, deletes, or
Specific edits objects. The Windows Azure Management Portal administrator
Settings configures the containers associated with the storage account.
For example: testcontainer
Account Name— Type the name of the Azure storage account that CTA
uses to gain REST access to the Azure container. The Windows Azure
Management Portal administrator creates this account.
For example: testaccount
Access Key — Type the key that CTA uses to gain REST access to the
Azure container. When a storage account is created, Windows Azure
generates primary and secondary access keys for that account. Either
key is valid.
For example:
wM95T9yA2RXYI+dmwecw/we5S099kcrQ2OqrsAfDybWHYvEyce+UjYVq
qd9IZOuBp4v/bPf6C5WR5eekBg6N4B3ilN1w==
86
Internal Use - Confidential
Review the Summary and click Finish to define the Azure.
Note When archiving to the cloud (for example, Atmos, Amazon S3, or Azure), the CTA
clock must be accurate and in sync with the cloud service. Therefore, it is
required to have an NTP server configured when archiving to these destinations.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
On the Create Server page that appears, select Centera. Click OK.
For each step in the File Server wizard, provide the required information indicated
with a red asterisk and click Next.
Step Description
Basic File Type the name to identify the Centera.
Server
Information
87
Internal Use - Confidential
Review the Summary and click Finish to define the Centera.
In the navigation field of the web browser, type the IP address of the CTA. The CTA
GUI appears.
Type the username and password for the default account which are:
a. Username: admin
b. Password: rain
Select Configuration and Server. The Server List appears. Click Add.
ECS-CAS can be added to CTA as Centera. Refer to Deploying CTA with Centera for
deployment instructions.
ECS/S3 can be added to CTA as Amazon S3. Refer to Deploying CTA with Amazon S3
for deployment instructions.
ECS/ATMOS-REST can be added to CTA as an Atmos server. Refer to Deploying CTA
with Atmos for deployment instructions.
88
Internal Use - Confidential
Chapter 5 Maintaining the Cloud Tiering Appliance
89
Internal Use - Confidential
Importing a file list archive
The CTA can perform archival tasks on lists of files imported from a third-party software
provider. To generate and import the file lists properly, the CTA administrator and the
third-party software administrator must exchange information as follows:
The third-party software administrator gives the CTA administrator the names of the
primary servers.
The CTA administrator:
a. Adds the primary servers as source servers on the CTA as described in
Adding the primary servers.
b. Configures an import provider with username and password as
described in Configuring the import provider.
c. Configures an import file task as described in Configuring the import
task.
The CTA administrator provides the server, provider, and task information to the
third-party software administrator.
With settings defined on the CTA, the third-party software generates an XML file
containing lists of files on a primary server that are to be archived.
Note For optimum performance during file import, limit the XML file list to 1
million entries.
The XML file is transferred to the CTA as described in Importing the file list. Once CTA
validates the imported file, the import files archive task is queued to run.
Import files archive tasks are run in the same way as other archive tasks. The archive
destination is defined with the CTA policy. The source is defined in the imported XML file
list. Online help describes how to schedule and review results of an archive task.
Note File systems with Unity File Level Retention (FLR) enabled cannot be used as an
archiving source.
90
Internal Use - Confidential
The CTA administrator gives the server names to the third-party software administrator.
Select Configuration and Import Provider. The Import Provider List appears.
Click Add. The Import Provider Properties page appears.
Specify the following:
a. Username — Type a name for the user that is allowed to log into the
CTA from the provider. This must be a valid Linux user name. The third-
party software uses the name for the provider in the XML file that it
creates.
b. Password — Type a password used to log into the CTA from the
provider.
Click Commit to define the Provider.
The CTA administrator gives the name and the password to the third-party software
administrator.
Configure an import files archive task based on an archive policy. Files are archived to the
destination defined in the policy.
Step Description
Task Type On the Archive tab, select one of the archive task types.
At the bottom of the screen, check the box to Import file list provided
by an external provider.
Import File Type a task name. Select the import provider defined in Configuring the
Task import provider.
91
Internal Use - Confidential
Step Description
Define Policy Click Add Rule.
Rules
Define a To archive all files in the imported list, build an expression with:
Policy Rule File Attribute: Size
Operator: >=
Value: 1
Unit: Bytes
Click Add.
Leave the default action of Archive.
Define Policy The Define Policy Rules page reappears with the new rule added.
Rule
Verify Policy After verifying the policy definition, click Save Policy.
Rule
Policy The Policy page reappears with the new policy added.
Schedule Select the time-based Schedule Type for the import task: Import, Daily,
Weekly, Monthly or Future. The task will not run until the XML file list is
imported and validated.
92
Internal Use - Confidential
/opt/rainfinity/filemanagement/import/providers/<PROVIDER>/import_
files_<ID>.xml
where PROVIDER is the logical name of the provider defined in CTA and ID is the unique
ID in the XML file.
• provider name
• task name
• file server names
The CTA also verifies that it can access all shares and exports listed in the XML file.
If any validation checks fail, an error is reported in the import log. To review import logs
before running the import file archive task:
If data on a CTA or a CTA/VE is lost, the software must be reinstalled and the last backup
copy of the configuration and database tables must be restored. For this reason, backup
the CTA or CTA/VE configuration and the critical database tables nightly.
Note Task and simulation log files are not included in a backup. To preserve these files,
copy the /opt/rainfinity/filemanagement/log/fws/simulation directory to secure
storage either periodically or before performing a CD clean install.
• Critical CTA system configuration data is backed up to a gzipped tar file (.tgz).
93
Internal Use - Confidential
• The tar file is written to a destination on a Centera or NAS repository.
To perform disaster recovery, the CTA uses a catalog file (DBBackup.out) to locate tar
files on the destination and to reconstruct the CTA system configuration after a disaster.
The catalog file is stored on both the CTA and in a secondary disaster recovery location.
With NAS repositories, the data is stored with a directory structure that is similar
to that of an archive destination.
c. Select Disaster Recovery Location — The NFS export where the backup
catalog file (DBBackup.out) will be stored. The DBBackup.out file is also
stored on the CTA. The file stored on the NFS export is only used if the
file stored on the CTA is lost or damaged.
Note Ensure that the selected location is only assigned to one CTA. Multiple CTAs must
not use the same disaster recovery location.
94
Internal Use - Confidential
Restoring a backup dump
Backups are typically restored after a system failure. To restore a backup, start with a
freshly installed appliance. Steps are performed from both the GUI and the command
line.
As the restoration occurs, the system will prompt for input to:
a. Confirm restoration.
b. Start the FPolicy callback service for a NetApp.
c. Start the callback daemons for VNX and for the cloud service.
At each prompt, type y. When asked if you want to add another server, type n.
Note The database tables are restored at a rate of approximately 10 million entries
per hour.
If restoring data to the same machine, the CTA automatically restarts at the end of the
restoration process. If restoring data to a different machine, the CTA must be manually
restarted. Also, original network configuration files, such as /etc/hosts, may need to be
manually edited to reflect the new IP and hostname of the new machine.
95
Internal Use - Confidential
Typical output of the fmrestore script is as follows:
[root@fm2 bin]# fmrestore /var/fmbackup_12.0_cta.Thu_26-01-
12_16_41.tgz
Expanding /var/fmbackup_12.0_cta.Thu_26-01-12_16_41.tgz in /var...
This will overwrite your configuration and database. Are you sure?
Press 'y' to continue or 'n' to abort now
y
Stopping CTA GUI ...
Stopping Tomcat server
Tomcat server stopped
Stopping filemanagement daemon ...
Stopping filemanagement daemon watchdog
Stopping filemanagement daemon done
done
done
Restore Done..
96
Internal Use - Confidential
mode by the system administrator to recover the keystore from the CTA-HA, which is
presumed to have the most recent copy. The krd will ensure that a local keystore will not
be overwritten with a new keystore that contains fewer keys than the original.
The database maintenance process can take several hours. While the process is running,
the filemanagement daemon must be halted and the GUI may not be used. System
administrators should plan to run database maintenance when the appliance is not
needed.
Check the current database size. Click the Archived Files tab:
Check how much disk space the database is using by typing:
du -sh /var/lib/pgsql/data/base
The database should use about 1 million archived files per gigabyte. If the database is
using more than twice the expected disk space, for example, if 1 million archived files are
occupying more than 2 gigabytes, perform database maintenance.
Note Before running the CTA vacuum process, it is recommended that you back up the
CTA system and copy the backup file to an off-host location.
97
Internal Use - Confidential
• To schedule the CTA vacuum process to start at a later time and to run
repeatedly, type:
rffm scheduleVacuumTask VacuumStartTime=<StartTime>
VacuumWeekRepetition=<Number_of_weeks>
where:
a. StartTime is the date and time when the first vacuum task will run. The
format is yyyy-mm-dd hh:mm:ss. After each run, the value is reset to
the date and time of the repeat run.
b. Number_of_weeks is the number of weeks between runs. It is specified
as an integer and the value should be between 4 and 24. The default is
8.
Every 30 minutes, CTA checks to see if there are any vacuum tasks scheduled.
One hour before the vacuum task is scheduled to start, CTA sends the alert “A
VACUUM TASK WILL START WITHIN THE NEXT 1 HOUR”.
For example, to start the CTA vacuum process at 2 a.m. on May 1, 2011 and run the
task every four weeks, type:
rffm scheduleVacuumTask VacuumStartTime="2011-05-01 02:00:00"
VacuumWeekRepetition=4
c. At or around 1 a.m. on May 1, 2011, CTA sends the alert that the
vacuum process will start within the hour.
d. Following the run, the StartTime is reset to at 2 a.m. on May 29, 2011.
• To delete the CTA vacuum process, type:
rffm deleteVacuumSchedule
Prerequisites:
• Migration can only occur between systems running the same CTA version (such
as between two systems running CTA 12.0 to CTA/VE 12.0). If two systems are
running different CTA variants, one or both should first be upgraded so that they
are running the same variant before migration occurs.
• To ensure a non-disruptive migration to a virtual CTA, the new CTA/VE needs to
have the same network configuration as the physical CTA. This includes the IP,
domain, and NTP configurations.
98
Internal Use - Confidential
Keep in mind:
• When archiving from NAS to NAS, no disruption in the recalls of files (such as
when double-clicking a file to recall it) will be experienced as part of the
migration.
• In environments archiving to cloud repositories, the file recalls could be
impacted if no CTA-HA(s) are available in the environment.
• The network bonding feature that is available on CTA is not available on CTA/VE.
Recommendations:
• To ensure that the migration is non-disruptive, it is recommended to have
CTA/VE-HA(s) deployed in the environment. For an environment that already has
CTA-HA(s) deployed, leverage the CTA-HA(s) to provide recall functionality while
migrating from a physical CTA to CTA/VE. After the primary CTA migration,
migrate the CTA-HA(s) as well, as shown in Step 9 below.
The migration path consists of the following steps:
99
Internal Use - Confidential
Shutting down and restarting the appliance
To shut down and restart a working CTA or CTA/VE:
If an HA appliance is deployed, verify that the HA appliance has taken over file recalls
by attempting to open an archived file.
Either shut down or reboot the appliance.
a. To shut down the appliance, type the command:
shutdown -h now
For the CTA-HA, only the callback services are stopped. The filemanagement stop
command is not used.
100
Internal Use - Confidential
Chapter 6 Cloud Tiering Appliance System Settings
Both the GUI and the CLI provide two types of users:
If rfhsetup is used to enable the security database setting option, existing GUI users will
not be able to log in. Use rfhsetup to disable root logins, and then create the new user.
102
Internal Use - Confidential
For Allow login as root?, select N.
Note Once root login is disabled, you must log into the CTA with the new username
and password to use the CLI.
Admin users
An admin user who is a member of the wheel group and logged in through SSH can
become a superuser to:
Ops users
An ops user belongs to the Rainfinity group.
If the administrator changes the user’s setting while the user is logged in, the user’s role
will not be refreshed until one of the three following conditions occurs:
Log in as admin.
From the Configuration tab, select Cloud Tiering Appliance Users.
Select Add a New User. In the Cloud Tiering User Properties dialog box that appears:
a. Type the name.
b. Type a new password.
103
Internal Use - Confidential
c. Specify the type of user:
− Super User — The admin user.
− Regular User — The ops user.
Note When the single security database setting is disabled, users created through the
GUI are allowed to log in through the GUI but not the CLI. In addition, if the
single security database setting is enabled, user accounts cannot be created
through the GUI. If the user attempts to invoke the configuration page for Cloud
Tiering Appliance Users, a warning appears.
When the setting to disable root logins is being changed to yes, the CTA checks to ensure
that:
• There is at least one admin user other than root who belongs to the wheel
group. This user must have a configured password.
• The wheel users are in the local /etc/group file. The CTA ignores LDAP users
while performing this check because LDAP servers occasionally become
unreachable.
Note Configure a small set of admin users locally for each CTA. Most admin and ops
users are configured on an LDAP server. In this way, the management of these
users scales to large networks.
Strengthen passwords
If the passwd command is run with password strengthening enabled, your new password
must be at least eight characters long and satisfy the following requirements:
Note The root user can change any password including its own to any value,
regardless of the password strengthening setting to strengthen it.
104
Internal Use - Confidential
Age passwords
If password aging is enabled, every user (except root) who can log in with a shell account
will have an aging password. The root user configures:
STIG hardening
Security Technical Implementation Guide (STIG) is a set of security guidelines issued by
the US Department of Defense. These STIG UNIX guidelines define how UNIX/Linux
appliances should behave from a security standpoint.
• The user must type the root password to gain access to the CTA in single user
mode.
• After three consecutive login attempts, the account is disabled.
• Only the root user can reenable a disabled account.
105
Internal Use - Confidential
• The login delay between login prompts increases from 2 to 4 seconds.
• New passwords are required to be a minimum of nine characters in length.
• When changing passwords, the past five passwords cannot be reused as the new
password value.
• The root account’s home directory will be set to a permission value of 700.
• Man page file permissions will be set to 644.
• User-directories must not contain undocumented startup files with permissions
greater than 750 (that is, they must allow write access only for that user).
• The system and default user umask must be set to 077.
• Access to the cron utility will be restricted using the cron.allow and cron.deny
files.
• Crontab file permissions above 700 will not be permitted (in the /etc/cron.daily,
/etc/cron.hourly, /etc/cron.weekly directories).
• The inetd.conf file permissions will be set to 440.
• Unnecessary accounts, for example, games and news will be deleted.
• sysctl.conf file will be set to 600 permission.
To enable STIG hardening on the CTA and CTA-HA:
106
Internal Use - Confidential
• The /root directory permissions is reset to 750.
• Man page file permissions remain at 644. That is, this STIG hardening change is
retained.
• User-directory permissions remain at the value prior to STIG hardening.
• The system and default user umask must be set to 022.
• Unnecessary groups/accounts that are deleted during STIG hardening remain
deleted even after STIG hardening is disabled.
• Access to the cron utility is unrestricted using the cron.allow and cron.deny files.
To disable STIG hardening on the CTA:
Bind type
There are two types of binds:
• Hard — The CTA continues to retry the bind attempt until a maximum timeout is
reached.
• Soft — The CTA attempts to bind once and abort if the server does not respond.
107
Internal Use - Confidential
Time limits
There are two types of time limits:
• Search time limit — The amount of time for which the LDAP client waits for an
initial response from the server.
• Bind time limit — The amount of time for which the LDAP client attempts to
bind.
By default, these time limits are set to 10 seconds to allow the appliance to remain
responsive when the LDAP server is down, and to fail over to an alternate
authentication mechanism, if another mechanism is configured.
Server type
The CTA LDAP client works with the following types of LDAP servers:
• OpenLDAP
• Active directory with RFC 2307 support
Identity Management for Unix should be installed on the ActiveDirectory server
for CTA to be able to authenticate an ActiveDirectory user. The AD user used to
log into CTA must have the NIS domain setup correctly on the AD server. The
user should be added to the wheel and rainfinity groups to have administrator
privileges.
LDAP authentication
When LDAP is configured, LDAP authentication is established through a sequence of
events.
108
Internal Use - Confidential
After the secure channel is established, the password is exchanged. If SASL is
configured, it can be used instead of a password.
• The server and client can negotiate an encryption scheme to secure all traffic
between them.
Once authentication is established and an encryption scheme is optionally selected, the
LDAP client requests user authentication.
Other LDAP servers have not been validated for CTA version 7.2 or
later.
e. IP address or hostname for the LDAP server
109
Internal Use - Confidential
If using Open LDAP, for which certificate-based authentication is
enabled, type the hostname that matches the hostname used in the
certificate generation. If an IP address was used in the certificate
generation instead of the hostname, type the IP address.
Note Failure to type the proper information will create problems during the
LDAP setup. This is one of the most common configuration errors during
LDAP setup.
f. LDAP basedn
Type the suffix for your domain name.
g. LDAP binddn
Specify the LDAP binddn for the Active Directory.
h. LDAP bindpw
Password for the specified binddn. This is specific to AD configuration.
i. LDAP CA Certificate Path
Path to the Certificate Authority certificate stored on the CTA.
j. LDAP-enabled SASL
To configure SASL, provide the following information:
− SASL KDC address
− Domain name
− Kerberos principal details
− Kerberos keytab file
− Name server IP address
Note With LDAP enabled, CTA users can log into the CLI.
• The single security database (SSD) setting must be enabled on the CTA.
• Users allowed to log in to the CTA must be added to the rainfinity and wheel
groups in the LDAP server database.
If the GUI is running and LDAP is enabled through rfhsetup, the GUI will not recognize
LDAP authentication attempts until it is restarted by typing the following command:
/opt/rainfinity/filemanagement/bin/fmgui restart
Enable external authentication (LDAP) before enabling the single security database.
Invoke the GUI.
Note If changing the CTA IP address or moving the CTA to a new location, disable
remote login and re-enable root login before changing or moving the CTA. After
110
Internal Use - Confidential
changing or moving the CTA, re-enable LDAP with the IP address or hostname of
a LDAP server that is reachable in the new configuration.
Certificate management
When configuring LDAP, TLS, and SSL for authentication, key and certificate files are
required. In order for authentication encryption to work correctly, these keys and
certificates must be:
• Periodically refreshed
• Correctly located on the appliance
Each certificate has an expiration date. Every week, the CTA checks the validity of each
certificate. Certificate warning information is logged into the /var/log/secure file, and if
the alert is enabled, email is sent when the certificate is due to expire. Once a certificate
expiration warning is received, SSL/TLS certificates must be updated.
111
Internal Use - Confidential
d. email verification — Type a recipient email address to which test emails
may be sent. For example, [email protected]. The rfhsetup script
will attempt to verify the mail configuration by sending two emails.
Wait a few minutes. Check the email account to see if these emails were
successfully received.
Mail Test 1 — To confirm the receipt of an email with the subject Mail Test 1, type y.
Otherwise, type n.
Mail Test 2 — To confirm the receipt of an email with the subject Mail Test 2, type y.
Otherwise, type n.
If either of the test emails was received, mail delivery is working and mail setup is done.
• The name of the SMTP server. Check with your system administrator.
• The email address provided for the test email.
• The SMTP server is reachable. Try to ping it.
Log settings
When the security level is set to harden, any event that might affect the security of the
system is written to the CTA log files. Use the Cloud Tiering Appliance setup tool to
administer and preserve log files.
112
Internal Use - Confidential
server. Use the CTA to create a tar file of these rotated system and the CTA logs, then
secure copy them to a remote server.
113
Internal Use - Confidential
You can now successfully use SCP without a password to send the rotated log files to
your external server.
Configuring alerts
A CTA can be configured to monitor various system log files and send email to alert
whenever an event occurs. CTA sends notifications for SNMP traps and alerts listed in
Appendix B, Alerts.
114
Internal Use - Confidential
Select Configure Log Alerts.
Follow the prompts to configure:
a. When asked to enable alerts, type y.
b. Specify one or more email addresses separated by a space or comma,
to receive the alerts.
115
Internal Use - Confidential
d. Follow the prompts to configure:
− When asked to enable alerts, select Yes.
− Specify the type of alert delivery. Select either email only, SNMP
only, or email and SNMP.
To track command history, the CTA uses the psacct Process Accounting package. This
package tracks commands that are entered. In addition to commands, the CTA extends
this package to track command arguments.
116
Internal Use - Confidential
Select Configure Logging Options.
Select Configure System Command Accounting.
Type y to enable system command accounting.
• To list the commands entered by all users, use the tool without any options, or:
/opt/rainfinity/bin/rflastcomm
• To list commands entered by a user since a start date on 5 p.m. on June 6, 2007,
use the tool with the following arguments:
/opt/rainfinity/bin/rflastcomm –u <username> –s ‘2007-06-06
17:00:00’
This tool is part of the standard psacct Process Accounting package. For detailed info on
using this tool, type: man last.
117
Internal Use - Confidential
• To query the user login history, type:
/opt/rainfinity/bin/rfquerycshis.sh -t ls
• To list hardware related messages from the system log files, type:
/opt/rainfinity/bin/rfquerycshis.sh -t hw
118
Internal Use - Confidential
Otherwise you will not be able to include the fmadmin user in the NetApp filers’
administrators group.
119
Internal Use - Confidential
CTA displays a Fully Qualified Domain Properties dialog box.
Enter the Domain Name and IP Address of the Domain Controller.
Click Commit.
SID translator
The CTA is able to translate Security IDs (SID) in the security properties of the files and
directories involved in a CIFS file migration task. The capability may be used to assist
projects in which the data’s group or user association changes from the source to the
destination. For example, when the Access Control List (ACL) is defined in terms of local
groups on the source file server.
When the data is migrated to the destination server, the ACL should be defined in terms
of corresponding local groups. The rules governing this translation are defined in the SID
translation files.
.NET Framework 4 must be installed on the Windows server before installing the SID
translator utilities. The latest .NET Framework may be downloaded from Microsoft at:
http://msdn.microsoft.com/en-us/netframework/default.aspx
120
Internal Use - Confidential
To download the SID translator utilities, select Downloads. Search for Cloud Tiering
Appliance. Download SIDUtilities<BuildNumber>.msi, where <BuildNumber> is a
number similar to 8_0b15.
To start the installation script, run the following file:
SIDUtilities<BuildNumber>.msi
Select Configuration and File Migration Settings. The File Migration Settings page
appears.
To add a SID translation file:
121
Internal Use - Confidential
Network topology scenarios
a. Click Add.
b. Navigate to find the XML file and choose that file. When the file is
selected, it is added to the list.
Select Configuration and File Migration Settings. The File Migration Settings page
appears with a list of previously uploaded SID translation files.
Select the file to delete and click Delete.
122
Internal Use - Confidential
Network topology scenarios
Appendix A Network
topology
scenarios
123
Internal Use - Confidential
Network topology scenarios
However, there are cases when more complex topologies are needed.
124
Internal Use - Confidential
Network topology scenarios
125
Internal Use - Confidential
Network topology scenarios
126
Internal Use - Confidential
Network topology scenarios
On the CTA/VE, configure each physical eth1, eth2, eth3 or eth4 port with an IP address,
Net Mask, and Default Gateway.
Note When using the VST mode, do not create a VLAN interface.
To use VST, create appropriate port groups. Give each port group a label and a VLAN ID.
Port group values must be unique on a virtual switch. Once the port group is created, you
can use the port group label in the virtual machine configuration.
Log in to the VMware VI Client and select the server from the inventory panel.
The hardware configuration page for this server appears.
On the Configuration tab, click Networking.
Click Properties for a network.
The vSwitch Properties dialog box appears.
127
Internal Use - Confidential
Network topology scenarios
On the Ports tab, select the port group and click Edit.
In the Properties dialog box for the port group, click the General tab to edit:
a. Network Label — This is the name of the port group that you are
creating.
b. VLAN ID — This identifies the VLAN that the port group’s network traffic
will use.
Click OK to exit the vSwitch Properties dialog box.
The advantage of this link is that during VMware vMotion, the remote ESXi Server re-
creates the trunk port, and the administrator does not need to preconfigure the VLANs
on the destination ESXi Server/Switch combination. The use of VGT prevents errors
during vMotion.
Log in to the VMware VI Client, and select the server from the inventory panel. The
hardware configuration page for this server appears.
On the Configuration tab, click Networking.
Click Properties for a network.
The vSwitch Properties dialog box appears.
On the Ports tab, select the port group and click Edit.
In the Properties dialog box for the port group, click the General tab to edit:
a. Network Label — This is the name of the port group that you are
creating.
b. VLAN ID — This identifies the VLAN that the port group’s network traffic
will use.
c. To use VGT, type 4095.
Click OK to exit the vSwitch Properties dialog box.
Configuring VLAN interfaces on the CTA/VE
On the CTA/VE side, the VGT mode requires the creation of VLAN interfaces on top of the
CTA/VE ethernet interface. IP addresses are assigned only to the VLAN interfaces. The
VLAN bond interface is unconfigured and does not have an IP address. Use the rfhsetup
networking menu to configure the ethernet interface.
128
Internal Use - Confidential
Network topology scenarios
1 of 4 entries displayed
Command: [Q]uit [A]dd [R]emove [S]ave [U]p [D]own re[F]resh
[H]elp Status: OK
rfhsetup <- Network configuration -> Interface eth0's
configuration
Type A to add a new interface. Use the left and right arrow keys to select a VLAN
interface and press Enter.
Type a name for the VLAN interface. The naming convention is <bond>.<vlan-ID>.
For example, to add VLAN ID 20 on eth0, the name will be eth0.20. After typing the
name, press Enter.
Note The new VLAN bond interface (for example, eth0.20) will be added to the
interface list.
Use the up and down arrow keys to select the newly created VLAN interface. Press
the right arrow key. The eth0.20 VLAN configuration screen appears. Add the IP
address, netmask, and gateway.
Use the left arrow key to exit the eth0.20 configuration menu and save the
configuration.
Use the left arrow key to exit the Configure Networking menu and apply the saved
configuration.
129
Internal Use - Confidential
Alerts
Appendix B Alerts
131
Internal Use - Confidential
Alerts
132
Internal Use - Confidential
Alerts
CTA alerts
The CTA alerts are classified by type:
• Rainfinity alerts
• Generic alerts
• Security alerts
• Hardware alerts
Table 8 lists all the CTA alerts.
133
Internal Use - Confidential
Alerts
134
Internal Use - Confidential
Alerts
135
Internal Use - Confidential
Alerts
136
Internal Use - Confidential
Alerts
303-0002 GUI login attempt GUI login attempt has rainfinityAlert 1.3.6.1.4.1.1139.9.3.2.0.4
failed failed.
303-0003 GUI user logged GUI user has logged rainfinityAlert 1.3.6.1.4.1.1139.9.3.2.0.4
out out.
304-0002 Task failed too Task has failed too rainfinityAlert 1.3.6.1.4.1.1139.9.3.2.0.4
many operations many operations and
and terminated has been terminated
early early.
137
Internal Use - Confidential
Alerts
701-0010 A fatal error has A fatal error has caused rainfinityAlert 1.3.6.1.4.1.1139.9.3.2.0.4
caused a CTA a CTA process to
process to terminate. The log lists
terminate specific error
messages.
138
Internal Use - Confidential
Alerts
All alerts are listed in the Log Pattern Index of the GUI.
Use the CLI or the Alert Settings page in the CTA GUI to edit log alert patterns.
Configuration options include:
139
Internal Use - Confidential