Use the Certificate configuration screen to enable interface operation in an encrypted mode, in which data passed between the authorized user and the system cannot be intercepted easily. Enter the appropriate information in the text boxes. This information forms the distinguished name for the certificate and should be customized for your installation. Browsers typically expect the Common Name to be the Internet name of the CFA.
After you enter the information, click Submit.
Licensing for all Infrascale data protection solutions – which includes Infrascale OS application running on Infrascale CFAs – is based on the net capacity of the product you have purchased. The “net capacity” of each offering equates to the total raw capacity minus the capacity allocations needed for standard RAID 5 configurations and archiving.
For example, your capacity license of 2.4 TB will be derived from 3.2 TB of raw capacity minus 400 GB for a RAID 5 setting, and minus 400 GB for archiving.
If you wish to upgrade your capacity license, you may not simply buy higher capacity hard drives and install them in your CFA. This course of action will void any warranties associated with your purchase. Instead, you must contact your Infrascale dealer and purchase a capacity license upgrade. This license upgrade includes our approved installation and configuration process.
For details concerning Infrascale capacity licenses, upgrades, and warranty offerings, please refer to the official Infrascale price list available from your Infrascale Reseller.
This window will allow you to override the default value for maximum number of booted VMs. The default value is calculated based on system resources, and exceeding this value runs the risk of degraded performance. It is recommended that you leave the boot limit at the default value, and delete previously booted VMs before booting a new VM.
NAS is a provision of disk space via commonly used network file sharing protocols. This disk space can be shared by many client computers using one or both of the following protocols:
SMB protocol is commonly used to provide shared network access to files for computers running Microsoft Windows.
NFS protocol provides the same service to computers running many of the Unix-based operating systems, such as AIX, Linux, and Solaris.
Use the NAS screen to manage folders and network file sharing protocols and to control firewall interaction with the NAS space.
Adding a new share
To create a new share, on the main NAS screen, click the Folder link. A screen similar to the following will appear:
You should choose a folder name that meaningfully represents what this folder and possible subfolders will be used for. Remember that it will be possible to share this folder with one or more people on one or more client computers using one or more network file sharing protocols. An example folder name would be “Staff.”
In the Enter Folder Name box, type the name for the new share, and then click Register. A screen similar to the following will appear:
From this screen you can unregister the specified folder, create the space for the folder or delete it if it already exists, and change the folder’s service availability.
If space for the folder does not already exist, click Create to create the folder and move towards sharing it. The screen will then appear similar to the following:
This screen gives you the additional options to delete the space that you created, check your disk usage, and change which local user or group owns the folder.
This screen also indicates the service availability of the NFS and SMB file sharing protocols for the share. In the example in the figure, the “NFS no” and “SMB no” links indicate that neither protocol is currently available. (If the respective protocols were available, the links would be labeled “NFS yes” and “SMB yes”.)
To configure the file sharing protocols and make them available:
For the SMB protocol (for computers running Microsoft Windows), continue with the next section, see SMB Protocol.
For the NFS protocol (for computers running Unix-variant operating systems, such as AIX, Linux, and Solaris), see Enabling the NFS Protocol.
This section documents SMB protocol, which is commonly used to provide shared network access to files for computers running Microsoft Windows.
Enabling SMB protocol
The first task for using the SMB protocol is to enable the protocol on the CFA. This task also includes configuring global SMB protocol settings and creating SMB users.
When you enable or disable the SMB protocol, the setting will apply immediately, as well as whenever the CFA starts up, until you change the setting.
To enable SMB protocol on the CFA, on the main NAS setup screen, click SMB (on) (the links indicate the current status):
At the top of the screen, under Current Status, click Enable to enable SMB protocol. (Or, if SMB is already enabled, click Disable to disable the protocol.) The browser will then return to the previous screen.
You can use the Global Settings panel on this screen to configure the overall service behavior for any folders shared via SMB in the global settings. The settings are in five categories:
|Security Mode||Use to specify whether users need to log on to the server in order to connect to the share|
|Workgroup/Server String||Use to specify the workgroup that the CFA should log in to, as well as what will be displayed to users in addition to the CFA name|
|Map to Guest||Use to specify whether to allow guest logins|
|Hidden Files||Use to configure what file types, if any, will be hidden files that will not normally be seen on the remote clients. For each file type listed, you can use the dropdown list to select Unset, Hide, or Show|
|Filename Mangling||Use to configure filename case and format settings|
To save your global settings, click Set.
This screen also includes an Account Management link at the bottom for creating and managing SMB users.
There are no predefined users. You can use the following buttons on the screen to create a new user, or manage existing users (select users by checking the respective check boxes):
|Button name||Button description|
|Add||Add new account with the specified name (minimum three characters) and password (minimum four characters)|
|Password||Change password for the selected users|
|Enable||Enable selected users|
|Disable||Disable the selected users|
|Remove||Remove the selected users|
When you have finished managing users, close the screen.
Making SMB available on a folder
To make SMB protocol available on the folder, either:
On the main NAS setup screen (see NAS), click no in the SMB column for the respective folder, or
On the disk share configuration screen (see Adding a new share), in the Service Available row, click SMB no.
From this screen, you can configure various remote access capabilities specific to the named folder.
For security purposes, new folders are created with no access rights. You will need to enable various configuration settings in order for the folder to actually be usable:
|Folder||The folder for sharing. (You cannot edit this setting here)|
|Share Name||The share name, which defaults to the share name. Share names should be 12 characters or less|
|MS‑DOS Volume Name||The MS‑DOS volume name for the share|
|Comment||Arbitrary notes regarding the share|
|Available||When selected, allows access to the folder. This setting is configurable in case you need to quickly disable that folder availability without necessarily removing the folder or disabling the SMB protocol service. |
Whether Available is selected determines whether SMB protocol is listed as available (yes) or not (no) on the main NAS screen and other related screens
|Browsable||When selected, allows the folder to be browsed|
|Writable||When selected, allows the folder to be written to (although at first you may want to leave the checkbox clear in order for the folder to be read-only)|
|Guest OK||When selected, allows guest access to the folder|
Next, use the Users section of the screen to configure what authenticated users can do with the folder (please refer to the screenshot above)
This screen lists the defined SMB users from whom you can configure the users for the share, using the Valid, Assigned, and Administrators options:
In the Valid selection list, select one or more users who will then all be able to access the folder share. To select multiple users, hold down
Ctrl while you click individual users.
Use the Assigned dropdown list to select which user (if any) to assign as the owner of files created by valid users. (If no user is selected as owner, users will own their own files.)
Valid users who are not assigned as owners will not be able to make any changes to this top level folder, but only to any subfolders that the valid user does own. To change this, click Owning User, and then on the disk share configuration screen (see Adding a new share), change the local user to match the valid user. (Be sure to click Change User so that the change will take effect.)
Use the Administrators selection list to select one or more users as administrators.
You can use the Hidden Files section to configure what file types, if any, will be hidden files that won’t normally be seen on the remote clients. For each file type listed, you can use the dropdown list to select Unset, Hide, or Show.
To save these new configuration settings and return to the main NAS screen, click Set.
This section documents NFS protocol, which is commonly used to provide shared network access to files for computers running many of the Unix-based operating systems, such as AIX, Linux, and Solaris.
Enabling NFS protocol
The first task for using the NFS protocol is to enable the protocol on the CFA. This task also includes configuring NFS clients.
When you enable or disable the NFS protocol, the setting will apply immediately, as well as whenever the CFA starts up, until you change the setting.
To enable NFS protocol on the CFA, on the main NAS setup screen, click NFS (off) (the links indicate the current status):
To enable NFS protocol, click Enable. (Or, if NFS is already enabled, click Disable to disable the protocol.) The browser will then return to the previous screen.
Making NFS available on a folder
To make NFS protocol available on a folder, either:
On the main NAS setup screen (see NAS), click no in the NFS column for the respective folder, or
On the disk share configuration screen (see Adding a new share), in the Service Available row, click NFS no.
In the General Settings group, select Available to allow access to the folder. You can also enter arbitrary folder notes in the Comment box.
In the Client Specific Access group, you can make the following settings for the folder:
|Client||The client that the setting applies to. You can use asterisks ( |
|R/W||When checked, enables write access as well as read access to the client for the export|
|Async||When checked, improves performance at the cost of possible data loss or corruption on unclean server restarts|
|Any‑port||When checked, allows NFS requests from any Internet port number – not just less than 1024|
|Root||When checked, allows remote superuser|
|Anon||When checked, treats all users anonymously|
|UID||When Anon is checked, user ID for the anonymous user|
|GID||When Anon is checked, group ID for the anonymous user|
To add additional client lines to the table, click Add Client. Or, to remove the selected (checked) client lines, click Remove Client.
To save these new configuration settings and return to the main NAS screen, click Set.
RAID management module provides a simple graphical way to manage the CFA RAID arrays that are present on the system. RAID system does not require any user intervention under normal operating conditions. In the event of a hard drive failure, use this interface to replace the failed drive and repair the RAID array.
The bay configuration section shows the logical setup and status of the bays as a table. The table lists the bays, their format, storage capacity, and the status.
The Alarms section shows a list of recently logged messages regarding the status of the individual RAID arrays. For a complete list of the events and their explanations, see Array notification events.
If an array and its constituent drives are operational, the background color of the drive bays is green.
If any of the RAID arrays have problems, the background color of the drives is red, and a red banner is displayed on the View Notices screen. In addition, the RAID icon in the lower right will be red. Any notice will cause the banner behind the View Notices button to turn red:
Identifying a failed disk drive
When the system detects a failed disk drive in one of the redundant arrays, the failed disk drive will be marked with . Once a disk and its associated array have been marked, the first step is to attempt a rebuild. If the rebuild fails, it is likely the failed drive needs to be replaced to restore array integrity. Contact Infrascale Support to confirm, if necessary. Once the new drive has been installed, the associated array must be rebuilt.
Restoring array operation
Once you have identified a failed disk drive, complete the steps in the following sections to replace the drive and restore the array to full operation.
Logically remove the degraded disk
While RAID drives are hot-swappable, to logically remove the disk drive, click the button associated with the drive bay of the failed disk, and then click Offline. (Archive drives must always be prepared for removal.)
When prompted to confirm the Offline action:
Click Yes to remove the selected disk (taking it offline), or
Click No to cancel the operation.
Once the disk is logically removed, you can no longer select the bay without first using the Rescan button.
Physically remove the bad drive and replace it with a good drive of equal (or greater) capacity. A tested and supported replacement disk can be obtained from your Infrascale dealer or reseller.
To remove the disk, slide the button on the drive bay to the right, which releases a small lever. Pull back on the level until the disk and the mounting sled are released from the CFA.
Insert the new disk and sled into the drive bay until the disk is almost entirely inserted. You should feel a small amount of resistance. Then press the lever to finish inserting and locking the sled into place.
Once you have installed and scanned the new disk, you can initiate rebuilding the degraded array. Select the button of the replacement disk, along with the button(s) of any other disk(s) in the degraded array, and then click Rebuild.
The system will begin to rebuild the unit, and the background of the array disks will become yellow. The rebuilding status is displayed with and the status changes to Rebuilding tracking % of completion. When is covered with green slices, the rebuilding process is complete, and the background colors are reset to green.
You can scan the RAID for new drives by clicking Rescan. The system will recognize any new drives, including the one just replaced. If the new drive appears to have data stored on it, you will need to format the drive before it can be used for rebuilding the array.
Format new drive
This step may be necessary only if the new drive appeared to have been used before to store non-redundant data. If reformatting is necessary, the system will enable the Reformat button and prevent you from rebuilding the array with this drive until the disk has been reformatted. Reformatting will cause some basic information on the disk to be erased and any previously stored data to be lost. Reformatting should only take a few seconds. Once the drive is reformatted, it can be used for rebuilding a degraded array.
Command button actions
The actions of the command buttons in the displays are summarized in the following table:
|Refresh||Refresh the drive information|
|Rescan||Scan disks for physical changes and update the display presentation|
|Clear Alarms||Clear all alarms|
|Rebuild||Rebuild the array using the selected disk|
|Offline||Take the disks in the selected bays offline, prepare them for physical removal|
|Reformat||Make a disk in the RAID bay or in the archive bay usable for that bay’s function by erasing data on that disk. |
This is a high-risk operation. Be careful not to reformat a disk that you used to save data unless you no longer need the data
|Verify||Initiate the array verification|
|Stop Verify||Stop the array verification|
Array notification events
The following table explains the most common messages than can appear in the Alarms box on the RAID status page. These messages will be preceded by the time the event occurred, the bays of the disks involved, and the severity of the message.
|Drive error||An error was encountered with the disk in the specified bay|
|Incomplete unit detected||Incomplete unit detected disks to bring it online|
|Rebuild failed||An attempt to rebuild an array has failed|
|Array degraded||The system has stopped using a disk in the specified array and has started using the redundant information to retrieve data|
|Verify failed||An attempt to verify the redundant information in an array has failed; the disk drive that contained erroneous data is given|
|Initialization finished||The system has finished creating the redundant information on a new array or on an array that was not cleanly shut down|
|Initialization started||The system has started creating the redundant information on a new array or on an array that was not cleanly shut down|
|Rebuild finished||The system has finished rebuilding a replaced disk with information from the other disks in the specified array|
|Rebuild started||The system has started rebuilding a replaced disk with information from the other disks in the specified array|
|Verify complete||A verification process has finished on the specified array|
|Verify started||A verification process has been started on the specified array|
|Soft reset occurred||The disk has been reset without powering down|
|Array degraded||The specified array has been degraded and should be replaced|
|Controller error||The disk controller of the specified disk has issued an error|
|Logical array deleted||The specified logical array has been deleted|
|Sector repair occurred||Sector repair occurred A sector on the specified disk had reported an error and has been repaired|
|Encountered bad sector during rebuild||During a disk rebuild a bad sector was found|
|Replacement drive is too small||The drive used as a replacement is smaller than the one it is intended to replace|
|Verify error||An error has been found during verification of the specified disk|
|Drive not supported||The specified drive is not supported by the CFA|
|Unclean shutdown detected||If the CFA is not properly shut down, the system does not have time to stop the RAID controllers. This may cause the system to reinitialize the RAID array(s). This initialization process can cause performance degradation while the initialization is in progress. Loss of data may also occur. Turning the power off, pressing the Reset button, or losing power to the box are common ways to cause an unclean shutdown|
The following table describes the messages displayed in the bay configuration and status section.
|Degraded||When the label is applied to an array, the array is compensating for a failed or missing disk by recalculating data from the remaining disks. |
When the label is applied to a disk, the system has detected a fault with the disk and is no longer using the disk to retrieve information
|Initializing||The system is calculating the redundant data used to recover information in the event of a disk failure or loss|
|Rebuilding||The system is recalculating the information of one or more disk drives in an array, usually as a result of a disk drive replacement process|
|Unused||There is no disk in the drive bay|
|Verifying||The system is recalculating the redundant data and comparing it to the data on disk to ensure the integrity of the entire array|
Use this section to register the CFA via the Infrascale Dashboard. Registration will link the CFA with the Infrascale Dashboard and allow features such as remote access and cloud replication.
The Cloud Region option determines the location of the cloud endpoint that will be used for cloud replication. It is suggested that you select the region closest to the location of the CFA.
You can use this screen to save and restore CFA configuration files, using the Save Configuration and Restore Configuration buttons, respectively.
The on-battery runtime of most uninterruptible power sources is relatively short but sufficient to start a standby power source or properly shut down the protected equipment. The CFA provides USB connectivity for most standard UPS battery units. In the event of a power outage, the CFA will run on battery power until a low battery signal is received. At that time, the CFA will execute automatic power-fail shutdown.
The UPS settings can be found under System > Settings. To scan for a battery unit, select UPS and click Rescan.
When the device has been found, the CFA can monitor the power status. If desired, select Shutdown on power failure.
When your options have been selected, apply the settings and close the window.
Storage settings are available in the vCFA Management Console only.
This section displays the usable and licensed capacity of your storage.
It allows you to increase the size of the RAID or the Catalogs volume. After adding additional storage to the vCFA, you will need to complete the wizard to make the newly added storage available to the vCFA.