Tse 1365
Tse 1365
INTRODUCTION ................................................................................ V
Introductions ................................................................................................ v
GLOSSARY
Course Topics
Modules Demonstrations
Architectural Overview
Managing and Administering Administration Console
Searching the Archive Search
Replication Overview
Overview
• How it Works
– Single platform supporting
multiple applications
simultaneously
– Common archive functions Discovery Module
across content types Result Set
• Data and metadata ingest
• Authentication and policies
– Embedded full-text indexing
and search
• All content in the archive
• Retrieve content produced
by different applications
– High-performance, scalable,
and secure storage
3
Users and applications write and read files. Internally, they are
managed as objects.
• Value
– Active archive for fixed content
– Stores and authenticates all types of
content
– Continuous object availability
– Retention by policy
– Secure access/search to
data/metadata using open standards
• Minimizes technology
obsolescence
– Online archive for performance
– Low maintenance
• Simple deployment and scalability
• Self-healing and self-managing
Multi-application Access
Built-in NFS, CIFS/SMB, HTTP, and WebDAV gateways allow easy access for
multiple applications
Archive Object Management
Data + Metadata + Policies
Policy-based object management guarantees archived data is authentic, available
and secure
Open Solution
Content Archive Platform supports standard file system gateways, can store
standard file formats such as XML and HTML and can leverage other Hitachi
enterprise-class hardware platforms over time
• Object archive
– Email
– Files (for example, documents, presentations, and spreadsheets)
– Images
– Other “unstructured” data
• Fixed content – write once: read many
• Distributed – shared among nodes
• Scalable – able to grow as needed
• Easy to use – just runs
Architecture
Storage nodes are the essential part of Hitachi Content Archive Platform. They
manage the archive objects that reside in storage. All runtime operations are
distributed among the storage nodes, thereby ensuring reliability and performance
as capacity grows. If a node fails, the Content Archive Platform adapts by
redirecting processing to the nodes that remain online, so the archived data remains
available to you.
Search nodes
Search nodes manage a distributed index of all the archive objects in Content
Archive Platform. It must include at least one search node for an archive to be
searchable. As with storage nodes, all runtime search operations are distributed
among the search nodes, thereby ensuring reliability and performance as your
archiving needs grow.
Search index
To facilitate searches, Content Archive Platform maintains an index of all archive
objects. The index is based on both the metadata and data for each object. Content
Archive Platform uses this index for fast retrieval of search results.
Architecture
• Node – a host (server) that runs the Content Archive Platform software
– Server Nodes – manage the archive objects
– Search Nodes – manage a distributed index of all the archive objects; must
be at least one search node to use search functionality
Content Archive Platform consists of multiple servers, called nodes which are
networked together as peers. At least two of the servers must be storage nodes.
Content Archive Platform can also have one or more search nodes.
Storage nodes
Storage nodes are the essential part of Content Archive Platform. They manage the
archive objects that reside in Content Archive Platform storage. All runtime
operations are distributed among the storage nodes, thereby ensuring reliability and
performance as capacity grows. If a node fails, the Content Archive Platform system
adapts by redirecting processing to the nodes that remain online, so the archived
data remains available to you.
Search nodes
Search nodes manage a distributed index of all the archive objects in Content
Archive Platform. Content Archive Platform must include at least one search node
for an archive to be searchable.
As with storage nodes, all runtime search operations are distributed among the
search nodes, thereby ensuring reliability and performance as your archiving needs
grow.
Example Metadata
/fcfs_data /fcfs_metadata Files:
client shares
• created.txt
HTTP NFS CIFS WebDAV • dpl.txt
Content Archive Platform File System • hash.txt
Storage Metadata Policy • retention.txt
Manager Manager Manager • shred.txt
xyz
dbms a
names
address
When you view an archive through any available protocol such as CIFS or NFS, the
Content Archive Platform File System displays directories in a standard hierarchical
structure. Two directories are at the top of this structure:
fcfs_data heads the directory structure you create for the items you add to the
archive
fcfs_metadata heads a directory structure that parallels the one you create under
fcfs_data. As you archive your items under fcfs_data, Content Archive Platform
displays the information that describes each of them under fcfs_metadata
fcfs_metadata and the directories that Content Archive Platform displays under it
are called metadirectories. The files displayed in these metadirectories are called
metafiles.
Hardware Components
• Product Lines
Content Archive Platform 300
• Fully integrated archive appliance with RAIN architecture
• Integrated software and storage on each node
• RAID 5 Protection with DPL2
• Available in 2, 4, 8, or 17 usable TB configurations
– 17 TB system uses 1 TB disk drives
OR
Other metrics:
y Maximum number of directories per node: 1,500,000
y Maximum number of objects per directory: 200,000
y Maximum number of objects per system: 32,000,000,000 (80 nodes times
400,000,000 objects per node)
y Maximum number of attachments per email for SMTP: 50
y Maximum aggregate email attachment size for SMTP: 500 MB
y Maximum custom-metadata.xml file size: 1 GB
y Maximum number of XML elements in custom-metadata.xml: 9,000
y Maximum level of nested XML elements in custom-metdata.xml: 55
Public LAN
Active
Private LAN connection
Passive
connection
4GB FC
13
• Example Configurations
RKA-JAT (Arc/Node x)
WMS100 RK-XS (Search)
RKA-JAT (Arc/Node x)
WMS100 RK-XS (Search)
RKA-JAT (Arc/Node x) RKA-JAT (Arc/Node x)
14
Core Functionality
• Overview
Metadata Manager
• Overview
17
• Key Functions
– Handles the management of
metadata related to each archive
object through the use of a
<M>
distributed database.
– Copies of all metadata are kept on P
multiple nodes to ensure the proper
number of data protection level
(DPL). MMMM
MM
18
What is metadata?
y Dates (create, directory modify, until [retention policy], user, group, mode, and
others)
y Symbolic links and directories
y Messages in the administration user interface
y Policy information for each directory and file
y System configuration information
y Metrics for disk, node, and storage
y File analytical data
y User customizable metadata will be supported in future versions of Content
Archive Platform
• Metadata Creation
– When a file is ingested, it is written to /fcfs_data
– Metadata is created and written to /fcfs_metadata
Example Metadata
/fcfs_data /fcfs_metadata Files:
client shares
• created.txt
HTTP NFS CIFS WebDAV • dpl.txt
Content Archive Platform filesystem • hash.txt
Storage Metadata Policy • retention.txt
Manager Manager Manager • shred.txt
xyz
dbms a
names
address
19
Storage Manager
• Overview
20
• Key Functions
– Manages the storage on the physical media
– Ensures all operations are in a known state
– Processes requests from other managers:
• Sends information about the state of the media
• Recognizes drive failures and handles notification
• Stores metadata with the data
– One Storage Manager per LUN in a given node
Request Manager
• Overview
22
• Purpose
– Orchestrates all requests from the external world through the access layer
and internal requests from the policy manager
• Key Functions
– Ensures all read/write operations in the archive are handled properly and
guarantees all requests are in a known state at all times
– Provides transaction control for coordinating multiple read/write operations
across nodes to satisfy a given client request
– Reads and Writes are fail-safe, so if a Storage Manager dies in the middle of
a request, the Request Manager will redirect the operation to another
functioning Storage Manager
– Files may have multiple readers, may be read while being written, but files
may only have a single writer
– Brokers request resolution
– Acts as an internal client to the Storage and Metadata Managers
Policy Manager
• Overview
24
25
y The shredding policy overwrites storage that held data and metadata for a
deleted object in such a way as to completely remove any trace that the object
was ever in the archive.
y The scavenging policy ensures that the metadata for each object exists and is not
corrupted.
y The duplicate elimination policy safely removes redundant data to free space in
the Content Archive Platform storage.
y The garbage collection policy finds hidden objects that are marked for deletion or
shredding, and performs the applicable operation. It also finds data and
metadata left over from incomplete archive operations, and deletes or shreds it,
as applicable.
y The cluster balance policy ensures that archive objects are balanced across all
Content Archive Platform storage.
y The replication policy copies objects from one Content Archive Platform system
to another to ensure data availability and enable disaster recovery.
y The compression policy makes more efficient use of archive storage by
compressing object data, thereby freeing space for storing more objects.
• Protection Policy
– Ensures that archive objects are protected and available
– Self-configuring and self-healing systems with failover and ongoing integrity
checks
– Ensures specified number of replica copies are maintained to tolerate
simultaneous points of failure
• Authentication Policy
– Policy-based object management guarantees archived data is authentic,
available and secure
– Guards against corruption or tampering
– User selectable hash algorithms include SHA-1, 256, 384 or 512; MD5 and
RIPEMD-160
• Retention Policy
– Ensures that objects remain in the archive for at least as long as the
retention setting requires. When permitted, you can change the retention
setting for an object
– Prevents file deletion before retention period expires
26
– Can be set explicitly or inherited
• Shredding Policy
– Shredding
– Ensures no trace of file is recoverable from disk after deletion
• Scavenging Policy
– ensures metadata of archived objects accurately maintain their state (are not
corrupted)
• Duplicate Elimination Policy
– Find and inspect duplicates
– Remove duplicates, but maintains object integrity
27
28
Replication Manager
• Overview
29
• Purpose
– Replication Manager ensures that the replication policy is working properly to
update the replica with all object creations, deletions, and metadata changes
that occur on the primary system.
Protection Manager
• Overview
31
• Purpose
– Protection Manager establishes protection sets and helps ensure that archive
objects always have the required level of protection. It also keeps track of
nodes that become unavailable.
Administrative Engine
• Overview
33
• Functions
– Provides information to the Administrative Console GUI, which is accessed
through the web browser
– Monitors Content Archive Platform activity, including system and policy events
– This activity is accessible through the access layer’s Administration Console
and the SNMP gateway
Archive Access
• Overview
35
• Archive Access
– Access to the Content Archive Platform archive occurs through industry-
standard protocols and the search facility.
• Archive Access Protocols
– The HTTP, WebDAV, CIFS, and NFS protocols enable you to add, view, and,
when allowed, modify and delete object data and metadata through familiar
directory structures. (WebDAV is an extension of the HTTP protocol.)
– The SMTP protocol enables Content Archive Platform to receive and store
email data directly from email servers.
– The NDMP protocol enables full, incremental, and differential backups and
restores of archive objects.
• Search Console
– The Search Console provides interactive access to the Content Archive
Platform search facility, which lets users search the archive for objects that
meet specified criteria.
Administrative Services
• Overview
37
• Purpose
– Provides a human-readable interface to Content Archive Platform
configuration, activity, and status.
• Administration Console
– Provides interactive access to the administrative engine. The Console is a
secure web application that provides a dynamic view.
• SNMP
– Facilitates monitoring and management through an external interface. It
reports selected events that occur in the system and, optionally, lets you
modify Content Archive Platform settings.
Namespace Organization
• Single Namespace
– Since the filesystem is so large, the design of the hierarchical layout of the
namespace is a key to flexibility and organization of the data
– Directory depth should be kept to a reasonable level (less than 20) or
performance may degrade
– The number of objects in a directory can also have a negative impact on the
performance of the system. In general, keep the number of objects per
directory to 200K or less. Even at this number, commands to perform
directory listings become very slow and worthless to an end user.
39
40
Node Failure
• Overview
– Node failures reported to Administrative Engine after 30 seconds
– Administrative Engine triggers protection policy to start (ahead of schedule)
90 minutes after node failure is reported
– Backup Metadata Manager regions are promoted to authoritative
– New backup Metadata Manager regions are created to meet DPL compliance
– Meanwhile read requests are satisfied by remaining copies of data or by other
node accessing LUNs if Zero Copy Failover is configured
41
User Roles
Administration Console
Server
URL
Login:
• security
This page shows the serial number, if any, for the Content Archive Platform system.
At the bottom right, the page also shows the specific version of the Content Archive
Platform release. Once you enter the Administration Console, both the serial number
and the version appear at the bottom of each page.
In the Username field, type your case-sensitive Console username — either admin or
monitor:
admin enables you to perform all the functions available in the Console, including
monitoring and configuring the Content Archive Platform system
monitor enables you to view all aspects of the system presented in the Console, but
does not let you make any changes
2. In the Password field, type the case-sensitive password that goes with your
username.
• Overview Page
When you log into the Administration Console, the first page is the Overview page.
It lets you monitor the health of the Content Archive Platform system as a whole. It
provides notification of hardware and capacity problems, displays current policy
status, displays a capsule view of the system log, and contains graphs that show
object and indexing counts and the volume of storage used. To return to the
Overview page from other Console pages, click on the tab.
y Hardware Status — Alerts in this category identify nodes that are reporting
problems relating to drives and network interface cards. For details on the
problems for a node, click on the node ID. For more information on the types of
problems reported, see “Hardware Status” on page 35 of the Administration
Guide.
y System Status — Alerts in this category report on storage usage and indicate
system-wide conditions such as a temporary prohibition on object deletion.
y Tip: If the amount of used storage is approaching 85 percent, consider adding
more storage capacity. By adding capacity before this threshold is reached, you
can prevent interruptions in archive availability due to insufficient space.
y Object Integrity — Alerts in this category report on the state of object data and
metadata in the archive. They also identify situations in which the protection or
authentication policy is fixing errors or has found errors it cannot fix.
For information on suspending object deletion, see “Setting Retention Options” on
page 72 of the Administration Guide. And for information on the protection and
authentication policies, see Chapter 8, Policies.
Overview Page
• Policy Status
– Displays the status of each Content Archive Platform policy, as well as the
data protection level (DPL) of the system
The Current Policy Status section on the Overview page displays the status of each
policy, as well as the data protection level (DPL) of the system. The information in
this section is aggregated from the policy managers on the storage nodes. For
example, if the protection policy is running on at least one storage node, the status of
the policy is Running, regardless of whether it is running on any other nodes.
y Status — The current status of the policy. Possible values are:
y Running — The policy is currently running
y Ongoing — The policy is running continuously
y Completed — The policy has finished its run. Completed indicates that the
policy finished without interruption.
y Waiting — The policy has never run
y Fixing — The policy is fixing violations it has detected
y Irreparable — The policy failed to fix violations. This is a severe condition and
should be evaluated immediately.
y Deletion prohibited — For the retention policy only, deletions have been
disallowed for the system. For information on prohibiting deletions, see
Administration Manual “Setting Retention Options” on page 72.
y DISABLED — The policy cannot run because another policy that has precedence
is running, or your authorized service provider.
• Recent Events
– The list of events in this section is a subset of the events (major events) in the
system log
• Object Count
– Contains a graph showing the numbers of objects and indexed objects in the
archive during the past 30 days
10
Total storage capacity — The total amount of storage space associated with the
Content Archive Platform storage nodes, excluding the space required for system
overhead and the operating system. This is the total space available for all archived
data, including object data, metadata, and redundant data required to conform to
the Content Archive Platform protection policy. For information on the protection
policy, see “Protection” on page 68 of the Administration Manual.
Used storage volume — The total amount of storage space currently occupied by all
archived data, including object data, metadata, and any redundant data required to
conform to the Content Archive Platform protection policy.
Pre-archived volume — The total size of the archived data and custom metadata
files before they were stored. This value tells you how much data you have archived.
Exercise
11
12
Logs
• Overview
Page thru
Hide details events
Events per
Show detail page
13
The System Log page lists all events that have occurred since the last time Content
Archive Platform was installed. The page displays twenty events at a time in reverse
chronological order. To display this page, click on System Log in the top row of tabs.
Severity — The severity of the event. Possible values are:
y Notice — The event is normal and requires no special action. Messages of this
severity are informational only. Examples are:
Node started
Protection policy violation fixed
Metadata recovery complete
Informational messages in the system log have a green background.
y Warning — The event is out of the ordinary and may require manual
intervention. Examples are:
Shutdown due to insufficient DPL
Protection policy violation
Metadata recovery started
Warning messages in the system log have an orange background.
Current node count — The numbers of storage nodes and search nodes currently in
Content Archive Platform. This number includes all nodes attached to the Content
Archive Platform network, regardless of whether they are running, starting up,
stopping, or not running at all. It does not include nodes that have been removed
from the system.
A list of the nodes in the system — For each node, the list shows:
y Controls — Action links for the node. For information on these controls, see
“Stopping and restarting individual nodes” on page 38 and “Monitoring
Individual Nodes” below.
y Node ID — The unique ID assigned to the node. To see the IP address of the
node, place the cursor over the node ID.
y Type — The type of node (either Storage or Search).
y Status — The node status. Possible values are:
Available — The node is running.
Unavailable — The node is either not running, starting up but not yet able to
perform
Content Archive Platform functions, or shutting down and no longer able to
perform Content Archive Platform functions. If a node is unavailable due to a
hardware problem, you may be able to determine the cause by reviewing the
Hardware Status section on the Node Status page. If the node is unavailable, the
background of the row is in orange. For information on this section, see “Hardware
Status” on page 35 of the Administration Manual.
Alert — The node is experiencing one or more problems. The Alerts column
indicates the types of problems. If the node has one or more alerts, the background
of the row is in light orange.
14
15
Node Status
• Overview
16
The Node Status page of the Administration Console shows detailed information
for any given node. The full page title (Storage Node Status or Search Node Status)
indicates the type of node displayed, as well as the node ID.
To open the Node Status page, do one of the following:
y On the Nodes page, click on the display control ( ) or node ID for the node you
want. For information on the Nodes page, see “Understanding the Node List” on
page 32 of the Administration Guide.
y On the System Log page, click on the display control ( ) or node ID for an event
that occurred on the node you want. For information on the System Log page,
see “Using the Content Archive Platform Log” on page 28.
y In the Recent Events section on the Overview page, click on the display control
( ) for an event that occurred on the node you want. Alternatively, click on the
show details option in the Recent Events section and then click on the node ID.
For information on the Recent Events section, see user guide “Administering
Content Archive Platform”.
• Logical Volumes
17
Volume identifiers are assigned sequentially, but the volumes may be listed out of
order.
y A graphical representation of the amount of storage used out of the total amount
of storage on the volume. If the logical volume is unavailable, the colored area of
the graph is gray.
y The percentage of storage space that is currently in use on the volume.
y The number of bytes of storage used out of the total number of bytes of storage
on the volume. If the node is unavailable, the background of the Logical Volume
Usage section is orange.
• Hardware Status
18
The Hardware Status section on the Node Status page summarizes the current
operating conditions of various types of components of the currently displayed node.
It also provides the option of viewing detailed information for each component.
However, if any component is malfunctioning, the Console automatically displays
details about it.
To display detailed information for a given component, click on the Show details
link for it. To hide the details, click on the Hide details link.
The background of any status messages for malfunctioning components is orange. If
the node is unavailable, the background of the heading in the Hardware Status
section is orange.
Status — The current status of the node. Possible values are:
y Available — The node is running.
y Unavailable — The node is either not running, starting up but not yet able to
perform functions, or shutting down and no longer able to perform functions.
Important: If the status of a node changes spontaneously from available to
unavailable and the node does not restart automatically, please contact your
authorized service provider.
Node ID — The ID assigned to the node.
IP address — The IP address assigned to the node.
Boot time — The date and time the node last started up.
Usage/capacity — The total amount of storage space on all the logical volumes
associated with the node and the amount of that space currently in use.
• Node Events
19
External Logging
Critical
errors
Admin Console
Filtering and
custom actions
Administrator’s
workstation Warnings
Syslog
server
SNMP
Notices
manager
20
Critical
errors
Admin Console
Filtering and
custom actions
Administrator’s
workstation
Warnings
Syslog
server
SNMP Notices
manager
Download Logs
• Downloads the logs from each node that is running, even if not healthy
• Includes only logs from within a specified time period
• Can include a comment
• Includes no archived data or metadata
• Encrypts the logs for privacy
– Only support personnel have the key to decrypt the logs
– You can add your own encryption keys so you can decrypt the logs yourself to
verify that no data is included
• Required role: System
22
Internal Logs
23
Demonstration
Exercise
Yes
No
Search Module
Console
Archive
Archive Index
Archived
Archived
ArchivedArchived
ArchivedArchivedArchivedArchived
Archived
Archived
Archived
ObjectObject Object Object Object Object Object Object ObjectObjectObject
• Search Console
Simple Search
• Overview
– Based solely on string (text) matching
– Can specify multiple strings
– Can use wild cards
– Does not use metadata
– Supports comparison operators:
• Any – retrieve objects that contain any of the search strings
• All – only retrieve objects that have all of the search strings
• Exact – only retrieve objects that contain exactly the phrase of the search
string – use quotes when searching for multiple exact phrases
– Directory Path – search string may contain the directory path of the object (if
known)
Simple searches are one of three types of searches you can perform from the Search
Console. A simple search is based solely on word matching. You can specify
multiple words or phrases to search for, and you can use wildcards to find more
matches. Simple searches do not support the use of metadata as search criteria.
This section provides instructions for performing simple searches. It explains the
rules for specifying the search criteria and the options that determine whether
objects are included in the search results. It also includes several examples. Once
you have the results of a simple search, you can filter and export them. For
information on these activities, see Chapter 3, “Working with Search Results” in the
Hitachi Content Archive Platform- Searching an Archive Administration Manual.
You can also save the search criteria as a reusable query. For information on saving
search criteria, see Chapter 6, “Working with Saved Queries.”
• Wild Card
– Asterisk (*) is the only valid wild card.
– Asterisk can only be added to the end of a search string.
• Strin* is valid
• *tring is not valid
– For an exact search, you can use a wildcard only if the search string does not
include any embedded spaces.
• String* is valid
• String Bass* is not valid
• Boolean Operators
– Plus sign (+) appended to a search string will only retrieve objects that contain
string
– Minus sign (-) appended to a search string will only retrieve objects that do
not contain the string
10
• Example
Search criteria
••Any
Anywords
words
••All
Allwords
words
••Exact
Exactphrases
phrases
••Wild
Wildcards
cards
••Booleans
Booleans
••“+”
“+”contains
containsword
word
••“-” does not contain
“-” does not contain
word
word
11
• Search Results
Results list
12
Select object
13
By
object
type
By
retention
time
14
Sort results
15
Show detail
16
Export:
• CSV
• XML
17
Save
query
View
Saved
Queries
18
Exercise
Object Metadata
Custom Metadata
19
Structured Search
• Overview
Metadata Properties
Metadata Types
• Example - Author
Metadata type
Comparison operator
Add
• Example – Email
String
22
• Custom Metadata
23
Advanced Search
• Sample Properties
See User Guide: Hitachi Content Archive Platform Searching an Archive for all
Properties
25
Search Demo
26
Content Replication
level
– Includes content, metadata, and policy
information (for example, shredding
attributes) Replicated file content
• Metrics generated that include Synchronized and secure archive objects
• Getting Started
– A Content Archive Platform must have replication enabled, to create
replication links.
– Replication uses Secure Sockets Layer (SSL) for authentication.
– SSL certificates (keys) are required to configure authentication.
• Content Archive Platform comes with an embedded self-signed server
certificate.
– The SSL requirement may be disabled through the Administration Console for
those replicating within a secure network or using external encryption
technologies.
– Do not use these at customer sites:
• Cluster 1 Private Key: server1.pkcs12
• Cluster 1 Public Key: server1.pem
• Cluster 2 Private Key: server2.pkcs12
• Cluster 2 Public Key: server2.pem
– The password on all these keys is passwd.
– SSL authentication can be disabled, but should not be at real customer sites.
5
Replication can be enabled during the Content Archive Platform initial build. If
replication is not enabled during installation, then the feature can be enabled
through a service procedure.
Note:
To make an environment secure, you must be sure that any communication is with
"trusted" sites whose identity you can validate. SSL uses certificates for
authentication that are digitally signed documents, which bind the public key to the
identity of the private key owner. Authentication happens at connection time, and is
independent of the application or the application protocol. Authentication involves
making sure that sites you communicate with are who they claim to be. With SSL,
authentication is performed by an exchange of certificates, which are blocks of data
in a format described in ITU-T standard X.509. The X.509 certificates are issued, and
digitally signed by an external authority known as a certificate authority.
10
11
12
13
• ______________
• ______________
• _________ _____________
• Create _______
• Authorize _______
14
Replication Operations
• Suspend
15
Suspend link operation – Examples for use include internet going down,
bandwidth crisis, or need another application to get priority.
It stops the link that it selects.
Keeps track of what backs up, building a delta list, and restarts where it left off.
Whatever is in backlog is not in B.
Source
Target
• Delete Link
– To replicate directories in a new link after deleting a link, you must remove the
directories at the target first.
– New links can only be created if the directories only exist at the source, to
avoid collisions.
17
Delete link – directories are deleted. However, metadata rules apply. Folders with
set retention periods will not allow you to delete the directories.
Failover/Failback
• Case 1: Replication link source or target (or link between them) fails
temporarily
– Repair failure and bring back online.
– Replication will resume automatically.
• Case 2: Replication Link Source fails for an extended period
– Failover to replica
• Makes link directories writable at the target
– Clients must failover to use the target for all operations (customer
responsibility).
– Repair replication link source
• Replication link source will come up read-only.
– For bi-directional replication, replication to target will resume automatically as
it recovers.
19
20
21
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-back to top-
Microprogram — See Microcode
Mirror Cache OFF — Increases cache efficiency
—M— over cache data redundancy.
MAC — Media Access Control (MAC address = a MM — Maintenance manual.
unique identifier attached to most forms of
MPA — Micro-processor adapter
networking equipment.
MP — Microprocessor
MIB — Management information base
MPU— Microprocessor Unit
MMC — Microsoft Management Console
-back to top-
Path failover — See Failover
PAV — Parallel Access Volumes
PAWS — Protect Against Wrapped Sequences
—O—
PBC — Port By-pass Circuit
OEM — Original Equipment Manufacturer
PCB — Printed Circuit Board
OFC — Open Fibre Control
PCI — Power Control Interface
OID — Object identifier
PCI CON (Power Control Interface Connector
OLTP — On-Line Transaction Processing Board)
• Virtual Logical Volume Image (VLMI) Round robin mode — A load balancing technique
Manager (optimizes capacity utilization), in which balances power is placed in the
DNS server instead of a strictly dedicated
• Hitachi Cache Residency Manager feature machine as other load techniques do. Round
(formerly FlashAccess) (uses cache to robin works on a rotating basis in that one
speed data reads and writes), server IP address is handed out, then moves
• LUN Manager (reconfiguration of LUNS, to the back of the list; the next server IP
or logical unit numbers). address is handed out, and then it moves to
the end of the list; and so on, depending on
RCHA — RAID Channel Adapter the number of servers being used. This
RC — Reference Code or Remote Control works in a looping fashion. Round robin DNS
RCP — Remote Control Processor is usually used for balancing the load of
geographically distributed Web servers.
RCU — Remote Disk Control Unit
Router — a computer networking device that
RDMA — Remote Direct Memory Access forwards data packets toward their
Redundancy — Backing up a component to help destinations, through a process known as
ensure high availability. routing.
Reliability — An attribute of any commuter RPO (Recovery Point Option) — point in time that
component (software, hardware, or a recovered data should match.
network) that consistently performs RPSFAN — Rear Power Supply Fan Assembly
according to its specifications.
RS CON — RS232C/RS422 Interface Connector
RID — Relative Identifier that uniquely identifies a
user or group within a Microsoft Windows RSD — Raid Storage Division
domain R-SIM—Remote Service Information Message
RISC — Reduced Instruction Set Computer RTO (Recovery Time Option) — length of time that
RK (Rack) — Acronym referring to the main can be tolerated between a disaster and
“Rack” unit, which houses the core recovery of data.
operational hardware components of the
Thunder 9500V/9200 subsystem. (See also: -back to top-
RKA, H1F, and H2F)
RKA (Rack Additional) — Acronym referring to
“Rack Additional”, namely additional rack
—S—
unit(s) which house additional hard drives SA — Storage Administrator
exceeding the capacity of the core RK unit of SAA — Share Access Authentication - the process
the Thunder 9500V/9200 subsystem. (See of restricting a user's rights to a file system
also: RK, RKA, H1F, and H2F). object by combining the security descriptors
RKAJAT — Rack Additional SATA disk tray from both the file system object itself and the
share to which the user is connected
—X—
XAUI — "X"=10, AUI = Attachment Unit Interface
XFI — Standard interface for connecting 10 Gig
Ethernet MAC device to XFP interface