In case of any problems with the new version, only a reboot is required, minimizing the system downtime. Task management is so much easier and convenient when using the unified task mechanism with scheduling for data and volume replication, backup and snapshot. Tasks may have many schedules and can be scheduled ahead of time. You can maintain the server without using the web browser.
The API includes functionalities like: users and shares handling, iSCSI targets operations, hardware status, software update, machine reboot and shutdown. Most of the functions implemented in the Open-E software include schedule functionality. This allows you to create backups, snapshots, run the replication process at a precisely determined time and much more.
The Open-E DSS V6 supports the usage of two or more network cards to access separate sub-networks or to increase the bandwidth and allows administrators to select services to be enabled on a specified NIC.
One of the supported modes is AFT Adapter Fault Tolerance , which assures greater reliability by providing a secondary network adapter that automatically takes over if the primary network adapter fails. To improve the data throughput and latency, the Data Storage Software V6 supports 10 GbE to increase bandwidth, improve overall performance, and reduce message latency across connections. Open-E DSS V6 supports InfiniBand cards that increase bandwidth, improve overall performance, and reduce message latency across connections.
InfiniBand is a modern, high-speed up to 10Gbit serial computer bus. This functionality is also known as IPoIB. This protocol secures data transmitted across a network, preventing confidential and personal information from being intercepted or modified. This function increases Ethernet networking throughput and reduces the CPU utilization of large file transfers.
If the default routing is not sufficient, this feature can be used to customize it. You can specify various rules for network interfaces. This is useful when you have several network interfaces in the same sub-network.
E-mail alerts are sent to the system administrator in case of HDD problems through the software. A snapshot is an immediate point-in-time image of the logical volume. The snapshot images can be used for both consistent and temporary backup, while users still have uninterrupted and complete access to the LV.
Files can be recovered from previous snapshots, if accidentally deleted or modified. Logical volume groups allow storage administrators to create logical storage pools that span multiple physical disk drives. With its support of multiple logical volume groups, Open-E DSS V6 makes it easier to meet the changing needs of users and applications while making the maximum use of available physical disk space.
Automatic Session Reassignment makes group renaming, removal, and WWN assignment work without interrupting blocking other sessions. This functionality makes the iSCSI and Fibre Channel services work smoothly while their configuration is being modified. This powerful caching solution can make the storage operate up to 8 times faster than the HDD-only solution. Synchronous replication guarantees zero data loss.
Write is not considered complete until acknowledgement by both local and remote storage. Most applications wait for a write transaction to complete before proceeding with further work, hence overall performance decreases considerably. Therefore, it is recommended using this option only for LAN. Synchronous replication is used to replicate data between nodes of iSCSI failover.
As used in the LAN ensures zero data loss and good performance. Once configured, all data written to the primary server is mirrored to a secondary server. NFS locks are also reassigned on the secondary server after primary server fails. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties to this License. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues , conditions are imposed on you whether by court order, agreement or otherwise that contradict the conditions of this License, they do not excuse you from the conditions of this License.
If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.
For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. In such case, this License incorporates the limitation as if written in the body of this License. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation.
If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. If the program is interactive, make it output a short notice like this when it starts in an interactive mode:. You should also get your employer if you work as a programmer or your school, if any, to sign a "copyright disclaimer" for the program, if necessary.
Here is a sample; alter the names:. This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for them if you wish , that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software.
For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable.
Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary.
To prevent this, the GPL assures that patents cannot be used to render the program non-free. Propagation includes copying, distribution with or without modification , making available to the public, and in some countries other activities as well. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.
However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met.
This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright.
Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December , or similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:. Task Mechanism with Scheduling Management of all the tasks is much easier and convenient using the unified task mechanism with scheduling for data and volume replication, backup and snapshot.
Tasks are scheduled as to when to activate and may have many schedules. Virtual Tapes Configure tape drive emulation on share or Dynamic Volume e. Tape Library Support Automate backups with use of tape drive libraries. Tape Retention Time Set schedule for tapes to be rewritten for new backup. Fast initial volume synchronization Open-E DSS V6 features fast initial volume synchronization for volume replication. Whether you have 5, , 15, or more, you only pay one price for one Data Storage Software V6 License.
DSS V6 can synchronize data in both directions: the Open-E DSS V6 can be the source and destination of files at the same time, allowing to cross-backup data on several servers. No storage limit above 48TB of licensed capacity The storage limit is turned off when 48TB of licensed capacity is reached. When you reach 48TB, the limit is removed and you can use as much storage space as the product supports. API You can maintain the server without using the web browser!
All operations are performed using a secure SSH connection. The API includes functionalities like: - users and shares handling - iSCSI targets operations - hardware status - software update - machine reboot and shutdown.
In many cases this can help speed problem resolution. For security reasons this function can only be initiated by you manually. Get a decision in seconds with no obligation to buy.
Checking your rate won't affect your credit score. To avoid negative shopping experience, we at AVADirect highly recommend to verify product availability information before placing your order. The availability information is present on the product pages in form of the following inventory statuses:. Available - The product is available to purchase, either from our local inventory, or another location.
To confirm which, please contact us before placing your order. License error Started by canyonh , PM. DSS 6. Replicating a replication Started by ocmcomms , PM. Anyone upgraded to Xenserver 6. Started by webguyz , PM. No Access to shares Started by pennsys techs , PM.
Unable to access share Started by pennsys techs , PM.
0コメント