Sometimes we need to provide READ ONLY access to S3 bucket for all not authenticated users. That post describes how to configure such public access.
ECS is usually used with a Load Balancer. Because a load balancer is placed in-band and controls all incoming and outgoing traffic, it can be used to collect performance data and transfer it to external log analyzer for further visualization and alert.
In that post, I’ll share my experience with ECS performance monitoring and reporting based on Brocade vTM load balancer and Graylog log analyzer.
Multipart upload allows uploading large objects in parts. This post reveals how that feature works. Primitive s3curl is used to test S3 APIs.
Sometimes we need very granular level of control on what ECS REST APIs are allowed to be requested. We can do that using rules on Brocade vTM Load Balancers.
I’d like to test if I can use the most popular S3 testing tools S3 browser and Cyberduck to manage versioning feature.
In that post I play with S3 versioning using s3curl. Major thing to do are: enable versioning, create several versions of an object, delete and restore the latest version, restore one of the non-latest version, enable and check version expiration policy, suspend versioning and clean a bucket.
One of the best methods to measure ECS data access latency is to use logging feature on a Load Balancer. We discuss some details of the method in that post. Brocade vTM Load Balanced is used.
In that post, we discuss how to configure Brocade vTM Load Balancer providing access to ECS management APIs.
ECS supports namespace and bucket metering in both UI and CLI. Lets discuss how to use that necessary feature.
How much space do we have until reaching a bucket’s hard quota? Lets consider 2 simple ways to check that.
In that short post we will check how to get access to an S3 bucket from using access key and secret of the object user which belongs to another namespace.
Object user names can be either unique all federated VDCs or just in the specific namespace. That short post explains how to configure ECS user scope.
Sometimes we need to delete all data in a S3 bucket or Swift container. Below are the examples of scripts to do that.
Below the code of the primitive shell scripts to test S3 and Swift.
In that post I discuss how to configure and use domain users allowing them to generate object storage access credentials by themselves.
The paper reviews the basic ways to configure the most popular Load Balancing products F5 BigIP, Nginx, HAproxy, Citrix Netscaler, Kemp VLM and Brocade vTM.
ECS-sync is an external tool developed by the Object EMC Development team. It supports Centera, Atmos, S3, file to CAS, Atmos, S3, file migration. In this post I’m focused on S3 to S3 migration.
The paper describes my experience of subj. Both Neutrino and OpenStack management are described.
In this post several typical cases how to use API with curl and Advanced REST API Client are presented.
My personal experience with Centera to ECS Transformation and Migration. Be prepared for a lot of curl and API calls 😉
CLI is used here. Native migration in GUI is supported from ECS 3.0.
That is the tiny Python script to test ECS S3 access. Continue reading
In that post we will check how to configure and use NFS with multi-protocol access.
Let’s test very basic CAS features on top of ECS.
Let’s answer one of the common questions. Why we see folders’ structure in Cyberduck and S3 browser? In theory, we shouldn’t…
One of our customers asked to compare Amazon S3 and OpenStack Swift protocols provided by ECS.
My compilation from different sources below. Don’t expect really comprehensive analysis. So, criticism is not accepted 😉
Basic tests of very powerful tool ECS-sync.
In that post I’d like to show how to authorise with Swift v2. Simple curl commends are used.
In the document I share the real experience of working with ViPR Controller in VNX + VPLEX environment.
In the short post I documented how to install ViPR Controller CLI if your Linux server doesn’t have direct access to Internet.
I created this document to keep track of my experimental installation of ECS Community Edition 184.108.40.206 (March 2016). It is based on the official installation instructions from github.com but contains more details and comments for specific commands’ output and description of mistakes I made and errors I got.
I created this document to keep track of my experimental installation of OpenStack Liberty (December 2015). It is based on the official installation guide from docs.openstack.org but contains more details and comments for specific commands’ output and description of mistakes I made and errors I got.
In the very extensive document I share the real experience of working with ViPR Controller in MetroPoint environment.
Here I posted the doc created to demonstrate how ViPR Controller works with MetroPoint.
I have couple of projects with ECS and F5 Load Balancers. But unfortunately I never worked wit F5 yet. So today I’d like to play a little bit with the virtual F5 Load Balancer. Continue reading
Lets discuss how CloudBoost with ECS in the backend can be integrated with a Networker.
Infrastructure assessments are usually implemented as a complex project and require considerable effort and time. The key point for such projects is a methodology; a clear explanation of all aspects of data collection, analysis, and interpretation of results is crucial.
In that post I’ll continue discussing how to integrate backup solution based on CloudBoost with ECS.
In that post I’ll discuss how to integrate backup solution based on CloudBoost with ECS.
In that post we will discuss how to configure Atmos Cloud Provider in CloudArray.
In that post we will discuss how to get access to another ECS protocol S3 with CLI curl tool.
In that post we will discuss how to get access to ECS Swift with CLI curl tool.
Brief description of steps to configure ECS with CloudArray under Nginx Load Balancer.
.pdf doc attached.
The main goal of the doc is a brief description of ECS appliance which minimizes the number of questions from a customer side during implementation preparation.
Simple procedures to Deregister, delete and add HBA/WWN in ViPR Controller 2.2
All ViPR Controller 2.2 Services are described in the single Excel table.
By default, ViPR creates resources (such as zones and masking views) using global hard-coded naming convention. From ViPR C v2.2 we can override the default and provide our own naming convention for some types of resources.
Today I decided to play with COSBench. Will test S3 access to ECS.
Subj for this year EMC Proven Professional Knowledge Sharing competition.
Now subj is the one of my formal roles.
Please read the Principles of Design Diagramming by Vasily Pantyukhin
This article is focused on the methods to accelerate and improve the process of diagram development.
ViPR administration tasks are controlled by assigning Active Directory (AD) Users / Groups into Roles. Also, access to the ViPR resources can be controlled by assigning AD Users / Groups to the appropriate Access Control List (ACL).
Diagram that describes all network ports used by ViPR Controller.
Let’s check how ViPR Controller takes care about capacity consumed by log files.
I decided to check what ViPR admins will see in the case of one or two nodes fail.
ViPR CController configuration consists of dozens different entities. They are connected and interdependent very complicated ways. I decided to check if it is possible to draw the whole picture in one diagram. After several tries, I found that graph diagrams best suited for that purposes.
Case study #2
Telecom Company asked the system Integrator to sell 600TB of space to store backup copies of data. Unfortunately, the budget for that is very limited. Integrator hopes for a long-term relationship with the customer and therefore decided to use Human Defined Services approach to solving the situation the most efficient way.
Case study #1
DBAs and system administrators complained that storage provisioning takes too long. Storage administrator decided to find the answer for the key question “How to decrease the provisioning time?”
“Designers work iteratively to test their ideas and improve them throughout the entire development process. Making an idea tangible from an early stage through cheap mock-ups helps save resources and can minimize risk. Few advices for a solutions design prototyping here.
Case study #3
A medium size software development company had its own datacenter. Accidentally, a fire destroyed the data center. Fortunately backup of the important data was in the safe place. How the company should restore data access?
Diagrams are needed to transfer new information to the audience in visual form. All graphics consist of both real data and decoration.
How to balance data and decarations on diagrams?
Service Design and problem resolution always must be based on the information about the system and environment. How to get such information if we don’t know the exact answer?
As an urban planning or design of consumers’ goods, IT architecture can be elegant or ugly, functional or wasteful. It can tell us, “Our organization is very pragmatic” or vise verse “We have too much money to spend them smartly”. Different people with their preferences, visions and practical reasons usually form the architecture over the years. Is it possible to keep and control the beautiful style of architecture for a long time?
Wikipedia describes an Issue tree as a graphical breakdown of a question that dissects it into its different components vertically, and that progresses into details as it reads to the right.
Issue trees are useful in problem-solving to identify the root causes of a problem as well as to find potential solutions.
In IT every person plays two roles – Provider and Consumer. For example application administrator provide users’ access to the application. At the same time, he consumes services provided by DBAs, system, network and storage administrators. And so on… It’s a chain.
Value flow illustrates dependencies between Consumers and Providers in the chain of service delivery process. It defines what job has to be done on each chain link, reveal qualitative and quantitative metrics for sub-services’ success and describe incoming services.
In that post we discuss about why Service Designer needs heuristic tools?
Complexity of services has to be explored and can be exploited. In the very begining we need to understand how complex the system is and place it in the continuum from ordered to unordered state. Cynefin is the framework that helps to do that.
The primary purpose of services is to get consumer’s job done well. Outcome-driven service is an approach that shifts the focus away from the service solution back to a job’s outcome and satisfaction in each step of execution.
What are the most important characteristics of services?
During all phases of Service Design, several aspects of services have to be considered. Some of them direct the way of the design. Other characteristics should be changed to optimize the service or resolve the problem.
What are the Principles of Service Design?
Experts lay out five general principles of Service Design:
- User Centered
Let’s consider them in details.
Before we start a discussion about Service Design, we have to define the meaning of the main terms. What are Services? What is a Service Design?
Every complex structure needs a reference frame to be measured and controlled. Information Technologies also require a common coordinate system that on the one hand has to be simple and clear for easy usage and on the other hand comprehensive enough to describe complex projects and approaches. The best candidate is the frame of reference based on three dimensions: People, Processes and Technologies (PPT).