Avid ISIS ISIS 5.0 Guide

Add to my manuals
116 Pages

advertisement

Avid ISIS ISIS 5.0 Guide | Manualzz

Avid ® ISIS ®

Administration Guide

Version 5.0

Legal Notices

Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.

This product is subject to the terms and conditions of a software license agreement provided with the software. The product may only be used in accordance with the license agreement.

Part of the software embedded in this product is gSOAP software.

Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.

THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT

NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO

EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES

(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH

DAMAGE.

This document is protected under copyright law. An authorized licensee of Avid ISIS 7000 may reproduce this publication for the licensee’s own use in learning how to use the software. This document may not be reproduced or distributed, in whole or in part, for commercial purposes, such as selling copies of this document or providing support or educational services to others. This document is supplied as a guide for Avid ISIS 7000. Reasonable care has been taken in preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or typographical errors. Avid Technology, Inc. does not accept responsibility of any kind for customers’ losses due to the use of this document. Product specifications are subject to change without notice.

Copyright © 2015 Avid Technology, Inc. and its licensors. All rights reserved.

The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:

Copyright © 1988–1997 Sam Leffler

Copyright © 1991–1997 Silicon Graphics, Inc.

Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of

Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam

Leffler and Silicon Graphics.

THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT

LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL

DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF

THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF

THIS SOFTWARE.

The following disclaimer is required by the Independent JPEG Group:

This software is based in part on the work of the Independent JPEG Group.

This Software may contain components licensed under the following conditions:

Copyright (c) 1989 The Regents of the University of California. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT

LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Copyright (C) 1989, 1991 by Jef Poskanzer.

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.

Copyright 1995, Trinity College Computing Center. Written by David Chappell.

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.

Copyright 1996 Daniel Dardailler.

Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.

Modifications Copyright 1999 Matt Koss, under the same license as above.

Copyright (c) 1991 by AT&T.

Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.

2

THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR

AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS

FOR ANY PARTICULAR PURPOSE.

This product includes software developed by the University of California, Berkeley and its contributors.

The following disclaimer is required by Paradigm Matrix:

Portions of this software licensed from Paradigm Matrix.

The following disclaimer is required by Ray Sauers Associates, Inc.:

“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised, knew or should have known of the possibility of such damages.

The following disclaimer is required by Videomedia, Inc.:

“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability or its fitness for any particular purpose.”

“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN ver.

3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players and the like.”

The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:

©1993–1998 Altura Software, Inc.

The following disclaimer is required by Interplay Entertainment Corp.:

The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid products.

This product includes portions of the Alloy Look & Feel software from Incors GmbH.

This product includes software developed by the Apache Software Foundation (http://www.apache.org/ ).

© DevelopMentor

This product may include the JCifs library, for which the following notice applies:

JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/ ). See the LGPL.txt file in the Third Party Software directory on the installation CD.

Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.

Attn. Government User(s). Restricted Rights Legend

U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.

Trademarks

003, 192 Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages,

AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid

Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID,

AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager,

ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|24, Command|8, Control|24,

Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio

Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet,

DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do

More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander,

ExpertRender, Fader Pack, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process,

HDpack, Home-to-Hollywood, HYBRID, HyperSPACE, HyperSPACE HDCAM, iKnowledge, Image Independence, Impact, Improv, iNEWS, iNEWS Assign, iNEWS ControlAir, InGame, Instantwrite, Instinct, Intelligent Content Management, Intelligent Digital Actor Technology, IntelliRender, Intelli-Sat, Intelli-sat

Broadcasting Recording Manager, InterFX, Interplay, inTONE, Intraframe, iS Expander, iS9, iS18, iS23, iS36, ISIS, IsoSync, LaunchPad, LeaderPlus, LFX,

Lightning, Link & Sync, ListSync, LKT-200, Lo-Fi, MachineControl, Magic Mask, Make Anything Hollywood, make manage move | media, Marquee,

MassivePack, Massive Pack Pro, Maxim, Mbox, Media Composer, MediaFlow, MediaLog, MediaMix, Media Reader, Media Recorder, MEDIArray,

MediaServer, MediaShare, MetaFuze, MetaSync, MIDI I/O, Mix Rack, Moviestar, MultiShell, NaturalMatch, NewsCutter, NewsView, NewsVision, Nitris, NL3D,

NLP, NSDOS, NSWIN, OMF, OMF Interchange, OMM, OnDVD, Open Media Framework, Open Media Management, Painterly Effects, Palladium, Personal Q,

PET, Podcast Factory, PowerSwap, PRE, ProControl, ProEncode, Profiler, Pro Tools, Pro Tools|HD, Pro Tools LE, Pro Tools M-Powered, Pro Transfer,

QuickPunch, QuietDrive, Realtime Motion Synthesis, Recti-Fi, Reel Tape Delay, Reel Tape Flanger, Reel Tape Saturation, Reprise, Res Rocket Surfer, Reso,

RetroLoop, Reverb One, ReVibe, Revolution, rS9, rS18, RTAS, Salesview, Sci-Fi, Scorch, ScriptSync, SecureProductionEnvironment, Serv|GT, Serv|LT,

Shape-to-Shape, ShuttleCase, Sibelius, SimulPlay, SimulRecord, Slightly Rude Compressor, Smack!, Soft SampleCell, Soft-Clip Limiter, SoundReplacer,

SPACE, SPACEShift, SpectraGraph, SpectraMatte, SteadyGlide, Streamfactory, Streamgenie, StreamRAID, SubCap, Sundance, Sundance Digital,

SurroundScope, Symphony, SYNC HD, SYNC I/O, Synchronic, SynchroScope, Syntax, TDM FlexCable, TechFlix, Tel-Ray, Thunder, TimeLiner, Titansync,

Titan, TL Aggro, TL AutoPan, TL Drum Rehab, TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, tools for storytellers,

Transit, TransJammer, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Video the Web Way, VideoRAID, VideoSPACE, VTEM, Work-N-Play, Xdeck, X-Form,

Xmon and XPAND! are either registered trademarks or trademarks of Avid Technology, Inc. in the United States and/or other countries.

3

Apple, Macintosh, and Safari are either registered trademarks or trademarks of Apple Computer, Inc., registered in the U.S. and other countries. HP is a registered trademark of Hewlett-Packard Company. Intel is a registered trademark of Intel Corporation. Java is a trademark of Sun Microsystems in the United

States and/or other countries. Kingston is a registered trademarks of Kingston Technology Corporation. All other marks may be the property of their respective titleholders. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks contained herein are the property of their respective owners.

Avid ISIS Administration Guide • Created 8/14/15 • This document is distributed by Avid in online (electronic) form only, and is not available for purchase in printed form.

4

Contents

Chapter 1

Chapter 2

Using This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Who Should Use This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Symbols and Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

If You Need Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Avid Training Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Working with the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Opening the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Understanding the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

System Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

System Status Console Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Navigation Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Main Tools Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Accessing Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Session Counter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Customizing the Management Console Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Moving Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Showing and Hiding Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Sorting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Filtering the Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Updating Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Selecting Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Using Context Menus to Perform Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Entering Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Management Console Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Configuring Management Console Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Configuring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Creating the ISIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Binding the Media Packs to the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Configuring External Authentication of Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Receiving Notification of System Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Filtering the Error Notification Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Adding Contact and Email Address Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

5

Chapter 3

Chapter 4

Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Securing an ISIS Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Changing the BMC Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Managing Storage Groups and Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Storage Groups List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Creating a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Removing Media Packs from Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Displaying Storage Group and Media Packs Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Deleting Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Managing Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Workspaces List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Displaying Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Workspace Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Creating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Duplicating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Renaming a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Resizing a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Using the Workspace Size Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Setting Event Triggers for a Workspace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Deleting a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Managing User Access Privileges for Workspaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Setting or Changing Workspace Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Managing Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Users List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

User Details Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Creating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Changing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Displaying User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Installing the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Opening the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Using the LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Changing the Account Synchronizer Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Synchronizing LDAP and ISIS Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Importing LDAP Users with Incorrectly Formatted LDAP UIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

6

Chapter 5

Chapter 6

Disconnecting and Reconnecting the LDAP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Adding User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Modifying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Deleting User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Displaying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Managing Bandwidth Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Bandwidth Limits Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Displaying Bandwidth Limits Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Adding a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Changing a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Deleting a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Managing Avid ISIS 1000 Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Managing Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Displaying Engine Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Engine Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Upgrading an Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Removing Engines from the Engine List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Managing Storage Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Storage Controllers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Storage Controller Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Upgrading a Storage Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Managing Media Packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Media Packs List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Displaying Media Pack Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Media Pack Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Unbinding Media Packs from the ISIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Clearing Network Degraded Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Removing Orphaned Media Packs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Cleaning Up Files (Manually Rectifying Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Management Console Error Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Foreign Disk Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Managing Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Monitoring Client Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Client Bandwidth List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Scaling the Bandwidth List Graph Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

7

Chapter 7

Displaying Client Bandwidth Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

System Monitoring and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Hardware Monitoring Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

System Status History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

System Director Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Displaying or Clearing the System Logs Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Administration Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Using the Administration Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

ISIS Snapshots Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Creating, Displaying, and Deleting Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Working with Snapshot Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Avid ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Installing the Avid ISIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Using the Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Creating Aggregate Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Displaying Aggregate Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Opening the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Updating the Disk Analyzer Tool Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Running Disk Analyzer Tool Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Saving Disk Analyzer Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Using the Media Pack Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Retrieving Media Pack Flag Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Media Pack Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Creating a Metadata Dump File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Restoring the File System--SUPPORT USE ONLY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Agent Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Appendix A Avid ISIS Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Opening the ISIS Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Understanding the Agent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Statistics Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Tools Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Logging Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

8

Changing the Storage System Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Changing the Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Changing the Enclosure ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Configuring DNS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Setting the System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Changing the Agent Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Shutting Down the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Restarting the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

9

Using This Guide

The Avid ® ISIS ® media network provides a high-performance distributed file system that contains high-capacity shared media storage for workgroups of connected Avid editing workstations. This user’s guide describes how to connect your client system to the media network, mount workspaces, and configure your system for best performance.

Unless noted otherwise, the material in this document applies to the Windows ® , Mac OS ® X, and Linux operating systems.The majority of screen shots in this document were captured on a Windows system, but the information applies to all operating systems. Where differences exist, information on the differences is provided.

The documentation describes the features and hardware of all models. Your system might not contain certain features and hardware that are covered in this guide.

Who Should Use This Guide

This guide is intended for users who need to manage the Avid ISIS media network. You should have a basic understanding of how to use and manage the Windows operating system or the Mac OS X systems, and you should be familiar with basic workgroup and network concepts.

Symbols and Conventions

Avid documentation uses the following symbols and conventions:

Symbol or Convention Meaning or Action

> n c w

(Windows), (Macintosh), or

(Linux)

Bold font

Italic font

A note provides important related information, reminders, recommendations, and strong suggestions.

A caution means that a specific action you take could cause harm to your computer or cause you to lose data.

A warning describes an action that could cause you physical harm. Follow the guidelines in this document or on the unit itself when handling electrical equipment.

This symbol indicates menu commands (and subcommands) in the order you select them. For example, File > Import means to open the File menu and then select the Import command.

This symbol indicates a single-step procedure. Multiple arrows in a list indicate that you perform one of the actions listed.

This text indicates that the information applies only to the specified operating system, either

Windows Macintosh OS X or Linux.

Bold font is primarily used in task instructions to identify user interface items and keyboard sequences.

Italic font is used to emphasize certain words and to indicate variables.

10

If You Need Help

Symbol or Convention Meaning or Action

Courier Bold font

Ctrl+key or mouse action

Courier Bold font identifies text that you type.

Press and hold the first key while you press the last key or perform the mouse action. For example, Command+Option+C or Ctrl+drag.

If You Need Help

If you are having trouble using your Avid product:

1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important to check each step of your workflow.

2. Check the latest information that might have become available after the documentation was published.

New information is available in the ReadMe file supplied in your Avid software kit. Documentation is available as a PDF in the software kit and through the user interface.

Always check online for the most up-to-date release notes or ReadMe because the online version is updated whenever new information becomes available.

To view the online versions, visit the Knowledge

Base at www.avid.com/support .

3. Check the documentation that came with your Avid application or your hardware for maintenance or hardware-related issues.

4. Visit the online Knowledge Base at www.avid.com/support . Online services are available 24 hours per day, 7 days per week. Search this online Knowledge Base to find answers, to view error messages, to access troubleshooting tips, to download updates, and to read or join online message-board discussions.

Accessing the Online Documentation

The Avid online documentation contains all the product documentation in PDF format. You can access the documentation in the AvidISISDocumentation folder in the Avid installer kit. Download and install Acrobat Reader before you access the PDF documentation.

Avid Training Services

Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid understands that the knowledge you need to differentiate yourself is always changing, and Avid continually updates course content and offers new training delivery methods that accommodate your pressured and competitive work environment.

For information on courses/schedules, training centers, certifications, courseware, and books, please visit www.avid.com/support and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).

11

1

Working with the Management Console

The Management Console is the primary interface to the Avid ISIS system and allows you to perform administration functions.

When you access the Management Console, the Login page opens, and the site prompts you to supply a user name and password to log in. If you type the wrong password, an error message appears and the Login dialog box reappears.

n

When you first install the Avid ISIS 1000 software, the Administrator password is blank by default. To set an

administrator password, see “Changing the Administrator Password” on page 30 .

Standard Avid ISIS 1000 client users can log in to the Management Console, but they will have limited access to the

Management Console interface. They can also see certain information about the network through the Client

Manager. For more information about the Client Manager, see the Avid ISIS 1000 Client Help. The Avid ISIS 1000

Client Manager Installation and User’s Guide

is included in the Avid ISIS Documentation folder in the software kit.

Opening the Management Console

The Management Console runs within one of the following qualified web browsers:

• Windows — Microsoft Internet Explorer, Mozilla Firefox ® , Google ® Chrome ™

• OS X — Safari, Mozilla Firefox, Google Chrome

To open the Management Console as Administrator:

1. Open your web browser and in the address bar enter either:

t the Storage System Name (if DNS is configured; see “Configuring DNS Service” on page 105 )

t the IP address of the System Director. (This is the IP address of the Storage Controller running the System

Director; whether in a single- or multi-Engine configuration.)

The Login dialog box for the Management Console opens. The “Username” field is automatically populated with the Administrator user name.

2. Type your password.

For information on changing the administrator password, see

“Changing the Administrator Password” on page 30

.

3. Click Login (arrow icon), or press Enter.

The Management Console Home page opens.

To log out of the Management Console: t Click Logout in the upper right corner of the screen.

12

Understanding the Management Console Interface

Understanding the Management Console Interface

The Management Console, which you can access on the Engine or on any Ethernet-attached client, has a user interface where controls are grouped by function and are displayed by clicking the appropriate icons or text.

To use the Management Console, you must have Adobe ® Flash ® Player installed on your system.

6

7

4

5

2

3

Callout Description

1 System Status Console — Provides a snapshot view of several aspects of the Avid ISIS 1000 system. See

Status Console” on page 14 .

“System

Navigation toolbar — Access Management Console tools and navigation. See

“Navigation Toolbar” on page 16

.

Main tools panel — Click to go to the respective tool pages. See

“Main Tools Panel” on page 16 .

Help link — provides links to various Avid ISIS 1000 online documents. See “Accessing Help” on page 18 .

Logout link — Ends the Management Console session and logs you out of the system.

System Identification — Displays the system model information, Storage System name, and version.

Session Counter — Displays how long the current session has been active. Counts down from 2 hours (2:00:00).

See

“Session Counter” on page 18

13

Understanding the Management Console Interface

System Status Console

The System Status Console, located on the left side of the Management Console, contains several components that give you a snapshot view of the system. These allow you to access additional information about your system and to perform certain administrative tasks, such as monitoring and logging.

n

Administrators can configure whether or not the System Status Console is visible on the login screen of the

Management Console. However, even if it is visible, you must log in to follow links from the tool bar screens (such as the log files).

In the following figure, the panels of the System Status Console are separated slightly for clarity.

Callout Description

1

2

3

4

5

Current system status panel — LEDs for errors, warnings, info, and upgrade statuses will be lit to indicate the presence of system events. Click a color to open the Status panel. See

“System Status Console Panels” on page 14 .

Status retrieval panel — The Management Console periodically retrieves system status information. The panel displays the results and the time stamp of the retrieval operation.

System Status History panel — Displays the system events that have occurred since the System Director was started, along with the date and time of the first logged event. Clicking this panel opens the System Status History

tool. For more information, see “System Status History” on page 83 .

Storage capacity panel — Displays the total capacity of all bound Media Packs, capacity allocated to Workspaces, and the amount of capacity used by data.

System Status Console panels — Click the panel headings to display the system information panel. For more information, see

“System Status Console Panels” on page 14

.

System Status Console Panels

The System Status Console contains several panels that provide information about different areas of Avid ISIS 1000 operation. Click a panel title to expand and collapse the panel.

14

Panel Name

Understanding the Management Console Interface

Description

Status Console Panel

—Provides a quick summary of the System Director status. If an event in the system log triggers a status to appear, a link is provided to the System Logs tool. For more

information, see “Displaying or Clearing the System Logs Page” on page 85

System Console Panel

—Provides a summary of hardware, software, and networking information.

Performance Console Panel

—Provides a summary of the number of messages per second, number of open files, and the names of clients connected to the system.

Bandwidth Console Panel

—Displays “Megabytes per second,” information on total and per-client bandwidth.

15

Understanding the Management Console Interface

Navigation Toolbar

The navigation toolbar provides several items to help you navigate through the Management Console interface.

Callout Description

1

2

3

Home link—You can click this link from any page to return to the Management Console Home screen

Current tool heading—Indicates the tool you are currently using

Related links section—Displays links to other Management Console tools relevant to the one you are currently using

Main Tools Panel

The Management Console main panel is divided into the following sections:

• The System section, which contains the following tools:

Name

Workspaces

Users

Groups

Bandwidth Limits

Installers

Engines

Storage Controllers

Media Packs

Storage Groups

Description

Create, delete, duplicate, or change capacity of any Workspace and see all Workspace details;

see “Managing Workspaces” on page 39

.

Create, delete, duplicate, or change Workspace access for any User and see all User details;

see “Managing Users” on page 48

.

Create, duplicate, or change Workspace access for any User Group; modify User Group

members; and display all User Group details; see “Managing Groups” on page 60

.

Display and modify bandwidth for clients that are allowed to connect to the ISIS system; see

“Managing Bandwidth Limits” on page 64 for more information.

Download installers for ISIS Clients, ISIS software for the Engine, ISIS Tools, and Adobe

Flash Player.

For information on installing the ISIS Client software, see the Avid ISIS Client Manager

Installation and User’s Guide

. For information on the ISIS Tools, see “Avid ISIS Toolbox” on page 88 .

Display details for Engines, reported serial number, status, uptime and more information; see

“Managing Engines” on page 67

.

Display details, upgrade, and clear status for Storage Controllers in the Engine; see

“Managing Storage Controllers” on page 70

.

Bind, unbind and see details for Media Packs; see “Managing Media Packs” on page 71

.

Create, delete, or modify Media Pack Media Packs of any Storage Group, and display Storage

Group details; see

“Managing Storage Groups” on page 35

.

16

Understanding the Management Console Interface

• The Connect section, which contains the following tools:

Name

Connection Status

Client Bandwidth

Reservations

Description

Display any connected client; see “Monitoring System Connection Status” on page 79

.

Display read and write bandwidth of any connected client; see “Monitoring Client

Bandwidth” on page 78 .

Display any current bandwidth reservation; see

“Displaying Client Bandwidth Reservations” on page 81 .

• The Tools section, which contains the following tools:

Name

System Status History

Network Utilities

Description

Display historical system status information; see “System Status History” on page 83 .

Allows you to retrieve a detailed look at the connected network, or run a ping or traceroute; see

“Network Utilities” on page 84 .

• The Logging section, which contains the following tools:

Name

System Director

Information

System Logs

Administration Logs

ISIS Snapshots

Description

Displays System Director information: status and ISIS version, metadata, running processes,

and Agent information, all on one screen; see “System Director Information” on page 84

.

Display all system messages, info, warnings, and errors at the application, system, and

security levels; see “Displaying or Clearing the System Logs Page” on page 85 .

Display current and archived Management Console logs; see

“Administration Logs” on page 85 .

Create a snapshot of the ISIS system for displaying or downloading; see “ISIS Snapshots

Page” on page 86 .

• The Advanced section, which contains the following tools:

Name Description

Preferences

External Authentication

Notification Service

Change and save bandwidth, LCT threshold, device creation, disk error threshold, and other

preferences; see “Configuring Management Console Preferences” on page 24 .

Configure external authentication servers; see

“Configuring External Authentication of

Users” on page 26

.

Configure email notification on specific system events; see “Filtering the Error Notification

Parameters” on page 29 .

Agent Settings

System Settings

Modify agent configuration options and trace settings; see

Manage the Avid ISIS 1000 file system; see

“Agent Settings” on page 101

“Creating the ISIS File System” on page 25 .

.

Administrator Password

Change the Management Console Administrator password; see “Changing the Administrator

Password” on page 30

.

17

Customizing the Management Console Display

Accessing Help

The Help menu, located in the upper right-hand corner of the Management Console window, provides links to the complete set of Avid ISIS 1000 online PDF documents. PDF documents can open in an external application or browser, depending on your configuration.

To access the Help menu:

1. Move the mouse cursor over the Help menu text.

The Help pop-up menu opens.

2. (Option) Click the name of a document to open it.

Session Counter

The user session will time out automatically after two hours of inactivity, after which you must log in again to continue working. The session counter, located in the lower right corner of the Management Console, displays the time remaining in the user session.

The counter is automatically reset to two hours when you click a link or perform an action such as adding or deleting a Workspace. You can also reset the counter manually by clicking it.

If you enable Auto refresh on a tool screen you will not automatically be logged out after two hours, as long as you

stay on the page where Auto refresh is enabled, or navigate between tools as described in “Updating Information” on page 20 . Clicking Home disables Auto refresh, and the session counter functionality (automatic logout) resumes.

To manually reset the session counter: t Click the session counter display.

The session timer is reset to two hours.

Customizing the Management Console Display

You can customize the Main display panel for any option by moving and hiding columns, and by sorting and filtering information.

Moving Columns

To move a column in the Main display panel: t Click and drag any column to the position you want, and release the mouse button.

18

Customizing the Management Console Display

The column appears in the new position, and columns to the right are moved to make room.

Showing and Hiding Columns

When you open a Management Console tool (for example, the Storage Controllers tool), the Main display panel lists items in default columns. Depending on the option selected, there might be other headings available to see. You can select individual or multiple column headings to be displayed or hidden.

To show or hide columns: t Select one of the options, right-click in the column heading row and select a heading you want to show or hide.

Displayed column headings are marked by a bullet symbol (•). You cannot hide the first column on the left of the Main display panel (usually the Name column).

Sorting Information

The ISIS Management Console interface allows you to sort information listed in the Main display panel, or in the

Details panel. Sorting the information in columns arranges items in either numerical or alphabetical order. You can also perform a multilevel sort of the displayed information.

To sort information: t Click the column heading for the column you want to sort.

The information is sorted in ascending order. To reverse the sort order, click the column heading again.

To perform a multilevel sort:

1. Click the column heading for the first column you want to sort.

The items in the column are sorted in ascending order.

2. Click an additional column.

The items in the second column are sorted in ascending order. The items in the first column maintain their sort order, but with a lower priority than the second sort.

3. (Option) Click multiple columns to add levels to the sort. To cancel a multilevel sort, click a column heading that has already been sorted.

19

Filtering the Display

Filtering the Display

You can limit the items listed in the Main display panel by setting Filter parameters at the bottom of the

Management Console window. Filtering the display allows you to focus on only those items that you want to monitor. You can restore all items to the display by clearing the Filter parameters.

Callout

1

4

5

2

3

6

7

Description

Category menu—Select the category to filter

“not” operator—Select to exclude items matching the filter rules from the search results

Condition menu—Select the filter condition

Search term field—Type the text or value to filter

Filter button—Perform the filter operation

Clear button—Clear the filter settings

Filter results counter—Displays the number of filtered results on the page, and in total

You cannot filter the display for Bandwidth, Connection Status, and Reservations (under the Connect heading).

To filter the display:

1. Select a category from the Category menu.

The Category menu lists all of the column headings available for the selected Command menu option.

2. (Option) Select “not” to exclude the items matching the filter rules from the search results.

3. Click the Condition menu and select the filter condition you want to use.

4. In the Filter text box, type the text or value you want to use to filter the display.

5. Click Filter.

The Main display panel updates to display the filtered results. The Filter panel displays the number of filtered items displayed and the total number of items available for display.

To restore all items to the display: t Click Clear.

The Main display panel updates to display all items.

Updating Information

You can update onscreen information to reflect recent system changes by clicking Refresh. You can also use Auto refresh to automatically refresh information at timed intervals, and prevent your session from timing out.

20

Selecting Items n

This setting persists between tools when you navigate between them using the Related Links. However, the

Auto-refresh setting reverts to the default (disabled) between browser sessions (if you close then reopen the management Console) and if you click Home and then back into the tools.

To enable Auto refresh: t Select the check box next to the Refresh.

Auto refresh mode is enabled, and a message is displayed.

n

While Auto refresh mode is enabled, other functions such as add, delete, and details are not available.

To disable Auto refresh: t Deselect the check box next to the Refresh.

Auto refresh mode is disabled, and the confirmation message closes.

Selecting Items

You can select multiple items in most Management Console tool windows. The methods for selecting more than one item in a list are similar to those used in Windows Explorer or the Macintosh Finder.

The following table summarizes the methods for selecting items and performing actions.

To Select This

One item

Multiple, non-contiguous items

Multiple, contiguous items

Do This

Click the item.

Ctrl+click each item you want to select.

Click the first item, then Shift+click on the last item.

Using Context Menus to Perform Actions

Most Management Console tool windows offer context menus you can use to perform commands on selected items.

To access context menus within the Management Console: t Right-click (Windows) or Ctrl+click (Macintosh) selected items.

21

Entering Text

Entering Text

Follow these guidelines when entering text in Management Console tool text fields:

• Names can be a maximum of 31 ASCII characters in length.

• Workspace names must use Unicode characters and cannot include a space.

• Passwords can be a maximum of 15 ASCII characters in length.

• Do not include a space in the name fields.

• Do not use a period (.) as either the first or last character in the names you create.

• Do not use the following characters in any name fields:

Character

*

?

/

:

\

^

"

<

>

Name

Circumflex accent

Backslash

Forward slash

Colon

Asterisk

Question mark

Double quotation mark

Less-than sign

Greater-than sign

Character

|

[

]

+

=

%

;

,

@

Name

Vertical line

Left square bracket

Right square bracket

Plus sign

Equals sign

Percent sign

Semicolon

Comma

Commercial At symbol n

The System Director does not support displaying regional language characters in the Management Console.

22

Management Console Preferences

Management Console Preferences

The Preferences tool allows you to set parameters that customize the basic functionality of the ISIS system:

• General Preferences—These control general system behaviors and are described in the following table.

• Logging Preferences—These control what types of logs are collected and the severity and verbosity of the event being logged. These are not described here; do not change these unless instructed to do so by Avid Support.

General Preferences

Option

Total System Bandwidth

(MB/sec)

Default Bandwidth for

Auto Created Devices

(MB/sec)

Force Manual Device

Creation

Default LCT Threshold

(ms)

*

Default Hard Disk Error

Threshold

*

History Data Collection

Auto-Rectify

Type Default text

(numeric)

1000 MB/sec text

(numeric)

0 (zero; unlimited bandwidth) check box

Disabled text

(numeric)

0 (zero; uses internal system default of

750ms) text

(numeric)

0 (zero; uses internal system default of 25 errors) check box

Enabled check box

Disabled

Show status prior to login check box

Disabled

Description

Total reservation bandwidth allowed by the system, in MB/sec.

When this value has been reached, ISIS will no longer accept bandwidth reservations from clients.

n

This value does not represent the actual bandwidth capabilities of the ISIS system. For more information about ISIS bandwidth capabilities, see the Avid ISIS v5.0

Documentation Knowledge Base..

Reservation bandwidth allowed for devices that are automatically created at connection time. Using the default value results in auto-created devices being granted unlimited bandwidth.

If enabled, clients without an entry in the Bandwidth Limits list are not allowed to connect. You must manually create an entry for every client computer that is expected to connect to the ISIS system.

Defines the upper limit of the Long Command Time (LCT) value, above which the Storage Manager will report a Disk

Degraded condition to the System Director. Using the value of zero sets the LCT threshold to the internal system default of

750ms.

Defines the upper limit for number of hard disk errors before the

Storage Manager reports a Disk Failure condition to the

System Director.

When enabled (default), collects system history data every hour, which is displayed in the System Status History panel (see

“System Status History” on page 83 . If disabled (for support use

only), the system stops collecting new data, but existing data is retained.

Automatically reconciles the actual amount of used space and the reported amount of used space on a system.Default value is disabled. Takes effect immediately with no restart required.

When enabled, prevents anyone from seeing the Status Console panel on the left side before they log in. Only administrators can change this setting. By default users can see the Status Console before logging in.

23

Management Console Preferences

Configuring Management Console Preferences

To configure Management Console Preferences:

1. From the Management Console home page, click Preferences, located in the Advanced section.

The Preferences tool opens.

2. Select your preferences.

3. (Option) To revert all options to the previously saved values, click Refresh.

4. Click Save Preferences to save your changes.

24

2

Configuring the System

After you set up your ISIS 1000 system, you must create the ISIS file system, bind Media Packs to the file system, then create Storage Groups from the Media Packs. Within a Storage Group, you then create Workspaces that clients mount on their local systems to work on files (see

“Managing Storage Groups and Workspaces” on page 35 ).

In addition, you must create user accounts to allow clients to connect to the ISIS. You can create user accounts on the ISIS itself, or configure an LDAP server to authenticate users.

Finally, Avid strongly recommends setting up the notification service to send email to one or more accounts when a problem occurs.

Creating the ISIS File System

Creating the ISIS file system is the first step to making the storage space usable. You create the ISIS file system after installing the ISIS software on a new Engine, or to create a fresh file system for a new customer; for example, you run a rental shop and are reconfiguring the ISIS system between customers.

Creating a new file system permanently deletes the existing file system. All users, groups, Workspaces, Storage

Groups and other objects are permanently deleted; all Media Packs are unbound; and all other settings, such as

External Authentication and Notification Service, are undone and must be reconfigured after the new file system is created.

In addition, the Administrator password (if changed) reverts to the default (no password).

To create a new file system:

1. In the Management Console, click System Settings.

By default, the System Settings panel opens on the File System page.

2. Click Create Active File System.

3. Click Apply.

A confirmation screen appears, asking you to confirm the operation, which will destroy all existing data (if any) on the ISIS 1000 system, and create a new file system.

Confirmation Message to Create New File System

4. Click OK to continue.

25

Binding the Media Packs to the File System

The Results panel displays the message Working... Creating new file system, followed by the message

Success... File System Created.

5. The system is now ready for you to bind the Media Packs, create Storage Groups and Workspaces, create users, and configure external authentication and Event Notification as required.

Binding the Media Packs to the File System

After you have created an active file system, bind the Media Packs to it. If you have more than one Engine in your configuration, the Media Packs for all Engines are listed on the Media Packs page.

To bind the Media Packs:

1. Click Media Packs in the Management Console.

2. Select one or more Media Packs in the list.

3. Click Bind.

4. Click Yes to confirm the request.

5. Click Refresh to see the status circle next to the Media Pack name change to green when complete. When the

Media Packs are bound, you can create Storage Groups. See

“Managing Storage Groups and Workspaces” on page 35

.

Configuring External Authentication of Users

External authentication lets you add users to the ISIS system who are already configured as LDAP accounts in your environment. Users added to the ISIS system through the LDAP Sync Tool are automatically configured as remote

LDAP users. When a remote LDAP user logs into the ISIS system, ISIS checks with an external LDAP server instead of the local ISIS user database to authenticate the user. Before remote LDAP users can access the ISIS system, you must configure the ISIS to use at least one, and up to three, external LDAP servers for authentication.

Configuring external authentication is optional, but recommended if you plan to have a large number of users.

Otherwise you must create each user account individually; see “Managing Clients” on page 48

. You can use external authentication in addition to creating user accounts on the ISIS. The system supports up to 5640 user accounts.

To use external authentication using LDAP, you must enable DNS. Specifically, the ISIS must be able to look up the

LDAP server name and do a reverse lookup (resolving the IP address to a name, and vice versa). To enable DNS, see

“Configuring DNS Service” on page 105

.

For more information on working with LDAP users and groups, see “Managing LDAP Accounts” on page 53 .

26

Receiving Notification of System Problems

To configure external authentication:

1. From the Management Console home page, click External Authentication.

The External Authentication tool opens.

2. Click the Enable check box to select it.

The Domain Name text box becomes active.

3. In the Domain Name text box, enter the domain name of the network to which the LDAP server belongs, including subdomain, if applicable. n

A domain name has two parts, separated by a period or dot: for example, avid.com. The company name “avid” is the assigned domain, and “com” is the top level domain, or TLD. A subdomain is a smaller unit within the company assigned domain, such as americas.avid.com.

Use the format subdomain.domain.tld; for example: americas.example.com

4. Click the check box to select Server 0.

The Address text box becomes active.

5. In the Address text box, enter the fully-qualified domain name of the LDAP server.

n

A fully qualified domain name (FQDN) consists of the hostname, subdomain name (if applicable), and the domain name.

Use the format servername.subdomain.domain.tld; for example: server1.americas.example.com

6. (Option) Repeat steps 3 – 5 (using the “Server 1” and “Server 2” check boxes) to configure additional backup

LDAP servers, if applicable.

n

All of the LDAP servers must be mirrors, and reside on the same subdomain/domain.

7. When finished, click Submit.

The domain and LDAP server information is added to the ISIS database, and a confirmation message is displayed in the Results area.

Receiving Notification of System Problems

The Notification Service tool lets you configure the ISIS system to notify you through email when problems occur.

An error notification service regularly polls the System Event log and, if any errors are logged, sends a concise summary of those errors to one or more email accounts. Configuring notification is optional but strongly recommended.

The Notification Service tool window is divided into the following sections:

• Configuration — Start and stop the Notification Service, and configure the Notification Service settings, described in the following table.

Option

SMTP Server

SMTP Port

Type Description text

The IP address or host name of your SMTP server.

text (numeric)

The port number of your SMTP server. The default value (25) is appropriate in most instances.

27

Receiving Notification of System Problems

Option Type Description (Continued)

Poll Frequency (seconds) text (numeric)

The frequency (in seconds) with which the error notification service checks for problems.

Email Address text

The email address of the Avid ISIS administrator or other primary contact for the error notification service.

• Filters — Set and change the parameters that define when email notifications are sent to email recipients.

• Contacts — Add and change email recipients.

Configuring the Notification Service

To configure the Notification Service:

1. From the Management Console home page, click Notification Service, in the Advanced section.

The Notification Service tool opens.

2. Click the Enable Service check box. (If the Notification Service is already running, the box will be checked.)

3. Enter the IP address for your network’s SMTP (email) server.

4. Enter at least one email address that will receive the notifications.

5. (Option) To test the configuration settings, click Test.

The results of the service test are displayed in the Results area.

6. Click Save.

A confirmation message is displayed in the Results area.

If you started or stopped the Notification Service, the Service State will change to reflect the new service state.

7. (Option) Click Reset.

The changes for the configuration will be reset to the previously saved values.

28

Receiving Notification of System Problems

Filtering the Error Notification Parameters

The Filters area of the Notification Service tool allows you to specify the type of error message that triggers an email notification and to set parameters for each type of error message—Error, Warning, and Information messages.

You can configure the ISIS 1000 to send notification emails for one or more of the following subsystem categories and the severity level that will trigger notification:

• Server Control — Reports messages about internal operations, including problems saving metadata to disk

• System Director — Reports messages about the ISIS file system, metadata, memory, system disks, and the

System Director IP address and networking

• ISIS General — Reports messages about Workspaces (such as changing its size), password changes, Media

Packs, and network communication errors detected by an ISIS component

• Storage Manager General — Reports messages about general Media Pack operations, such as initialization and status changes

To configure error notification parameters:

1. From the Management Console home page, click Notification Service, in the Advanced section.

The Notification Service tool opens.

2. Click Filters.

3. Click the check boxes corresponding to the error notifications you want to include or exclude. (A checked box includes that category, and a blank box excludes the category.)

4. Click Save.

The settings are saved, and a confirmation message is displayed in the Results area.

Adding Contact and Email Address Information

You must enter contact information for all the people you want to receive notification emails. There is no enforced limit to the number of contacts you can add.

29

Changing the Administrator Password

To add contacts:

1. From the Management Console home page, click Notification Service, in the Advanced section.

The Notification Service tool opens.

2. Click Contacts.

3. Click New.

The Contact/Email field is displayed.

4. Type a user name into the first text box.

This can be any name you want to assign to the user; it does not have to be the same as the email account name.

5. Type a valid email address into the second text box.

6. (Optional) Click New to add more email contacts.

7. Click Save.

To remove a contact:

1. Click Delete next to the email contact entry.

The contact is removed from the list.

2. Click Save.

Changing the Administrator Password

The Management Console Administrator password is blank by default. Avid highly recommends that you set an

Administrator password when you configure the Management Console for the first time.

To change the Administrator password when you are already logged in:

1. From the Management Console home page, click Administrator Password, located in the Advanced section.

The Administrator Password tool opens.

2. Type the current Administrator password in the Current Password field (blank by default).

3. Type the new Administrator password in the New Password field.

4. Type the new Administrator password again in the Verify Password field.

5. Click Change.

The Administrator Password is changed to the new value.

A confirmation message appears in the Results area.

To change the Administrator password if you have forgotten it:

1. Open a browser and enter the IP address of the ISIS system.

The Management Console login page opens.

2. Log in using the user name Administrator and the Agent password (either se-admin

or whatever you have changed it to).

3. Follow the steps in the previous procedure (changing the password when you are already logged in).

30

Securing an ISIS Infrastructure

Securing an ISIS Infrastructure

The ISIS system has several passwords:

• The Administrator password, used when you log into the Management Console (by default, there is no password). You can change this at any time in the Management Console.

• The Agent password (by default, se-admin

). This is also the password you use for initial system setup. You can change this at any time in the Agent.

For convenience, you can log in to either the Management Console or the Agent using the password for the other, in case you forget one.

• The password for the BMC (Baseboard Management Controller), which is a low-level process on the Storage

Controller that manages the BIOS, MAC addresses, and other internal functions.

By default, the BMC password has been set at the factory to be the same as the default Agent password

( se-admin

). However, this could be a security concern in some environments. If necessary, you can change the

BMC password.

Changing the BMC Password

If your lab environment or company requires it, you can change the BMC password to prevent unauthorized access to the hardware.

To change the BMC password:

1. Connect a computer or laptop to the Management Port on the Storage Controller, as shown:

2. Open a browser window and go to the address:

169.254.10.250

, which is the default IP address of the BMC controller.

3. Log in using the user name root

and the password se-admin

.

31

4. In the BMC interface, click the Configuration tab.

5. Select Users from the pull-down menu.

32

Securing an ISIS Infrastructure

Securing an ISIS Infrastructure

6. Click Modify User.

7. Click the Change Password checkbox, enter a new password in the Password and Confirm Password fields, then click Modify.

33

8. Click OK.

9. Log out of the BMC interface.

34

Securing an ISIS Infrastructure

3

Managing Storage Groups and Workspaces

Storage Groups are collections of Media Packs that store media files accessible within a shared storage environment. Storage Groups give you flexibility in allocating storage capacity among groups with different functional areas, workflow requirements, or as a means of mitigating the risk of various disk failure scenarios.

Workspaces are virtual volumes that exist on Storage Groups and can be resized dynamically. Workspaces allow you to subdivide the space in the Storage Groups to accommodate projects and users.

c

Performing administrative functions on more than one Administration site at the same time can cause unexpected results.

Managing Storage Groups

Storage Groups are collections of Media Packs, which create a large pool of storage. Within Storage Groups, you create Workspaces. Clients mount Workspaces to capture and edit media files.

Each Engine contains one Media Pack. If you have one Engine (one Media Pack), you can create one Storage

Group. If you have a multi-Engine ISIS system, you can create up to four separate Storage Group (one for each

Media Pack), or combine Media Packs into Storage Groups, as follows:

1

2

3

4

Number of Engines in ISIS system

1

2

3

4

Total Number of

Media Packs

Number of Possible

Storage Groups

1

1 or 2

1, 2, or 3

1, 2, 3, or 4

The Storage Groups page of the Management Console allows you to create, delete, rename, and manage

Storage Groups.

35

Managing Storage Groups

4

5

Callout

1

2

3

Description

Action button toolbar—Perform actions on selected Storage Groups

Storage Groups list—Lists all configured Storage Groups and related information; see “Storage Groups List” on page 36

Details panel—Detailed information on the selected Storage Groups; see “Displaying Storage Group and Media

Packs Details” on page 38

Media Packs list—Displays Media Packs belonging to the selected Storage Group

Filter panel—Filter the Storage Groups list display based on conditions you configure; see

“Filtering the

Display” on page 20

Storage Groups List

The following table summarizes the information available in the Storage Groups list. This information is also displayed in the Details panel for a selected Storage Group.

Heading

Name

Capacity

Effective

Description

Displays the name of the currently selected Storage Group

Displays the total storage capacity of the selected Storage Group

Displays the effective (available) storage capacity of the selected Storage Group

36

Managing Storage Groups

Heading

Used

Unused

Allocated

Unallocated

Files

Directories

Description (Continued)

Displays the amount of storage space that currently contains user data

Displays the amount of storage space that currently contains no data in the Media Packs assigned to the selected Storage Group

Displays the amount of storage space assigned to Workspaces in the selected Storage Group

Displays the amount of storage space available to create more Workspaces in the selected

Storage Group

Displays the number of files in all Workspaces in the selected Storage Group

Displays the number of directories in all Workspaces in the selected Storage Group

You can sort the information in the Storage Groups page by clicking any column heading. For more information on

sorting items in columns, see “Sorting Information” on page 19 .

Creating a Storage Group

Storage Groups are comprised of one or more Media Packs. To create a Storage Group, there must be at least one

Media Pack already bound to the ISIS file system. See “Binding the Media Packs to the File System” on page 26 .

n

Media Packs cannot be added to or removed from a Storage Group if the Storage Group already contains any

Workspaces. Therefore, if your ISIS system contains multiple Engines and you want to create separate Storage

Groups, carefully choose which Media Packs to use in which Groups. You cannot move Media Packs later if the

Storage Groups they belong to already have Workspaces. Typically, it is better to put all the Media Packs into the same Storage Group to maximize the storage flexibility.

To create a Storage Group:

1. From the Management Console home page, click Storage Groups in the System section.

The Storage Groups page opens. If you have no Storage Groups yet, but at least one Media Pack is bound to the file system, the Create Storage Groups panel opens automatically.

2. Click New.

The Create Storage Group panel opens.

3. In the Name text box, type a name for the Storage Group.

n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

4. In the Media Packs panel, select the Media Packs you want to assign to the new Storage Group.

5. (Option) Click Revert to undo any modifications made to the Storage Group information.

6. Click Apply to create a new Storage Group.

If another Storage Group has the same name.

The new Storage Group appears in the Storage Groups list, and the Create Storage Group dialog box refreshes to show the Media Packs still available for additional Storage Groups.

7. Click Close.

37

Managing Storage Groups

Removing Media Packs from Storage Groups

To move a Media Pack to another Storage Group, or to remove it from the Engine completely, you must remove it from its current Storage Group. If the Storage Group contains multiple Media Packs, you must remove them all.

Media Packs removed from the Storage Group are returned to the system’s pool of unassigned (spare) Media Packs.

To remove Media Packs from a Storage Group:

1. From the Management Console home page, click Storage Groups in the System section.

The Storage Groups page opens.

2. In the Storage Groups list, select the Storage Group that contains the Media Packs you want to remove, and then do one of the following: t Click Details.

t Double-click the Storage Group name.

The Media Packs panel refreshes and displays the selected Media Packs as Spare.

4. (Option) Click Revert to undo any modifications made to the Storage Group information.

5. Click Apply.

The Media Packs are removed from the Storage Group. You can then unbind them from the ISIS file system

(see “Unbinding Media Packs from the ISIS File System” on page 75 ).

Displaying Storage Group and Media Packs Details

The Details and Media Packs panels display information about the currently selected Storage Group and the Media

Packs it contains, as seen by the System Director. Some of the information is embedded in the Media Pack, and other information is assigned to the Media Pack by the ISIS software.

n

To sort the information in the Media Packs panel, click any column heading. For more information on sorting items in columns, see

“Sorting Information” on page 19 .

To see information about a Storage Group: t In the Storage Groups list, select a Storage Group.

The Storage Groups page displays all the information for the selected Storage Group. If the Details panel is not visible, click Details.

The Media Packs panel lists the Media Packs allocated to the currently selected Storage Group, as well as

Media Packs available for allocation to the Storage Group.

For information about the Media Packs panel, see “Media Packs List” on page 72

. Some columns are hidden by default (see

“Showing and Hiding Columns” on page 19

).

To close the Details panel: t Click Details.

Deleting Storage Groups

You can delete any Storage Group that does not contain Workspaces. If the Storage Group you want to delete

contains Workspaces, see “Deleting a Workspace” on page 45 .

38

Managing Workspaces

To delete a Storage Group:

1. From the Management Console home page, click Storage Groups in the System section.

The Storage Groups page opens.

2. In the Storage Groups list, select the Storage Group you want to delete.

3. Click Delete.

A dialog box opens asking you to confirm the action.

4. Click Yes.

The Storage Group is deleted.

After the Storage Group is deleted, all of the Media Packs previously in the Storage Group appear in the Media

Packs panel as Spare.

Managing Workspaces

In addition to creating and deleting Workspaces, you can rename themand change the amount of storage allocated to each Workspace.

Callout Description

1

2

Action button toolbar—Perform actions on selected Workspaces

Workspaces list—Lists all configured Workspaces and related information; see “Workspaces List” on page 40

39

Managing Workspaces

Callout Description

3

4

5

Details panel—Detailed information on the selected Workspaces; see

page 20

“Displaying Workspace Details” on page 40

Filter panel—Filter the Workspaces list display based on conditions you configure; see “Filtering the Display” on

User access panel—Displays users who have access to the selected Workspace and details about their access privileges; see

“Managing User Access Privileges for Workspaces” on page 46

Workspaces List

The Workspaces list displays all Workspaces, the Storage Groups on which they reside, and details about each

Workspace.

Heading

Name

Capacity

Resize slider

Maximum

Used

% Used

Reserved

Unused

Status

Storage Group

Files

Description

Lists the names of all Workspaces in the selected Storage Groups

Lists the total storage capacity of each Workspace

Displays a graphical representation of the used and available space for each Workspace (for more

information, see “Using the Workspace Size Graph” on page 44 )

Lists the maximum amount of storage space available for the Workspace on the network

Displays the amount of storage space currently in use in the Workspace

Displays the percentage (%) of Workspace capacity currently in use

Displays the amount of storage space that has been reserved by a client application

Lists the amount of storage space that currently has no data written on it in each Workspace

Displays the workspace status, such as when the Workspace is about to be deleted (“delete pending”), or when it is running out of space or has become full.

Displays the Storage Group that contains the Workspace

Lists the total number of files stored in the Workspace n

To sort the information in the Media Packs panel, click any column heading. For more information on sorting items in columns, see

“Sorting Information” on page 19 .

Displaying Workspace Details

To see detailed information about a Workspace: t In the Workspaces list, either select a Workspace and click Details, or double-click a Workspace name.

To close the Details panel: t Click Details.

The Details panel contains the same information as the Workspaces column list (see

“Workspaces List” on page 40

) except the Resize slider and the Maximum storage space, and includes the following additional information:

40

Managing Workspaces

Heading

Directories

Warning Event Trigger

Error Event Trigger

Description

Displays the number of directories used by the selected Workspace

Displays the value in used percentage (%) or unused gigabytes (GB) of storage at which a warning event is written to the Event Log

Displays the value in used percentage (%) or unused gigabytes (GB) of storage at which an error event is written to the Event Log

The User Access panel lists all users and user groups and their access privileges. (For information on access

privileges, see “Managing User Access Privileges for Workspaces” on page 46 .)

Heading

Name

Type

Access

Effective

Reason

Description

Lists the names of the users and user groups on the network

Displays the client category (user or user group) for each client in the Name list

Lists the access privileges for each client in the Name list

Lists the effective access privileges for each client in the Name list

Lists the reason for any difference between the access privileges assigned to a user and the effective access assigned to a user as a member of a user group n

To sort the information in the User Access panel, click any column heading. For more information on sorting items in columns, see

“Sorting Information” on page 19 .

Workspace Considerations

Before you create Workspaces:

• Consider how you want to allocate them. For example, you can allocate them to projects, groups, individual clients, streaming bit rates, media types, media distributors, or a combination of these.

• Consider whether you want to apply access restrictions, and what type.

• Determine how much storage each Workspace requires and allocate space accordingly. This might be a function of project size, number of clients, media duration, or media resolution.

In a multiple Workspace configuration, consider reserving some space rather than assigning all of it immediately.

Once space is allocated, it tends to be filled quickly and you might need space later to accommodate a new project or client or to extend or protect an existing Workspace. In these situations, it is easier to use space held in reserve than to take it away from an existing Workspace.

Creating a Workspace

Workspaces are locations to store and segregate data. You can create up to 1024 Workspaces on the ISIS 1000 system, control user access to Workspaces, and assign permissions for each user.

n

If you have created Storage Groups but you have not created any Workspaces, the Create Workspace dialog box opens by default when you select the Workspaces list.

41

Managing Workspaces

To add a new Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

2. Click New.

The Details panel opens.

3. In the Name text box, type a name for the Workspace.

n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

4. [Option] If you have multiple Storage Groups, click the Storage Group drop-down list and select the

Storage Group in which you want to create the Workspace.

The Storage Group name appears in the Storage Group text box.

5. Type a size for the Workspace in the Capacity text box. The Capacity text box shows the default size (200 GB), and the maximum size is listed next to the Capacity text box.

n

The minimum Workspace size is 1 GB.

If all storage in the Storage Group is allocated to existing Workspaces, you can recapture some space by making an existing Workspace smaller. For information on resizing Workspaces, see

“Resizing a Workspace” on page 43

.

6. (Option) To set a Warning event trigger, select the type of trigger from the drop-down list (either Used % > or

Unused GB <), then type in a value.

7. (Option) To set an Error event trigger, select the type of trigger from the drop-down list (either Used % > or

Unused GB <), then type in a value.

n

For more information about setting Event triggers, see

“Setting Event Triggers for a Workspace” on page 45 .

8. In the User Access panel, set the User and User Group access privileges (for more information, see

“Setting or

Changing Workspace Access Privileges” on page 47

).

9. Click Apply.

The new Workspace appears in the Workspace dialog box, and the Create Workspace dialog box refreshes to allow you to create a new Workspace.

If there is already a Workspace with the same name, an error occurs.

10. Click Close.

The new Workspace appears in the Workspaces list.

Duplicating a Workspace

When you duplicate Workspaces, they inherit the attributes of the Workspace from which they were created.

n

The contents of the original Workspace are not duplicated.

To duplicate a Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

2. In the Workspace list, select the Workspace you want to duplicate.

42

Managing Workspaces

3. Click Duplicate.

The Duplicate Workspace dialog box opens. By default, the duplicate Workspace inherits the name of the original Workspace followed by a number that increases each time the Workspace is duplicated; for example, the first copy of a Workspace named MyData is MyData1, then MyData2, and so on.

4. (Option) Modify any of the attributes of the new Workspace. For information on modifying Workspaces, see the following topics:

-

“Renaming a Workspace” on page 43

-

“Resizing a Workspace” on page 43

-

“Managing User Access Privileges for Workspaces” on page 46

5. Click Apply.

The duplicate Workspace appears in the Workspace list, and the Details panel refreshes to allow you to create another duplicate of the original Workspace.

If there is no room for a Workspace of the specified size, the Capacity field displays a red line and the Apply button becomes inactive.

6. Click Close.

Renaming a Workspace

You can rename a Workspace at any time, even when it is being used by client workstations and mapped to a local drive or by letterless mapping (to a Universal Naming Convention path) on the client system. The only effect on users is that the Workspace name will be different the next time they need to access it.

As a best practice, Avid recommends that all users unmount the Workspace you want to rename before you proceed.

To rename a Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

2. In the Workspaces list, click the Workspace name you want to change.

3. If the Details panel is not visible, do one of the following: t Click Details.

t Double-click the Workspace name.

The Workspaces Details panel displays all the information on the selected Workspace.

4. Type a new name in the Name text box. n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

5. (Option) Click Revert to undo any modifications made to the Workspace information.

6. Click Apply.

Resizing a Workspace

You might need to make a Workspace larger to create room for a capture procedure or for some new media files.

Alternatively, you might need to make a Workspace smaller to create space for other Workspaces or to reserve storage for another day.

43

Managing Workspaces

To change the size of a Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

2. In the Workspaces list, select a Workspace.

3. Do one of the following: t Click the handle of the Workspaces Size graph, and drag it to resize the graphical display. The Workspace

size listed in the Capacity text box changes as you drag the handle. See “Using the Workspace Size Graph” on page 44

.

t Click Details and type a new value for the Workspace size in the Capacity text box in the Workspace

Details panel.

n

You cannot make the Workspace larger than the maximum available space in the Storage Group.

4. Click Apply.

Using the Workspace Size Graph

The Workspace Size graph provides a quick way to see and change how much storage capacity is currently allocated to each Workspace and how much of that storage space currently has data written on it. The graph represents the following:

• Workspace size—total disk space in the Storage Group allocated to each Workspace

• Used space—used disk space in the Workspace

• Unused space—unused disk space in the Workspace

• Maximum Workspace size—total of Workspace size plus remaining disk space in the Storage Group available for allocation to each Workspace q w

3

4

5

Callout

1

2 e r t

Description

Decrease/Increase buttons—Increases or decreases the scale of the graph (zooms in or out)

Resize handle—Click and drag to increase or decrease the Workspace size; see

“Resizing a Workspace” on page 43

Used Space

Unused space

Maximum Workspace size—total of Workspace size plus space in the Storage Group still available for allocation to each Workspace

44

Managing Workspaces

Setting Event Triggers for a Workspace

You can set event triggers that will write events to the Event log when Workspace capacity (in gigabytes) is less than the specified value, or when used Workspace capacity exceeds the specified percentage. You can create triggers for both Warning and Error events:

• Warning events indicate that a the amount of used or unused space in the Workspace is nearing a threshold that you set, and you have time to take action (increase the size of the Workspace or change the event trigger) before it can cause problems.

• Error events indicate that the amount of used or unused space in the Workspace has already met the critical threshold that you set. Take immediate action to correct the problem.

If you have email notifications enabled, you can receive email notifications when Workspace capacity events occur.

For more information, see “Receiving Notification of System Problems” on page 27

.

To set an event trigger:

1. In the Workspaces list, select the Workspace for which you want to set a trigger.

2. If the Details panel is not visible, do one of the following: t Click Details.

t Double-click the Workspace name.

3. (Option) Select one of the following from the Warning Event Trigger drop-down list: t Unused GB < (Trigger a warning when unused capacity falls below the specified value, in gigabytes) t Used % > (Trigger warning when used capacity exceeds the specified percentage value)

4. Type a value in the text field for the used or unused capacity at which you want a warning event to be written to the Event Log.

5. (Option) Select one of the following from the Error Event Trigger “used” list: t Unused GB < (Trigger a warning when unused capacity falls below the specified value, in gigabytes) t Used % > (Trigger warning when used capacity exceeds the specified percentage value)

6. Type a value in the text field for the used or unused capacity at which you want an error event to be written to the Event Log.

7. Click Apply.

8. Click Close.

Deleting a Workspace

You can delete Workspaces (singly or in multiples) that are not currently being accessed by any clients, whether or not the Workspaces have media files stored on them.

Before deleting a Workspace, make sure that its media is moved, backed up, or no longer needed.

If you delete a Workspace that has been mapped to a local drive by a client, the client can no longer access that

Workspace. Clients should unmap the deleted Workspace using the Avid Client Manager. For more information, see the Avid ISIS Client Manager Installation and User’s Guide or the Client Manager Help.

To delete a Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

45

Managing User Access Privileges for Workspaces

2. In the Workspaces list, select the Workspace you want to delete.

3. Click Delete.

A dialog box opens, prompting you to confirm the operation.

4. Click Yes.

The Workspace is deleted.

Managing User Access Privileges for Workspaces

You can set privileges for user and user group access to Workspaces:

• Read/Write—User (client) can read and write to the Workspace

• Read—User (client) can read only read from the Workspace

• None—User (client) cannot read, write, or mount the Workspace

By default, new client accounts do not have access privileges to Workspaces until an administrator assigns them (see

“Creating Users” on page 51

). You can customize access for each client to every Workspace, if necessary.

You can control access either from the Workspace level (specifying the access to that Workspace for every user and group on the system)—or from the user or group level (granting access to a user or group for all or specific

Workspaces, or preventing a user or a whole group of users from accessing one or more Workspaces).

To modify an individual client’s or group’s access privileges, see “Changing User Details” on page 52 . To control

access to a Workspace for all users and groups, see “Setting or Changing Workspace Access Privileges” on page 47 .

You also can give users different access privileges from those given to the group to which they belong. The group’s privileges set the baseline for all group members, and you can tailor the privileges for specific members of that group.

For example, you can grant a group read/write access, then restrict some members to read-only or no access.

Alternatively, you can give the group read-only (or no) access, but specify read or read-write access for some members of the group. This can be useful for projects that include users who need a variety of permissions.

Changes to Workspace privileges have the following effects:

Current Privilege

None

Read

Read/Write

Read or Read/Write

New Privilege

Read or Read/Write

Read/Write

Read

None

Effect

Available immediately

Available immediately

Apply immediately. If a file is open for writing, client retains write privilege until file is closed.

If a client is already at the Workspace selection stage when the access privileges are removed, the Workspaces remain in the display. However, attempting to access the Workspaces will be unsuccessful.

46

Managing User Access Privileges for Workspaces

Setting or Changing Workspace Access Privileges

You can set access privileges for users and user groups when the client accounts are created (see “Creating Users” on page 51

and

“Adding User Groups” on page 62

), or later (see “Changing User Details” on page 52 ).

Alternatively you can set, modify, and monitor access privileges to Workspaces without having to modify individual client accounts.

n

Make sure all users have unmounted the Workspace before you change its access privileges.

To set or change user or user group access to a Workspace:

1. From the Management Console home page, click Workspaces in the System section.

The Workspaces page opens.

2. In the Workspaces list, select a Workspace.

3. If the Details panel is not visible, do one of the following: t Click Details.

t Double-click the Workspace name.

The Workspaces Details panel displays all the information on the selected Workspace.

4. In the User Access panel, select a user or a user group. Ctrl+click (Windows and Linux) or Cmd+click

(Macintosh) to select multiple users and user groups. Click Select All to select all users and user groups.

5. Change the Workspace privilege.

6. (Option) Click Revert to undo any modifications made to the user access information.

7. Click Apply.

47

4

Managing Clients

You must create a client account for any client type (user, group, or device) that needs to access the Avid ISIS shared storage network. Client accounts allow access from users, groups, and devices to the Workspaces on the ISIS 1000 system, and prevent unauthorized users from accessing other users’ data. When you create client accounts, you set basic client information, such as user names and passwords.

User accounts have administrative privilege levels, group membership types, and Workspace access. There can be more user accounts than connected clients. The ISIS 1000 system has a built-in user account named Guest, which you cannot rename or delete.

Each user and user group account has an associated privilege level that controls their access to files stored in the network.

Instead of (or in addition to) manually creating accounts, you can configure external authentication to allow LDAP

users to connect to the ISIS. To import LDAP users, see “Managing LDAP Accounts” on page 53 .

n

Users must have access to at least one Workspace before they can use the shared storage network.

The ISIS Management Console allows you to create client accounts for each client connected to the system, and maintains a record of all attached clients. The client accounts are listed in dialog boxes for each client type.

n

Some clients might not be able to connect to the shared storage network if the combined bandwidth requirement of connected components equals the system limit for bandwidth use. For information on monitoring bandwidth use, see

“Monitoring Client Bandwidth” on page 78 .

Managing Users

The Users page of the Management Console allows you to create, modify, and delete user accounts; assign users to specific groups; and manage access privileges for all users.

When you double-click a user (or select a user and click Details), a Details panel opens to the right of the main

Users panel.

48

Managing Users

Callout Description

3

4

1

2

5

6

Action button toolbar—Perform actions on selected users

Users list—Lists all users and related information; see

“Users List” on page 49

Details panel—Detailed information on the selected users; see

Users” on page 51

and

“Changing User Details” on page 52

“User Details Panel” on page 50

Group membership—Displays information about the group membership for the selected user; see “Creating

Workspace access—Displays information about the Workspace access for the selected user; see “Creating Users” on page 51

and “Changing User Details” on page 52

Filter panel—Filter the user list display based on conditions you configure; see

“Filtering the Display” on page 20

Users List

The Users list panel displays the following information.

Heading

Name

Flags

Description

Lists the client name

Indicates the status of client privileges

49

Managing Users

Heading

Bandwidth

Description (Continued)

Displays the client’s bandwidth allocation.

Setting a bandwidth limit on editing clients, such as a Media Composer ® when the ISIS 1000 system is under load.

, can decrease playback performance n

To sort the information in the Users panel, click any column heading. For more information on sorting items in

columns, see “Sorting Information” on page 19

.

User Details Panel

The User Details panel displays the following information.

General Details

Heading

Name

Password

Verify

Bandwidth (MB/sec)

User Flag: can resize

User Flag: remote LDAP user

User Flag: disable user

Description

Lists the user name

Lets you change the password for the user to log in to the system

Re-enter the new password to verify it

Lets you change the maximum bandwidth requirements

When checked, allows the user to resize their Workspaces

When checked, allows LDAP authentication and group privileges

Disables the user account

Group Membership

Heading

Name

Type

Description

Lists the names of available groups

Lists the user’s membership status for each group (Member or Non-Member)

Workspace Access

Heading

Name

Access

Effective

Reason

Description

Lists the names of available Workspaces

Lists the user’s access privileges for the Workspace

Lists the effective access privileges for the selected user for the Workspace

Lists the reason for any difference between the access privileges and the effective access assigned the selected user

50

Managing Users

Creating Users

To create a user account:

1. From the Management Console home page, click Users in the System section.

The Users page opens.

2. Click New.

The Create User dialog box opens.

3. Set the user options (see “User Details Panel” on page 50

).

4. (Option) In the Group Membership list, select a group, and click Member to make the user a member in the group.

By default, new users are listed as “Non-Member” in the Type category for each group. The Non-Member button is inactive until you assign the user a group membership.

The Group Membership list shows the user as a member of the group.

5. (Option) In the Workspace Access list, select one or more Workspaces and do one of the following: t Click Read to set read-only access for the user.

By default, access privileges for new users are listed as “None” in the Access category for each Workspace.

The None button is inactive until you set the access. (For information on permissions for Workspace access in the network, see

“Managing User Access Privileges for Workspaces” on page 46 .)

t Click Read/Write to set both read and write access for the user.

The Workspace Access list shows the new user access privileges for the selected Workspace.

6. Click Apply.

7. Click Close to close the Create User dialog box and to return to the Users page.

The new user appears in the Users list.

Duplicating Users

Duplicated users inherit the bandwidth allocation and access privileges of the accounts from which they were created.

To duplicate a user account:

1. In the Users list, select the user account you want to duplicate.

2. Click Duplicate.

The Duplicate User dialog box opens.

3. (Option) Modify any of the attributes of the new user. For more information see “Changing User Details” on page 52

.

4. Click Apply to create a new user containing the attributes of the selected user.

The duplicate user appears in the Users page, and the Duplicate User dialog box refreshes to allow you to duplicate a new user.

The new user account has a default name — user n, where n is an integer that is incremented each time you click Apply to create another duplicate user account.

5. Click Close to close the Duplicate User dialog box and to return to the Users page.

51

Managing Users

Changing User Details

You can rename a user account and also change the password, allocated bandwidth, privileges (including disabling or re-enabling it), group memberships, and the Workspaces the user can access.

You can modify a user account at any time, even when it is being actively used in your work environment. However,

Avid recommends that users unmount a Workspace if you are changing their access to it.

n

You cannot rename or delete the default Guest account, but you can change the password (default is blank; no password), its group membership and Workspace access, and the user flags.

To modify a user account:

1. From the User list, do one of the following: t Select the user account you want to modify, and click Details.

t Double-click the user name.

The Details panel displays information about the selected user account.

2. Modify the user options as required. For a list of options, see

“Creating Users” on page 51 .

3. Modify group membership for the user as required: t Click Member to add the user to the group.

t Click Non-Member to remove the user from the group.

4. Modify Workspace access for the user as required: t Click None to remove Workspace access privileges for the user.

t Click Read to set read-only Workspace access for the user.

t Click Read/Write to set both read and write Workspace access for the user.

For information on permissions for Workspace access in the network, see

“Managing User Access Privileges for Workspaces” on page 46

and

“Setting or Changing Workspace Access Privileges” on page 47

.

5. (Option) Click Revert to undo any modifications made to the user information.

6. Click Apply.

Deleting Users

You can delete any user account except the default Guest user. If you want to keep an account but temporarily

prevent its access to the shared storage network, see “Disabling Users” on page 53

. Deleting a user that belongs to a group also removes that user name from the group list. If you remove all the users in a group, the group itself is not deleted.

c

If you delete the client account, its connection to the System Director is broken immediately and any mounted

Workspaces are unmounted as soon as they are accessed.

To delete a user account:

1. Ensure that the client account to be deleted is not currently active.

2. From the Users list, select the user account you want to delete.

3. Click Delete.

A dialog box opens, prompting you to confirm that you want to delete the client.

4. Click OK.

52

Managing LDAP Accounts

Disabling Users

You can remove a user temporarily from the Avid ISIS shared storage network by disabling the account. This preserves the client accounts (they remain in the Users list) and allows you to restore their access to the system later.

To disable a user account:

1. Make sure that the client account to be removed is not currently active.

2. From the Users list, select the client account you want to disable.

3. Do one of the following: t Click Details.

t Double-click the client name.

The Details panel displays information about the selected user.

4. Select the “disable user” check box.

5. (Option) Click Revert to undo any modifications made to the user information.

6. Click Apply.

7. Click Close to close the Details window.

Displaying User Details

The Details panel displays all information for the currently selected user.

To see information about a user: t In the User list, click to select a user.

The Users page displays all the information for the selected user. If the Details panel is not visible, click Details.

To hide the User Details panel: t Click the arrow next to the Details title bar.

To close the User Details panel: t Click Close.

Managing LDAP Accounts

LDAP (Lightweight Directory Access Protocol) is an Internet protocol that some applications use to look up information — such as account information, user names, and groups — from a server. The LDAP Sync tool allows

ISIS administrators to synchronize ISIS user accounts with existing LDAP user accounts and to create or modify a large number of users and groups within the Avid ISIS system.

The LDAP Sync tool lets you:

• Display user accounts available within a given LDAP service but not in the ISIS system, and vice versa

• Add new groups and users to the ISIS system

• Grant user memberships to groups

• Remove user membership from a group in ISIS if the user no longer belongs to that group on the LDAP server

53

Managing LDAP Accounts

Users synchronized by the LDAP Sync tool will automatically be added as “Remote” users for authentication to the

LDAP server.

You can use the LDAP Sync Tool to search for groups and their users on an LDAP server, synchronize users and groups accounts by adding or removing users and groups from ISIS, generate a report of the account actions, and see a history of the synchronization activity. You must first configure a connection by entering the LDAP server’s fully qualified name, port, and user distinguished name and password for authentication.

n

Users imported by the LDAP Sync Tool cannot log into the Avid ISIS until it is configured for external

authentication. For more information, see “Configuring External Authentication of Users” on page 26 .

n

Avid ISIS currently supports only Microsoft Active Directory, and might not be compatible with other LDAP implementations.

Installing the LDAP Sync Tool

The LDAP Sync Tool is part of the ISIS software kit, but is not installed by default.

To install the LDAP Sync Tool:

1. In the Management Console, click Installers under the System heading.

2. In the ISISTools section, click the LDAP Sync Tool executable file appropriate for your operating system.

3. Save the executable file to your computer and install it.

Opening the LDAP Sync Tool

You can use the LDAP Sync Tool to configure LDAP connections. If you have not previously configured a connection, you must enter the connection name and other information specific to the particular LDAP server.

c

Contact your IT administrator to obtain your LDAP login information. Three failed connection attempts might result in your LDAP user account being disabled.

n

All connection information is stored locally for the connecting user’s account. If you try to connect from a different workstation or as another user, you must re-enter the ISIS 1000 and LDAP login information.

Alternatively, you can configure external authentication on the ISIS 1000 to add the LDAP server. See

“Receiving

Notification of System Problems” on page 27 .

To open the LDAP Sync Tool:

1. Do one of the following: t (Windows) From the Start menu select Avid > LDAPSyncTool > Avid LDAP Sync Tool.

t (Macintosh) Select Applications > ISIS 1000 Tools > LDAP Sync Tool.

The Avid Login dialog box opens.

2. In the Hostname field, enter the host name of the System Director.

3. Enter the administrator password.

4. Click Connect.

t If this is your first time using this tool and an LDAP server is configured, the LDAP Group Selection list

opens. See “Synchronizing LDAP and ISIS Accounts” on page 56

.

t If this is your first time using this tool but no LDAP server is configured, the Connect to LDAP Server dialog box opens. Enter the information for your LDAP server as shown below and click Connect.

54

Managing LDAP Accounts t If the tool has been used before on this computer, the main window opens.

Using the LDAP Sync Tool

The Account Synchronizer is the main window of the Avid ISIS LDAP Sync Tool. Use the Account Synchronizer to search the LDAP user accounts, synchronize (reconcile) user accounts by adding or removing users from the ISIS users list, generate a report of the account actions, and see a history of the accounts. You can also modify the display of the Account Synchronizer to filter out unneeded account information.

LDAP Sync Tool — Main Window (Account Synchronizer) n

All LDAP reconciliation session data, such as reports and history, are stored in the local user’s account. If you log into another workstation and/or as a different user, this information will not be available.

55

Managing LDAP Accounts

When you first connect to the ISIS 1000 and the LDAP server, the Account Synchronizer checks the users in the selected LDAP groups against the ISIS 1000 database and builds a set of actions to reconcile the two. The main window displays the complete set of groups, using buttons with colors and icons to indicate the reconciliation status of each group.

Icon Meaning

The group is in the LDAP database, but not in the ISIS system. The default action is to add the group and all users to the ISIS.

The group is in both LDAP and ISIS system, but the users are different between the two:

• If the user is in LDAP but not the ISIS system, the user will be added to the ISIS system.

• If the user is in the ISIS system but not in LDAP, the user will be removed from the ISIS system.

n

The user will no longer share privileges with the group. The user will still be able to access the ISIS system, and membership in other local or LDAP groups is unaffected.

The group is in both LDAP and the ISIS system, and all users are reconciled. No action is taken by default.

The user and/or group is in the ISIS system, but not LDAP.

c

By default, all users and groups in this entry will be permanently deleted. If you do not want to remove these users from the ISIS database you must manually override the default action before performing a Reconcile action.

The user is IN an ISIS 1000 only group.

c

By default, all users and groups in this entry will be permanently deleted. If you do not want to remove these users from the ISIS 1000 database you must manually override the default action before performing a Reconcile action.

Click any button to see detailed information about the actions you can perform on users in each group.

Changing the Account Synchronizer Display

You can sort the columns in the display alphabetically, and add or remove LDAP groups from the Account

Synchronizer display.

To sort columns: t Click a column heading to sort the contents of the column alphabetically. Click the heading again to reverse the sort.

To resize columns: t Click and drag the divider between column headings.

Synchronizing LDAP and ISIS Accounts

Synchronizing the LDAP/Active Directory and ISIS 1000 user lists consists of the following steps:

• Selecting LDAP groups

• Specifying user-specific synchronization actions

• Performing the synchronization process

56

Managing LDAP Accounts n

The synchronization process only reads the LDAP/Active Directory user list. The ISIS 1000 LDAP Sync Tool will never alter the LDAP/Active Directory user list.

To add groups to the Account Synchronizer display:

1. Click Select Groups.

The LDAP Group Selection window opens.

n

On subsequent LDAP Sync Tool sessions, the main window will open after you log in and display the selected groups from the last session.

2. Select the groups to be synchronized.

To Select This:

Single group

Multiple non-contiguous groups

Multiple contiguous groups

All groups

Do This:

Click the group name.

CTRL-click each name to be selected.

Click the first group name, then SHIFT-click the last group name.

Press CTRL-A.

3. Click Add Selected.

The LDAP Sync Tool builds a list of sync actions for the selected groups, and displays the selected groups in the main window.

4. (Option) To print a report of the account list and selections, click Print.

57

Managing LDAP Accounts

To remove groups from the Account Synchronizer display:

1. Select one or more rows and click Clear Selected to remove the row from the Group list. Ctrl+click (Windows and Linux) or Cmd+click (Macintosh) or Shift+click to select multiple rows.

2. Click Clear All to remove all rows from the Group list.

To modify the default reconciliation actions for individual users:

1. Click the row in the Sync Status column for the appropriate group (each row in the Sync Status column is a button).

The Descriptive name window opens and displays the user names of all members of the group, as well as actions to be taken.

2. You can do the following: t To show all users, including those which are already reconciled, click Show All.

n

The “Show All” check box is disabled if all or no users in the group are already reconciled (all users are shown by default).

t To override the default action, click the check box in the “ISIS Sync Action” column to deselect it.

3. (Option) To print a report of the user list and selections, click Print.

4. Click Close to close the user selection window and return to the main window.

To synchronize LDAP/Active Directory and ISIS user databases: t Click Synchronized Marked.

The LDAP Sync Tool performs the reconciliation actions, then displays the groups status in the main window.

To refresh selected entries:

1. Select one or more groups from the main window.

To Select This:

Single group

Multiple non-contiguous groups

Multiple contiguous groups

All groups

Do This:

Click the group name.

CTRL-click each name to be selected.

Click the first group name, then SHIFT-click the last group name.

Press CTRL-A.

2. Click Reload All.

Information about the selected groups is retrieved from the LDAP server, reassessed, and displayed in the main window.

58

Managing LDAP Accounts

To see and/or print the History log:

1. Click History.

The Synchronization History window opens.

2. (Option) To print the History Log, click Print.

The Print dialog opens.

3. (Option) To clear the History Log, click Delete History.

The Delete History dialog box opens. Click Yes to delete the history.

4. To close the Synchronization History window, click Close.

To exit the LDAP Sync Tool

1. Do one of the following: t Click File > Exit t Click Close Window in the upper right corner of the window.

A confirmation window opens.

2. Click Yes.

The application closes.

Importing LDAP Users with Incorrectly Formatted LDAP UIDs

When synchronizing users from the LDAP Synchronization Tool, the User ID (also known as the UID) must contain characters that ISIS 1000 allows for valid user names. The entry in the User ID column is used as the ISIS 1000

Username. User names and passwords must use only ASCII characters. See

“Entering Text” on page 22 for more

information about valid and invalid characters.

If the User ID contains any invalid characters:

• The user will not be added to ISIS 1000

• The synchronization for the group is aborted

• Any subsequent user accounts in the group are not reconciled

In such cases, you must do one of the following:

• Create the user in ISIS 1000 with a user name that does not contain these illegal characters, and manually add them to groups.

• Update the user entry in the LDAP database with a UID that contains no illegal characters, then run the LDAP

Sync Tool again to reconcile the users.

Disconnecting and Reconnecting the LDAP Servers

The connection status button icons indicate whether you are connected to the ISIS 1000 or LDAP servers:

Connected to ISIS 1000

Disconnected from ISIS 1000

59

Managing Groups

Connected to LDAP server

Disconnected from LDAP server

You can use the connection status buttons to manually disconnect from and reconnect to the LDAP server. (If the connection to the ISIS 1000 is broken, you must close the LDAP Sync Tool, then restart it and log in again.) The button icons change depending on your current connection status.

n

You are disconnected from the ISIS 1000 or LDAP servers if their respective session time-out periods are exceeded.

To disconnect from the LDAP server: t Click LDAP.

The LDAP Sync Tool disconnects from the LDAP server, and the LDAP connection status button icon changes to Disconnected.

To connect (or reconnect) to the LDAP server:

1. Click LDAP.

The Connect to LDAP Server window appears.

n

The text fields will be filled in for you if you have previously logged into the LDAP server within the same session.

2. Click Connect.

The LDAP Sync Tool connects to the LDAP server and the Connection status icon changes to green

(connected).

Managing Groups

Groups allow you to organize and manage users based on their common properties, such as by Workspace access,

LDAP users, or other criteria.

60

Managing Groups

4

5

Callout

1

2

3

6

Description

Action button toolbar—Perform actions on selected user groups

Details panel—Detailed information on the selected user group; see page 61

User membership panel—Displays information about the membership for the selected user group; see “Adding

User Groups” on page 62 and “Modifying User Group Details” on page 62

User groups list—Lists all user groups and related information

Filter panel—Filter the user list display based on conditions you configure; see

“Filtering the Display” on page 20

Workspace access panel—Displays information about the Workspace access for the selected user group; see

“Adding User Groups” on page 62

and

“Modifying User Group Details” on page 62

The Group Details panel displays the following information.

Panel Heading

Group Details

Name

User Membership

Name

Type

Description

Lists the user group name

Lists the names of all users

Lists the user’s membership status for each user group (Member or Non-Member)

61

Managing Groups

Panel Heading Description (Continued)

Workspace Access

Membership Count

Lists the number of groups to which each user belongs (up to a maximum of 15)

Name

Lists the names of available Workspaces

Access

Lists the access privileges for the selected user group

Adding User Groups

To add a group account:

1. From the Management Console home page, click Groups in the System section.

The Groups page opens.

2. Click New.

The Create Group dialog box opens.

3. Type a user group name in the Name text box.

If there is already a user group with the name entered in the Name text box, an error message tells you to type a new name.

n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

4. (Option) In the User Membership list, select a user and click Member to make the user a member in the user group. A user can belong to up to 15 user groups.

By default, new users are listed as “Non-Member” in the Type category for each user group. As a result, the

Non-Member button is inactive until membership is set.

5. (Option) In the Workspace Access list, select a Workspace or click Select All to select all Workspaces, and do one of the following: t Click Read to set read-only Workspace access for the user group.

t Click Read/Write to set both read and write Workspace access for the user group.

By default, access privileges for new user groups are listed as “None” in the Access category for each

Workspace. As a result, the None button is inactive until access is set. (For information on permissions for

Workspace access in the network, see

“Setting or Changing Workspace Access Privileges” on page 47

.)

6. Click Apply.

7. Click Close to close the Create Group dialog box and to return to the Groups dialog box.

The new user group appears in the Groups list.

Modifying User Group Details

You can rename a user group account, change user membership, and modify Workspace access at any time, even when it is being actively used in your work environment.

To modify a user group account:

1. From the Groups list, do one of the following: t Select the user group account you want to modify, and click Details.

t Double-click the user group name.

The Details panel displays information about the selected user group account.

62

Managing Groups

2. Modify the user group name as required.

If there is already a user group with the name entered in the Name text box, an error message tells you to type a new name.

n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

3. Modify user membership for the user group as required: t Click Member to make the user a member in the user group.

t Click Non-Member to remove the user from the user group.

4. Modify Workspace access for the user group as required: t Click None to remove Workspace access privileges for the user group.

t Click Read to set read-only Workspace access for the user group.

t Click Read/Write to set both read and write Workspace access for the user group.

For information on permissions for Workspace access in the network, see

“Managing User Access Privileges for Workspaces” on page 46

and

“Setting or Changing Workspace Access Privileges” on page 47

.

5. (Option) Click Revert to undo any modifications made to the client information.

6. Click Apply.

Deleting User Groups

You can delete any user group account except the default Guest group (of which the default user account, Guest, is a member). Deleting a group does not delete the user accounts who are members of the group.

To delete a user group account:

1. Ensure that the user group account to be deleted is not currently active.

2. From the Groups list, select the user group account you want to delete.

3. Click Delete.

A dialog box opens, prompting you to confirm that you really want to delete the user group.

4. Click OK.

Displaying User Group Details

The Details panel displays all information for the currently selected user group.

To see detailed information about a User group: t In the Group list, click to select a user group.

The Groups page displays all the information for the selected user group. If the Details panel is not visible, click

Details

.

To hide the User Membership or Workspace Access panel: t Click the arrow next to the Details title bar or the User Access title bar.

To close the Details panel: t Click Close.

63

Managing Bandwidth Limits

Managing Bandwidth Limits

The Bandwidth Limits panel lets you display and manage the bandwidth used by clients that can connect to the ISIS system. Some client applications try to use as much bandwidth as possible, potentially throttling other users of the system. To control this, you can modify the maximum amount of bandwidth a client can use.

Callout

1

2

3

4

Description

Action button toolbar—Perform actions on selected Bandwidth Limit entries

List—Lists all client devices and related information; see “Bandwidth Limits Panel” on page 64

Details panel—Detailed information on the Bandwidth Limits; see “Displaying Bandwidth Limits Details” on page 65

Filter panel—Filter the display based on options you configure; see “Filtering the Display” on page 20

Bandwidth Limits Panel

The Bandwidth Limits panel displays the following information.

Heading

Name

Bandwidth

Bandwidth Mode

Description

Lists the client name

Displays the current bandwidth for the client n

You might need to set a bandwidth limit for a device such as an Avid AirSpeed server if it is consuming more bandwidth than expected.

Lists the mode used to allocate bandwidth (only Device Bandwidth is available)

64

Managing Bandwidth Limits

Heading

Description

Description (Continued)

Displays the user-supplied device description, if any

Displaying Bandwidth Limits Details

The Bandwidth Limits Details panel displays the same information as the Bandwidth Limits list.

To see detailed information about a client or device: t In the Bandwidth Limits list, double-click a name.

Adding a Bandwidth Limit Entry

Bandwidth limit entries are created in two ways: either manually (you create them) or automatically, when a client connects to the ISIS for the first time. However, you can prevent the automatic creation of entries in the Preferences

page on the Management Console by checking the box for Force Manual Device Creation (see “Configuring

Management Console Preferences” on page 24

).

For automatically created entries, the default bandwidth is determined by the Preferences page setting called

Default Bandwidth for Auto Created Devices (MB/sec)

. The default value of zero (0) means there is no limit to the bandwidth the client can use.

To create a Bandwidth Limit specification for a client:

1. From the Management Console home page, click Bandwidth Limits in the System section.

The Bandwidth Limits page opens.

2. Click New.

3. Type the name of the device in the Name text box.

If there is already a device with the name entered in the Name text box, an error message is displayed.

n

For information on valid and invalid characters, see

“Entering Text” on page 22 .

4. (Option) Type a value in the Bandwidth text box to set the amount of read/write bandwidth (in MB/s) to allocate to the device. A value of 0 (zero) indicates that bandwidth will not be metered.

5. (Option) Type a description in the Description text box.

6. Click Apply.

The Bandwidth Limits list refreshes and displays the new client.

7. Repeat steps 2 through 6 to add more clients.

8. When finished, click Close.

Changing a Bandwidth Limit Entry

You can rename an entry or change the allocated bandwidth or description at any time. Any changes take effect immediately, even if the user is connected.

n

If you change any setting in an entry that was automatically created, the entry is not automatically deleted when that user disconnects from the system.

65

Managing Bandwidth Limits

To modify a Bandwidth Limit entry:

1. From the Bandwidth Limits list, select the entry to modify, and do one of the following: t Click Details.

t Double-click the name.

The Details panel displays information about the selected client.

2. Modify the options as required.

3. (Option) Click Revert to undo any modifications.

4. Click Apply.

Deleting a Bandwidth Limit Entry

You can delete a Bandwidth Limit entry for user-created clients or any entry you have modified. (Automatically created accounts that have not been changed are deleted automatically also, when the user disconnects.)

To delete a Bandwidth Limit entry:

1. Make sure that the client account is not currently connected.

2. From the Bandwidth Limits list, select the entry to delete.

3. Click Delete.

In the Delete Confirmation dialog box click Yes to confirm that you want to delete the entry.

4. Click OK.

The entry is deleted and removed from the Bandwidth Limits list.

66

5

Managing Avid ISIS 1000 Hardware

You perform all storage management operations from the Avid Management Console, which allows you to add, remove, configure, and manage your hardware.

n

For an overview of the Management Console and information about how to start the tool, see

Management Console” on page 12 .

“Opening the

Managing Engines

The Engines page of the Management Console allows you to see details and to monitor the status of all Engines connected to the shared storage network. The Engine is the container for all the other physical (Storage Controllers,

Media Packs) and virtual (Storage Managers, Storage Groups) components.

Engine List

The Engine list includes the following information.

Heading

Serial Number

Status Time

Status

Available

Spare

Active

Product Part Number

Enclosure ID

System Director

Description

Serial number of the Engine

The last time the System Director logged the status of the Engine

Displays changes in the working status due to upgrade installation or failure.

Lists the number of available Media Packs in each Engine

Lists the number of spare Media Packs in each Engine

Lists the number of active Media Packs in each Engine

Displays the Avid part number for the ISIS product.

Displays the number (from 00 - 99) assigned to the Engine. In a lab with many ISIS systems, assigning an Enclosure ID can help you identify a particular Engine.

The Enclosure ID is displayed in the window on the left side of the Engine.

Indicates whether the Engine is running the System Director: values are yes or no. In a single

Engine configuration, this value is always yes. In a multi-Engine configuration, only one Engine shows a value of yes (only one System Director is supported in a multi-Engine configuration).

Displaying Engine Details

To see information about an Engine:

1. Do one of the following: t Select an Engine and click Details.

t Double-click an Engine name.

67

Managing Engines

The Details panel displays all information for the Engine. The panel is divided into sections:

Engine Details — displays the same information as in the Engine list

Storage Controllers — displays information about the Storage Controllers in the Engine

Media Packs— displays information also available in the Media Packs list

Disks — displays information about the disks in the Engine

You can sort the information in the details sections by clicking any column heading. Also see “Sorting

Information” on page 19

.

n

You can see more detailed information on Engine components by using the Avid Agent tool. See on page 102 .

“Avid ISIS Agent”

To close the Details panel: t Click Details.

Engine Status

Engines or Storage Controllers can have one of the following status values:

Status

Installing

Install failed

Install waiting

Install needed

Install downloading

Install Phase (1, 2, 3)

Description

The ISIS software is being installed

The software installation failed. Contact support.

The installation is in progress

A newer version of the ISIS software is available

The ISIS software kit is downloading from the Avid support site.

The software installation is in the specified phase

Upgrading an Engine

When new releases of the Avid ISIS software are available, you can upgrade the Engines to take advantage of new features and bug fixes.

Typically, you upgrade the ISIS clients first, then upgrade the ISIS system. (For information on updating clients, see the Avid ISIS Client Manager Installation and User’s Guide.)

• In a single-Engine configuration, upgrade the Engine through the Agent.

• In a multi-Engine configuration, first upgrade the System Director Engine through the Agent, then upgrade the remaining Engines through the Management Console. You can identify the System Director Engine by looking

at the Engines page in the Management Console. See “Engine List” on page 67 .

n

In a multi-Engine configuration, all the Engines (all Storage Controllers) must be running the same version before the system can resume normal operation. Upgrading an Engine causes it to reboot; plan to do upgrades during a maintenance window with no client I/O occurring.

To upgrade a single-Engine system, or the System Director Engine, through the ISIS Agent:

1. On your local computer, download the new software from the Avid support site, using your support account.

2. Unzip the software on your computer.

68

Managing Engines

3. In the Management Console, open the Engines page and identify the Engine running the System Director.

Double-click the System Director Engine to open its Details panel.

4. Double-click the Host Name to open the Agent for the System Director Engine (for more information, see

“Avid ISIS Agent” on page 102 ).

5. In the Agent, click Install under the Configuration heading, and confirm that the box next to Run System

Director

is checked (to verify that this is the System Director Engine).

6. Click Choose File and navigate to the location of the software kit contents that you just unzipped.

7. Click Submit.

To complete the upgrade, the system will reboot. A message is displayed indicating the time remaining until the system is again available. You can then log back in to the Agent or the Management Console and confirm the system is running the new version. The version information is visible at the bottom of the Management Console

(see “Understanding the Management Console Interface” on page 13 ), and in the Agent (on the System tab

under Versioning).

To upgrade additional Engines in a multi-Engine system through the Management Console:

1. On your local computer, download the new software from the Avid support site, using your support account.

2. Unzip the software on your computer.

3. In the Management Console, click Engines.

4. Select an Engine and click Upgrade. Make sure you do not select the System Director Engine.

The Upgrade Storage Controllers dialog box opens. (Upgrading an Engine uses the same code path as upgrading the Storage Controller.)

5. Select the

AvidISISSetup_nnnnn.bin

file from the list in the right column.

The Command text box displays the location of the upgrade installer.

c

Do not enter or change any text in the Command or Options fields except under the supervision of qualified

Avid support personnel. Doing so can result in system degradation and data loss.

6. Click Upgrade.

You can monitor the progress of the upgrade in the Details panel. To complete the upgrade, the system will reboot. A message is displayed indicating the time remaining until the system is again available. You can then log back in to the Management Console and confirm the system is running the new version. The version

information is visible at the bottom of the Management Console (see “Understanding the Management Console

Interface” on page 13 ), and in the Agent (on the System tab under Versioning).

7. Repeat this procedure for all the remaining Engines (except the System Director Engine) in the ISIS storage system.

Removing Engines from the Engine List

If you need to replace an Engine, use the Management Console to remove the connection history of the inactive or inoperative Engine from the list in the Engines page. After the Engine is removed from the ISIS file system, you can physically remove it from the network.

Removing an Engine from an ISIS system requires that you delete any Workspaces in the Storage Group supported by the Media Pack in the Engine. If the Storage Group contains multiple Media Packs (one from two or more

Engines), you must delete all the Workspaces in that shared Storage Group before you can remove an Engine.

For information on removing Engines from the network, see the ISIS 1000 Setup and Maintenance Guide.

69

Managing Storage Controllers

To remove an Engine from the Engine list:

1. In the Engine list, select the Engine to remove.

2. Click Remove Status.

The Engine is removed from the Engine list.

n

If you remove an active Engine by mistake, the System Director restores the Engine to the Engine list the next time it polls the shared storage network (usually within 20 seconds).

Managing Storage Controllers

The Storage Controllers page of the Management Console allows you to see details and to monitor the status of all

Storage Controllers connected to the shared storage network.

Storage Controllers List

The Storage Controllers list includes the following information:

Heading

Host Name

Status Time

Status

BMC Version

Controller Serial Number

Engine Serial Number

Free Memory

Total Memory

Description

The name of the Storage Controller

The date and time of the currently displayed information. To update the data, click Refresh.

The Storage Controller status. Storage Controllers have the same status values as Engines; for

more information, see “Engine Status” on page 68 .

The BMC firmware version running on the Storage Controller

The manufacturer serial number of the controller

The serial number of the Engine that contains this Storage Controller

Displays the amount of memory not in use

Displays the total amount of available memory

Storage Controller Details

To see information about an Storage Controller:

1. Do one of the following: t Select a Storage Controller and click Details.

t Double-click the Storage Controller name.

The Details panel displays all information for the Storage Controller. The panel is divided into sections:

Details — displays the same information as in the Storage Controller list

Media Packs — displays information also available in the Media Packs list

IP Address— displays the IP address of the Storage Controller

Some of the information is embedded in the Storage Controllers, and other information is assigned to the

Storage Controllers by the Avid ISIS 1000 software.

70

Managing Media Packs

You can sort the information in the Details panel by clicking any column heading. For more information on

sorting items in columns, see “Sorting Information” on page 19 .

To close the Details panel: t Click Details.

Upgrading a Storage Controller

When new releases of the Avid ISIS software are available, you can upgrade the Engine to take advantage of new features and bug fixes.

Typically, you upgrade the ISIS clients first, then upgrade the ISIS system. (For information on updating clients, see the Avid ISIS Client Manager Installation and User’s Guide.) n

In a multi-Engine configuration, the Storage Controllers in all Engines must be running the same version before the system can resume normal operation. Upgrading the Storage Controller causes the system to reboot; plan to do upgrades during a maintenance window with no client I/O occurring.

To upgrade the Storage Controllers:

1. On your local computer, download the new software from the Avid support site, using your support account.

2. Unzip the software on your computer.

3. In the Management Console, click Storage Controllers.

4. Select the Storage Controller to upgrade.

5. Click Upgrade.

The Upgrade Storage Controllers dialog box opens.

6. Select the upgrade installer from the list in the right column.

The Command text box displays the location of the upgrade installer.

c

Do not enter any text in the Command or Options fields except under the supervision of qualified Avid support personnel. Doing so can result in system degradation and data loss.

7. Click Upgrade.

You can monitor the progress of the upgrade in the Details panel. To complete the upgrade, the system will reboot. A message is displayed indicating the time remaining until the system is again available. You can then log back in to the Management Console and confirm the system is running the new version. The version

information is visible at the bottom of the Management Console (see “Understanding the Management Console

Interface” on page 13 ), and in the Agent (on the System tab under Versioning).

Managing Media Packs

The Media Packs tool coordinates and controls the activity of Media Packs and allows you to bind and unbind

Media Packs and perform maintenance operations.

71

Managing Media Packs

1

2

3

4

Action button toolbar — Perform actions on selected Media Packs

Media Packs list — Lists all configured Media Packs and related information; see

“Media Packs List” on page 72

Details panel — Displays detailed information on the selected Media Packs; see

“Displaying Media Pack Details” on page 73

Filter panel — Filters the Media Packs list display based on conditions you configure; see

“Filtering the Display” on page 20

Media Packs List

The Media Packs list contains the following information. If you cannot see a column, it might be hidden. See

“Showing and Hiding Columns” on page 19

).

Heading

Name

Host Name

Description

Displays the name (created automatically) of each Media Pack bound to the system

Displays the name of the Storage Controller

72

Managing Media Packs

Heading Description (Continued)

Status Time

Status

State

Uptime

Capacity

Usable

Used

Lists the last time the System Director logged the Media Pack’s status

Displays any change in the working status logged by the System Director (for a description of status messages, see

“Media Pack Status” on page 74

)

Displays the Media Pack state (Spare, Bound, Unbound)

Displays the amount of time the Media Pack has been running (days:hours:min:sec)

Displays the total capacity of the Media Pack

Displays the amount of storage space remaining

Displays the amount of used space

Version

Engine Serial

Displays the software version number of the Engine

Displays the serial number of the Engine

Storage Group Displays the Storage Group, if any, to which the Media Packs are allocated.

n

You can organize the information in the Media Packs list by showing additional columns or by sorting or filtering

displayed items. For more information on modifying the display, see “Customizing the Management Console

Display” on page 18 .

A colored icon precedes the name of each Media Pack, indicating its status, as follows:

Icon Color

White

Green

Yellow

Blue

Red

Description

Media Pack is unbound (not linked to the ISIS file system)

Media Pack is bound to the file system

Indicates one of the following:

• a problem with the Media Pack

• the Media Pack is experiencing degraded performance

An installation or software upgrade is in progress

Media Pack problem, such as a disk failure

Displaying Media Pack Details

To see detailed information about a Media Pack:

1. In the Media Packs list, select a Media Pack.

2. Do one of the following: t Click Details.

t Double-click the Media Pack name.

The Details panel displays all the information for the selected Media Pack, such as the Storage Controller that manages the Media Pack and details about its disks.

73

Managing Media Packs

To close the Details panel: t Click Details.

Media Pack Status

The Status column in the Media Packs list reports the status of the Media Packs logged by the System Director. (The

Status line in the Details panel reports the same information.) As long as the Media Pack maintains a working status, the Management Console shows no entries in the Status field. When a problem arises, or when the status of the

Media Pack changes, the Management Console refreshes the display.

A Media Pack can have one of the following status values, in alphabetical order. Each status has a severity level

(Info, Error, Warning).

Status

Disk Failure (Error)

Disk full (Error)

Disk Performance Degraded

(Warning)

Drive missing (Warning)

Drive rebuilding (Info)

Network degraded (Error)

Offline (Warning)

Rectifying Files (Warning)

Description

The hard disk error threshold for a disk has been exceeded and the Media Pack has taken the disk offline. The default threshold is 25 hard errors.

One or more Media Packs in a Storage Group has reached its full capacity. Even if some of the Media Packs still have available space, the Storage Group is considered full as soon as one Media Pack is filled. As data is written and deleted, some Media Packs are filled before others. .

Disk Performance Degraded, because either:

• A disk has logged a Long Command Time. The ISIS system periodically clears this log.

The Long Command Time counter is also cleared during a reboot.

• A disk has reached 75% of its hard error threshold. Reboot the Engine to clear the status.

A drive is missing from the Media Pack

The contents of a data drive are being rebuilt from the other drives in the Media Pack (after you replace a failed drive)

The IP interfaces on the Media Pack have failed or the Media Pack has experienced at least a

10% error rate (usually due to lost packets), indicating a network communication problem

(possibly a cable or switch issue).

Although the Media Pack is reporting and detecting the errors, it is usually not the Media

Pack itself that is the problem. See the tech note

A Media Pack was set offline by the system.

The ISIS system is cleaning up deleted files and verifying existing files on Media Packs.

This occurs every time the system restarts and every 10 days thereafter, and also when manually initiated. Each Media Pack staggers its process so that they do not run simultaneously.

Disk Status

The individual disks in a Media Pack and the System Disks can have the following status values:

74

Managing Media Packs

Status

Failing

Failed

Rebuilding

Operational

Missing/Empty

Unsupported

Initializing

Foreign

Description

The drive is failing. Although there is no way to tell how much time you have before the drive fails, this status alerts you to obtain a replacement drive as soon as possible. To check the

performance of Media Pack drives, see “Statistics Tab” on page 103 .

The drive has failed and must be replaced. You cannot reuse it. See the Avid ISIS 1000 Setup and

Maintenance Guide for instructions on replacing a disk.

The data on the drive is being rebuilt from the other drives in the Media Pack, or from the other system drive. This status occurs after you replace a failed drive.

The drive is functioning normally.

A drive is missing or the slot is empty.

The drive was not purchased from Avid and cannot be used in the Engine.

The Engine is starting up (for example, after a reboot) and performing internal housekeeping.

The drive possibly came from a different Engine. To use this drive, clear the foreign drive

configuration; see “Foreign Disk Error” on page 77

. n

During system startup, the Foreign status can also appear before the Initializing state.

However, if the drive status remains at Foreign, and does not change to Operational after about 30 seconds (or by the time the other drives are reporting their status as

Operational), then the drive likely is foreign.

Unbinding Media Packs from the ISIS File System

If you want to move a Media Pack to a different Engine (to create a Storage Group on that system), you must remove it from its current Storage Group, and then unbind it on the current system.

If the Storage Group contains multiple Media Packs, you must remove all of them, meaning all Workspaces (if any)

must be deleted. All the Media Packs you want to unbind must be in the Spare state. See “Deleting a Workspace” on page 45

for more information.

To unbind a Media Pack from the ISIS file system:

1. Select the Media Pack you want to unbind.

2. Click Unbind.

A confirmation dialog appears.

3. Click Yes to confirm.

The selected Media Pack is removed from the ISIS file system and its state changes to Unbound. You can then physically remove it from the Engine.

Clearing Network Degraded Status Messages

Network Degraded status indicates that the Media Pack has detected a high number of errors (see

“Media Pack

Status” on page 74

). If correcting the problem does not clear the status messages, use the Issue Command button to clear the messages and reset the error count.

c

Correct the cause of the Network Degraded status messages before you clear them from the

Management Console.

75

Managing Media Packs

To clear all Network Degraded messages in the Media Packs list:

1. Select one or more Media Packs from the Media Packs list.

You can use the Shift and Control keys to select multiple items. For more information, see “Selecting Items” on page 21

.

2. Click Issue Command.

The Issue Media Pack(s) Command window opens.

3. Click Clear Network Degraded, and then click Send.

Removing Orphaned Media Packs

Orphaned Media Packs are connected to a file system that is not currently in use, for example when a Media Pack is moved from one ISIS 1000 environment to another, or when you create a new active partition on a system that already includes bound Media Packs. The “Force Remove” command removes the file system binding from the

Media Pack and makes it available for use in the current file system.

c

The Force-Remove command erases all data stored on the Media Packs. Do not remove orphaned Media

Packs unless you are certain they contain no data you want to save.

To remove orphaned Media Packs:

1. From the Management Console home page, click Media Packs.

The Media Packs tool opens.

2. Select the orphaned Media Pack.

3. Click Force Remove.

A message warns you that removing Media Packs erases all data on the component.

4. Click Yes.

The Force Removal Text Confirmation dialog box opens.

5. Type

Remove

in the text box, and then click Remove.

The orphaned Media Pack is unbound from the ISIS file system and removed from the Orphaned Media Pack list.

Cleaning Up Files (Manually Rectifying Files)

Media Packs periodically check the status of stored files, cleaning up deleted files and verifying existing files. This process, called “rectifying files,” occurs randomly and asynchronously during normal system operation to minimize any potential decrease in system performance. The Status column in the Media Packs list indicates this operation.

Media Packs also rectify files when starting or restarting. When this happens, data stored on the Media Packs might not be in sync with the data in the file system itself. Also, if a client cannot communicate with the Media Pack, there can appear to be more data allocated to the Media Packs than the file system has allocated. To correct this, you can manually send the Media Pack a command to rectify its files.

To rectify files:

1. Select one or more Media Packs from the Media Packs list.

Use the Shift and Control keys to select multiple items. For more information, see “Selecting Items” on page 21

.

2. Click Issue Command.

76

Management Console Error Messages

The Issue Media Packs(s) Command dialog box opens.

3. Click Initiate Block Rectify, and then click Send.

The system rectifies files on the selected Media Packs and changes the status in the Media Packs list to

Rectifying Files.

Management Console Error Messages

The following sections suggest actions to perform on selected error messages in the Management Console.

Foreign Disk Error

The Foreign Disk message is displayed when you insert a drive that was previously used in a different Media Pack, or if the drive has been out of the Engine for longer than five minutes. This message can also appear after a system crash, before the system has restored the relationships of drives to Media Packs. However, if the drive failed, you cannot reuse the drive even if you clear the configuration.

c

Clearing the foreign disk configuration is a permanent operation. If you are using a drive that came from a different Media Pack, make sure the original Media Pack no longer needs it.

To replace media drives, see the ISIS 1000 Setup and Maintenance guide.

To clear the Foreign Drive status:

1. Open the Agent.

2. Click Advanced, then Disks.

3. Select the drive, then click Clear Foreign Config.

4. A dialog box opens, warning that continuing with this operation will permanently destroy all data on the drive.

You must type the words

Destroy My Data

in the text field and click OK to continue.

5. After the old configuration is cleared, the drive gets assigned to a Media Pack that needs a drive.

77

6

Managing Connections

This section describes how to monitor and manage connections to the ISIS 1000 shared storage network.

Monitoring Client Bandwidth

The Client Bandwidth page allows you to monitor system usage, including total system bandwidth use and bandwidth consumption of each connected system.

To open the Client Bandwidth page:

On the Management Console home page, click Client Bandwidth in the Connect section.

The following figure and table describe the Client Bandwidth page.

Callout Description

1

2

3

System bandwidth scale buttons—Increase or decrease the scale of the system bandwidth graph; see

Bandwidth List Graph Display” on page 79

“Scaling the

System bandwidth read and write graphs—Graphic display of system read (green) and write (red) bandwidth; see

“Client Bandwidth List” on page 79

Device bandwidth scale buttons—Increase or decrease the scale of the device bandwidth graph; see “Scaling the

Bandwidth List Graph Display” on page 79

78

Monitoring System Connection Status

Callout Description

4 Device bandwidth read and write graphs—Graphic display of device read (green) and write (red) bandwidth; see

“Client Bandwidth List” on page 79

The System Read Bandwidth and System Write Bandwidth rows in the Bandwidth page show total system read bandwidth (green bar) and total system write bandwidth (red bar) in megabytes per second (MB/s).

Below the System Read Bandwidth and System Write Bandwidth rows is a list of all active system components showing their current activity and their system identification.

Client Bandwidth List

The following table describes the information displayed in the Client Bandwidth page.

Heading

System Read Bandwidth

System Write Bandwidth

System Name

Read BW

Write BW

Bandwidth

Description

The value of the total system bandwidth currently in use for reading files (in MB/s)

The value of the total system bandwidth currently in use for writing to files (in MB/s)

The name of the system specified during the System Director configuration

For the listed system components, the value of the bandwidth currently in use for reading files

(in MB/s)

For the listed system components, the value of the bandwidth currently in use for writing to files (in MB/s)

For the listed system components, graphical display of bandwidth usage:

• Read (green bar)

• Write (red bar) n

To sort the information in the Bandwidth Monitor list, click any column heading. For more information on sorting items in columns, see

“Sorting Information” on page 19 .

Scaling the Bandwidth List Graph Display

The Bandwidth Monitor list represents bandwidth consumption for the network and for individual system components in the form of horizontal bars in a graph display. Numeric divisions are displayed in megabytes/second

(MB/s). You can adjust the scale of the graph to make it easier to monitor bandwidth information.

To decrease or increase the size of the graph view: t Click the Decrease Size or Increase Size button.

Monitoring System Connection Status

The Connection Status page allows you to see the status of all components connected to the network.

To open the Connection Status page:

From the Management Console home page, click Connection Status in the Connect section.

79

Monitoring System Connection Status n

Some clients might not be able to connect to the shared storage network if the combined bandwidth requirement of connected components equals the system limit for bandwidth use. For information on monitoring bandwidth use, see

“Monitoring Client Bandwidth” on page 78 .

Callout

1

2

Description

Action button toolbar—Perform actions on selected components

Connections list—List connected components and related information; see

“Connection Status Descriptions” on page 80

Connection Status Descriptions

The Connection Status dialog box lists information about all components — both active and inactive — that comprise the shared storage network. The following table describes the information displayed in the dialog box.

Heading

Name

ID

OS

Type

License

Last Seen

Description

Lists the name of the component

Lists an internal numeric identifier used by the System Director to represent the component; these identifiers are assigned when a component first contacts the System Director

Lists the operating system of the component

Lists the category or principal function of the component

Displays the number of licenses allotted to the component

For inactive components, displays the date and time when the component last sent its status to the

System Director; for active components, displays a zero (0) as the default value

For active components, displays the date and time when the component last sent its status to the System

Director.

The System Director removes information about components that have not been seen for a week, unless the component’s bandwidth limit is configured to custom values or the Default Device Bandwidth option in the

Preferences dialog box is selected n

To sort the information in the Connection Status dialog box, click any column heading. For more information on

sorting items in columns, see “Sorting Information” on page 19

.

80

Displaying Client Bandwidth Reservations

Displaying Client Bandwidth Reservations

Normally, bandwidth reservations are initiated and configured automatically by Avid applications based on bandwidth requirements. In some cases however, you might want to limit the bandwidth available to client systems.

Client workstation users can use the Client Manager to obtain a default bandwidth reservation on the ISIS system.

The actual bandwidth available to the client is the lowest of the following values:

• The default bandwidth requested by the Client Manager

• The maximum bandwidth assigned by the ISIS Administrator to the user

• The maximum bandwidth value assigned by the Management Console, either per-device or by the default bandwidth allocation for auto-created devices

• The bandwidth limitation of the client device

The Reservations page displays the status of client reservations, and includes the name of the client system and the value of the reservation, in MB/sec.

n

To sort the information in the Reservations page, click any column heading. For more information on sorting items in columns, see

“Sorting Information” on page 19 .

81

7

System Monitoring and Diagnostics

The ISIS 1000 provides tools for logging, monitoring, and system diagnostics. The following table describes each tool and where to find it.

Tool Name What It Does Where to Find It

Hardware Monitoring Service

System Director Information

System Logs

Administration Logs

ISIS Snapshots Page

System Status History

Connection Analyzer Tool

Log Aggregator Tool

Disk Analyzer Tool

Media Pack Parameters Tool

Media Pack Log Viewer

Periodically polls critical system components and reports status to the

System Director

Runs in the background; in case of problems, hardware status is displayed in the System Status panel on the

Management Console

Displays detailed information about the

ISIS System Director

Displays all events initiated by the system, sortable by type

Management Console -- Logging

Management Console -- Logging

Displays all the administrative actions performed on the system, such as creating

Storage Groups and Workspaces, changing an object’s attributes, or deleting an object

Management Console -- Logging

Management Console -- Logging Creates a snapshot of the current state of the ISIS system

Provides an interactive log of error and warning events, capturing the state of the system at the time of the event

Management Console -- Tools

Provides a quick look at the connection status of all Media Packs in the shared storage network

Collects a full set of event logs and system statistics, including Media Packs and the

System Director

ISIS Toolbox

ISIS Toolbox

Runs basic disk performance tests on your

Media Packs

ISIS Toolbox

Sets and retrieves Media Pack logging flags ISIS Toolbox

Displays event information about Media

Packs

ISIS Toolbox

Hardware Monitoring Service

When the Hardware Monitoring service detects a hardware problem, it sends status to the System Director. The

System Director displays this status on the Management Console. Errors and warnings are indicated in the System

Status Console (see “System Status Console” on page 14

). Expand the Status Console panel to see which component is causing the error or warning.

82

System Status History

The status messages describe system issues that might not be obvious because in most cases the ISIS system continues to function. However, Avid recommends that you correct any issues as soon as possible so that a more serious failure does not occur. The following table lists examples of messages that are displayed in the Status

Console panel.

Component

Power Supply (and fans)

Approved Network settings

Category

Error

Warning

Message Text

Power supply missing or failed

Incorrect network adapter settings

Description

One or more power supplies or fans have failed, are failing, are missing, or do not have a power cable plugged in.

One or more of the network adapters used for ISIS 1000 communication do not have the correct settings applied.

System Status History

The System Status History page displays the past 5 days (96 hours) of system status information collected by the

System Status Console. You can download the history as a zip file, and then send the file to Avid support for analysis.

To open the Status History page: t From the Management Console Home page, click System Status History, in the Tools section.

The System Status History page opens to the day of the first logged system event.

To see information on a system event:

1. In the Hours column, click the hour with the colored icon corresponding to the time and type of system event you want to see.

The Seconds column opens.

2. In the Seconds column click the second with the colored icon corresponding to the time and type of system event you want to see.

A snapshot image of the System Status Console, taken at the time of the logged event, is displayed.

To clear Status History Event flag: t Click Clear status history event flag.

The status event history panel indicator is cleared.

n

This command only clears the status event history indicator from the System Status Console. It does not remove any status event history entries.

To download the status history: t Click Download.

The status event history is saved to a file (named history.zip). When prompted to open or save the file, click

Save

. By default, the file is saved to the Downloads directory on the computer running the Management

Console. You can then send it to Avid support personnel.

83

Network Utilities

Network Utilities

The Network Utilities page in the Management Console provides you with the following standard utility tests:

• Network Statistics—displays statistics for IPv4 and IPv6, TCP and UDP

• Ping—allows you to test the connection between a system in the shared storage network and the

System Director

• Traceroute—allows you to verify the path between a system in the shared storage network and the

System Director n

You must have Administrator privileges to run the utility tests.

To open the Network Utilities page:

1. From the Management Console home page, click Network Utilities, in the Tools section.

The Network Utilities page opens.

2. Select Network Statistics, Ping, or Traceroute from the Command list.

3. Enter the network name or IP address of the target machine in the “Target name” field.

4. Click Submit to perform the command.

The results of the command are shown in the Results area.

System Director Information

The System Director Information page in the Logging section displays detailed information about your System

Director and network. You cannot edit the information displayed in the System Director Information window, but

you can change some Agent settings through either the Agent Settings page (see “Agent Settings” on page 101 ) or

the ISIS Agent (see

“Avid ISIS Agent” on page 102

).

To see System Director Information: t From the Management Console home page, click System Director Information, in the Logging section.

The System Director Information page opens. The System Director Information includes:

Server (System Director) status and ISIS software version

Server (System Director) details, including the maximum allowed number of clients

Metadata information, such as the creation time and how much is available and in use

A list of the processes currently running on the system

Agent environment, statistics, and configuration information (mostly for internal and Support use), some of which can be changed: see

“Agent Settings” on page 101 .

System Logs

The System Logs page provides a complete view of the system-generated events. You can filter the log reports to display messages in a particular category (WARNING vs INFO), by date, by the subsystem or Storage Controller that generated the event, or by words in the messages themselves.

The logs provide detailed status information that is especially useful to Avid Customer Support personnel for monitoring system status during prolonged operations.

84

Administration Logs

Displaying or Clearing the System Logs Page

Open the System Logs window to see and to clear event logs. Clearing the logs empties the log of all event entries and resets the logging process.

To access System Logging functions:

1. From the Management Console home page, click System Logs, in the Logging section.

The System Logs page opens.

2. In the Select Log list, select a file to display (the file named messages

, with no suffix, is the most recent; messages.1

is older than messages

, messages.2

is older than messages.1

, and so on).

3. Click View.

The selected log displays in the Logs panel.

To clear logs:

1. Click Clear.

2. Click OK.

The event log for the selected category is cleared, and logging is reset to start recording new events.

Administration Logs

Administration logs list all the actions performed on the ISIS system by any user with administrative privileges. You can filter the log reports by type of event, time, the user who performed the reported operation, or words in the messages themselves.

The logs provide an audit trail that is especially useful to Avid Customer Support personnel.

Using the Administration Logs

Administration Logs are records of Administrator actions reported by the Management Console, including informational messages (such as when upgrades occur), errors, and warnings. You can sort the log entries by column or filter them to show only a certain type of entry (for example, only errors). The log displays the following data for each event:

• Type — The categories are the following: Info, Error, Warning

• Time — The time of the logged event

• IP — The recorded IP address of the client or the System Director, depending on where the logged event happened

• User — Who initiated the event

• Message — Detailed information about the event

To see the Administration logs:

1. From the Management Console home page, click Administration Logs, located in the Logging section.

The Administration Logs page opens.

2. Do one of the following: t Click View to see the Administration logs.

t Click Download to download the Administration logs in Comma Separated Values (CSV) format.

85

ISIS Snapshots Page

3. (Option) To filter the log entries in the View Administration logs window: a. Type the appropriate keyword in a Filter text box.

b. Press Enter. To see all log entries, clear the text box and press Enter.

4. (Option) To refine your filtering, enter keywords into multiple Filter text boxes.

5. If the log contains more entries than it displays, use the Navigation controls to move through the log.

ISIS Snapshots Page

The ISIS Snapshots page lets you capture the current state of the system and store that information for later displaying or downloading. This information, coupled with the system logs collected by the Log Aggregator tool

(see “Log Aggregator Tool” on page 90 ), can be used by Avid Customer Support personnel to diagnose and

troubleshoot problems.

The following information is collected in an ISIS Snapshot:

• General information, such as the System Director (Storage Controller) name and the date the snapshot was collected, and the name of the zip file containing the snapshot

• The system component information (in .csv and .zip files), including any current warnings or errors and their details

• System Director status and metadata

• All currently configured system preferences

Creating, Displaying, and Deleting Snapshots

Snapshot files are saved in folder named with the timestamp of the snapshot and the System Director name — for example,

03-26-15 154950 ISIS-1000

.

Click Download to save the file to a computer.

To create a snapshot:

1. From the Management Console home page, click ISIS Snapshots, in the Logging section.

The ISIS Snapshots page opens.

2. Click New.

3. Enter a name for the snapshot or accept the default name (default) and click OK.

The snapshot is created and the details are displayed in the Snapshots window.

To see a snapshot:

1. By default, the most recent snapshot is displayed automatically. To see a different snapshot, select one from the list.

2. Click View.

The selected snapshot detail is displayed.

To delete a snapshot:

1. Select a snapshot from the list.

2. Click Delete.

A confirmation dialog window opens.

86

ISIS Snapshots Page

3. Click OK to confirm the deletion.

The selected snapshot is deleted.

To delete all snapshots:

1. Click Delete All.

A confirmation dialog window opens.

2. Click OK to confirm the deletion.

All snapshots are deleted.

Working with Snapshot Archives

When you create a snapshot, the ISIS Snapshots tool creates a folder which includes a compressed file containing all the collected information. You can combine snapshots into an archive to keep track of the system status — for example, you can archive snapshots weekly or monthly. The Snapshot tool compresses archives in a ZIP file

(archivename.zip).

Archives are stored in folders named with the time stamp of the snapshot and the System Director name — for example,

03-26-15 154950 ISIS-1000

. The compressed archive uses the same file name format as the snapshot folder.

You can download the archive in compressed form as a ZIP file by clicking Download.

To create a snapshot archive:

1. On the Snapshots page, click New next to Archives.

A confirmation dialog window opens.

2. Enter a name for the archive or accept the default name (default) and click OK.

3. Click OK to confirm building a new archive from all current snapshots.

The archive is created and listed in the Archives drop-down list. After you create an archive, the snapshots are no longer available to view and the message No Available Snapshots is displayed.

To delete a snapshot archive:

1. Select a snapshot archive from the list. (If there are no snapshot archives, the ISIS Snapshots page displays “No

Available Archives.”)

2. Click Delete.

A confirmation dialog appears.

3. Click OK to confirm the deletion.

The selected archive is deleted.

To delete all archives:

1. Click Delete All.

A confirmation dialog window opens.

2. Click OK to confirm the deletion.

All archives are deleted.

87

Avid ISIS Toolbox

Avid ISIS Toolbox

The Avid ISIS Toolbox is a collection of tools you can use to monitor and perform diagnostic operations on all your

ISIS hardware. The ISIS Toolbox is included in the ISIS software kit, but is not installed automatically. You can install it from the Management Console Installers link.

Installing the Avid ISIS Toolbox

To install the Toolbox:

1. In the Management Console, click Installers under the System heading.

The Installers page is displayed.

2. In the ISISTools section, click the Toolbox file appropriate for your operating system.

3. Save the file to your computer and install it.

Connection Analyzer Tool

The Connection Analyzer provides a quick look at the connection status of all Media Packs in the shared storage network.

88

Avid ISIS Toolbox

Connection Analyzer Tool

The Connection Analyzer displays connection status in a grid, using the following icons to denote the status of each

Storage Manager:

Icon Label

Session Active

Status

Source Media Pack has a session with the target Media Pack

Session Failed

No Connection

Source Media Pack does not have a session with the target Media Pack

Target Media Pack is not communicating with the System Director

Storage Server Not

Running

Microserver failure—Failure in the request from the Agent to the Media Pack for session information—for example, a failed request resulting from the Media Pack not running or the

Media Pack not servicing the request before it timed out

System Not

Responding

Communication failure—Unable to determine status—for example, the Agent is not running or there is a network problem between the Connection Analyzer tool and the Media Pack

To open the Connection Analyzer and test the connection status of Media Packs:

1. Install the ISIS Toolbox if it is not already installed. See

“Installing the Avid ISIS Toolbox” on page 88 .

2. Do one of the following: t (Windows) Select Start, then Avid, then Toolbox, then Avid ISIS Toolbox.

t (Macintosh) Select Applications, then AvidISISTools, then ISIS Toolbox.

If any site security warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your system administrator.

3. In the Login screen, enter the host name or IP address of your System Director (this might be filled in for you) and the Administrator password, then click OK.

89

Avid ISIS Toolbox

The Avid ISIS Toolbox opens.

4. Click Connection Analyzer from the left pane.

The Connection Analyzer window opens and checks the connection status of all Media Packs in the network.

The tool displays results in a color-coded grid.

Place your pointer over a block in the Connection States column to display a tooltip with details about the

Media Pack. This is useful when you have more Media Packs than can be displayed in the dialog box and you need to use the scroll bars to see a specific connection.

5. (Option) Click Info to display version information.

To update the status of Media Packs:

1. Click Start to update the status of Media Packs without reloading the entire list from the System Director.

2. (Option) To stop the status update operation, do the following: a. Click Stop.

A confirmation dialog appears.

b. Click Yes.

The update process stops and the main display returns to the previous result.

Log Aggregator Tool

The Log Aggregator tool, included in the ISIS Toolbox, allows you to collect a full set of the event logs and system statistics of a network, including active Media Packs and the System Director.

You can select which information — from the network, the System Director software, and Media Packs — you want to collect in the log reports. This provides you with a system record that you can use to see error and status messages. The logs provide detailed status information that is especially useful to Avid Customer Support personnel for monitoring system status during prolonged operations.

c

Do not use the Log Aggregator unless instructed to do so by Avid Customer Support. Improper use could result in system downtime or degraded performance.

90

Avid ISIS Toolbox

Using the Log Aggregator Tool

The Log Aggregator lists all components of the shared storage network in a tree view. You can see events:

• For all components in the shared storage network by selecting all active ISIS systems in the Selection window

(the highest level in the tree view).

• For any subset of components by selecting one or more entries in the Selection window (at a level lower than the ISIS Systems in the tree view).

n

You must run the Log Aggregator from a system with network access to the entire shared storage network.

Otherwise, the tool cannot collect logs for all systems connected to the network.

To open the Log Aggregator tool:

1. Install the ISIS Toolbox if it is not already installed. See

“Installing the Avid ISIS Toolbox” on page 88 .

2. On a computer with access to the entire shared storage network, do one of the following: t (Windows) Select Start, then Avid, then Toolbox, then Avid ISIS Toolbox.

t (Macintosh) Select Applications, then AvidISISTools, then ISIS Toolbox.

If any site security warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your system administrator.

The Avid ISIS Toolbox opens.

3. Click Log Aggregator in the left pane.

The Log Aggregator window opens.

91

Avid ISIS Toolbox

To close the Log Aggregator:

1. Click Close.

A dialog box opens asking you to confirm that you want to quit the Avid ISIS Toolbox.

2. Click Yes.

Creating Aggregate Logs

To use the Log Aggregator, you must have Administrative privileges and be logged into a system with access to the shared storage network.

To create logs with the Log Aggregator tool:

1. Open the Log Aggregator tool. (For information on opening the Log Aggregator, see

“Using the Log

Aggregator Tool” on page 91

.)

2. In the Selection window, do one of the following: t Select all active ISIS systems to see events from all components in the shared storage network.

t Select one or more components to see events from specific System Directors, Engines, Media Packs, and clients attached to the network.

3. Click Configure.

The Aggregation Options dialog box opens.

4. Choose the types of data you want collected in the event logs:

5. Click OK to close the Aggregator Options dialog box and return to the Log Aggregator.

6. (Optional) In the Output Directory text section, click Browse to navigate to a directory where you want the logs to be saved, if other than the default (

C:\Users\username

).

7. Click Start.

The progress bar indicates the status of the log aggregation. The Log Aggregator displays a Success icon

(green) or a Fail icon (red) for each system and component logged.

To cancel the log aggregation process, click Stop.

92

Avid ISIS Toolbox

Displaying Aggregate Logs

The Log Aggregator saves individual logs in a log directory called LogAggregator_date-time at the location indicated in the Output Directory section in the Log Aggregator. Subdirectories include separate logs for each component in the network for which you created logs. The Log Aggregator also creates a compressed file containing all logs in the top-level folder (aggregator_results.zip). You can forward this compressed file to your Avid representative if requested by Avid Customer Support.

To see saved logs:

1. Navigate to the directory where the Log Aggregator saved the collected logs.

2. Double-click the file name of the log you want to see.

Disk Analyzer Tool

The Disk Analyzer runs basic disk performance tests on your Media Packs.

The tests include the following, which you can run in either Sequential or in Random access mode:

• Read test

• Write test

• Read/Write test

• Erase test

You can also use the Disk Analyzer to collect statistics on the status of Media Packs and network use, including the statistics generated by Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) and by local Media Pack processes — for example, statistics on Long Command Times (LCT).

n

S.M.A.R.T. data is also available through the Log Aggregator tool.

You can run the Disk Analyzer on more than one Media Pack at a time; however, running the tests might degrade performance on the shared storage network.

c

Do not run the Disk Analyzer unless instructed to do so by Avid Customer Support, and only during a maintenance window.

Opening the Disk Analyzer Tool

To open the Disk Analyzer tool:

1. Install the ISIS Toolbox if it is not already installed. See

“Installing the Avid ISIS Toolbox” on page 88 .

2. Do one of the following: t (Windows) Select Start, then Avid, then Toolbox, then Avid ISIS Toolbox.

t (Macintosh) Select Applications, then AvidISISTools, then ISIS Toolbox.

If any site security warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your system administrator.

The Avid ISIS Toolbox opens.

93

3. Click Disk Analyzer in the left pane.

The Disk Analyzer window opens.

Updating the Disk Analyzer Tool Display

To update the display: t Click Refresh.

Running Disk Analyzer Tool Tests

To run a test on the Disk Analyzer:

1. Open the Disk Analyzer.

2. From the Action drop-down list select one of the following:

94

Avid ISIS Toolbox

Avid ISIS Toolbox

Execute disk tests

Collect disk statistics

Collect network statistics

3. In the Selection window, do one of the following: t Select all active ISIS systems to test all Media Packs in the shared storage network.

t Select one or more Media Packs to test specific components in the network.

4. Click Start.

If you selected Execute disk tests, the Disk Test Options dialog box opens.

5. Configure the appropriate options for the test you want to run.

Option

Test Type

Access Mode

Duration

Refresh Rate

Reattach to existing tests

Description

The type of test to be performed: Read, Write, Read/Write, or Erase.

Perform sequential or random access test

Test duration either in minutes or number of passes (specify the number of minutes or passes in the text field)

Slider bar to specify how often to refresh the test status

By default, starting a new test will abort any currently running tests and clear any existing results. Select this option to resume any currently running tests and retain the results

6. Click OK to close the Disk Test Options dialog box and return to the Disk Analyzer.

Results of the test display in the Results area.

7. To stop the test at any time, click Stop.

Saving Disk Analyzer Test Results

You can save the results of the Disk Analyzer tests to your local system. The test results are saved in comma separated value (CSV) format.

To save the results of the Disk Analyzer tests:

1. Click Save Results.

The Save Results window opens.

2. Browse to the location on your local system where you want to save the test results and click Save.

The test results are saved to the specified location.

Media Pack Parameters Tool

The Media Pack Parameters tool, included in the ISIS Toolbox, allows you to set and retrieve Media Pack logging flags. This status information is useful to Avid Customer Support personnel for monitoring system status during prolonged operations.

c

Do not use the Media Pack Parameters tool unless instructed to do so by Avid Customer Support. Improper use could result in system downtime or degraded performance.

95

Avid ISIS Toolbox

Using the Media Pack Parameters

The Media Pack lists all components of the shared storage network in a tree view. You can see events for:

• All components in the shared storage network — Select all active ISIS systems in the Selection window (the highest level in the tree view).

• Any subset of components — Select one or more entries in the Selection window (at a level lower than the ISIS

Systems in the tree view).

n

You must run the Media Pack Parameters tool from a system with network access to the entire shared storage network. Otherwise, the tool cannot collect logs for all systems connected to the network.

To open the Media Pack Parameters tool:

1. Install the ISIS Toolbox if it is not already installed. See

“Installing the Avid ISIS Toolbox” on page 88 .

2. Do one of the following: t (Windows) Select Start, then Avid, then Toolbox, then Avid ISIS Toolbox.

t (Macintosh) Select Applications, then AvidISISTools, then ISIS Toolbox.

If any site security warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your system administrator.

The ISIS Toolbox opens.

3. Click Media Pack Parameters in the left pane.

The Media Pack Parameters window opens.

96

Avid ISIS Toolbox

To close the Media Pack Parameters tool:

1. Click Close.

A dialog box opens asking you to confirm that you want to quit the Avid ISIS Toolbox.

2. Click Yes.

Retrieving Media Pack Flag Parameters

To use the Media Pack Flag Parameters, you must have Administrative privileges and be logged into a system with access to the shared storage network.

To retrieve the Media Pack Parameters:

1. Open the Media Pack Parameters. (For information on opening the Media Pack, see

“Using the Log Aggregator

Tool” on page 91 .)

2. In the Selection window, do one of the following: t Select all System Directors to see events from all components in the shared storage network.

t Select one or more Media Packs to see events from specific System Directors.

3. Click Configure.

The Media Pack Parameters dialog box opens.

4. Configure the following options to retrieve data:

Option Description

No filtering Selects all of the parameters listed in the Media Pack Parameters window.

All other Media Pack Parameters Allows you to specify the data to collect by selecting one or more parameters

Log Level and Throttle Do not change the Log Level or Throttle setting unless instructed to do so by Avid

Customer Support. Improper use could result in system downtime or degraded performance.

97

Avid ISIS Toolbox

5. Click OK to close the Media Pack Parameters dialog box.

6. Click Start.

The Media Pack displays the retrieved information.

Media Pack Log Viewer

The Media Pack Log Viewer is a utility that displays event information about Media Packs. You cannot save the information displayed in the Log Viewer, but you can copy it to a word processing application, such as Notepad.

You can also save event logs displayed in the Logging tab. The information is used primarily by Avid Customer

Support personnel to help analyze problems with Media Packs.

To use the Media Pack Log Viewer:

1. Install the ISIS Toolbox if it is not already installed. See

“Installing the Avid ISIS Toolbox” on page 88 .

2. Do one of the following: t (Windows) Select Start, then Avid, then Toolbox, then Avid ISIS Toolbox.

t (Macintosh) Select Applications, then AvidISISTools, then ISIS Toolbox.

If any site security warnings open, click Yes to accept the certificate. If you are not sure about the security requirements of your shared storage network, see your system administrator.

The ISIS Toolbox opens.

3. Click Media Pack Log Viewer in the left pane.

The Log Viewer opens.

n

If the ISIS system has no Media Pack event logs, nothing is displayed.

98

Creating a Metadata Dump File

4. Select an option as described in the following table.

Icon

(None)

(None)

Option

Resume

Pause

Clear

Resync

Autoscroll

Refresh Rate (sec)

Description

Resumes monitoring Media Pack events

Stops monitoring Media Pack events

Clears all event data from the Console View tool

Restores previously-cleared event data to the Console View tool

Scrolls the display to the bottom of the page

Sets the rate at which the Console View tool refreshes event data

Creating a Metadata Dump File

To help you resolve a problem with your system, Avid Customer Support might ask you to dump the system metadata to a file. This file, named

PartitionDump.txt

, is very large and can take a long time to create.

n

Perform this operation only as a diagnostic aid. You cannot restore metadata from a metadata dump file.

To create a metadata dump file:

1. From the Management Console Home page, click System Settings in the Advanced section.

By default, the System Settings tool opens on the File System page.

2. Click Other.

99

Restoring the File System--SUPPORT USE ONLY

3. Click Dump Metadata, then click Apply.

Avid support personnel can retrieve the file from your ISIS system.

Restoring the File System--SUPPORT USE ONLY

Use this procedure only with guidance from Avid Customer Support. You might be advised to restore the file system if the System Director cannot find and load a valid partition file. The Status panel in the Management Console displays the following messages: c

Restoring a file system from a backup metadata file is a destructive process. You might will lose all files,

Workspaces, and other objects. In addition, the Administrator password reverts to the password that was in use as of the metadata file you restore from, or to the factory default.

To restore the file system from a metadata file:

1. In the Management Console, click System Settings.

2. Click Create File System From Import.

3. Select a PartitionDump.bin file from the Metadata Files list; in general, use the most recent file. Work with Avid

Support to determine the best file to use.

4. Click Apply.

A confirmation screen appears, asking you to confirm the operation, which will destroy all existing data on the

ISIS 1000 system, and create a new file system using the data in the file.

Confirmation Message to Create File System from Import

100

Agent Settings

5. Click OK to continue.

The Results panel displays the following messages:

Working... Creating active file system from filename

Success... Created File System from Import File.

6. Your Avid Support representative will help you with the next steps, which might include re-creating Storage

Groups, Workspaces, and user accounts.

Agent Settings

The ISIS 1000 Management Console includes several tools for displaying the System Agent statistics and configuration information, and for configuring advanced options.

n

These tools should not be used except under the advice and supervision of Avid support personnel.

• Use Agent Options to modify Agent configuration options such as timeouts and session settings.

• Use Agent Trace Setup to configure trace settings for connections, HTTP requests, SSL callbacks, and threads.

For detailed information on the ISIS Agent, see “Avid ISIS Agent” on page 102 .

101

A

Avid ISIS Agent

For most day-to-day operations and system monitoring, use the management Console. To perform more advanced operations, such as changing the logging properties or the network configuration, or to see more detailed information about system components, use the ISIS Agents. Not all of the Agent functionality is described here; some is for Customer Support use only, or with their guidance. n

You must have Administrator privileges to access the Agent.

Opening the ISIS Agent

The Agent runs as a Web service and can be opened from the following pages:

• Engine Details: Storage Controllers, Media Packs, and Disks

• Storage Controller Details: Media Packs, IP Addresses

• Media Pack Details: IP Addresses and Disks

Alternatively, you can open a browser window and enter the IP address of a Storage Controller, in the format: https://ip_address:5015/

The default Agent password is se-admin

. To change it, see

“Changing the Agent Password” on page 106 .

On any ISIS system, you can also use the ISIS Administrator password to access the Agent. If you are already logged in to the Management Console, you are automatically logged in to the Agent when you open it. This is known as single sign-on.

To open the ISIS Agent:

1. In the Management Console, click Engines, or Storage Controllers, or Media Packs.

2. Double-click an item in the list to open the Details pane.

3. Do one of the following: t In Engine Details, double-click a Storage Controller name or a Media Pack name.

t In Storage Controller Details, double-click a Media Pack name or an IP address.

t In Media Packs Details, double-click an IP address or a Disk name.

4. If you see a warning about the website security certificate, click Continue.

The Agent page opens.

Understanding the Agent Interface

In the ISIS Agent interface, controls are grouped by function and are displayed by clicking the appropriate buttons.

The following figure illustrates the ISIS Agent with the System tab selected.

102

Understanding the Agent Interface

The Agent interface is divided into the following areas:

3

4

Callout Description

1

2

Command menu—Contains the options used for basic management functions.

Tabs—You can access different Command functions by clicking the tabs at the top of the Agent tool. The System tab is selected by default.

Logout link

Main display area—Displays information about your network and in some cases allows you to configure components.

System Tab

The System tab lists general information about component status, version, and usage. The Configuration section contains links that let you set and change general system, networking, and interface values. n

Some changes require a system reboot. When an action might cause the system to reboot, a confirmation dialog is shown, allowing you to continue with the operation or cancel.

Statistics Tab

The Statistics tab displays basic information about your network or network components and provides statistics for the local system and for the Media Packs. The Media Pack Disk Statistics page displays detailed information about the performance of the Media Pack disks.

103

Changing the Storage System Name

Tools Tab

The Tools tab lets you perform tests to evaluate the function of the network and disk operations. These tools are used primarily by Avid Customer Support to diagnose problems with components of the shared storage network.

Logging Tab

The Logging tab provides a complete view of the system logs. The logs provide a snapshot of error and status messages, and are especially useful to Avid Customer Support personnel for monitoring system status during prolonged operations.

Advanced Tab

The Advanced tab contains agent configuration utilities and diagnostic tools for Avid Customer Support personnel to troubleshoot problems with the shared storage network. From this tab, you can also shut down or restart the

Storage Controller. c

Using the tools in the Advanced tab can result in degraded system performance or loss of data. The tools should be used only by Avid Customer Support personnel or under Avid Customer Support direction.

c

Never use the Command field to change the administrator password; doing so can prevent all future log-ins.

Changing the Storage System Name

You can change the Storage System Name; for example, you spelled it wrong during initial system setup, or you want it to be more descriptive (clients see the Storage System Name in the Client Manager, and connect to the ISIS by its Storage System Name).

The name can be up to 31 English alphanumeric characters long, any combination of upper and lower case (a-z and

A-Z), can contain a dash or hyphen (-), and must start and end with a letter or number.

Renaming the system requires a reboot. You might want to perform this change when clients are not connected and actively using the system.

To change the Storage System Name:

1. Alert clients that the system name will change and the system will reboot.

2. On the System tab, click General (under Configuration).

3. Enter a new name into the Storage System Name field, then click Submit.

A confirmation message is displayed stating that the system might reboot. To continue, click OK.

If you click OK, the Agent displays a message that it is applying the changes. When the system reboots, a message is displayed stating that the system is rebooting and will attempt to reconnect. The amount of time remaining until reconnection is displayed and counts down in real time.

When the remaining time has elapsed, you can log into the Agent (or the Management Console) again.

4. Clients can reconnect to the system using its new name. Tell users they might need to refresh the host list in the

Client Manager to see the new name.

104

Changing the Host Name

Changing the Host Name

You can change the host name, which is the name of the System Director. In a single-Engine configuration, the

System Director runs on the Storage Controller. In a multi-Engine configuration, the System Director runs on the

Storage Controller in the first Engine that was set up to create the shared storage system.

The name can be up to 25 English alphanumeric characters long, any combination of upper and lower case (a-z and

A-Z), can contain a dash or hyphen (-), and must start and end with a letter or number.

Renaming the System Director requires a reboot. You might want to perform this change when clients are not connected and actively using the system.

To change the host name:

1. Alert clients that the system will reboot.

2. On the System tab, click General (under Configuration).

3. In the Basic Network Configuration section, enter a new name in the Hostname field, then click Submit.

A confirmation message is displayed stating that the system might reboot. To continue, click OK.

If you click OK, the Agent displays a message that it is applying the changes. When the system reboots, a message is displayed stating that the system is rebooting and will attempt to reconnect. The amount of time remaining until reconnection is displayed and counts down in real time.

When the remaining time has elapsed, you can log into the Agent (or the Management Console) again.

Changing the Enclosure ID

Setting an enclosure ID is optional. The enclosure ID is displayed on the front of the Engine, in the LED panel on

the left side (see “Engine List” on page 67 ). During initial system setup, you have the option of setting an Enclosure

ID. You can change (or delete) it at any time, with no effect on the system operation.

To set, change, or delete the Enclosure ID:

1. On the System tab, click General (under Configuration).

2. Enter a new value for the Enclosure ID in the field, or delete existing text to delete the current ID.

3. (Option) If you make a mistake, click Reset to clear all the fields. Nothing is changed.

4. Click Submit.

Configuring DNS Service

If your network environment includes one or more Domain Name servers, you can add the ISIS system to the DNS service, and add the DNS domain to the ISIS. This enables you to open the Management Console using the System

Director host name, as an alternative to the IP address. Enabling DNS also allows you to use LDAP for external user

authentication; for more information, see “Configuring External Authentication of Users” on page 26

.

To configure DNS:

1. Open the ISIS Agent. (For more information, see “Opening the ISIS Agent” on page 102 ).

2. On the System tab, click General under the Configuration heading.

3. In the Basic Network Configuration area, enter the following information:

105

Setting the System Time

The DNS domain you want the ISIS system to join

One or more IP addresses for the DNS servers in your environment, separated by spaces

(Optional) Additional domains in your environment (if applicable) to search through when trying to resolve a host name.

4. Click Submit.

If you enter an invalid IP address, an error message is displayed.

5. Make sure to add the ISIS system to your DNS service. Only then will you be able to log into the ISIS

Management Console using the System Director host name.

Setting the System Time

You can configure the system time manually or use one or two external NTP servers. (If you configure an NTP server and enter the system time manually, the NTP server takes precedence.)

You typically set the system time or configure NTP servers during initial system setup, but you can change the system time or the NTP server information (for example if the IP address of an NTP server changed) at any time, with no effect on the system operation.

To set system time, or add or change and NTP server:

1. On the System tab, click Time (under Configuration).

2. To configure an NTP server, check the box and enter the IP addresses or host names for up to two NTP servers on your network.

3. To set the date and time manually, enter the current date and time in the fields, and choose a time zone from the list.

4. Click Submit.

A confirmation dialog box opens indicating that the system might have to reboot. Click OK to continue or

Cancel

to stop. If you changed the time zone and canceled the operation (for example, to wait for a better time to reboot), click Reset to restore the previous time zone setting.

Changing the Agent Password

By default the Agent password is set to se-admin

. Avid recommends changing this password the first time you use the Agent page.

c

In a multi-Engine configuration, change the Agent password on all Engines, and use the same password on all.

To change the Agent password:

1. On the System tab, click Administration (under Configuration).

2. Type the current password in the “Current Password” field.

3. Type the new password in the “New Password” field.

4. Type the new password in the “New Password” field.

5. (Option) If you make a mistake, click Reset to clear all the fields. Nothing is changed.

6. Click Submit.

106

Shutting Down the System

Shutting Down the System

Under normal working conditions, you will not need to shut down the system. All the components are hot-swappable, so that if a piece of hardware fails (a drive, power supply, or fan) you can replace it while the system remains running.

However, if you need to move the Engine to a different location or if it will be unused for an extended period, you can shut it down.

To shut down the system:

1. Alert all clients to stop using and unmount all Workspaces.

2. Open the Agent. For more information, see “Opening the ISIS Agent” on page 102 .

3. Click the Advanced tab.

4. Under System Tools, click Shutdown.

The Agent page displays the message

Confirm shutdown request

, and a field in which you must enter the

Administration password to continue.

5. Enter the Administrative password, then click Shutdown.

A message is displayed that the system is shutting down. When it does, the Agent page closes, the Management

Console closes (if open), and all clients are disconnected from the system.

6. Optionally, turn off the switches on both power supplies and disconnect the power supplies from mains power; for example, if you are going to physically relocate the system.

Restarting the System

You can restart the system after a clean shutdown.

To restart the system, do one of the following: t If the power supplies are not plugged in to mains power, connect them.

t If the power supplies are still connected to mains power, turn off the switches for a few seconds, then turn them on again.

The system begins its power on self test (POST) processing, and after several minutes the fans start running at full speed. After a few more minutes, the system becomes available on the network and you can open a browser and log into the Management Console.

107

Index

A

Access privileges

and duplicating users 51

effective 46

for Workspaces, setting

47

managing 46

new users

51

Account Synchronizer (LDAP Sync tool)

55

Active clients

78

Adding

Devices 65

groups 62

LDAP/Active Directory groups

57

Storage Groups 37

User groups 62

Users

51

Workspaces

41

Administration Logs about

85

described

17

, 85

displaying

85

downloading

85 filtering 85

tool 17

Administrator password

Agent, changing 106

Agent, default

106

changing or setting 30 forgotten 30

tool 16

Agent

Advanced tab 104

Configuration menu (System tab) 103

default password 102 interface 102

Logging tab 104

opening 102

options 101

password, changing 106

Single sign-on support 102

Statistics tab

103

System menu (System tab) 103

Tools tab

104

Trace Setup tool 17

Aggregate logs

90 ,

91

, 95

options 92

Allocating Workspaces 41

Auto Refresh

enabling and disabling 20

Auto-Rectify

23

default value

23

Management Console preferences

23

Avid online support

11

training services

11

Avid Help

See

Help

Avid Management Console

See

Management Console

B

Bandwidth

aggregate 79

displaying 64

limiting

65

monitoring 78

monitoring reservations 81

reservations

81

system 79

Bandwidth Limits tool 64

adding clients or devices

65

deleting clients or devices 66

described 16

Bandwidth Limits, managing 64

Client Bandwidth tool

See also

active clients

Binding Media Packs 26

,

26

BMC

changing password 31

version

70 ,

74

C

Changing

Agent password

106 , 106

Bandwidth Limits 64

BMC password

31

device properties

65

Enclosure ID 105 hostname 105

LDAP Sync tool display 56

Storage System Name 104

System Director name 105

System passwords

31

user groups

62

users 52

Workspace access privileges 47

Workspace size

43

Clearing

LDAP Sync tool History log 59

Network Degraded status messages 75

status event history 83

system logs 85

Client Bandwidth tool described

78

, 79 scaling graph display 79

Clients

active 78

adding

65

deleting 66

monitoring bandwidth 78

renaming

65

Closing

Groups tool Details panel 63

LDAP Sync tool 59

Log Aggregator tool 92

Storage Groups tool Details panel 38

Users tool User Details panel 53

Workspaces tool Details panel

40

Columns

LDAP Sync tool 56

,

56

moving

18

showing and hiding

19

sorting

19 sorting (multi-level) 19

Configuring contact information (Notification service)

29

DNS service

105 , 105

External Authentication

26

Notification Service 27

NTP servers

106

Connecting to servers (LDAP Sync tool) 59

Connection Analyzer tool

See also

Toolbox

checking connection status

89

described

88

opening 89 status icons 89

Connection Status tool described

16

, 79

,

80

Contact information (Notification service)

29

Context menus

21

Copying users

51

Creating aggregate logs

92 , 92

devices

65

ISIS file system 25

metadata dump text file 99

snapshot archives 87 , 87

snapshots

86

Storage Groups 37

user groups 62 , 62

users

51

Workspaces

41

109

Index

Customizing the Management Console 18

D

Default

Agent password

102

, 106

Bandwidth for Auto Created Devices

23

Hard Disk Error Threshold

23

Hard Disk Error Threshold value 23

LCT Threshold 23

Management Console password

12

Delete Logging

23

default value

23

Deleting

all snapshots 86

clients 66

devices

66

snapshot archives

87

Storage Groups

38

system snapshot

86

user groups

63

Users 52

Workspaces 45

Devices adding

65

deleting

66

modifying 65

renaming

65

Disabling users

53

Disconnecting clients from LDAP server (LDAP Sync tool)

59

Disk Analyzer tool

described 93

disk test options 95

Media Pack statistics 93

opening

93

running disk tests 94

saving results

95

updating display 94

Disk S.M.A.R.T. (Self-Monitoring, Analysis, And Reporting

Technology)

See

Disk Analyzer tool

Displaying

Administration logs 85

aggregate logs 93

bandwidth limits

64

Bandwidth Limits details

65

Client Bandwidth reservations

81

connection status 89

Engine details

67

LDAP Sync tool History log

59

Media Pack details 38

,

73

Media Pack statistics 93

Storage Group details

38 , 38

System Director information

84

system status history events 83

user details 53

user group details

63

Workspace details 40 , 40

DNS service about

105

configuring

105

Documentation

11

Downloading

Administration Logs

85

snapshot archives 87

System event history

83

Dumping system metadata (text file)

99

Duplicating users

51

Workspaces

42 , 42

E

Email Address (Notification service setting)

28

Email notifications

See

Notification service

Enclosure ID

setting or changing 105

Engines

Details panel

68

displaying information about

68

enclosure ID 67

information about

67 managing 67 page 67

removing

69

System Director indicator 67

upgrading

68 , 68 , 68 , 68

Entering text

22

Error notification

configuring parameters (Notification service) 29

Notification service

27

Event triggers described

45 setting 45

External Authentication configuring

26

described

26

See also

Avid LDAP Account Synchronizer

External Authentication tool 17

,

26

F

File system binding Media Packs

26

creating 25

restoring

100

unbinding Media Packs

75

Filtering

Administration logs

85

information 20 limitations 20 resetting 20

110

Force Manual Device Creation 23 , 23

G

General preferences

23

Groups

See also

Storage Groups

See also

User Groups

Groups tool

closing Details panel 63

described 16 ,

60

displaying group details

63

hiding user membership panel

63 hiding Workspace Access panel 63

modifying user groups

62

user membership panel

63

Workspace Access panel 63

Guest account (default) 51

H

Help

accessing 18 menu 18

Hiding

Groups tool user membership panel 63

Groups tool Workspace Access panel 63

Users tool Details panel 53

History Data Collection

23

default value

23

Hostname

changing 105

maximum length

105

valid characters

105

I

Illegal characters 22

Importing incorrectly formatted UIDs (LDAP/AD)

59

Installers tool 16

Installing

LDAP Sync tool

54

Invalid characters 22

ISIS Agent

System menu (System tab)

103

ISIS infrastructure

securing 31

ISIS Snapshots tool

collected information 86 described 86

using

86

L

LDAP (Lightweight Directory Access Protocol) external authentication

26

Index

remote LDAP users 26

See also

LDAP Sync tool

LDAP Sync tool

See also

External Authentication

account list and selections report

57

Account Synchronizer 55

adding LDAP/Active Directory groups 57

clearing History log 59 closing 59

columns resizing

56 sorting 56

compatibility 54

connecting and disconnecting from servers

59

described

53

displaying History log

59

importing users with bad UIDs

59

installing 54 login information storage 54

modifying display

56

group reconciliation actions

58

opening 54

printing History log 59 reconnecting to ISIS system 59

removing LDAP/Active Directory groups

58

resizing columns 56

sorting columns

56

synchronization status icons

55

synchronizing accounts 56

synchronizing LDAP/Active Directory groups

58 user list and selections report 58

using 55

Limiting bandwidth

65

Log Aggregator tool

Administrative privileges 92

aggregate log options

92 closing 92 creating aggregate logs 92

described

90

, 91

,

95

displaying aggregate logs

93

event logs 91 ,

96

opening 91

Output directory

92

, 93 output format 93

using 91

Logging preferences 23

Logs administration

85

aggregate

90 ,

91

, 95

Media Pack

98

system

85

M

Main tools panel described

16

111

Management Console

See also

Management Console tools

Adobe® Flash® player

13

Auto Refresh 20

Auto-Rectify

23 , 23 configuring preferences 23

context menus 21

customizing 18

Default

LCT Threshold 23

default

Bandwidth for Auto Created Devices

23

Hard Disk Error Threshold

23

password

12

Delete Logging

23

described 13

entering text 22 , 22

filtering information 20 , 20

Force Manual Device Creation

23

forgotten Administrator password

30

Help menu

18

History Data Collection

23

Home page 12

log in

12

log out

12

logging 84 ,

85

Media Packs tool

71

moving columns 18

navigation toolbar

16

non-administrative login 12

opening (as Administrator)

12

organizing display information 18

password (default) 12

See

Management Console selecting items

21

session counter 18

setting Administrator password

30

Show status before login 23

showing and hiding columns 19 sorting information 19

supported web browsers 12

System Status Console 14

text guidelines 22

tools overview 16

Total System Bandwidth 23

updating information (refresh)

20

using

13

Management Console tools 16

Administration Logs 17

, 85

Administrator Password

16

, 30

Agent Options 101

Agent Trace Setup

17 ,

101

Bandwidth Limits 16

, 64

Client Bandwidth

78

Connection Status

16

Connection Status tool

79

Engines

67

Index

External Authentication

17 ,

26

Groups 16

Hardware Monitor tool 82

Installers 16

ISIS Snapshots

16

ISIS Snapshots tool

86

LDAP Sync tool 53

Network Utilities

17

Network Utilities tool 84

Notification Service 17 ,

27

Preferences

17 ,

23

Reservations

16

Reservations tool

81

Storage Groups 16

System Director Information

16

System Director Information tool

84

System Logs 16

System Logs tool

85

System Status

16

System Status History tool

83

Toolbox

88

User groups tool 60

users tool 48

Workspaces

16

, 39

Managing

access privileges 46

Bandwidth limits

64

Engines 67

Media Packs 71

Storage Controllers 70

Storage Groups 35

user groups 60

users

48

Workspace access privileges

46

Workspaces

39

Media Pack Agent

System tab 103

Media Pack Log Viewer

98

Media Pack Parameters

opening 96

retrieving

97

Media Packs about

71

binding

26 binding to file system 26

displaying statistics 93

list

72

managing 71

Parameters tool 96

rectifying files

76 removing orphans 76

status messages 74

unbinding

75

Media Packs tool

clearing Network Degraded status 75

displaying details 73 icon colors 73

112

Metadata partition dump text file (PartitionDump.txt)

99

Metadata dump file (PartitionDump.txt) 99

Modifying

clients 65

devices

65

group reconciliation actions (LDAP Sync tool)

58

LDAP Sync tool display 56

user groups

62

users 52

Monitoring bandwidth

78

bandwidth reservations 81

system connection status 79

Moving columns 18

Multi-level sorting (columns) 19

N

Names invalid characters

22

maximum length

22

valid characters

22

Navigation toolbar

16

current tool heading

16 described 16

Home link 16

related links section

16

Network Degraded status, clearing 75

Network statistics

See

Network Utilities tool

Network Utilities tool

17

Administrative privileges 84

described 16

opening

84

using

84

Non-permitted characters

22

Notification Service

configuring 27

,

28

Email Address setting

28

error notification parameters

29

Poll Frequency setting

28

SMTP Port setting

27

SMTP Server setting 27

starting

28

stopping

28

testing settings

28

Notification service tool

27

NTP servers, configuring

106

O

Online support

11

Opening

Agent

102

Disk Analyzer tool 93

Index

LDAP Sync tool 54

Log Aggregator tool 91

Management Console (as Administrator) 12

Media Pack Parameters tool 96

Network Utilities tool 84

Toolbox

89 ,

91

, 93

Organizing display information

18

Orphaned Media Packs tool

76

P

Passwords

See

Administrator password

See

Administrator password (Agent)

See

User passwords

Agent 102

BMC

31 changing all 31

maximum length 22

ping tool

See

Network Utilities tool

Poll Frequency (Notification service setting)

28

Preferences

Auto-Rectify 23 general 23

logging

23

Preferences tool 17

Printing

account list and selections (LDAP Sync tool) 57

LDAP Sync tool History log 59

user list and selections (LDAP Sync tool)

58

R

Reconciling used space reporting 23

Rectifying files 76

Remote LDAP users

26

Removing

Engines 69

LDAP/Active Directory groups (LDAP Sync tool)

58

Media Packs 75

Orphaned Managers 76 orphaned Media Packs 76

Renaming

clients 65

devices

65

user groups 62

users

52

Workspaces

43

Reports

account list and selections (LDAP Sync tool) 57

user list and selections (LDAP Sync tool)

58

Reservations

See

bandwidth reservations

113

Reservations tool

16

, 81

Resetting filters 20

Resizing Workspaces

43

Restarting the system 107

Restoring file system

100

System Director

100

Right-click menus

See

context menus

Running Disk Analyzer tests

94

S

Saving Disk Analyzer tool results

95

Scaling Client Bandwidth tool graph display 79

Securing the ISIS system 31

Selecting multiple items

21

Session Counter behavior

18

location

18

resetting

18 user session 18

Session, preventing timeout 20

Setting

Administrator password 30

Agent password

106

Enclosure ID 105

event triggers

45

system time 106

Workspace access privileges 47

Settings

External Authentication 26

Management Console 23

Notification Service

28

Show status before login

23

default value

23

Showing and hiding columns 19

Shutting down the system 107

Single Sign-on to Agent

102

SMTP

Port

27

Server

27

Snapshots

See

ISIS Snapshots tool

Snapshots tool

creating snapshot 86

creating snapshot archives

87

deleting snapshot 86

deleting snapshot archives 87

described 16

downloading archives 87

file name format

86

Log Aggregator tool

86

output format

86

snapshot archive file location

87

snapshot archive file name format

87

snapshot archives

87

Index

snapshot archives described 87

snapshot file location 86

Sorting

information 19

LDAP Sync tool columns

56

Starting the Notification Service

28

Status icons

Connection Analyzer tool 89

LDAP Sync tool 55

Media Packs 73

Status messages

Hardware Monitoring

82

Log Aggregator

90

Media Packs 74

Network Degraded, clearing

75

Stopping the Notification Service 28

Storage Controllers

managing 70

restarting 107 shutting down 107

upgrading 71

Storage Groups

creating 37

deleting 38

maximum number 37

removing Media Packs

38

Storage Groups page 35

Storage Groups tool closing Details panel

38

creating Storage Groups

37

described

16

Details panel

38 displaying details 38

Storage Groups list 36

Storage System Name

changing 104 maximum length 104 valid characters 104

Synchronizing

LDAP/Active Directory and users 56

LDAP/Active Directory groups

58

System

shutting down 107

starting

107

System Director

changing name of 105

chassis information 70

configuring DNS service

105

error notification 29

hardware status reporting 82

identifying

67

indicator

67

IP address 12

ISIS Snapshots tool

86

maximum name length

105 name, valid characters 105

no regional language support

22

114

restoring file system 100

status summary

14

upgrading

68

System Director Information tool

16

, 84

,

84

System Logs

about 84

clearing

85 displaying 85

System Logs tool 16

System security 31

System Status Console 14 accessing 14 configuring 14 console panels 14

current system status panel

14 described 14 , 14

expanding/collapsing panels

14 status event history panel 14

status retrieval panel

14 storage capacity panel 14

System Status History tool

83 clearing status event 83

described 16

displaying system events 83

downloading file

83

file, where saved

83

opening

83

System time, setting 106

T

Text fields

guidelines 22

non-permitted characters

22

Toolbox

See also

Connection Analyzer tool

See also

Disk Analyzer tool

See also

Log Aggregator tool

described 88

Media Pack Parameters 96

opening

89 ,

91

, 93

Tools

diagnostic 88 ,

93

Log Aggregator 90

logging 84 ,

85 ,

90

, 95 ,

98

Storage Group management

35

Workspace management 39

Total System Bandwidth

bandwidth capabilities 23 default values 23

traceroute tool

See

Network Utilities tool

Index

Training services 11

Troubleshooting 11

U

Unbinding Media Packs

75

Updating Disk Analyzer tool display

94

Upgrading

Engines 68 , 68 , 68 , 68

Storage Controllers 71

System Director 68

User Access panel 41

User groups

adding 62 , 62

deleting 63

managing 60 , 60

modifying

62

setting Workspace access privileges 47

synchronizing (LDAP Sync tool) 53

, 56

Workspace access privileges

46

Users adding

51 , 51 copying 51

creating accounts

51

deleting 52

disabling 53

duplicating 51

effective access privileges

46

Guest 51

list

49

managing 48

modifying

52

remote LDAP

26

setting Workspace access privileges 47

synchronizing (LDAP Sync tool) 53

, 56

Workspace access privileges described 46

Users tool 48

closing User Details panel 53

described

16

Details panel

50

, 53 hiding User Details panel 53

user list

49

Using

ISIS Snapshots tool

86

LDAP Sync tool 55

Log Aggregator tool 91

Log Viewer tool 98

Management Console

13

Network Utilities tool 84

W

Workspace privileges

effects of changing 46

Workspaces

adding 41 allocating 41

115 changing privileges

47

chunk size 41

creating

41

default size 42

deleting

45

duplicating

42

event triggers

45

graphical display

44

list 40

managing

39

minimum Workspace size

42

naming rules

22

renaming

43

resizing

43

setting access privileges 47

setting effective user access 46

setting event triggers 45

setting privileges

47

size graph 44

system limit

41

user access privileges 46 , 46

user group access privileges

46 , 46

Workspaces tool

described 16

Details panel, closing

40

Details panel, opening

40

size graph 44

User Access panel

40

Index

Avid

75 Network Drive

Burlington, MA 01803-2756 USA

Technical Support (USA)

Visit the Online Support Center at www.avid.com/support

Product Information

For company and product information, visit us on the web at www.avid.com

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents