DataMan. version 3.7.0

Size: px
Start display at page:

Download "DataMan. version 3.7.0"

Transcription

1 DataMan version 3.7.0

2 Contents DataMan User Guide 1 Overview 1 Introduction 1 DataMan 1 Technical Specifications 1 Hardware Requirements 1 Software Requirements 2 Ports 2 Other Configuration 2 Data Encryption 2 DataMan Installation 3 Component Installation 3 License Installation 4 Creating Endpoints 4 Adding an AWS Glacier Endpoint 6 Adding an AWS S3 Endpoint 6 Adding a SSH Host Endpoint 6 Adding Credentials 7 Transferring Files 7 DataMan Settings 8 CLI Installation 9 CLI Initialization 9 Store Storage Service Credentials 9 Configuration 10 Create Endpoints 10 REST API Specification 10 Command Line Client 11

3 Initialization 11 List Encryption Keys 12 Store Encryption Key 12 Create a Storage Endpoint 12 List Endpoints 12 Create and Upload a AWS Glacier Archive 13 List Archives 13 List Contents of an archive 13 Creating a Recurring transfer 14 Downloading an Archive 14 Searching for files 14 Job Status 15 Scaling DataMan 15

4

5 DataMan User Guide Overview The DataMan provides CycleServer plugins that allow managing archiving and retrieval of user data to Cloud Storage. DataMan makes it easy to manage backup, archival and transfer of data residing in various storage services and mediums. It supports Amazon's Glacier for archival and provides encryption for data archived using user provided keys. Customizable plugins compress and then encrypt the files before uploading them to Glacier. By default AES Encryption is performed using the key specified by the user. A REST API is provided to perform various operations on encryption keys that allow users to store and retrieve encryption keys and perform archival ans retrieval of folders residing on the local file system. Once the compressed archive is uploaded metadata about the archive such as the key used for encryption, source location and the location of a generated manifest file is stored in CycleServer. The manifest file contains file system specific information about all the files in the archive such as file ownership, permissions, various creation and/or modification timestamps etc as obtained from the underlying file system. A command line client utilizing the REST API is provided. Introduction This document serves as the user guide for the DataMan product versions 2.x and 3.x. The document also provides technical specifications of DataMan. DataMan DataMan at its core is based on the Cycle telemetry engine operating on a nosql datastore. It has a pluggable architecture and makes use of components to support various operations. It also provides a rich query interface and a rich alerts and reporting framework that can be used to create custom reports and alerts on the datastore information, such as user actions, scheduled data transfers and collected metadata. The DataMan component supports data transfer and management operations by operating on data transfer requests created by adding records to the datastore. These records contain both user information and information needed to perform the data transfer. All operations performed by the DataMan component are also written to the datastore to provide an audit trail. This information is made available via a REST API and command line clients which will be detailed in later sections. Technical Specifications Hardware Requirements 1

6 We recommend running CycleServer with DataMan on a Linux machine with 4-8 cores, 8-16 GB of RAM and at least 500GB of free space for optimal performance. The amount of RAM required is proportional to the number of parallel streams used to transfer data. The recommended setup is for 8 parallel streams with a 64GB part size. Every additional stream needs an additional 1-2GB of RAM. The disk space required by DataMan is a function of the largest file size to upload/download. The amount of free scratch space is should be at least 3 times the largest file to upload/download. Software Requirements DataMan requires a Linux system capable of running Oracle Java 1.7. The required Java Runtime Environment is bundled with CycleServer. All RHEL 5.x and its clones, Ubuntu and SLES 11+ are supported platforms. Root access is required during installation for user creation and enabling automated startup. The cycle_server user and group must be created prior to installation if default user creation facilities of Linux are inadequate to create user accounts. Python 2.7 is needed for execution of the Client. Ports In order to communicate with clients CycleServer requires ports 8080 and 8443 to be open to machines on which clients are installed. For Amazon Glacier transfers outgoing traffic to the Amazon Glacier endpoints must be allowed and for S3 transfers outgoing traffic to S3 endpoints must be allowed. Other Configuration CycleServer must have read access to the filesystem from which files need to be uploaded to Glacier. In addition if data deletion on inventory is enabled write access is required. Special scripts required to query ACL values of files must adhere to ACL input format described in the user guide. Write access is needed to the filesystem to which data must be restored. Additionally any administrative privileges required to perform ACL changes are required to restore ACLs on downloaded files. Data Encryption DataMan encrypts each file to be archived post compression using strong AES 256-bit encryption. The Encryption is performed using the standard Java Cryptography Extensions (JCE) security libary provided with the Oracle Java Runtime Environment. The JCE library provide standards based, industry strength cryptographic methods providing tools for strong encryption and avoiding the pitfalls of using weak encryption keys. The JCE SecureRandom class ensures that cryptographically secure random keys are generated and used for encryption of data. 2

7 Users can generate or import encryption keys and use them to encrypt data when uploading to Amazon Web Services Glacier or S3. In order to improve security due to encryption it is possible create a key family and specify the key family name during encryption. Specifying a key family to be used results in a new key to be generated for each transfer request using that key family. Recurring syncs, for example, can use a key family causing a new key to be generated and used each time the sync is scheduled to run. When uploading data, encryption is performed in parallel on fixed size chunks of data. The encryption keys are seeded with a platform dependent random number generator. On Linux based systems /dev/urandom is used to obtain the random bytes for use in generating the encryption keys and on Microsoft Windows the Microsoft Crypto API is used to request random numbers. The random numbers on both Linux and Windows are generated using entropy from various sources on the system such as clock ticks, network and disk I/O, key strokes if applicable, thermal variations of hardware components etc. The system blocks until enough entropy is available before returning the next set of random bytes, thus ensuring high quality random data. This ensures that the random numbers are impossible to reproduce without physical access to the system and knowledge of the numerous physical events that went into generation of the random data. The JCE libraries also provide flexibility to replace the built in implementation of the Random number generator with an implementation that makes use of hardware randomization if available. DataMan provides a way to export the encryption keys out of DataMan for backup purposes. Administrative users can specify a key backup script that can be run at scheduled intervals to backup keys provided to it as a json file to a secure location. The cycle_server account and the key backup script must be secured in such a way that they cannot be tampered with leading to a security breach. DataMan Installation Install DataMan by unpacking the compressed archive provided and execute the install.sh script on Linux and install.cmd on Windows. On Linux the install script must be executed as root. DataMan is currently supported on Linux, Windows and Mac OS X platforms. If DataMan is installed from a prepackaged DataMan installation proceed to License Installation. If the components are provided separately proceed to the component installation step before configuring the DataMan installation from the web interface. Component Installation If DataMan is being installed on a preexisting CycleServer installation, then follow this step to install DataMan. Copy the file_sync component zip file provided to the $CS_HOME/components directory. Next copy the DataMan component zip file into the same location. Wait a few minutes for the components to be installed. Finish CycleServer 3

8 installation by pointing your browser to the CycleServer web interface as provided at the end of the CycleServer installation. By default this is host>:8080 or License Installation At the end of the insttaltion wizard you will be taken to the Apps page, where you can install alicense to activate all the DataMan features. On the apps page, if you already have a license, paste the license text in the text box provided under the License tab as shown below. Figure 1. License Installation If you do not already have a license, copy the nodeid shown and it to sales@cyclecomputing.com to receive a license. Upon receiving the license, paste the license text in the space provided on this page. Creating Endpoints Once the license is installed, click on the Data link on the top menu to proceed to the DataMan home page. The first time the page is opened, it will start with the "Add Endpoint" forms on both the left and right pane as shown in Figure 2. 4

9 Figure 2. Initial Endpoint Add forms The left pane automatically defaults to the localhost endpoint which is used to view and operate on data residing on the DataMan host. The Local Host check box must be enabled to configure endpoints on the DataMan host. The Allowed Paths text box allows you to add paths that DataMan can browse and retrieve and store data to. This is set to /tmp by default and should be changed to point to the data staging area on the DataMan host. If only Cloud storage operations will be performed and no data will be downloaded, the defaults can be accepted. Once you click Save the localhost endpoint named DataMan will be created and the file browser pane will show the allowed paths as in Figure 3. 5

10 Figure 3. Local Endpoint Configured The right pane can be used to similarly add endpoints of different types. The configuration options for the other endpoints are described in the following sections. Adding an AWS Glacier Endpoint To add a Glacier endpoint, type in a name for the endpoint on the Add Endpoint form and then select Amazon Glacier from the Endpoint Type drop down menu. If this is the first time configuring an AWS endpoint or to use a new set of credentials click on the plus sign next to the Credential dropdown to add a new Credential. More detail on adding credentials is presented in section Adding Credentials. After adding a credential, select the AWS Glacier Region in which the vault is located. Please note that a vault should already be present the the region of your choice before adding the DataMan endpoint. After selecting the region, the Vault selection dropdown will be automatically populated with the vaults available in that region. Select the desired vault and click Save. Adding an AWS S3 Endpoint To add an AWS S3 endpoint, use the endpoint form to select Amazon S3 Endpoint type, pick or enter a new set of AWS credentials and select the bucket to use from the drop down menu. Please note that for endpoint creation to work from the endpoint creation form, the credentials must have list buckets privileges for Amazon S3. Adding a SSH Host Endpoint To add an ssh host endpoint, select Add Endpoint from the title menu on one of the endpoint browser panes. This willreplace the pane with the Endpoint Creation form. Name the endpoint appropriately and select Host from the endpoint type drop down. If not already unchecked, uncheck the Local host check box and fill in the remote host's host name or IP address in the Hostname field. Also fill in the account name to login as and select the SSH Private Key that will be used to connect to the host from the Credential dropdown as shown in Figure 4. 6

11 Figure 4. Adding SSH Host Endpoint Adding Credentials Credentials can be added either from the Endpoint Add form by clicking the plus sign next to the Credential text box or by navigating to the Credential type (under Other types) by browsing to <dataman-url>:<dataman-port>/types and selecting All from the component selection menu. Transferring Files Data is transferred between endpoints by using the data transfer buttoms located between the left and right endpoint browser panes. The simple transfer button can be used to start an immediate transfer from one endpoint to another. It should however be noted that an immediate transfer simply submits the transfer for execution as soon as a worker is available to perform the transfer. The number of workers can be configured by editing the Queue records and changing the workers attribute to teh desired number of workers. The default setting is 1 and is recommended for most purposes. 7

12 DataMan Settings In order to tune DataMan transfers a number of settings can be adjusted. The settings page can be navigated to using the user menu on the top right of the screen and selecting Settings. On the settings page double clicking on the DataMan entry brings up the DataMan settings form as shown in Figure 5. Figure 5. DataMan Settings form Proxy Server Configuration To enable using a proxy server for AWS operations check the Use Proxy checkbox and put the details of the proxy server in the followign fields. SSL for AWS Operations The Enable SSL checkbox enables the use of https when connecting to the AWS Storage endpoints. It is enabled by default and must be unchecked to fall back to using http. Although not recommended it may be needed if there are too many "Peer not authenticated" or HTTP connection errors during transfers. Server Side Encryption The S3 encryption checkbox is used to enable server side encryption when transferring data to S3. Please note that this is not the same as using encryption via DataMan, which preencrypts the data before transferring it to S3 or Glacier. The Server Side Encryption enables data to be encrypted using AWS managed keys when at rest in the S3 bucket. S3 Uploader This settings modifies the number of threads used to transfer data to S3. Recommended value of this setting depends on your network bandwidth and the number of CPU cores available on the DataMan host. We recommend that this value not be set greater than 32 to prevent http connection errors during uploads. 8

13 S3 Part Size This is the size of a single chunk of a multi-part upload that is uploaded using a single thread to S3. The chunk size is a power of 2 and specified in bytes. Amazon S3 places a upper limit of on the number of parts, so the chunk size should be chosen appropriately based on the largest file to be uploaded. For instance if the largest file to be uploaded is larger than 320GB and less than 640GB, the part size must be 64 MB ( ). If the largest file size is smaller than 320 GB, it is recommended that the part size be 32 MB. For very small files a part size of 8 or 16 MB can be used. Please note that when converting from MB to bytes calculate the number of bytes as (size in MB) * 1024 * 1024 to obtain a power of 2 size in bytes. Change Checkers Change checkers are used to determine if a file has been changed and needs to be copied from one S3 bucket to another. Change checkers perform HEAD operations on S3 objects to retrieve metadata that can be used to determine if the object has changed. DataMan compares the ETag attribute on the S3 object to the MD5 checksum of the file disk or to the ETag of the source S3 object. If the ETag is not an MD5 checksum, as is the case with multi-part uploads, DataMan looks for the metadata attribute "user-md5", which is set by DataMan to be the MD5 checksum of the file. If this attribute is not found or is different, DataMan overwrites the object with the new one. For host to S3 uploads it will also set the "user-md5" metadata attribute. Amazon S3 automatically prefixes the metadata attribute with "x-amz-meta-", so the attribute on the S3 console will appear as "x-amz-meta-user-md5". If objects have been uploaded to S3 using multi-part uploads, the metadata attribute should be added to the objects for reliable syncing, without relying on the ETag. CLI Installation Unzip the CLI bundle to the location of your choice. Place the dataman binary found in the bin folder on your PATH for convenient access to dataman commands. CLI Initialization Intialize dataman using the dataman initialize command. Provide your username and password when prompted: $ dataman initialize Welcome to DataMan! CycleServer URL: [ CycleServer username: [akulshrestha] admin CycleServer password: Generating CycleServer key... DataMan configuration stored in /Users/akulshrestha/.cycle/config.ini Store Storage Service Credentials 9

14 Use the storeawscredentials to store the Glacier AWS secret key and access key to be used by CycleServer: dataman storeawscreds -a <accesskey> -s <secretkey> Configuration Use the dataman config command to configure dataman network settings and notification settings. The Web interface should be used in preference to this command. Answer the questions on the prompts and finish configuration: $ dataman config list for archive status notification: @demo.com Dataman application settings configured. Local Endpoint Created. Advanced configuration options can be invoked by using the dataman config all command. Use this to specify the number of upload streams, size of each upload chunk, command to be executed to gather additional file attributed etc. Create Endpoints The dataman createendpoint command is used to create Endpoints for AWS Glacier vaults and AWS S3 buckets. To configure DataMan to use a AWS Glacier vault as an endpoint: $./dataman createendpoint -t Glacier Endpoint Name: test AWS Glacier Region: us-east-1 AWS Glacier Vault Name: test DataMan Endpoint Created. For S3 buckets: $./dataman createendpoint -t S3 Endpoint Name: s3test AWS S3 Bucket: com.mybucket.bucketname DataMan Endpoint Created. Dataman is now configured and ready to use. REST API Specification DataMan provides a RESTful interface for configuration, key management and data transfer operations. The configuration operations interact with the CycleServer datastore to store configuration items used by DataMan to perform data transfers. The data transfer operations store transfer requests in the datastore which are then scheduled for execution. Key Management List Keys 10

15 GET /ads/datamanager.encryptionkey&format=json Store Key Autogenerated Key: GET /datamanager/rest?o=store&keyname=name Specified Key: GET /datamanager/rest?o=store&keyname=name&key=bda12deadbeef431 Archive Operations List Archives GET /ads/datamanager.archive List Archive Contents GET /glacier/rest?o=listarchive&a=archivename Upload an archive GET /glacier/rest?o=upload&k=keyname&a=archivename&v=vault&p=/upload/from&t=tags Download an archive or a file from an archive GET /glacier/rest?o=download&k=keyname&a=archivename&v=vault&d=/download/to GET /glacier/rest?o=download&k=keyname&a=archivename&v=vault&d=/download/to&f=file Command Line Client Users will interact with DataMan using the command line client called dataman. A help screen is provided by invoking dataman help which lists the various commands and their options. (Note: On Windows \ must be escaped in paths - C:\\manifests): $ dataman help Initialization 11

16 The initialize command is used to perform one time configuration of the command line client enabling it to securely communicate with the CycleServer instance hosting the Cycle DataMan REST API.: $ dataman initialize List Encryption Keys The listencryptionkeys command shows all keys stored in CycleServer.: $ dataman listencryptionkeys KeyName:Symmetric Key examplekey _1: c d8a476f203a0772c7185eb7b6a1795bf3586ac3d5d Store Encryption Key The storeencryptionkeys command allows users to store a key into CycleServer to encrypt and decrypt files with. If no key is provided then a key is automatically generated and stored. The keyname is used as a handle to identify the key to be used with other commands.: $ dataman storeencryptionkeys <keyname> [key] Create a Storage Endpoint Storage endpoints refer to data sources and destinations which may include traditional file systems, file storage services, archival services etc.: $ dataman createendpoint -t Glacier Endpoint Name: glacier AWS Glacier Region: us-east-1 AWS Glacier Vault Name: examplevault1 DataMan Endpoint Created. $ dataman createendpoint -t S3 Endpoint Name: s3example AWS S3 Bucket: com.cyclecomputing.software DataMan Endpoint Created. List Endpoints Lists all available endpoints.: $ dataman listendpoints Glacier Name : Vault : Region 12

17 glacier : examplevault1 : us-east-1 $ dataman listendpoints S3 Name : Bucket s3example : com.cyclecomputing.software Create and Upload a AWS Glacier Archive The upload command creates a compressed and encrypted archive and uploads it to Amazon Glacier.: $ dataman upload -c vaultname -k keyname -d /path/to/upload -t "tag1=value1,tag2=value2" archivename List Archives The listarchives command is used to query CycleServer for the archives that have been uploaded to Glacier.: $ dataman listarchives examplevault1 Name : Status : Key Used examplearchive _6 : Inventoried : testkey-1 examplearchive _5 : Inventoried : testkey-1 examplearchive _7 : Inventoried : testkey-1 List Contents of an archive To see the contents of an archive: $ dataman listarchive arch _1 Wed Mar 6 13:00: arch _3.manifest Mon Feb 4 22:48: b6e480a a5-c17e2b manifest Wed Mar 6 16:47: arch _9.manifest Mon Feb 4 21:21: file1.dat Mon Feb 4 21:36: file3.dat Fri Feb 15 12:45: arch _1.manifest Mon Feb 4 22:13: e7a38c79-275a b b manifest Mon Feb 4 21:37: file4.dat Tue Feb 26 12:51: arch _4.manifest Mon Feb 4 21:35: file2.dat Fri Mar 8 12:19: arch _1.manifest Tue Feb 5 00:13: arch _1.manifest Wed Mar 6 13:55: arch _6.manifest total

18 Creating a Recurring transfer A recurring sync can be created to backup new or changed files to glacier. MD5 checksums of files are used to determine if they are changed. The -s option can be used to specify an interval in seconds or a Quartz cron schedule string: $ dataman createrecurringsync -n sync1 -s 60 -e glacier -a winsync1 -k wintest1 -d "C:\testData" Schedule strings are of the format "ss mm hh dd mon dayofweek". Examples of schedule strings. 1. Every 20 seconds: "0/20 * * * *?" 2. Every other minute, starting at 15 seconds past the minute: "15 0/2 * * *?" 3. Every other minute, between 8am and 5pm: "0 0/ * *?" 4. At 10am on the 1st and 15th days of the month: "0 0 10am 1,15 *?" 5. Every 30 seconds on Weekends (Saturday and Sunday): "0,30 * *? * SAT,SUN" Downloading an Archive The download command requests an archive to be downloaded, downloads it when the request has been fulfilled by Amazon Glacier, decrypts, uncompress and explodes it to the provided location. Only inventoried archives from inventoried vaults can be downloaded.: $ dataman download -c vaultname -k keyname -d /path/to/explode/to archivename $ dataman download -c vaultname -k keyname -d /path/to/explode/to -f filename archivename Searching for files The dataman search command can be used to locate files within archives or archives with specified tags.: $ dataman search -f file1.dat arch_unenc_nomd5_512parts8mb_ _5#11: file1.dat arch_unenc_nomd5_256parts_ _4#10: file1.dat arch_unenc_nomd5_64parts_ _2#9: file1.dat arch_unenc_nomd5_64parts_ _1#8: file1.dat arch_unenc_32parts_ _4#7: file1.dat arch_unenc_ _3#6: file1.dat arch _3#5: file1.dat arch _1#3: file1.dat= $ dataman search -t project=demo arch_unenc_nomd5_256parts_ _4#10: project=demo,owner=demouser 14

19 Job Status To show the status of a download request or an inventory request: $ dataman jobstatus arch _1 : archivedownload : COMPLETED : J0VEbh68gKA_AD --- : inventory : COMPLETED : LbDi-mSHh8V56L --- : inventory : COMPLETED : E8gP3B_sHdte6n --- : inventory : EXPIRED : 6c5qHIGBaaHeJU arch _1 : archivedownload : COMPLETED : wptsffd7xtiirs Scaling DataMan If the aggregate bandwidth available for Glacier uploads is greater than the sustained bandwidth usage of a single DataMan node, multiple nodes should be used. In order to determine the bandwidth usage efficiency the following factors must be taken into consideration. Data Preprocessing When dealing with large volumes of data, it must often be pre-processed to package and optionally compress the data. This can be a time consuming process and the throughput depends on resources available on the node that pre-processes the data. For compression of large files, parallel compression tools such as pigz are recommended on multi-core machines. If the upload speed to Glacier is faster than the aggregate bandwidth of the preprocessing pipeline, it is recommended that more than one node be used to preprocess data to be presented for upload to DataMan. The goal of the pre-process pipeline should be to always have one additional dataset available for upload before the previous upload finishes. Upload Bandwidth Single DataMan nodes will often peak out below the net available bandwidth to the Archival Service endpoint. This can be due to various reasons, such as interface speeds, limited number of cores on the node or limited I/O bandwidth. If MD5 checksum computation is enabled, additional time is needed to compute the checksum, before data is uploaded. Due to the nature of the checksum algorithm, it runs on a single core and is not parallelized. Hence for large files this becomes a bottleneck and reduces the net upload bandwidth to Glacier. If prepackaging of data creates a few large files, the 15

20 checksum computation is a significant overhead. In this case, multiple DataMan nodes must be used to make best use of the bandwidth. In the perfect scenario at least one of the nodes must be uploading data while the other is computing checksums or waiting on data to become available from the pre-processing pipeline. The DataMan nodes should be individually tuned to determine the right upload part size and concurrency required to achieve the highest upload speeds possible for that node. If the peak bandwidth is less than 80% of the total bandwidth available to the archival service endpoint, then additional DataMan nodes are needed to make full use of the available bandwidth. Please note that this is only valid on a congestion free network. For a network with substantial traffic adding more DataMan nodes may not offer any benefit. On congested networks the network traffic patterns must be evaluated before making any recommendation. Additional DataMan nodes can also be used to maximize bandwidth use if the MD5 checksum computation takes more than half the time required to upload the dataset. When adding another node it is beneficial to start the next upload on the new DataMan node once the first node has started uploading data to the archival service. When data sets are of similar or comparable size, this can be done by putting the uploads on a schedule that allows one node to be computing the checksum while the other is uploading data. 16

DataMan. version 3.5.1

DataMan. version 3.5.1 DataMan version 3.5.1 Contents DataMan User Guide 1 Overview 1 Introduction 1 CycleServer 1 DataMan 1 Technical Specifications 2 Hardware Requirements 2 Software Requirements 2 Ports 2 Other Configuration

More information

DataMan. version 4.9.9

DataMan. version 4.9.9 DataMan version 4.9.9 Contents DataMan User Guide 1 Overview 1 Introduction 1 DataMan 1 Technical Specifications 1 Hardware Requirements 1 Software Requirements 2 Ports 2 Other Configuration 2 Data Encryption

More information

DataMan. version 5.5.7

DataMan. version 5.5.7 DataMan version 5.5.7 Contents DataMan User Guide 1 Introduction 1 DataMan 1 Technical Specifications 2 Hardware Requirements 2 Software Requirements 2 Ports 2 Other Configuration 2 DataMan Installation

More information

DataMan. version 6.5.4

DataMan. version 6.5.4 DataMan version 6.5.4 Contents DataMan User Guide 1 Introduction 1 DataMan 1 Technical Specifications 1 Hardware Requirements 1 Software Requirements 2 Ports 2 DataMan Installation 2 Component Installation

More information

Amazon S3 Glacier. Developer Guide API Version

Amazon S3 Glacier. Developer Guide API Version Amazon S3 Glacier Developer Guide Amazon S3 Glacier: Developer Guide Table of Contents What Is Amazon S3 Glacier?... 1 Are You a First-Time Glacier User?... 1 Data Model... 2 Vault... 2 Archive... 3 Job...

More information

Zadara Enterprise Storage in

Zadara Enterprise Storage in Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

EDB Postgres Enterprise Manager EDB Ark Management Features Guide

EDB Postgres Enterprise Manager EDB Ark Management Features Guide EDB Postgres Enterprise Manager EDB Ark Management Features Guide Version 7.4 August 28, 2018 by EnterpriseDB Corporation Copyright 2013-2018 EnterpriseDB Corporation. All rights reserved. EnterpriseDB

More information

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312)

Release Date March 10, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) Adeptia Server 4.9 Installation Guide Version 1.2 Release Date March 10, 2009 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60610, USA Phone: (312) 229-1727 Copyright Copyright 2000-2008 Adeptia,

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

Managing the Cisco APIC-EM and Applications

Managing the Cisco APIC-EM and Applications Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page

More information

WebsitePanel User Guide

WebsitePanel User Guide WebsitePanel User Guide User role in WebsitePanel is the last security level in roles hierarchy. Users are created by reseller and they are consumers of hosting services. Users are able to create and manage

More information

Getting Started and System Guide. Version

Getting Started and System Guide. Version Version 1.0.29 2016 Waterford Technologies. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form

More information

ForeScout Amazon Web Services (AWS) Plugin

ForeScout Amazon Web Services (AWS) Plugin ForeScout Amazon Web Services (AWS) Plugin Version 1.1.1 and above Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic Segmentation

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

EDB Postgres Enterprise Manager EDB Ark Management Features Guide

EDB Postgres Enterprise Manager EDB Ark Management Features Guide EDB Postgres Enterprise Manager EDB Ark Management Features Guide Version 7.6 January 9, 2019 by EnterpriseDB Corporation Copyright 2013-2019 EnterpriseDB Corporation. All rights reserved. EnterpriseDB

More information

Amazon Glacier. Developer Guide API Version

Amazon Glacier. Developer Guide API Version Amazon Glacier Developer Guide Amazon Glacier: Developer Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions October 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

Configuring Commvault VirtualServer Protection to backup to Igneous

Configuring Commvault VirtualServer Protection to backup to Igneous Configuring Commvault VirtualServer Protection to backup to Igneous Introduction Commvault Virtual Server Protection (VSP) is a third-party enterprise backup software suite, allowing companies to backup

More information

Carbon Black QRadar App User Guide

Carbon Black QRadar App User Guide Carbon Black QRadar App User Guide Table of Contents Carbon Black QRadar App User Guide... 1 Cb Event Forwarder... 2 Overview...2 Requirements...2 Install Cb Event Forwarder RPM...2 Configure Cb Event

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

Documentation. This PDF was generated for your convenience. For the latest documentation, always see

Documentation. This PDF was generated for your convenience. For the latest documentation, always see Management Pack for AWS 1.50 Table of Contents Home... 1 Release Notes... 3 What's New in Release 1.50... 4 Known Problems and Workarounds... 5 Get started... 7 Key concepts... 8 Install... 10 Installation

More information

SUREedge Migrator Installation Guide for Amazon AWS

SUREedge Migrator Installation Guide for Amazon AWS SUREedge Migrator Installation Guide for Amazon AWS Contents 1. Introduction... 3 1.1 SUREedge Migrator Deployment Scenarios... 3 1.2 Installation Overview... 4 2. Obtaining Software and Documentation...

More information

Administration 1. DLM Administration. Date of Publish:

Administration 1. DLM Administration. Date of Publish: 1 DLM Administration Date of Publish: 2018-07-03 http://docs.hortonworks.com Contents ii Contents Replication Concepts... 4 HDFS cloud replication...4 Hive cloud replication... 4 Cloud replication guidelines

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

AWS Elemental MediaStore. User Guide

AWS Elemental MediaStore. User Guide AWS Elemental MediaStore User Guide AWS Elemental MediaStore: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

DASH COPY GUIDE. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31

DASH COPY GUIDE. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31 DASH COPY GUIDE Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31 DASH Copy Guide TABLE OF CONTENTS OVERVIEW GETTING STARTED ADVANCED BEST PRACTICES FAQ TROUBLESHOOTING DASH COPY PERFORMANCE TUNING

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

Pass4test Certification IT garanti, The Easy Way!

Pass4test Certification IT garanti, The Easy Way! Pass4test Certification IT garanti, The Easy Way! http://www.pass4test.fr Service de mise à jour gratuit pendant un an Exam : SOA-C01 Title : AWS Certified SysOps Administrator - Associate Vendor : Amazon

More information

NetBackup Collection Quick Start Guide

NetBackup Collection Quick Start Guide NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

Backup App V7. Quick Start Guide for Windows

Backup App V7. Quick Start Guide for Windows Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical

More information

Ricoh Managed File Transfer (MFT) User Guide

Ricoh Managed File Transfer (MFT) User Guide Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN

More information

VIRTUAL GPU LICENSE SERVER VERSION , , AND 5.1.0

VIRTUAL GPU LICENSE SERVER VERSION , , AND 5.1.0 VIRTUAL GPU LICENSE SERVER VERSION 2018.10, 2018.06, AND 5.1.0 DU-07754-001 _v7.0 through 7.2 March 2019 User Guide TABLE OF CONTENTS Chapter 1. Introduction to the NVIDIA vgpu Software License Server...

More information

File Protection using rsync. User guide

File Protection using rsync. User guide File Protection using rsync User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync considerations... 3 3. Creating a File Protection backup using rsync... 4 4.

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved. Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information

More information

Installing Intellicus DotNet Client on Windows. Version: 16.0

Installing Intellicus DotNet Client on Windows. Version: 16.0 Installing Intellicus DotNet Client on Windows Version: 16.0 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

NexentaStor VVOL

NexentaStor VVOL NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document

More information

Alliance Key Manager AKM for AWS Quick Start Guide. Software version: Documentation version:

Alliance Key Manager AKM for AWS Quick Start Guide. Software version: Documentation version: Alliance Key Manager AKM for AWS Quick Start Guide Software version: 4.0.0 Documentation version: 4.0.0.002 Townsend Security www.townsendsecurity.com 800.357.1019 +1 360.359.4400 Alliance Key Manager

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Launch and Configure SafeNet ProtectV in AWS Marketplace

Launch and Configure SafeNet ProtectV in AWS Marketplace ProtectV TECHNICAL INSTRUCTIONS Launch and Configure SafeNet ProtectV in AWS Marketplace Contents Overview... 2 Prerequisites... 2 Configure KeySecure... 3 Configure the Firewall (for Linux Clients Only)...

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

Bitnami Dolibarr for Huawei Enterprise Cloud

Bitnami Dolibarr for Huawei Enterprise Cloud Bitnami Dolibarr for Huawei Enterprise Cloud Description Dolibarr is an open source, free software package for small and medium companies, foundations or freelancers. It includes different features for

More information

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business

More information

Release Date September 30, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA

Release Date September 30, Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Adeptia Suite 5.0 Installation Guide Release Date September 30, 2009 Adeptia Inc. 443 North Clark Ave, Suite 350 Chicago, IL 60654, USA Copyright Copyright 2000-2009 Adeptia, Inc. All rights reserved.

More information

Backup and Restore. About Backup and Restore

Backup and Restore. About Backup and Restore About, page 1 Back Up DNA Center, page 2 Restore DNA Center, page 4 Schedule a Backup, page 5 About The backup and restore procedures for DNA Center can be used for the following purposes: To create backup

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

Using BlueStep Backup

Using BlueStep Backup Using BlueStep Backup BlueStep Backup Your data is an invaluable resource. To protect and store critical digital documents and files, BlueStep Technologies offers the ideal technological solution - BlueStep

More information

Ross Whetten, North Carolina State University

Ross Whetten, North Carolina State University Your First EC2 Cloud Computing Session Jan 2013 Ross Whetten, North Carolina State University BIT815 notes 1. After you set up your AWS account, and you receive the confirmation email from Amazon Web Services

More information

FilesAnywhere Features List

FilesAnywhere Features List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no

More information

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides

More information

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0 VMware Skyline Collector Installation and Configuration Guide VMware Skyline Collector 2.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

SUREedge DR Installation Guide for Windows Hyper-V

SUREedge DR Installation Guide for Windows Hyper-V SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...

More information

Bomgar Vault Server Installation Guide

Bomgar Vault Server Installation Guide Bomgar Vault 17.2.1 Server Installation Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.31

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.31 JAMF Software Server Installation and Configuration Guide for Linux Version 9.31 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this

More information

Change and Configuration Management Administration

Change and Configuration Management Administration CHAPTER 7 Change and Configuration Management Administration These topics provide administrative information on Change and Configuration Management: Configuring Global Settings for Configuration Management,

More information

Managing Software Images Using Software Management

Managing Software Images Using Software Management CHAPTER 8 Managing Software Images Using Software Management Manually upgrading your devices to the latest software version can be an error-prone, and time-consuming process. To ensure rapid, reliable

More information

VMware vfabric Data Director 2.5 EVALUATION GUIDE

VMware vfabric Data Director 2.5 EVALUATION GUIDE VMware vfabric Data Director 2.5 EVALUATION GUIDE Introduction... 2 Pre- requisites for completing the basic and advanced scenarios... 3 Basic Scenarios... 4 Install Data Director using Express Install...

More information

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS Revision History Date Descriptions Type of modification 29 Jun 2016 First Draft New 25 Nov 2016 Modified Ch 3 Download Backup App, Ch 3 Install Backup App

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

0. Introduction On-demand. Manual Backups Full Backup Custom Backup Store Your Data Only Exclude Folders.

0. Introduction On-demand. Manual Backups Full Backup Custom Backup Store Your Data Only Exclude Folders. Backup & Restore 0. Introduction..2 1. On-demand. Manual Backups..3 1.1 Full Backup...3 1.2 Custom Backup 5 1.2.1 Store Your Data Only...5 1.2.2 Exclude Folders.6 1.3 Restore Your Backup..7 2. On Schedule.

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Perform Backup and Restore

Perform Backup and Restore , page 1 You can schedule periodic backups using the Cisco Prime Collaboration user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However, you must

More information

EasyMorph Server Administrator Guide

EasyMorph Server Administrator Guide EasyMorph Server Administrator Guide Version 3.9.2 December, 24 th 2018 Table of Contents TABLE OF CONTENTS... 1 PREREQUISITES... 2 Memory requirements... 2 INSTALLATION... 2 License key... 3 SERVER SERVICE

More information

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Restoring data from a backup

Restoring data from a backup Restoring data from a backup The following topics explain how to find a backup to restore and then perform a restore: Finding a backup to restore on page 98 Restoring to the original location on page 101

More information

SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide

SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

LiveNX Upgrade Guide from v5.2.0 to v5.2.1

LiveNX Upgrade Guide from v5.2.0 to v5.2.1 LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction

More information

Zmanda Cloud Backup FAQ

Zmanda Cloud Backup FAQ Zmanda Cloud Backup 2.0.1 FAQ The first sections of this document cover general questions regarding features, cloud, and support; the last section lists error messages and what to do about them. Terminology

More information

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4 About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Version 2.3 User Guide

Version 2.3 User Guide V Mware vcloud Usage Meter Version 2.3 User Guide 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

Merchandising Server 2.2

Merchandising Server 2.2 Merchandising Server 2.2 2014-12-07 04:31:45 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Merchandising Server 2.2... 5 About... 6 System Requirements

More information