Avid NEXIS 18.5 User guide

Category
Network management software
Type
User guide
Avid NEXIS
®
Avid NEXIS Administration Guide
Version 18.5
ii
Legal Notices
Product specifications are subject to change without notice and do not represent a commitment on the part of Avid Technology, Inc.
This product is subject to the terms and conditions of a software license agreement provided with the software. The product may only be used in accordance
with the license agreement.
This product may be protected by one or more U.S. and non-U.S patents. Details are available at www.avid.com/patents.
This guide is protected by copyright. This guide is for your personal use and may not be reproduced or distributed, in whole or in part, without permission of
Avid. Reasonable care has been taken in preparing this guide; however, it may contain omissions, technical inaccuracies, or typographical errors. Avid
Technology, Inc. disclaims liability for all losses incurred through the use of this document. Product specifications are subject to change without notice.
Part of the software embedded in this product is gSOAP software.
Portions created by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Copyright © 1988–1997 Sam Leffler
Copyright © 1991–1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose is hereby granted without fee,
provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of
Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam
Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT
LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL
DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED
OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms
and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by
the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without
specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the
above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software
is provided " as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the
above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software
is provided " as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice
appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Daniel
Dardailler not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Daniel Dardailler makes
no representations about the suitability of this software for any purpose. It is provided " as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all
copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED " AS IS" , WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR
AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS
FITNESS FOR ANY PARTICULAR PURPOSE.
iii
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code equivalent of “Install-It,”
including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be liable for any damages resulting from reseller’s
failure to perform reseller’s obligation; or any damages arising from use or operation of reseller’s products or the software; or any other damages, including
but not limited to, incidental, direct, indirect, special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use
reseller’s products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates has been advised,
knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with respect to its merchantability
or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by Videomedia, Inc. and V-LAN
ver. 3.0 compatible products developed by third parties under license from Videomedia, Inc. Use of this software will allow “frame accurate” editing control of
applicable videotape recorder decks, videodisc recorders/players and the like.”
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample Source Code:
©1993–1998 Altura Software, Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
© DevelopMentor
This product may include the JCifs library, for which the following notice applies:
JCifs © Copyright 2004, The JCIFS Project, is licensed under LGPL (http://jcifs.samba.org/). See the LGPL.txt file in the Third Party Software directory on
the installation CD.
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or “commercial computer software
documentation.” In the event that such Software or documentation is acquired by or on behalf of a unit or agency of the U.S. Government, all rights with
respect to this Software and documentation are subject to the terms of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a),
as applicable.
Trademarks
Avid, the Avid Logo, Avid Everywhere, Avid DNXHD, Avid DNXHR, Avid Nexis, AirSpeed, Eleven, EUCON, Interplay, iNEWS, ISIS, Mbox, MediaCentral,
Media Composer, NewsCutter, Pro Tools, ProSet and RealSet, Maestro, PlayMaker, Sibelius, Symphony, and all related product names and logos, are
registered or unregistered trademarks of Avid Technology, Inc. in the United States and/or other countries. The Interplay name is used with the permission
of the Interplay Entertainment Corp. which bears no responsibility for Avid products. All other trademarks are the property of their respective owners. For a
full list of Avid trademarks, see:
http://www.avid.com/US/about-avid/legal-notices/trademarks.
The following disclaimer is required by Apple Computer, Inc.:
APPLE COMPUTER, INC. MAKES NO WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING THIS PRODUCT, INCLUDING
WARRANTIES WITH RESPECT TO ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED
WARRANTIES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH
SPECIFIC LEGAL RIGHTS. THERE MAY BE OTHER RIGHTS THAT YOU MAY HAVE WHICH VARY FROM STATE TO STATE.
Avid NEXIS Administration Guide Version 18.5 • Created 5/29/18 • This document is distributed by Avid in online (electronic) form only,
and is not available for purchase in printed form.
iv
Contents
Using This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Who Should Use This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Symbols and Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
If You Need Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Accessing the Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Avid Training Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 1 Configuring and Managing the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Creating the Avid NEXIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Binding Media Packs to the File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Setting the System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Configuring the Notification Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Enabling Link Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Securing the Avid NEXIS Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Securing Access to the Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Changing the BMC Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Configuring DNS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Changing the Storage System Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Upgrading the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Capturing System Information (Avid NEXIS Snapshots). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Working with Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Working with Snapshot Archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Chapter 2 Working with the Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Opening the Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Understanding the Management Console Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Navigation Sidebar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Action Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Filtering, Sorting, and Searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Updating the Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Guidelines for Names and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Customizing the System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configuring System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Monitoring Client Bandwidth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 3 Managing Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Storage Group Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Managing Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
v
Workspace Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Workspace Protection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Creating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Workspaces List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Displaying Workspace Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Resizing a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Duplicating a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Deleting a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Renaming a Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Setting Event Triggers for a Workspace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Managing User Access Privileges for Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Workspace Redistribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Managing Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Creating a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Renaming a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Increasing a Storage Group’s Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Displaying Storage Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Deleting Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Managing Engines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Engines Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Displaying Engine Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Understanding Engine and Storage Controller Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Managing Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Controllers Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Displaying Controller Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Understanding Network Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Managing Media Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Displaying Media Pack Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
About Media Pack Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Adding Unassigned Media Packs to Storage Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
About Removing Media Packs from Storage Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Removing Media Packs from a Storage Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Displaying Drive Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
SSD Health. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Disk Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Identifying the Slot Number for a Failing or Failed Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Clearing a Foreign Disk Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Unbinding Media Packs from the Avid NEXIS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Chapter 4 Managing Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
vi
User Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Creating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Duplicating Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Changing User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Disabling Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Displaying User Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Managing LDAP Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Configuring External Authentication of Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Installing the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Opening the LDAP Sync Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Using the LDAP Sync Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Managing User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Adding User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Modifying User Group Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Deleting User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Displaying User Group Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Managing Bandwidth Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Adding a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Displaying Bandwidth Limits Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Changing a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Deleting a Bandwidth Limit Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Chapter 5 Monitoring the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Monitoring Client Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Monitoring System Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Connection Status Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Monitoring Redistributions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Monitoring Client Reservations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Displaying Event History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Managing System Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Displaying the System Logs Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Clearing a System Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Managing Media Pack Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Displaying Media Pack Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Chapter 6 Avid NEXIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Installing the Avid NEXIS Toolbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Opening the Avid NEXIS Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Connection Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Log Aggregator Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Using the Log Aggregator Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
vii
Displaying Aggregate Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Running Tests with the Disk Analyzer Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Updating the Disk Analyzer Tool Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Saving Disk Analyzer Test Results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Using the Media Pack Parameters Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Retrieving Media Pack Flag Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Media Pack Log Viewer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Using This Guide
The Avid NEXIS
®
software-defined storage system provides a high-performance distributed file system that
contains high-capacity shared media storage for workgroups of connected devices. This users guide describes
how to connect your client system to the storage system, mount Workspaces, and configure your system for best
performance.
Unless noted otherwise, the material in this document applies to the Windows
®
, Mac OS
®
X, and Linux operating
systems.The majority of screen shots in this document were captured on a Windows system, but the information
applies to all operating systems. Where differences exist, information on the differences is provided.
The documentation describes the features and hardware of al
l models. Your system might not contain certain
features and hardware that are covered in this guide.
Who Should Use This Guide
This guide is intended for users who need to manage the Avid NEXIS media network. You should have a basic
understanding of how to use and manage the Windows operating system or the Mac OS X systems, and you
should be familiar with basic workgroup and network concepts.
Symbols and Conventions
Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
A note provides important related information, reminders, recommendations, and strong
suggestions.
c
A caution means that a specific action you take could cause harm to your computer or cause you
to lose data.
w
A warning describes an action that could cause you physical harm. Follow the guidelines in this
document or on the unit itself when handling electrical equipment.
n
A user tip provides a helpful hint that can aid users in getting the most from their system.
n
A shortcut shows the user keyboard or mouse shortcuts for a procedure or command.
> This symbol indicates menu commands (and subcommands) in the order you select them. For
e
xample, File > Import means to open the File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list indicate that you
perform one of the actions listed.
(Windows), (Windows
only), (Mac
intosh), or
(Macintosh only)
This text indicates that the information applies only to the specified operating system, either
Windows or Macintosh OS X.
Bold font Bold font is primarily used in task instructions to identify user interface items and keyboard
seque
nces.
2
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It is especially important
to check each step of your workflow.
2. Check the latest information that might have become available after the documentation was published.
Always check online for the most up-to-date release notes or ReadMe because the online version is
updated whenever new information becomes available. To view the online versions, visit the Knowledge
Base at
www.avid.com/support.
3. Check the documentation that came with your Avid application or your hardware for maintenance or
hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/support. Online services are available 24 hours per day, 7
days per week. Search this online Knowledge Base to find answers, to view error messages, to access
troubleshooting tips, to download upgrades, and to read or join online message-board discussions.
Accessing the Online Documentation
The Avid online documentation contains all the product documentation in PDF format. You can access the
documentation from the Knowledge Base site specific to your release. Download and install Acrobat Reader
before you access the PDF documentation.
Avid Training Services
Avid makes lifelong learning, career advancement, and personal development easy and convenient. Avid
understands that the knowledge you need to differentiate yourself is always changing, and Avid continually
updates course content and offers new training delivery methods that accommodate your pressured and
competitive work environment.
For information on courses/schedules, training centers, certifications, courseware, and books, please visit
www.avid.com/support and follow the Training links, or call Avid Sales at 800-949-AVID (800-949-2843).
Italic font Italic font is used to emphasize certain words and to indicate variables.
Courier Bold font
Courier Bold font identifies text that you type.
Ctrl+key or mouse action Press and hold the first key while you press the last key or perform the mouse action. For
example, Command+Option+C or Ctrl+drag.
| (pipe character) The pipe character is used in some Avid product names, such as Interplay | Production. In this
document, the pipe is used in product names when they are in headings or at their first use in
text.
Symbol or Convention Meaning or Action
1 Configuring and Managing the System
This chapter describes how to complete the setup of a new Avid NEXIS system after physically installing it and
installing the software, as described in the
Avid NEXIS Setup and Maintenance Guide.
This chapter also covers routine system management, including setting bandwidth limits, performing software
upgrades, and creating snapshots for Avid Customer Care.
To make the system fully usable to clients, do the following:
1. Create the file system. See “Creating the Avid NEXIS File System” on page 1.
2. Bind Media Packs to the file system. See “Binding Media Packs to the File System” on page 2.
3. Set the system time. See “Setting the System Time” on page 2.
4. Configure notification to send email to one or more accounts when a problem occurs. See “Configuring the
Notification Service” on page 3.
5. Create one or more Storage Groups from the Media Packs, depending on your hardware and what kind of
Workspace protections you want to use. See
“Managing Storage” on page 23.
6. Create Workspaces within the Storage Groups. See “Managing Storage” on page 23.
7. Create user or device accounts to allow clients to connect to Workspaces. You can do one or both of the
following:
- Create user accounts on the Avid NEXIS system itself (see “Managing Users” on page 51).
-Configure Avid NEXIS to connect to an LDAP server to authenticate external users (see “Configuring
External Authentication of Users” on page 55).
Creating the Avid NEXIS File System
Creating a new file system is the first step to making the storage space usable after you install the Avid NEXIS
software on a new Engine.
n
If a file system already exists, creating a new one permanently deletes it and all users, groups, Workspaces,
Storage Groups and other objects. All Media Packs are unbound; and all other settings, such as External
Authentication and Notification Service, are cleared and must be reconfigured after the new file system is created.
In addition, the Administrator password (if changed) reverts to the default (no password).
To create a new file system:
1. Open a browser and enter either the hostname (if DNS is configured) or the IP address of the System Director.
The Management Console login window opens.
2. Enter the user name “administrator” and the administrator password (either blank, or the password you set it
to during initial configuration) and click Sign In.
3. In the navigation sidebar, click System, then Settings.
4. Click File System.
2
5. From the drop-down box, select Create New File System, then click Submit.
A confirmation screen appears, asking you to confirm the
operation, which will destroy all existing data (if
any) on the Avid NEXIS system, and create a new file system.
6. Click Continue.
The Results panel displays progress messages.
When the file system is created, you can complete the system
configuration.
Binding Media Packs to the File System
After you have created an active file system, bind the Media Packs to it. Binding a Media Pack formats it to a
specific performance capability:
High performance Media Packs are intended speci
fically for high-bandwidth media playback, such as UHD/
4K finish and color-correction workflows. Choose the strip size of 1024KB.
Scale-Out performance Media Packs are suitable for a broad variety of workflows up to the supported client
coun
t for your Avid NEXIS model. Choose the default strip size of 512KB.
SSD performance Media Packs are available only on an Avid NEXIS | E2 SSD Engine and are intended for
p
layback of ultra high bandwidth media. Media Packs in this Engine type are bound automatically at a strip
size optimized for the best performance.
Media Pack performance types cannot be changed while the p
ack is bound. To change its performance type, you
must unbind it and then rebind it as a different performance type (not supported on Avid NEXIS | E2 SSD
En
gines.)
To bind the Media Packs:
1. In the navigation sidebar, click Storage, then Media Packs.
2. Select a Media Pack.
3.
Click Bind.
4. A warning dialog is displayed asking you to confirm the operation. Click Continue.
5. In the Media Pack Bind Settings dialog box, choose the bind setting for the Media Pack:
t 512KB
Scale-Out Performance
t 10
24KB High Performance
6. Click Save.
When the Media Pack is bound, its icon changes from white to green, and the state is Spare - Bound.
7. Create a Storage Group. See “Creating a Storage Group” on page 38.
Setting the System Time
You can configure the system time manually or use one or two external NTP servers. (If you configure an NTP
server and enter the system time manually, the NTP server takes precedence.)
You typically set the system time or configure NTP servers during initial system setup, but you can change the
system t
ime or the NTP server information (for example if the IP address of an NTP server changed) at any time.
3
To set system time, or add or change and NTP server:
1. In the navigation sidebar, click System, then System Setup.
2. Click the Da
te/Time tab.
3. Do one of the following:
t T
o configure an NTP server, check the box and enter the IP addresses or host names for up to two NTP
servers on your network.
t T
o set the date and time manually, enter the current date and time in the fields, and choose a time zone
from the list
4.
Click Save.
A warning message asks you to confirm t
he action. Click Continue, or click Refresh to restore the previous
time zone setting.
Configuring the Notification Service
The Notification service watches the system logs and sends email to one or more addresses you configure. The
notifications support filters that allow you to specify the type of error message that triggers an email notification
and to set parameters for each type of error message—Error, Warning, and Information messages.
You can configure Avid NEXIS to send notification emails for one or more of the following subsystem categories
a
nd the severity level that will trigger notification:
Server Control — Reports messages about internal operations, including problems saving metadata to disk
System Director — Reports messages about the Avid NEXIS file system, metadata, memory, system drives,
an
d the System Director IP address and networking
Avid Storage General — Reports messages about Workspaces
(such as changing its size), password changes,
Media Packs, and network communication errors detected by an Avid NEXIS component
Storage Manager General — Reports messages about general Media Pack operations, such as initialization
and st
atus changes
To configure the Notification Service:
1. In the navigation sidebar, click Users, then Notifications.
2. In the configuration panel, do the following:
a. Enter the IP address for your net
work’s SMTP (email) server.
b. (Optional) If your SMTP server uses a port other than 25 (default), enter the port number. Port 25 is
appropria
te for most cases.
c. Enter at least one email address that
will receive the notifications.
d.
Click Save.
3. To add more than one name, click Ad
d in the Contacts area. There is no enforced limit to the number of
contacts you can add.
a. Enter a name for the contact in the Name field. This can
be any name you want to assign to the user; it
does not have to be the same as the email account name.
b. Enter a valid email address for the contact.
4. In the Filters panel, check the boxes according to which types of errors from which subsystems you want the
contact
s to receive notice for.
4
5. Click Save.
- A confirmation message is displayed in the
Results area.
- If you started or stopped the Notification Service, the Service State will change to reflect the new service
state.
6.
(Optional) To test the notification settings, click Run Test.
The results of the service test are di
splayed in the Results area.
Enabling Link Aggregation
If your environment supports and requires it, you can configure link aggregation (also called redundant
networking, NIC teaming, link bundling, or port trunking) on the network ports on each controller, which
provides redundancy in case one network port fails. The Avid NEXIS implementation follows the Link
A
ggregation Control Protocol (LACP) standard.
You can use link aggregation regardless of
the number of controllers in each Avid NEXIS Engine or System
Director Appliance (however, the Avid NEXIS | PRO does not support this feature).
c
Before enabling link aggregation, connect appropriate cables from both ports to a supported switch. If you
enable LACP before the ports are connected or before enabling LACP on the switch, you can lose access to
the system. See the Avid NEXIS Setup and Maintenance Guide for more information.
n
Enabling or disabling link aggregation requires the system to reboot.
To enable link aggregation:
1. In the navigation sidebar, click System, then System Setup.
2. Click Interfaces.
3. In the Data Interface section, ch
eck the box for Link Aggregation.
4.
Click Save.
A warning confirmation message warns you that the engine might reboot. Click Co
ntinue.
When the system restarts, link aggregation is enabled on the network ports on all installed controllers.
If an error occurs with the LACP co
nfiguration, a status message is displayed; see NEED NEW XREF.
To disable link aggregation:
1. In the navigation sidebar, click System, then System Setup.
2. Click Interfaces.
3. In the Data Interfaces section, uncheck the box for Link Aggregation.
4.
Click Save.
A confirmation message warns you that the engine might reboot. Click Continue.
When the system restarts, link aggregation is disabled on the network ports on all installed controllers.
To verify or monitor the status of link aggregat
ion on the controllers, see “Managing Controllers” on page 42.
5
Changing the Administrator Password
The Management Console Administrator password is blank by default (before a file system has been created, and
if it has never been changed). Avid highly recommends that you set an Administrator password when you
configure the Management Console for the first time.
n
If you forget the Administrator password you have created, contact Avid Customer Care.
See “Guidelines for Names and Passwords” on page 19 for valid password characters and the maximum length.
To change the Administrator password:
1. In the navigation sidebar, click Users, then Administrator.
2. Type the current Administrator password in the Current Password field (default is blank).
3. Type the new Administrator password in the New Password field.
4. Type the new Administrator password again in the Verify Password field.
5. Click Sub
mit.
- The Administrator Password is changed to the new value.
- A confirmation message appears i
n the Results area.
Securing the Avid NEXIS Infrastructure
If your environment requires tight security, you can restrict access to the Management Console using TLS
(Transport Layer Security, often referred to as SSL) encryption, and you can change the BMC password.
Securing Access to the Management Console
By default, the Management Console uses unencrypted HTTP. However, you can also run the Management
Console using HTTPS (TLS). When TLS is enabled, the Avid NEXIS generates a self-signed certificate that
pr
ompts a browser warning.
To run the Management Console unencrypted:
t Open a browser and enter: http://<IP address>
The browser bar looks like the following:
To run the Management Console encrypted:
t Open a browser and enter: https://<IP address>
The browser bar looks like the following, but the traffic is being encrypted and is secure:
6
Changing the BMC Password
The Avid NEXIS system has several passwords:
The Administrator password, used when you log into the Management Console (by default, there is no
p
assword). You can change this at any time.
The password you use for initial system setup (
se-admin
).
The password for the BMC (Baseboard Management Controll
er), which is a low-level process on the Storage
Controller that manages the BIOS, MAC addresses, and other internal functions.
By default, the BMC password has been set
at the factory to be the same as the system setup password (
se-
admin
), but this could be a security concern in some environments.
If your lab environment or company requires it, you can change
the BMC password to prevent unauthorized
access to the hardware.
To change the BMC password:
1. Connect a computer or laptop to the Management Port on the Storage Controller, as shown:
2. Open a browser window and go to the address:
169.254.10.250
, which is the default IP address of the BMC
controller.
3. Log in using the user name
root
and the password
se-admin
.
4. In the BMC interface, click the Configuration tab.
7
5. Select Users from the pull-down menu.
6. Click Modify User.
8
7. Click the Change Password checkbox, enter a new password in the Password and Confirm Password
fields, then click Modify.
8. Click OK.
9. Log out of the BMC interface.
9
Configuring DNS Service
If your network environment includes one or more Domain Name servers, you can add the Avid NEXIS system to
the DNS service, and add the DNS domain to Avid NEXIS. This enables you to open the Management Console
u
sing the System Director host name, instead of the IP address. Enabling DNS also allows you to use LDAP for
external user authentication; for more information, see “Configuring External Authentication of Users” on
page 55.
To configure DNS:
1. In the navigation sidebar, click System, then System Setup.
2. In the Domain Name Service area, en
ter the following information:
- The DNS domain you want the Avid NEXIS system to join, without the top level domain.
(For example, if your domain name is Example.com, enter Example in the domain name field, but not
“.
com”.)
- One or more IP addresses for the DNS servers
in your environment, separated by spaces
- (Optional) Additional domains in your environment (i
f applicable) to search through when trying to
resolve a host name.
3. Click Save
.
If you enter an invalid IP address, an error message is displayed.
4. Add the Avid NEXIS system to your DNS service.
Changing the Storage System Name
The Storage System name represents all the Avid NEXIS Engines (and the System Director Appliance, if
applicable) operating as one shared-storage system.
The name can be up to 31 English alphanume
ric characters long, any combination of upper and lower case (a-z
and A-Z), can contain a dash or hyphen (-), and must start and end with a letter or number.
Renaming the system requires a reboot. You might want to perform this change when clients are not connected
an
d actively using the system.
n
Change all the non-System Director Engines first, then change the SDA or Engine running the System Director
last.
To change the Storage System Name:
1. In the navigation sidebar, click System, then System Setup.
2. Select any Engine not running the System Director. Click System.
3. Enter a new name into the Storage Syst
em Name field, then click Save.
A confirmation message is displayed stating that the system might reboot. Click Co
ntinue.
When the system reboots, a messa
ge is displayed stating that the system is rebooting and will attempt to
reconnect. The amount of time remaining until reconnection is displayed and counts down in real time.
When the remaining time has elapsed, you can log into the Management Console again.
4. Repeat this procedure on all Engi
nes except the SDA or the one running the System Director.
10
5. Change the Storage System Name on the SDA or the Engine running the System Director. Make sure this is
the last Engine to be changed.
When the last Engine has rebooted, clients can reconnect to the system. Users might need to refresh the host
list in the Client Manager to see the new name.
Upgrading the System
When new releases of the Avid NEXIS software are available, you can upgrade the Avid NEXIS clients and
system to take advantage of new features and bug fixes.
All the system components (Engines and System Director Appliance, if applicable) are updated at the same time,
through one operation.
To upgrade an Avid NEXIS System:
1. On your local computer, download the new software from Avid, using your support account.
2. Unzip the software on your computer.
3. In the navigation sidebar, click System, then System Setup.
4. Click the Install tab.
5. Click Choose File (or Browse on Firefox), and navigate to the location of the software kit contents that you
just unzipped.
6. Click Upgrade.
The kit is installed on each member of the system, and each reboots in turn. The System Manager remains
open, displaying a series of status updates about the upgrade process, and a reboot countdown, until the last
component has rebooted. (The countdown text is always centered on the display; if it is in the way, try
resizing your browser window until it no longer obscures the Results panel.)
The current login session ends, closing the Management Console. When the system reboots, the login screen
is displayed.
7. Log back in to the Management Console.
8. Click Dashboard (if not already displayed) and look under the System heading to confirm the new version.
Capturing System Information (Avid NEXIS Snapshots)
Avid NEXIS Snapshots capture the current state of the system and store that information for you to examine or
download later. Avid Customer Care personnel can use this information, coupled with the system logs collected by
the Log Aggregator tool (see
“Log Aggregator Tool” on page 73), to diagnose and troubleshoot problems.
The following information is collected:
System Director (Storage Controller) name, storage system name, the date the snapshot was collected, and the
name of the zip file containing the snapshot
The system component information (in .csv and .zip files), including any current warnings or errors and their
details
System Director status and metadata
All currently configured system preferences
11
Working with Snapshots
Create a snapshot if requested by Avid Customer Care.
To create a snapshot:
1. In the navigation sidebar, click System, then Snapshots.
2.
Click Take New Snapshot.
3. Enter a name for the snapshot and click Cr
eate.
The snapshot is created and the details are displayed in the Snapshots window.
To see a snapshot:
t By default, the most recent snapshot is displayed automatically. To see a different snapshot, select one from
the list.
To download a snapshot:
1. In the navigation sidebar, click System, then Snapshots.
2. Select the snapshot to download.
3.
Click Download.
Depending on your browser, the file might be downloaded automatically to the computer’s default
D
ownloads folder, or you are asked to choose whether to save the file or open it. Save the file. Avid Customer
Care might ask you to send them that file.
4. To view the contents of the file
, unzip or extract the file.
To delete a snapshot:
t Click Delete next to the snapshot you want to delete.
A confirmation message is displayed.
t Cl
ick Continue.
The selected snapsh
ot is deleted.
To delete all snapshots:
1. Click Delete All (next to the Take New Snapshot icon).
A confirmation dialog window opens.
2. Click Continue.
All snapshots are deleted.
Working with Snapshot Archives
When you create a snapshot, the Avid NEXIS Snapshots tool creates a folder which includes a compressed file
containing all the collected information. You can combine all the system snapshots into an archive to keep track of
the system status — for example, you can archive sn
apshots weekly or monthly. The Snapshot tool compresses
archives in a ZIP file (archivename.zip).
The compressed archive uses the same file na
me format as the snapshot folder.
You can download the archive in compressed for
m as a ZIP file by clicking Download.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96

Avid NEXIS 18.5 User guide

Category
Network management software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI