The Isilon NL 400 is cost effective, but it also offers incredible performance in an easy to manage package. Built on a solid foundation of affordability, performance, and simplicity, the Isilon NL 400 is an innovative solution for any business’s storage needs. Isilon – Scale-out Dell EMC clustered storage platform. Isi – The Isilon command line interface. OneFS – The operating system of an Isilon cluster. SMB/CIFS – The Server Message Block (SMB) Protocol is a network file-sharing protocol; it supersedes Common Internet File System (CIFS), an earlier protocol. SMB is used in this document to. This release is supported on DLm2100 and DLm8100 systems. This release is supported on DLm2100 and DLm8100 systems. This release is supported on DLm2100 and DLm8100 systems. EMC Isilon takes a scale-out approach to storage by creating a cluster of nodes that runs a distributed file system. OneFS combines the three layers of storage architecture—file system, volume manager, and data protection—into a scale-out NAS cluster. Each node adds resources to the cluster. Isilon is a network-attached storage platform from Dell EMC, running the proprietary OneFS operating system. ADAudit Plus can track file accesses and modifications made in Dell EMC Isilon storage in real time, and detect anomalous activity using its user behavior analytics (UBA) engine.
HomeIsilon Manual
Isilon X410 Manual
Read Me First
Isilon X200 Manual
New Validations. Expect to get warnings post upgrade. This is expected and is a key feature of this release to detect failover conditions that must be addressed to be ready for failover. If you get alarms it is good, so the issues can be fixed.- SyncIQ Domain Mark for fast fail back - checks both clusters to verify if SyncIQ domain mark exists and will raise warning if not found (NOTE: it will raise warning if you did not apply sudo update on step #1)
- SPN Delegation for Access zone and IP pool failover - This check AD Delegation was completed to the cluster AD objects and the opposite cluster (cross test). If any test fails it will raise a warning with exactly which delegation permission is missing.
- DNS Dual Delegation - This ensures automatic DNS resolution is in place before a failover. This validation will inspect your DNS configuration to determine if the Delegation is correct, A records resolve to subnet service ip's in the correct subnet. If you use Infoblox this validation must be disabled. It only supports standards based Name server delegations and not DNS forwarding.
Before Executing Upgrade Steps
- The upgrade will disrupt Eyeglass services for less than 10 minutes
- A VM level snapshot should be taken before upgrade to allow rollback to the previous version of the appliance
Inplace Upgrades
Scenario #1 - Appliances running Open Suse 42.3 OS to the latest release
This option allows customers to upgrade to the latest release without deploying a new OVF to get the latest operating system. NOTE: OS verson 42.3 no longer recieves security updates and is customers choice to stay on this OS of the appliance. NOTE: The OS is not covered by the support contract. NOTE: Release 2.5.6 is the last release to provide 42.3 installer files.
- To check the OS version
- ssh as admin user to Eyeglass
- type cat /etc/os-release
- The OS version is displayed
- If Running 42.3 and you wish to stay on this OS version without using new OVF upgrade path, then continue with steps here.
Scenario #2 - Appliances running Open Suse 15.1 OS to the latest release
- No special steps
- Continue to upgrade instructions here.
Inplace Upgrade - Installer Download and Upgrade Procedures
- To complete an offline upgrade:
- Login to support site with a registered support account https://support.superna.net
- Scroll down on page after login to locate the software download validation form.
- Get the appliance ID from the about window of the Eyeglass desktop
- Enter the appliance ID and click download button to retrieve the offline installer. NOTE: This command checks for an active support contract, and will only download software if support contract validation is successful.
- Use winscp tool (google winscp download) to copy the offline package onto the appliance with the admin user and password.
- ssh to the Eyeglass appliance and sudo to root command: sudo su - (you will be prompted for the admin password again)
- Make the offline package executable: chmod 755 <filename>
- Run the installer: ./<filename>
- You may be prompted for Phone Home Agreement if not previously set. Enter ‘y’ or ‘n’ to continue. Phone Home allows remote monitoring and faster support that allows remote log collection.
- Once the update is completed, login to the Eyeglass web page.
- IMPORTANT: Refresh any open Eyeglass window to ensure that you have latest changes.
- Check the About Eyeglass window and verify version shows the version you downloaded. The full list of releases can be found here.
- Complete
- Check Post upgrade steps here
Upgrade to A New Appliance from an Old Appliance
- Follow the steps in the next sections to complete the backup and restore process from an old appliance to a new appliance
Step 1 - Upgrade Path From Old Appliance Versions to Open Suse 15.1 OS with the latest Release - Backup/Restore Method
All Appliance versions prior to latest version are using Open Suse OS versions that no longer have security patches available (13.1, 13.2 , 42.1, 42.3). Use this upgrade option to get upgraded to the latest Eyeglass release and get the latest Open Suse 15.1 OS that includes automatic security patch updates. NOTE: If you are using an older version appliance backup file some settings are not retained depending on the backup file release version. The table in this document outlines settings that are migrated.
- Follow steps to download the new OVF here
- Deploy new Eyeglass VM using the install guide as a reference.
- NOTE: The new appliance ip address can be different than the old appliance IP.
- Reference the table of settings that are migrated in the next section.
- After the new appliance is deployed and you can login to the webUI and ssh then continue with the steps below.
Step 1a - Review Table of Migrated Settings if Backup File Version Matches New Appliance Version
Eyeglass Configuration Item | Source Appliance software version > 1.8.0 |
Restoring local credentials for clusters | Yes |
Restoring licenses keys | Yes |
Adjusting licenses keys to latest format | Yes |
Job Schedules | Yes |
Job Initial state Setting (enabled, disabled) | No |
custom settings with igls adv command. | Yes |
Restore Notification Center settings1
| Yes |
Restoring failover log history (if available) | Yes |
Restoring custom RBAC roles (if available) | Yes |
Restoring API tokens (if available) | Yes (as of 1.9.0) |
Restoring Ransomware Defender security guard logs (if available) | Yes |
Restoring cluster Configuration reports (if available) | Yes |
Restoring Current Job state (enabled, disabled, DFS mode) (if available) | Yes |
Alarm history | No |
Old Backups Archives | No |
Cluster Storage Monitor Data (if available) | No |
RPO Generated Reports | No |
RPO Report Data | No |
Failover Scripts | Yes |
Ransomware Defender Settings and History (if available)
2. schedule is restored but no other settings - these need to be re-added manually with user service account and password. | No |
Isilon Onefs Manual
Step 1b - Review Historical Eyeglass Data & Settings that are Not Restored before continuing
- All existing Eyeglass databases are removed, no backup is made.
- NOTE: This will delete databases and they will be rediscovered on startup. DO NOT USE this method if you have Cluster Storage Monitor or Ransomware Defender historical events or RPO Report data that you need to retain. Contact support if this applies to you scenario.
Step 2 - Information to Record before Upgrading
- Take a screenshot of the Eyeglass Jobs window prior to upgrade. This can be used as a reference to verify Job state and type. Example auto type or dfs type.
- (if IP pool mode configured) Take a screenshot of the IP Pool failover policy to pool mappings
Step 3 - Restore Zip File (old appliance) and Restore to New Appliance Procedures
- Take an Eyeglass Restore backup from your old Eyeglass appliance.
- Download the Restore backup locally and then copy the zip file backup using scp or winscp to the newly deployed Eyeglass Appliance. It should be placed in /tmp folder .
- See Restore Backup button that is required versus support backup. The Restore backup includes SSL private keys, the support backup does not. This applies to Releases > 2.5.3
- Power off the old Eyeglass appliance. It is not supported to have multiple Eyeglass appliances managing the same clusters.
- SSH to new Eyeglass appliance and login as admin (default password 3y3gl4ss). Issue “sudo su -” to enter in root mode (default password 3y3gl4ss).
- igls app restore /tmp/<eyeglass_backup.xxxx.zip> --anyrelease
- Replacing /tmp/<eyeglass_backup.xxxx.zip> with the name of the Eyeglass Archive file always including full path.
- You will be prompted to continue. Enter “y” to continue.
- igls app restore /tmp/eyeglass_backup_17-07-05_20-42-08.zip --anyrelease
- Do you want to revert to the archive at /tmp/eyeglass_backup_17-07-05_20-42-08.zip? [y/N]: y
- Check Post upgrade steps here
Post-Upgrade Steps (All Upgrade Paths)
Validate - Service account permissions, Eyeglass Job Status, Pool Mappings, Licenses and Cluster Inventory
- Mandatory Step - Check minimum permissions sudo section in this document are all in place for your release. This will generate errors if permissions are not correct. Use this guide to review sudo permissions.
- Login to the new Eyeglass appliance and check:
- Open Jobs window and verify all jobs modes are set correctly and appear in either config sync or DFS section. The screenshot taken before should be used to check the jobs are in the correct mode.
- If the jobs are in the wrong mode please set the mode correctly with the bulk actions menu.
- (only If IP Pool failover Mode is configured otherwise skip) use the sceenshot taken above to verify the synciq pool mappings using the DR Dashboard mapping screen to verfiy they look correct.
- Open License Manager Icon and verify Licences are visible.
- Open Inventory Icon and verifyClusters are displayed.
- Log in to the Eyeglass web page and open the Eyeglass Main Menu -> Notification Center and verify that the Alarm Severity Filter is correctly set
- And verify that the Email Recipients are correctly set with the correct Email Type.
- done
Validate - Ransomware Defender, Easy Auditor, Performance Auditor License Assignment
- This step is mandatory to ensure licenses are assigned to the correct cluster. This release no longer supports auto assigned license mode to clusters
- Login to Eyeglass
- Open License Manager
- Click on Licensed Devices tab
- First STEP: Set each cluster that should NOT be licensed to Unlicensed status using the drop down menu.
- 2nd STEP: Set each cluster listed to User Licensed for the product(s) that should be assigned to this cluster. Example the production writeable clusters should be set to User Licensed for Ransomware Defender or Easy Auditor.
- Click the submit button to save.