Configuring vStor System Settings
Last updated
Last updated
Catalogic vStor offers a comprehensive set of settings allowing you to customize and optimize your storage environment. These settings can be accessed through the System view in the navigation sidebar. The System view consists of two tabs: System Settings and Network Settings.
The System Settings tab features a number of panes, each dedicated to a particular group of settings or parameters. See detailed description of each section below.
This section gathers general information about the vStor’s OS, library versions and statuses.
This section displays hostname and domain name information.
You can edit this section by clicking the Edit button to launch the Edit Host dialog window.
This section allows you to manage certificates in Catalogic vStor.
You can edit this section by clicking the Edit button to launch the Edit Certificate dialog window.
You can use the built-in certificate or add a custom one by selecting Custom certificate from the Certificate dropdown.
This section gathers the general settings of your vStor machine.
Sets the maximum time (in seconds) vStor will wait for an asynchronous snapshot creation operation to complete before marking it as failed.
Specifies how long (in days) vStor will retain configuration backups.
Sets the interval (in seconds) for automatically updating the vStor dashboard.
Sets the maximum number of file systems simultaneously mountable during agentless file restores.
Controls the default time (in minutes) a mounted volume from an agentless file restore will remain accessible.
Controls the number of threads dedicated to the NFS server for improved performance.
Sets the timezone used for replication and AutoSnapshot schedules.
Sets the maximum time (in seconds) vStor will wait for a snapshot creation operation to complete before marking it as failed.
Sets the maximum time (in seconds) vStor will wait for a volume creation operation to complete before marking it as failed.
You can edit this section by clicking the Edit button to launch the Edit General dialog window.
This section displays the current Kerberos configuration.
You can edit this section by clicking the Edit button to launch the Edit Kerberos Configuration dialog window.
Specifies the domain over which the Kerberos authentication server has the authority to authenticate a user, host or service.
Specifies the Key Distribution Center (KDC) host.
Indicates the file containing key pairs for Kerberos authentication.
This section displays the current NFS configuration.
You can edit this section by clicking the Edit button to launch the Edit NFS Configuration dialog window.
Specifies the maximum number of threads on the NFS server. The default value is 32.
This toggle controls compatibility with NFS version 3.
Encryption Keystore is a remote location where encryption keys for vStor volumes are stored. The recommended location for the Encryption Keystore is the DPX Master Server, although all Linux machines are supported.
You can manage the keys in the keystore by clicking the Manage keys button to launch the Manage Keys dialog window.
To add encryption key to a volume, do the following:
Click the Add key button next to the desired volume to launch the Add Encryption Key button.
Type in the valid encryption key for the volume.
Click Save.
Important. The encryption key you add to the Encryption Keystore must be the same as specified when enabling encryption for the volume. Otherwise, any decription operations will fail.
When configuring the Encryption Keystore in vStor, the user specifies an existing remote location for the keystore and credentials for the user with writing access to the specified directory.
You can edit the section by clicking the Edit button to launch the Edit Encryption Keystore dialog window.
Populate the dialog according to the indications below.
User
The Linux user with writing access to the keystore’s directory.
Password
The Linux user’s password.
Host
The hostname or IP address of the machine where the keystore is located.
Port
The port on which the machine with keystore listens.
Path
An existing absolute directory to be used as the Encryption Keystore. The path must be in Linux format.
Click Test to verify the keystore accessibility (optional).
Click Save. The configuration is now saved. The connection will also be tested when saving.
To help improve vStor, you can share usage data with Catalogic Software.
Enables the collection of anonymous usage data.
Select this option to send the collected telemetry
For in-depth troubleshooting, you can enable more detailed logging.
Generates detailed logs for troubleshooting vStor backend processes.
Use the toggle to enable or disable firewall.
By default, vStor uses your machine’s locale to determine the current time.
The address of your preferred NTP server.
Allows you to manually set the system time. Enter the desired time in ISO 8601 format, which includes the date, time, and timezone offset.
Format: YYYY-MM-DDTHH:MM:SS.SSSSSS+HH:MM
Example: 2024-09-18T05:16:33.135311-04:00
This represents:
Date: 2024-09-18 (September 18, 2024)
Time: 05:16:33.135311 (5:16 AM, 33 seconds, and microseconds)
Timezone offset: -04:00 (4 hours behind UTC)
Choose a new timezone from the dropdown list.
You can edit this section by clicking the Edit button to launch the Edit NTP dialog window.
Data deduplication is a process of eliminating excessive copies of data to optimize storage usage.
You can edit this section by clicking the Edit button to launch the Edit Deduplication dialog window.
Use the Reset button to return to default values.
Defines the maximum disk space (in bytes) the deduplication table can use before ZFS deduplication is disabled on the pool.
Sets a percentage threshold for memory usage. If exceeded, deduplication on the pool will be disabled.
This section gathers data transfer settings for outbound replication traffic.
You can edit this section by clicking the Edit button to launch the Edit Replication dialog window.
Defines the bandwidth limit in bytes per second.
Defines the timeout in seconds for requests made to vStor partners.
Defines the maximum replication streams concurrently.
Defines if the replication stream is compressed.
Defines the replication transfer timeout in seconds.
This section includes details concerning vStor e-mail notifications.
You can edit this section by clicking the Edit button to launch the Edit E-mail Notification Details dialog window.
Enter the sender name for vStor e-mail notifications.
Enter the e-mail addresses that will receive notifications. Multiple recipients can be added by separating them with commas.
This section gathers e-mail notifications configuration for your vStor instance.
You can edit this section by clicking the Edit button to launch the Edit E-mail Server Settings dialog window.
Your SMTP server address.
The port your SMTP server uses (usually 25, 465 or 587).
With this option disabled, your e-mail credentials will be sent in plain text.
Your SMTP server authentication username.
Your SMTP server authentication password.
Click the Reset button to return to default values.
Click the Test button to verify the e-mail server data (optional).
See also. For more details on certificates in vStor, see .
The Manage Keys dialog window shows the list of all encrypted volumes on the vStor. Volumes with encryption key added to the Encryption Keystore are marked with .
See also. For more information about the Encryption Keystore, see .
Important. Before enabling debug logging, we recommend contacting the , as the log files in debug mode may occupy a considerable amount of space.
See also. For more information about vStor replication and replication relationships, see .