Skip to main content
Version: vStor 4.14

vStor System Settings

Catalogic vStor offers a comprehensive set of settings allowing you to customize and optimize your storage environment. These settings can be accessed through the System view in the navigation sidebar. The System view consists of two tabs: System Settings and Network Settings.

Note.

The System view is only available for users with Admin role. For more information, see vStor User Roles.

The System Settings tab features a number of panes, each dedicated to a particular group of settings or parameters. See detailed description of each section below.

[image expected here]

System Information​

This section gathers general information about the vStor’s OS, library versions and statuses.

[image expected here]

Host​

This section displays hostname and domain name information.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit Host dialog window.

[image expected here]

Certificates​

This section allows you to manage certificates in Catalogic vStor.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit Certificate dialog window.

[image expected here]

You can use the built-in certificate or add a custom one by selecting Custom certificate from the Certificate dropdown.

See also.

For more details on certificates in vStor, see Managing Certificates.

General​

This section gathers the general settings of your vStor machine.

[image expected here]

Async snapshot creation timeout​

Sets the maximum time (in seconds) vStor will wait for an asynchronous snapshot creation operation to complete before marking it as failed.

Configuration retention time​

Specifies how long (in days) vStor will retain configuration backups.

Dashboard refresh time​

Sets the interval (in seconds) for automatically updating the vStor dashboard.

Mount file systems limit​

Sets the maximum number of file systems simultaneously mountable during agentless file restores.

Mounted file system volume retention timeout​

Controls the default time (in minutes) a mounted volume from an agentless file restore will remain accessible.

NFS server threads​

Controls the number of threads dedicated to the NFS server for improved performance.

Schedule timezone​

Sets the timezone used for replication and AutoSnapshot schedules.

Snapshot creation timeout​

Sets the maximum time (in seconds) vStor will wait for a snapshot creation operation to complete before marking it as failed.

Volume creation timeout​

Sets the maximum time (in seconds) vStor will wait for a volume creation operation to complete before marking it as failed.

You can edit this section by clicking the Edit button to launch the Edit General dialog window.

[image expected here]
Tip.

Use the Reset button to restore default values. You will be prompted to confirm your decision.

Kerberos Configuration​

This section displays the current Kerberos configuration.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit Kerberos Configuration dialog window.

[image expected here]

Realm​

Specifies the domain over which the Kerberos authentication server has the authority to authenticate a user, host or service.

KDC Hostname​

Specifies the Key Distribution Center (KDC) host.

Kerberos Keytab File​

Indicates the file containing key pairs for Kerberos authentication.

Tip.

Use the Reset button to restore default values. You will be prompted to confirm your decision.

NFS Configuration​

This section displays the current NFS configuration.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit NFS Configuration dialog window.

[image expected here]

NFS Server Treads​

Specifies the maximum number of threads on the NFS server. The default value is 32.

Enable Support for NFSv3 Connection​

This toggle controls compatibility with NFS version 3.

Tip.

Use the Reset button to restore default values. You will be prompted to confirm your decision.

Encryption Keystore​

Encryption Keystore is a remote location where encryption keys for vStor volumes are stored. The recommended location for the Encryption Keystore is the DPX Master Server, although all Linux machines are supported.

[image expected here]

Configuring Encryption Keystore​

When configuring the Encryption Keystore in vStor, the user specifies an existing remote location for the keystore and credentials for the user with writing access to the specified directory.

Tip.

We recommend using your DPX Master Server as the remote Encryption Keystore, but you can use any Linux machine.

Note. User authentication must not require any additional steps besides specifying the username and password , e.g. multifactor authentication. In such a case, a connection error will be thrown.

You can edit the section by clicking the Edit button to launch the Edit Encryption Keystore dialog window.

Note.

To save edits made to the Encryption Keystore dialog, you need to specify the valid password to the remote Encryption Store’s location.

[image expected here]
  1. Populate the dialog according to the indications below.
FieldDescription
UserThe Linux user with writing access to the keystore’s directory.
PasswordThe Linux user’s password.
HostThe hostname or IP address of the machine where the keystore is located.
PortThe port on which the machine with keystore listens.
PathAn existing absolute directory to be used as the Encryption Keystore.
The path must be in Linux format.
  1. Click Test to verify the keystore accessibility (optional).
  2. Click Save. The configuration is now saved. The connection will also be tested when saving.
See also.

For more information about the Encryption Keystore, see Using Remote Keystore.

Managing Keys​

You can manage the keys in the keystore by clicking the Manage keys button to launch the Manage Keys dialog window.

[image expected here]

The Manage Keys dialog window shows the list of all encrypted volumes on the vStor. Volumes with encryption key added to the Encryption Keystore are marked with .

To add encryption key to a volume, do the following:

  1. Click the Add key button next to the desired volume to launch the Add Encryption Key button.
[image expected here]
  1. Type in the valid encryption key for the volume.
  2. Click Save.
Important.

The encryption key you add to the Encryption Keystore must be the same as specified when enabling encryption for the volume. Otherwise, any decription operations will fail.

Deleting Keys​

[image expected here]

To delete a key from Encyption Keystore, hover over a row with Encryption Key added and click theicon. You will be prompted to confirm your decision. Click Delete.

[image expected here]

You can also delete all stored Encryption Keys using the Delete all keys button at the bottom of the Manage Keys dialog window. You will be prompted to confirm your decision by typing your vStor password. Click Delete.

[image expected here]

Resetting Encryption Keystore​

Use the Reset button to restore default values. You will be prompted to confirm your decision.

[image expected here]

You can use the toggle to delete all associated keys from the keystore. You will need to confirm your decision by typing your vStor password.

[image expected here]

Click Reset. The Encryption Keystore configuration will be cleared and all keys stored remotely by your vStor will be deleted from the remote location.

Telemetry​

To help improve vStor, you can share usage data with Catalogic Software.

[image expected here]

Collect telemetry data​

Enables the collection of anonymous usage data.

Share collected telemetry data with Catalogic Software​

Select this option to send the collected telemetry

Debug Logging​

For in-depth troubleshooting, you can enable more detailed logging.

[image expected here]

Generates detailed logs for troubleshooting vStor backend processes.

Important.

Before enabling debug logging, we recommend contacting the Catalogic Software Data Protection Technical Support, as the log files in debug mode may occupy a considerable amount of space.

Firewall​

Use the toggle to enable or disable firewall.

[image expected here]

Time​

By default, vStor uses your machine’s locale to determine the current time.

[image expected here]

NTP Servers​

The address of your preferred NTP server.

NTP Time​

Allows you to manually set the system time. Enter the desired time in ISO 8601 format, which includes the date, time, and timezone offset.

Format: YYYY-MM-DDTHH:MM:SS.SSSSSS+HH:MM

Example: 2024-09-18T05:16:33.135311-04:00

This represents:

  • Date: 2024-09-18 (September 18, 2024)
  • Time: 05:16:33.135311 (5:16 AM, 33 seconds, and microseconds)
  • Timezone offset: -04:00 (4 hours behind UTC)

NTP Timezone​

Choose a new timezone from the dropdown list.

You can edit this section by clicking the Edit button to launch the Edit Time dialog window.

[image expected here]

Deduplication​

Data deduplication is a process of eliminating multiple copies of data to optimize storage usage. Instead, only unique data chunks are stored.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit Deduplication dialog window.

[image expected here]

Deduplication table prefetch timeout (seconds)​

Defines the maximum time (in seconds) vStor will try to load the deduplication table into memory.

Tip.

Use the Reset button to restore the default value (900 seconds). You will be prompted to confirm your decision.

Replication​

This section gathers data transfer settings for outbound replication traffic.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit Replication dialog window.

[image expected here]

Bandwidth limit​

Defines the bandwidth limit in bytes per second.

Management timeout​

Defines the timeout in seconds for requests made to vStor partners.

Maximum replication streams​

Defines the maximum replication streams concurrently.

Stream compression​

Defines if the replication stream is compressed.

Transfer timeout​

Defines the replication transfer timeout in seconds.

Tip.

Use the Reset button to restore default values. You will be prompted to confirm your decision.

See also.

For more information about vStor replication and replication relationships, see Creating a Replication Relationship.

E-mail Notification Details​

This section includes details concerning vStor e-mail notifications.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit E-mail Notification Details dialog window.

[image expected here]

E-mail Sender​

Enter the sender name for vStor e-mail notifications.

E-mail Recipients​

Enter the e-mail addresses that will receive notifications. Multiple recipients can be added by separating them with commas.

Tip.
  • Use the Send test e-mail button to send a test notification and verify your e-mail configuration.
  • Use the Reset button to restore default values. You will be prompted to confirm your decision.

E-mail Server Settings​

This section gathers e-mail notifications configuration for your vStor instance.

[image expected here]

You can edit this section by clicking the Edit button to launch the Edit E-mail Server Settings dialog window.

[image expected here]

Hostname / IP address​

Your SMTP server address.

Port​

The port your SMTP server uses (usually 25, 465 or 587).

Enable secure connection​

With this option disabled, your e-mail credentials will be sent in plain text.

SMTP Username​

Your SMTP server authentication username.

SMTP Password​

Your SMTP server authentication password.

Tip.
  • Use the Test button to verify e-mail server data (optional).
  • Use the Reset button to restore default values. You will be prompted to confirm your decision.