Recently published articles

Network configuration
Manuals / 3.2

Basic network configuration Basic networking configuration allows you to configure the following: Hostname: network host name Domain name: DNS domain name to append to hostnames during DNS name resolution Default gateway: a router used by the storage to connect to the internet DNS 1/2/3: domain name servers to be used by storage when resolving internet names   The current configuration can be seen on Network > Basic configuration page. Configuring …

Continue reading

Data protection and disaster recovery
Manuals / 3.2

To protect data against accidental deletions or malware, you can schedule periodical snapshots. If you have another Syneto unit, you can also replicate the snapshots for disaster recovery protection. NOTEIn case you will replicate to another Syneto unit, do not forget to add the replication key to the destination storage. NOTEIn case you added new virtual machines to the mounted VMware datastore and it does not show up in the …

Continue reading

Clean up recovered virtual machines from a snapshot
Manuals / 3.2

On the left menu, select ‘Data management’ and then ‘Folder/Virtual disks’. Select the folder whose snapshot you want to clean up. NOTE: This will erase all the virtual machines recoverd from this snapshot. If you want to keep some of them, migrate them to another datastore. Click on the button left to the snapshot menu. A menu will appear. Select ‘Clean up virtual machines’.

Continue reading

Configure VM snapshots from folders page
Manuals / 3.2

On the left menu, select ‘Data management’ and then ‘Folder/Virtual disks’. Select a folder which has virtual machines. Then select the snapshot tab. The folders which have virtual machines stored on them have a little icon to the left of their name. It is a black box with vm written in it as you can see in the image below. To the right of the title ‘Local snapshots’, there is …

Continue reading

Protecting data from silent corruption
Manuals / 3.2

Syneto products have a built-in mechanism for protecting against silent data corruption. Silent data corruption means that data being read is different from the data previously written to a drive. There are several ways this could happen, from controller firmware errors all the way to natural events like cosmic radiation. To prevent silent data corruption, all data blocks are written accompanied by a checksum which uniquely identifies them. Later, when …

Continue reading