Chat now with support
Chat with Support

Metalogix Archive Manager for Files 8.3 - HSM Guide

Optional Configuration

 

Additional configuration options of HSM in Configuration tool described in this chapter are optional. However, they provide administrator with diagnostic, encryption, pack and async task possibilities on the following tabs:

·Advanced

·Diagnostics

·Encryption

·Packer

·Tasks

 

Advanced tab

 

This tab is used to configure the more advanced settings of HSM as single instancing, cache settings and temporary folder. After configuring all options press the Apply button.

 

a-advanced

 

 

Duplicate files detection

Since the HSM system includes the Duplicate Files Detection service, it means that identical files are stored only once. In the Duplicate files detection section you may specify the detection method:

a)Select the Detect by content option, should you wish to use the size, checksum and content for detection.

b)Select the Detect by checksum option, should you wish to use the size and checksum for detection;

c)Select Do not detect duplicate files option, should you wish to disable this detection

WARNING: In case the Force in store is enabled, the file is stored in both stores.

 

 

Caching

Use caching in case of slow storages (tape etc.). HSM will cache the recently used files to speed up the retrieving process.

If Enable caching is checked, HSM will copy all retrieved files to an HSM internal cache. To set the Cache directory (which should be a local hard disk), use the Browse button next to the respective text box. If you have a cluster, the HSM will know that each installation has its own path.

Set the Minimum cache size and Maximum cache size as well. The Minimum size should be about 80% of the cache size. If the cache is full, HSM will delete files (the oldest first) until the cache reaches the “minimum size”.

NOTE: To choose which Media Store should be cached, use the MediaStoreAdministrator tool. It is started when you click Launch on the Stores & Schemas tab.

 

The HSM stores temporary files created during duplication detection, compression etc. in temporary directory. Its location can be set in Temp directory text box. Usage of environment variables is allowed in this box (e.g. %TEMP% denotes the temp folder of the currently logged on user).

 

Diagnostics tab

 

From time to time administrators need to check systems they manage, examine and analyze their behavior. This tab provides access to features that facilitate this task. Logs and tracing record HSM actions specified by the administrator at the defined extent.

 

b-diagnostics

 

 

Manage trace settings

In the HSM Trace Settings configuration you can enable various kinds of loggings for the specific HSM components. Select the component in the list and then configure it by checking/unchecking the desired check boxes. Multi-select is possible.

c-trace

 

You can enable verbose logging (Debug Output), two kinds of performance loggings (logging information after a specific operation is completed or before a specific operation begins – Performance logging and Performance logging (with entry) and choose whether you want to re-direct outputs either to debug output (Force output to debug output) or to the given trace file (Force output to trace file). In the case of Force output to trace file the path has to be specified in the Trace File box. The trace information will be logged there. You can also Open the trace file with the Open file button or delete its contents with the Clear File button. If you clear the file then the file itself won’t be deleted. Use Add comment in case you wish to add some text to the file.

After changing the settings you want click the OK button. If you want to discard them click the Cancel button.

 

 

Manage log settings

In the Log settings dialog configure the overall HSM logs to your needs:

Include message levels – define which information should be logged

oErrors only

oErrors and warnings

oErrors, warnings and Information

NOTE: “Error” and “Warning” is internal classification of log entries.

 

Debug output – check to enable verbose logging

Log file – check to save the messages in log files

Path – set logs location

Name prefix – define naming convention; log file name will include this prefix and a number

Number of files – if a new log file should be created when the limit is reached, the oldest log file will be deleted

Size of each file – when the defined size is reached, new log file will be started

 

Click Open the current log file to open it.

Clicking the Clear all files will delete all logs.

d-log

 

Encryption tab

The Encryption tab allows you to manage encryption keys that are used to safeguard your archived items stored in HSM.

e-encryption

Steps to create an encryption key

1.In the Encryption tab, click Create. The Create new encryption key window opens.

e-encryption2

Enter the information as described below:

Key name - display name of the encryption key.

Key type - Select one of the industry standard encryption ciphers RC4 or AES256. Between the two, AES256 is a relatively new and very complex 256-bit block cipher, and RC4 is a very old and simple stream cipher.

2.Click OK to create the encryption key. The Configuration window opens.

e-encryption3

3.Click Yes to export the key or click No to export it later. If you click Yes, the Export Encryption Key window opens. See the section below for steps to export the encryption key.

info

IMPORTANT: Always export and store encryption keys in a safe location. If the key is lost, it will not be possible to read the encrypted files.

Steps to export an encryption key

1.There are two ways to export an encryption key:

a.Select an encryption key from the encryption key list and click Export.

b.Create a new encryption key and click Yes in the Configuration window that opens after you have created the key.

2.In the Export Encryption Key window, enter the information as described below.

e-encryption4

a.Path to key/file - location where the key will be exported. Click Browse to open the Save As window. The default location is C:\Program Files (x86)\Common Files\PAM\HSM\Keys. Keep the default or choose a location. Then enter a name for the encryption key file and click Save.

b.Password for encryption - enter a password for the encryption file.

c.Confirm password - enter the password again to confirm the password entry.

3.Click Export to export the encryption key.

Steps to import an encryption key

1.In the Encryption tab, click Import. The Import Encryption Key window opens.

e-encryption5

2.Enter the information as described below:

a.Path to key/file - location from where the key will be imported. Click Browse to select a location.

b.Password for encryption - enter a password for the encryption file.

c.Key name - name of the encryption key file.

3.Click Import to add the encryption key to the HSM encryption key list.

Steps to modify an encryption key

1.Select an encryption key from the encryption key list and click Modify. The Edit Encryption Key window opens.

e-encryption6

2.You can change the Key name of the encryption key but you cannot change the Key Type.

3.Click OK to save the change.

Steps to delete an encryption key

1.Select an encryption key from the encryption key list

2.Click Delete. A confirmation window opens.

3.Click Yes to confirm the deletion of the encryption key.

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating