Table of Contents | ||||
---|---|---|---|---|
|
Overview
Perifery Transporter is an S3 native portable storage appliance. Featuring state-of-the-art data protection, Perifery Transporter is capable of storing data created at the edge and shuttling that content back to a base location. Perifery Transporter can be used either as a standalone device or with existing in-facility Perifery or Swarm clusters. Data import from Perifery Transporter to a main cluster is possible at the push of a button. Once the data transfer is completed, the system can be reset and made ready to go back out on location.
...
The following items should be present:
The Perifery Transporter device
A USB key (this is *required to operate the Perifery Transporter)
A sheet with information about connecting to the device
...
The setup requires three steps:
Plugin USB key – Plugin the USB key into the Perifery Transporter device.
Plug into the network switch – Plug the Perifery Transporter device into a network switch. Your computer/laptop must also be plugged into the same switch for the local network connection.
Power on the device – Press the power button to turn on the device. Once power is on, the device will be accessible via the network. Consult the sheet that came with the device for the URL to enter into your browser to view the console.
...
Reboot
Reboot takes a few minutes to reboot the Perifery Transporter. No action is required on your part; we recommend that you wait for the reboot to occur within its scheduled window.
...
When you reboot, it starts the following:
...
When the reboot is complete, it shows a confirmation message.
...
Info |
---|
The user needs to perform the same steps on every bootreboot. |
Login
Once the device is ready, login into Perifery using the default username and password. These are also found on the sheet that came with the device.
Info |
---|
Login will not be possible until all the services have fully come online. This may take several a few minutes. |
...
Enter the default credentials. For the first-time login user, the credentials are:
Username – periferyadmin
Password – password
Click Login.
...
The default password is common for all users, hence, it is required to have a new strong password for security, which is unique and memorable for the user. This step is applicable to the first-time login only.
...
The new password must qualify the following requirements:
Password length should be between 8-64 characters
Combination of at least one uppercase, lowercase, and number
One special character (e.g., @, #, $, !, %, etc.)
...
New password – Enter the updated password. If it qualifies the above password criteria, all password checks appear in green.
Confirm password – Re-enter the same password again.
...
Click Update password. A message appears ‘Password updated successfully'.
...
Bucket name – The name of the bucket.
Object count – The count of objects in numbers.
S3 destination – The migration target.
Move content – This action item is used to move the bucket content to the remote location.
Report generation – This action item is used to generate the bucket report that you can view in the browser or download in raw JSON. This button gets enabled only after the bucket is moved to the remote location.
The refresh icon is added to refresh the list of bucket names that have been added and are ready for migration.
Move bucket content
You can move the bucket content to the desired remote location using the below steps:
Click on the Move icon corresponding to the bucket. It displays a form in the sliding panel.
Fill up the required fields marked with asterisks (*). An example is shown in the screenshot below:
S3 endpoint URL – Enter a valid target S3 endpoint URL.
S3 region – Enter the S3 region, which is a geographic area of the storage if required by the remote storage vendor.
S3 bucket – Enter the target S3 bucket where the content is to be moved.
Remote folder – Enter a folder path within the remote bucket. This is optional.
Remote S3 access key – Enter an access key for the remote bucket. It must be generated within the remote cloud storage service.
Remote S3 secret key – Enter an S3 secret key. It is generated with the access key.
Click Move. A confirmation message appears:
Now, the S3 target is displayed in the S3 destination column for the corresponding bucket.
Report generation
The report icon gets enabled irrespective of whether the bucket has been moved successfully or got failed to move to the remote location. To generate the report, refer to the following steps:
Click on the reporticon corresponding to the bucket.
All the objects available in the selected bucket are displayed along with their object name and object status on a successful migration. It gives a preview of the bucket content report:
In case the report is generated for a failed migration, the report shows the reason for cause of the migration error.Click Download. It will either download or pop up in a browser tab depending on how the browser handles the content type of the JSON file.
...
The user can view the profile from the top-right corner of the screen, which contains two options Change password and Logout.
...
three options:
About Perifery Transporter
Change password
Logout
...
About Perifery Transporter
This provides versions of the system and services used in Perifery Transporter.
...
Change password
This option is available for existing users. If they want If a user wants to change the current password, refer to the following steps:
...