The Elastio Cluster Admin interface provides administrators a streamlined way to configure settings, manage ransomware and malware scan plans, and monitor system performance. This guide walks through key features and functionalities to help users navigate and utilize the platform effectively.
Contents
- 1. Login
- 2. Cluster Home
- 3. Jobs Dashboard
- 4. Plans Management
- 5. Edit Plan Configuration
- 6. Global Configuration
- 7. User Profile Settings
- 8. Exporting Assets to CSV
1. Login
Overview
The login screen is the entry point for users to authenticate and access the Elastio Cluster Admin dashboard.
To access the Admin console: https://leader_node_host
Default User/Password: admin/elastio4all
Key Features
- Username and password fields for authentication.
- "Remember me" checkbox for persistent login sessions.
- Secure Sign In button.
User Actions
- Enter your username and password.
- Click Sign In to access the dashboard.
2. Cluster Home
Overview
The Cluster Home screen provides a high-level overview of the Elastio system, including active workers, services, and system status.
Key Features
- Cluster Info: Displays cluster name, version, and update timestamps.
- Services: Monitors essential components (Metrics Collector, Logs Collector, DB Service, etc.).
- Workers: Lists active worker nodes, including hostname, IP address, status, and last heartbeat.
- Actions: Provides an option to suspend worker nodes.
User Actions
- View real-time cluster status and health indicators.
- Suspend worker nodes as needed.
3. Jobs Dashboard
Overview
The Jobs Dashboard displays all scheduled and executed scan jobs, providing status updates for each task.
Key Features
- Filter Jobs: Users can filter by server, plan, and worker.
- Status Indicators: Jobs are categorized as Running, Completed, or Pending.
- Detailed Job Logs: Displays timestamps, start/end times, and execution duration.
User Actions
- Track job execution status.
- Monitor running and completed jobs.
- Filter job records based on date range and other attributes.
4. Plans Management
Overview
The Plans Management screen allows users to create, edit, and manage backup scan plans.
Key Features
- Plan List: Displays all active and configured plans.
- Scan Type: Defines the type of scan, including "Ransomware & Malware with Entropy".
-
Actions Menu:
- Edit an existing plan.
- Force Execute a scan immediately.
- Export Assets to CSV for reporting.
- Delete a plan.
User Actions
- Click Create New Plan to define a new scan.
- Edit existing plans or execute scans manually.
- Export scan results for external analysis.
5. Create/Edit Plans
Overview
The Edit Plan screen allows users to customize scan settings and scheduling.
Key Features
- Basic Info: Define plan name and vCenter configuration.
-
Asset Selector Config: ( Review specific details by Backup Vendor )
- Filter assets by name, VM Group, or company.
- Exclude specific VMs or groups from scans.
-
Scan Settings:
- Select scan type (Ransomware & Malware recommended).
- Enable Incremental Malware Scanning.
-
Schedule Settings: ( Review schedule settings details )
- Define scan frequency (e.g., daily, weekly, specific days).
- Enable options such as "Scan at most one RP per asset per day".
User Actions
- Modify asset filtering settings.
- Enable incremental scanning if needed.
- Define a schedule.
- Save changes to apply new configurations.
6. Global Configuration
Overview
The Global Configuration screen allows administrators to manage system-wide settings and cloud integration.
Key Features
-
Elastio Cloud Connector Link:
- Configure AWS Access and Secret Keys.
- Set the AWS region.
-
System Updates:
- Enable/Disable automatic updates.
- Enable non-interruptive mode.
- Set update check intervals (default: 24 hours).
User Actions
- Configure AWS credentials for cloud backup scanning.
- Enable system updates to ensure latest security patches.
7. User Profile Settings
Overview
The User Profile screen allows individual users to manage their personal preferences and credentials.
Key Features
- Preferences: Set the time zone (default: Browser Time Zone).
-
Change Password:
- Enter a new password and confirm it.
- The "Change" button is enabled only when both fields match.
User Actions
- Navigate to Settings → User Profile.
- Update your time zone preference.
- Change your password as needed.
8. Exporting Assets to CSV
Overview
This screen allows users to export asset scan results for external analysis and reporting.
Key Features
- Export asset lists for active scan plans.
- Download data in CSV format.
User Actions
- Navigate to the Plans tab.
- Select a plan and click "Export Assets to CSV".
- Download and review exported data.
Asset Selector Configuration
Asset selection varies by backup provider:
-
For Commvault: Specify backup VM names, include/exclude VMs by group name, and set copy precedence.
Company name (leave empty to select Commcell resources):
Include VMs by VM group name patterns (comma-separated, wildcards):
Copy precedence: (0=Automatic or numeric value 1 through n)
-
For Cohesity & Rubrik: Specify backup VM names and select repositories to include/exclude.
-
For Veeam: Use Backup Name or Backup Job Name for asset selection, allowing flexible filtering.
By Backup Name
It is ideal for selecting and inspecting orphaned or imported backups that are not associated with backup or copy jobs.
By Backup Job Name
Designed for typical use cases, this option allows straightforward selection and inspection of assets linked to specific backup jobs.Both Backup Name and Backup Job Name filters now accept lists of patterns, making it easier to match multiple backups or jobs simultaneously.
Filter Name Patterns: LDA-01*,LDA-02-PROD
Troubleshooting Steps
- Backup Job Name Filtering: Works for tagging workflows but does not capture Backup Copy Jobs.
- Backup Name Filtering: Captures all backup types but does not allow renaming for tagging.
- If Backup Copy Jobs are missing, use Backup Name Filtering instead.
-
If tagging is required, use Backup Job Name Filtering.
Backup Selection Methods
Selector Type | Supports Backup Copy | Allows Tagging |
---|---|---|
Backup Job Name | No | Yes |
Backup Name | Yes | No |
Schedule Settings
Recommended Setup
While the recommended setup supports incremental forever ransomware detection daily and full malware scans every week, this approach is feasible only for environments capable of completing inspections within that timeframe. For most customers, incremental malware scans will be the practical option due to resource or time constraints.
Configuring Schedules
Elastio's scheduling feature offers flexibility, allowing you to configure inspections for specific days of the week. This is particularly useful for environments that cannot perform daily inspections consistently.
For example, to configure periodic full malware scans while maintaining regular incremental scans, you can create two distinct scan plans:
- Plan 1 (Weekdays): Incremental ransomware detection and malware scans scheduled Monday through Friday.
- Plan 2 (Weekend): A full ransomware detection and malware scan is scheduled weekly on Saturday.
In this setup, Sunday is left unselected, assuming the full malware scan from Saturday may require additional time to complete and extend into Sunday.
Example in Practice
- Plan 1: Incremental inspections Monday through Friday.
- Plan 2: Full ransomware detection and malware scan on Saturday, with Sunday reserved for completion if needed.
This strategy balances thorough detection with system capacity and time constraints.