Monitoring access to vaults in IBM Cloud Object Storage

In these scenarios, you use IBM Spectrum® Control to identify the vaults that cannot be accessed and the vaults that are at risk of access failure. Then, you identify the access pools and the COS Accesser® nodes that the vaults depend on.

How the accessibility value for a vault is determined

The accessibility value that is calculated for each vault comprises the number of COS Accesser nodes that are available to access the vault. For example, if five COS Accesser nodes are configured for a vault and four of the nodes are in a failed state, then the accessibility value is one.

On the details page for IBM® Cloud Object Storage, the Vaults by Accessers chart shows the vaults that are inaccessible and the accessibility values for the remaining vaults in the storage system.