Veritas InfoScale™ Operations Manager 8.0.2 User's Guide
- Section I. Getting started
- Introducing Veritas InfoScale Operations Manager
- Using the Management Server console
- About selecting the objects
- About searching for objects
- Examples for using Veritas InfoScale Operations Manager
- Example: Cluster Server troubleshooting using Veritas InfoScale Operations Manager
- Example: Ensuring the correct level of protection for volumes controlled by Storage Foundation
- Example: Improving the availability and the disaster recovery readiness of a service group through fire drills
- Examples: Identifying and reducing storage waste using Veritas InfoScale Operations Manager
- Section II. Managing Veritas InfoScale Operations Manager
- Managing user access
- Creating an Organization
- Modifying the name of an Organization
- Setting up fault monitoring
- Creating rules in a perspective
- Editing rules in a perspective
- Deleting rules in a perspective
- Enabling rules in a perspective
- Disabling rules in a perspective
- Suppressing faults in a perspective
- Using reports
- Running a report
- Subscribing for a report
- Sending a report through email
- Managing user access
- Section III. Managing hosts
- Overview
- Working with the uncategorized hosts
- Managing File Replicator (VFR) operations
- Managing disk groups and disks
- Creating disk groups
- Importing disk groups
- Adding disks to disk groups
- Resizing disks in disk groups
- Renaming disks in disk groups
- Splitting disk groups
- Moving disk groups
- Joining disk groups
- Initializing disks
- Replacing disks
- Recovering disks
- Bringing disks online
- Setting disk usage
- Evacuating disks
- Running or scheduling Trim
- Managing volumes
- Creating Storage Foundation volumes
- Deleting volumes
- Moving volumes
- Renaming volumes
- Adding mirrors to volumes
- Removing the mirrors of volumes
- Creating instant volume snapshots
- Creating space optimized snapshots for volumes
- Creating mirror break-off snapshots for volumes
- Dissociating snapshots
- Reattaching snapshots
- Resizing volumes
- Restoring data from the snapshots of volumes
- Refreshing the snapshot of volumes
- Configuring a schedule for volume snapshot refresh
- Adding snapshot volumes to a refresh schedule
- Removing the schedule for volume snapshot refresh
- Setting volume usage
- Enabling FastResync on volumes
- Managing file systems
- Creating file systems
- Defragmenting file systems
- Unmounting non clustered file systems from hosts
- Mounting non clustered file systems on hosts
- Unmounting clustered file systems
- Mounting clustered file systems on hosts
- Remounting file systems
- Checking file systems
- Creating file system snapshots
- Remounting file system snapshot
- Mounting file system snapshot
- Unmounting file system snapshot
- Removing file system snapshot
- Monitoring capacity of file systems
- Managing SmartIO
- About managing SmartIO
- Creating a cache
- Modifying a cache
- Creating an I/O trace log
- Analyzing an I/O trace log
- Managing application IO thresholds
- Managing replications
- Configuring Storage Foundation replications
- Pausing the replication to a Secondary
- Resuming the replication of a Secondary
- Starting replication to a Secondary
- Stopping the replication to a Secondary
- Switching a Primary
- Taking over from an original Primary
- Associating a volume
- Removing a Secondary
- Monitoring replications
- Optimizing storage utilization
- Section IV. Managing high availability and disaster recovery configurations
- Overview
- Managing clusters
- Managing service groups
- Creating service groups
- Linking service groups in a cluster
- Bringing service groups online
- Taking service groups offline
- Switching service groups
- Managing systems
- Managing resources
- Invoking a resource action
- Managing global cluster configurations
- Running fire drills
- Running the disaster recovery fire drill
- Editing a fire drill schedule
- Using recovery plans
- Managing application configuration
- Multi Site Management
- Appendix A. List of high availability operations
- Section V. Monitoring Storage Foundation HA licenses in the data center
- Managing licenses
- About Veritas licensing and pricing
- Assigning a price tier to a host manually
- Creating a license deployment policy
- Modifying a license deployment policy
- Viewing deployment information
- Managing licenses
- Monitoring performance
- About Veritas InfoScale Operations Manager performance graphs
- Managing Business Applications
- About the makeBE script
- Managing extended attributes
- Managing policy checks
- About using custom signatures for policy checks
- Managing Dynamic Multipathing paths
- Disabling the DMP paths on the initiators of a host
- Re-enabling the DMP paths
- Managing CVM clusters
- Managing Flexible Storage Sharing
- Monitoring the virtualization environment
- About discovering the VMware Infrastructure using Veritas InfoScale Operations Manager
- About the multi-pathing discovery in the VMware environment
- About discovering Solaris zones
- About discovering logical domains in Veritas InfoScale Operations Manager
- About discovering LPARs and VIOs in Veritas InfoScale Operations Manager
- About Microsoft Hyper-V virtualization discovery
- Using Web services API
- Veritas InfoScale Operations Manager command line interface
- Appendix B. Command file reference
- Appendix C. Application setup requirements
- Application setup requirements for Oracle database discovery
- Application setup requirements for Oracle Automatic Storage Management (ASM) discovery
- Application setup requirements for IBM DB2 discovery
- Application setup requirements for Sybase Adaptive Server Enterprise (ASE) discovery
- Application setup requirements for Microsoft SQL Server discovery
Configure Secure File System
Use the Edit file system - Edit secure file system wizard to configure Secure File System on an existing file system. You can select any one or both of the following protection type to configure on an existing file system.
Check the following table for the Corruption Protection option's field description:
Table: Corruption Protection options
Field | Description |
---|---|
Interval | Specifies how often you want to take snapshots. You can select one of three options: daily, weekly, or monthly. |
Total snapshots | Specifies the total number of snapshots that you want to retain. |
Check the following table for the Ransomware Protection option's field description:
Table: Ransomeware Protection options
Interval | Specifies how often the checkpoint frequency that you want to set. You can select one of three options: daily, weekly, or monthly. |
Total checkpoints | Specifies the total number of checkpoints that you want to set. |
Retention time | Specifies retention span. Time for which the checkpoint should be retained. |
Checkpoints | Specifies whether the checkpoints are Removable or Non-removable. By default, checkpoint will be removable. |
Mode | Specifies the mode of the file system. While configuring SecureFS on an existing file system, the mode cannot be switched to compliance mode (Compliance mode refers to softworm) if the file system has WORM enabled. On the other hand, if the WORM (WORM refers to Enterprise mode) is not enabled, the configuration process automatically converts the file system to enterprise mode. Compliance mode is a default mode however, you can change the mode later if required. |
Audit log | Specifies the logging of certain event to persistent storage. You can choose to enable or disable it. By default, it will be enabled. Once enabled it cannot be disabled. |
Policy creation wizard options | |
Create Policy | Specifies WORM policy creation. You can configure policy to mark files as WORM while creating SecureFS. |
Interval | Specifies the Interval for the policy. |
Create rule wizard options | |
Rule Name | Specifies the name of the rule that you are going to create. |
Pattern | Specifies the pattern of the file name, which can be an exact file name or a pattern that includes a single wildcard character. |
Directory | Specifies a full path name relative to the file system mount point where the file system is mounted. You can select recursive or non-recursive. |
Users | Specifies username of the file's owner. The user number cannot be specified in place of the name. |
User groups | Specifies group name of the file's owner. The group number cannot be specified in place of the group name. |
Retention | Specifies the retention unit in days, months, and years. |
When : Specifies that files should be relocated if and only if they meet any or of the following relocation criteria. | |
Access age | This criterion is met when files are inactive for a designated period or during a designated period relative to the time at which the policy enforced. |
Modification age | This criterion is met when files are unmodified for a designated period or during a designated period relative to the time at which the policy enforced. |
Size | This criterion is met when files exceed or drop below a designated size or fall within a designated size range. |
IO temperature | This criterion is met when files exceed or drop below a designated I/O temperature or fall within a designated I/O temperature range. |
Access temperature | This criterion is met when files exceed or drop below a specified average access temperature or fall within a specified access temperature range. A file's access temperature is similar to its I/O temperature, except that access temperature is computed using the number of I/O requests to the file, rather than the number of bytes transferred. |