InfoScale™ Operations Manager 9.0 User's Guide
- Section I. Getting started
- Introducing Arctera InfoScale Operations Manager
- Using the Management Server console
- About selecting the objects
- About searching for objects
- Examples for using Arctera InfoScale Operations Manager
- Example: Cluster Server troubleshooting using Arctera InfoScale Operations Manager
- Example: Ensuring the correct level of protection for volumes controlled by Storage Foundation
- Example: Improving the availability and the disaster recovery readiness of a service group through fire drills
- Examples: Identifying and reducing storage waste using Arctera InfoScale Operations Manager
- Section II. Managing Arctera InfoScale Operations Manager
- Managing user access
- Creating an Organization
- Modifying the name of an Organization
- Setting up fault monitoring
- Creating rules in a perspective
- Editing rules in a perspective
- Deleting rules in a perspective
- Enabling rules in a perspective
- Disabling rules in a perspective
- Suppressing faults in a perspective
- Using reports
- Running a report
- Subscribing for a report
- Sending a report through email
- Managing user access
- Section III. Managing hosts
- Overview
- Working with the uncategorized hosts
- Managing File Replicator (VFR) operations
- Managing disk groups and disks
- Creating disk groups
- Importing disk groups
- Adding disks to disk groups
- Resizing disks in disk groups
- Renaming disks in disk groups
- Splitting disk groups
- Moving disk groups
- Joining disk groups
- Initializing disks
- Replacing disks
- Recovering disks
- Bringing disks online
- Setting disk usage
- Evacuating disks
- Running or scheduling Trim
- Managing volumes
- Creating Storage Foundation volumes
- Encrypting existing volumes
- Deleting volumes
- Moving volumes
- Renaming volumes
- Adding mirrors to volumes
- Removing the mirrors of volumes
- Creating instant volume snapshots
- Creating space optimized snapshots for volumes
- Creating mirror break-off snapshots for volumes
- Dissociating snapshots
- Reattaching snapshots
- Resizing volumes
- Restoring data from the snapshots of volumes
- Refreshing the snapshot of volumes
- Configuring a schedule for volume snapshot refresh
- Adding snapshot volumes to a refresh schedule
- Removing the schedule for volume snapshot refresh
- Setting volume usage
- Enabling FastResync on volumes
- Managing file systems
- Creating file systems
- Defragmenting file systems
- Unmounting non clustered file systems from hosts
- Mounting non clustered file systems on hosts
- Unmounting clustered file systems
- Mounting clustered file systems on hosts
- Remounting file systems
- Checking file systems
- Creating file system snapshots
- Remounting file system snapshot
- Mounting file system snapshot
- Unmounting file system snapshot
- Removing file system snapshot
- Monitoring capacity of file systems
- Managing SmartIO
- About managing SmartIO
- Creating a cache
- Modifying a cache
- Creating an I/O trace log
- Analyzing an I/O trace log
- Managing application IO thresholds
- Managing replications
- Configuring Storage Foundation replications
- Pausing the replication to a Secondary
- Resuming the replication of a Secondary
- Starting replication to a Secondary
- Stopping the replication to a Secondary
- Switching a Primary
- Taking over from an original Primary
- Associating a volume
- Removing a Secondary
- Monitoring replications
- Optimizing storage utilization
- Section IV. Managing high availability and disaster recovery configurations
- Overview
- Managing clusters
- Managing service groups
- Creating service groups
- Linking service groups in a cluster
- Bringing service groups online
- Taking service groups offline
- Switching service groups
- Managing systems
- Managing resources
- Invoking a resource action
- Managing global cluster configurations
- Running fire drills
- Running the disaster recovery fire drill
- Editing a fire drill schedule
- Using recovery plans
- Managing application configuration
- Multi Site Management
- Appendix A. List of high availability operations
- Section V. Monitoring Storage Foundation HA licenses in the data center
- Managing licenses
- About Arctera licensing and pricing
- Assigning a price tier to a host manually
- Creating a license deployment policy
- Modifying a license deployment policy
- Viewing deployment information
- Managing licenses
- Monitoring performance
- About Arctera InfoScale Operations Manager performance graphs
- Managing Business Applications
- About the makeBE script
- Managing extended attributes
- Managing policy checks
- About using custom signatures for policy checks
- Managing Dynamic Multipathing paths
- Disabling the DMP paths on the initiators of a host
- Re-enabling the DMP paths
- Managing CVM clusters
- Managing Flexible Storage Sharing
- Monitoring the virtualization environment
- About discovering the VMware Infrastructure using Arctera InfoScale Operations Manager
- About the multi-pathing discovery in the VMware environment
- About discovering Solaris zones
- About discovering logical domains in Arctera InfoScale Operations Manager
- About discovering LPARs and VIOs in Arctera InfoScale Operations Manager
- About Microsoft Hyper-V virtualization discovery
- Using Web services API
- Arctera InfoScale Operations Manager command line interface
- Appendix B. Command file reference
- Appendix C. Application setup requirements
- Application setup requirements for Oracle database discovery
- Application setup requirements for Oracle Automatic Storage Management (ASM) discovery
- Application setup requirements for IBM DB2 discovery
- Application setup requirements for Sybase Adaptive Server Enterprise (ASE) discovery
- Application setup requirements for Microsoft SQL Server discovery
Configure SecureFS immutable checkpoints
InfoScale offers the ability to configure secure file systems (SecureFS). SecureFS provides a recovery mechanism in case of a data corruption or deletion, and a ransomware event. The SecureFS feature helps protect your data through the use of snapshots and non-modifiable checkpoints.
The secure file system feature is enhanced to identify the underlying application (generic application, Oracle, or PostgreSQL) and then secure the file system accordingly. In earlier versions SecureFS feature was available only for general applications and for Oracle. With 9.0 release, SecureFS supports PostgreSQL databases. You can configure immutable checkpoint on a file system that is mounted on a InfoScale volume. Immutable checkpoints are supported only on VxFS. Hence all directories including the subdirectories should be VxFS mount points.
Before you configure SecureFS immutable checkpoints, refer to the InfoScale Storage Foundation Administrator's Guide - Linux for more details about the SecureFS feature.
To configure immutable checkpoint for an application, ensure that you select the host and the volume on which the application is installed or configured.
To perform this task, your user group must be assigned the Admin role on the host or the Server perspective. The permission on the host may be explicitly assigned or inherited from a parent Organization.
To configure an immutable checkpoint
- In the Management Server console, go to the Server perspective and expand Manage in the left pane.
- Expand Organization or Uncategorized Hosts to locate and select the host.
- Expand the host and Volumes to locate the volume on which you want to configure immutable checkpoints.
- Right-click the volume and select File System > Configure SecureFS > Immutable Checkpoint.
- In the Secure FS - Immutable checkpoints panel, from the Select application dropdown field, select the application, and then enter the required information.
- For a generic application, choose General and go to step 9.
- For Oracle database, choose Oracle and then specify the following information and then go to step 9:
Orahome
Enter the Oracle home directory path that is set for the
ORACLE_HOME
environment variable. It is the path to the Oracle binaries and configuration files.Username
Enter the Oracle user who has the privileges to start and stop the Oracle database instance.
SID
Enter the Oracle instance name that is specified for the $ORACLE_SID variable.
- For PostgreSQL database, choose Postgres and then specify the following information:
Username
Enter the dedicated OS user name that is created when PostgreSQL is installed. This user has the privileges to start, stop, and monitor the PostgreSQL database server operations.
Data directory
Enter the absolute path of the directory that contains the database that the PostgreSQL instance manages.
Archive location
Enter the archive location that is configured to store the PostgreSQL Write-Ahead Log (WAL) files.
To prevent SecureFS failures, this location must be on a different VxFS file system than where the PostgreSQL instance is deployed.
Authentication method
Choose the authentication method from the dropdown list.
The following options are available:
Trust
This method assumes that any user who can connect to the PostgreSQL server is authorized to access the database with whatever database user name they specify.
Peer
This method relies on the operating system user to connect to the PostgreSQL database.
System user
Enter the operating system user that can connect to the PostgreSQL database.
Specify this parameter only if the Authentication method is selected as Peer.
- Specify the following details for the checkpoint creation:
Mode
Specifies the mode of the file system. While configuring SecureFS on an existing file system, the mode cannot be switched to compliance mode (Compliance mode refers to soft WORM) if the file system has WORM enabled.
On the other hand, if WORM (WORM refers to Enterprise mode) is not enabled, the configuration process automatically converts the file system to Enterprise mode.
Compliance mode is a default mode. You can change the mode later if required.
Audit log
Specifies the logging of certain events to the persistent storage. You can choose to enable or disable it.
By default, it is enabled. Once enabled it cannot be disabled.
Interval
Specify the time interval frequency at which the SecureFS checkpoint creation must trigger. You can specify the time duration in Hours, Days, and Weeks.
The minimum supported time duration is one hour, which means that the checkpoint creation gets triggered every hour.
Total checkpoints
Enter the maximum number of checkpoints to create and store.
Retention
Specify the time duration for which you want to retain the checkpoint. You can specify the retention time duration in hours, days, and weeks.
The minimum recommended retention period is one hour.
- Click Finish to trigger the SecureFS checkpoints creation process.
- The Secure FS - Result pane displays the progress of the operation and the commands that VIOM uses to configure the checkpoints. After the process completes successfully, click OK.
Depending on the checkpoint interval configuration, VIOM runs the commands to create the SecureFS checkpoints. Once the retention period is reached, the oldest checkpoint is automatically deleted and a new checkpoint is created. The process repeats for the defined time interval.