Veritas Access Administrator's Guide
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section VIII. Managing Veritas Access storage services
- Compressing files
- About compressing files
- Compression tasks
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Compressing files
- Section IX. Reference
Configuring NIC devices
To list NIC devices on a specified node
- To list NIC devices on a specified node, enter the following:
Network> device list nodename
where nodename is the specified node for which bus id, mac addresses, device info, and device type for all devices are listed.
To add a NIC device to a Veritas Access cluster
- To add a NIC device to a Veritas Access cluster, enter the following:
Network> device add devicename
where devicename is the name of the device that you want to add.
Note:
The pre-configured devices can be added only if they are pre-configured on all the nodes.
To remove a NIC device from a Veritas Access cluster
- To remove a NIC device from a Veritas Access cluster, enter the following:
Network> device remove devicename
where devicename is the name of the device you want to remove.
When a device is removed, all the physical IP addresses and virtual IP addresses that are associated with the device are deleted from the specified NIC device. The physical IP addresses that are associated with the pre-configured devices are not kept in the free list. Therefore, the IP addresses are not available for reuse. The virtual IP addresses are not available for reuse. You need to re-add the NIC device in cases of reuse.
You can use the Network> ip addr show command to display the list of IP addresses associated with the device. You can see an UNUSED status beside the IP addresses that are free (not used).
To rename a NIC device
- To rename a NIC device, enter the following:
Network> device rename old_name with new_name nodename
Only the devices that are not part of access configuration can be renamed or the devices whose device type is listed as not configured in device list output can be renamed. The NIC devices with new names should not be present on all nodes of the Veritas Access cluster. In cases of mismatches in names of newly-added NICs in the Veritas Access cluster, you can rename those devices, and then add the devices to the Veritas Access cluster.
To identify a NIC device
- To identify a NIC device, enter the following:
device identify devicename nodename [timeout]
devicename
Specify the name of the device you want to identify.
nodename
Specify the node on which the device is located.
timeout
By default, the timeout value is 120 seconds.
To replace a NIC device from a Veritas Access cluster
- Delete all the VIP addresses that are related to the NIC that you want to replace using the ippr addr del command. Enter the following:
Network> ip addr del <virtual IP>
- Find out the name that is related to the NIC that is to be replaced by using the device list command.
- Remove the device from the Veritas Access configuration using the device remove command
- Shut down the target node and replace the target NIC hardware. Then restart the system.
- If new NIC name is not the same as the original device name, rename the new device name to the original device name.
- Add the new NIC device.
Network> device add <NIC device>
- Add the VIP back to the device.
Network> ip addr add <virtual IP>