Veritas Access Administrator's Guide

Last Published:
Product(s): Appliances (Version Not Specified)
Platform: 3340
  1. Section I. Introducing Veritas Access
    1. Introducing Veritas Access
      1.  
        About Veritas Access
      2.  
        Accessing the Access CLISH
      3.  
        Navigating the Access CLISH
      4.  
        Getting help using the Access CLISH
      5.  
        Displaying the command history
      6.  
        Using the more command
  2. Section II. Configuring Veritas Access
    1. Adding users or roles
      1.  
        About user roles and privileges
      2.  
        About the naming requirements for adding new users
      3.  
        Adding Master, System Administrator, and Storage Administrator users
    2. Configuring the network
      1.  
        About configuring the Veritas Access network
      2.  
        About bonding Ethernet interfaces
      3.  
        Bonding Ethernet interfaces
      4.  
        Configuring DNS settings
      5.  
        About Ethernet interfaces
      6.  
        Displaying current Ethernet interfaces and states
      7.  
        Configuring IP addresses
      8.  
        Configuring Veritas Access to use jumbo frames
      9.  
        Configuring VLAN interfaces
      10.  
        Configuring NIC devices
      11.  
        Swapping network interfaces
      12.  
        Excluding PCI IDs from the cluster
      13.  
        About configuring routing tables
      14.  
        Configuring routing tables
      15.  
        Changing the firewall settings
      16.  
        IP load balancing
      17.  
        Configuring Veritas Access in IPv4 and IPv6 mixed mode
    3. Configuring authentication services
      1.  
        About configuring LDAP settings
      2.  
        Configuring LDAP server settings
      3.  
        Administering the Veritas Access cluster's LDAP client
      4.  
        Configuring the NIS-related settings
      5.  
        Configuring NSS lookup order
  3. Section III. Managing Veritas Access storage
    1. Configuring storage
      1.  
        About storage provisioning and management
      2.  
        About configuring disks
      3.  
        About configuring storage pools
      4.  
        Configuring storage pools
      5.  
        About quotas for usage
      6.  
        Enabling, disabling, and displaying the status of file system quotas
      7.  
        Setting and displaying file system quotas
      8.  
        Setting user quotas for users of specified groups
      9.  
        About quotas for CIFS home directories
      10.  
        About Flexible Storage Sharing
      11.  
        Limitations of Flexible Storage Sharing
      12.  
        Configuring erasure coding for a Flexible Storage Sharing file system
      13.  
        Workflow for configuring and managing storage using the Veritas Access CLI
      14.  
        Displaying information for all disk devices associated with the nodes in a cluster
      15.  
        Displaying WWN information
      16.  
        Importing new LUNs forcefully for new or existing pools
      17.  
        Initiating host discovery of LUNs
      18.  
        Increasing the storage capacity of a LUN
      19.  
        Formatting or reinitializing a disk
      20.  
        Removing a disk
    2. Configuring data integrity with I/O fencing
      1.  
        About I/O fencing
      2. Configuring disk-based I/O fencing
        1.  
          Replacing an existing coordinator disk
        2.  
          Disabling I/O fencing
        3.  
          Destroying the coordinator pool
      3.  
        Using majority-based fencing
      4.  
        Manually enabling and disabling majority fencing in a non-SSH environment
      5.  
        Shutdown and restart the Veritas Access cluster in a non-SSH environment
    3. Configuring ISCSI
      1.  
        About iSCSI
      2.  
        Configuring the iSCSI initiator
      3.  
        Configuring the iSCSI initiator name
      4.  
        Configuring the iSCSI devices
      5.  
        Configuring discovery on iSCSI
      6.  
        Configuring the iSCSI targets
      7.  
        Modifying tunables for iSCSI
    4. Veritas Access as an iSCSI target
      1.  
        About Veritas Access as an iSCSI target
      2.  
        Managing the iSCSI target service
      3.  
        Managing the iSCSI targets
      4.  
        Managing the LUNs
      5.  
        Managing the mappings with iSCSI initiators
      6.  
        Managing the users
  4. Section IV. Managing Veritas Access file access services
    1. Configuring the NFS server
      1.  
        About using the NFS server with Veritas Access
      2.  
        Using the kernel-based NFS server
      3.  
        Using the NFS-Ganesha server
      4.  
        Switching between NFS servers
      5.  
        Recommended tuning for NFS-Ganesha version 3 and version 4
      6.  
        Accessing the NFS server
      7.  
        Displaying and resetting NFS statistics
      8.  
        Configuring Veritas Access for ID mapping for NFS version 4
      9.  
        Configuring the NFS client for ID mapping for NFS version 4
      10.  
        About authenticating NFS clients
      11. Setting up Kerberos authentication for NFS clients
        1.  
          Adding and configuring Veritas Access to the Kerberos realm
    2. Using Veritas Access as a CIFS server
      1.  
        About configuring Veritas Access for CIFS
      2.  
        About configuring CIFS for standalone mode
      3.  
        Configuring CIFS server status for standalone mode
      4.  
        Changing security settings
      5. About Active Directory (AD)
        1.  
          Configuring entries for Veritas Access DNS for authenticating to Active Directory (AD)
      6. About configuring CIFS for Active Directory (AD) domain mode
        1.  
          Joining Veritas Access to Active Directory (AD)
        2.  
          Verifying that Veritas Access has joined Active Directory (AD) successfully
        3.  
          Using multi-domain controller support in CIFS
        4.  
          About leaving an AD domain
        5.  
          Changing domain settings for AD domain mode
        6.  
          Removing the AD interface
      7.  
        Setting NTLM
      8. About setting trusted domains
        1.  
          Specifying trusted domains that are allowed access to the CIFS server
        2.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
        3.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
        4.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
        5.  
          Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
        6.  
          About configuring Windows Active Directory as an IDMAP backend for CIFS
        7.  
          Configuring the Active Directory schema with CIFS-schema extensions
        8.  
          Configuring the LDAP client for authentication using the CLI
        9.  
          Configuring the CIFS server with the LDAP backend
        10.  
          Setting Active Directory trusted domains
      9.  
        About storing account information
      10.  
        Storing user and group accounts
      11.  
        Reconfiguring the CIFS service
      12.  
        About mapping user names for CIFS/NFS sharing
      13.  
        About the mapuser commands
      14.  
        Adding, removing, or displaying the mapping between CIFS and NFS users
      15.  
        Automatically mapping UNIX users from LDAP to Windows users
      16. About managing home directories
        1.  
          Setting the home directory file systems
        2.  
          Setting up home directories
        3.  
          Displaying home directory usage information
        4.  
          Deleting home directories and disabling creation of home directories
      17. About CIFS clustering modes
        1.  
          About switching the clustering mode
      18. About migrating CIFS shares and home directories
        1.  
          Migrating CIFS shares and home directories from normal to ctdb clustering mode
        2.  
          Migrating CIFS shares and home directories from ctdb to normal clustering mode
      19.  
        Setting the CIFS aio_fork option
      20. About managing local users and groups
        1.  
          Creating a local CIFS user
        2.  
          Configuring a local group
      21.  
        Enabling CIFS data migration
    3. Configuring an FTP server
      1.  
        About FTP
      2.  
        Creating the FTP home directory
      3.  
        Using the FTP server commands
      4.  
        About FTP server options
      5.  
        Customizing the FTP server options
      6.  
        Administering the FTP sessions
      7.  
        Uploading the FTP logs
      8.  
        Administering the FTP local user accounts
      9.  
        About the settings for the FTP local user accounts
      10.  
        Configuring settings for the FTP local user accounts
      11.  
        File sharing for a scale-out file system using FTP
    4. Using Veritas Access as an Object Store server
      1.  
        About the Object Store server
      2.  
        Use cases for configuring the Object Store server
      3.  
        Configuring the Object Store server
      4.  
        About buckets and objects
      5.  
        File systems used for objectstore buckets
      6.  
        Multi-protocol support for NFS with S3
  5. Section V. Monitoring and troubleshooting
    1. Configuring event notifications and audit logs topics
      1.  
        About event notifications
      2.  
        About severity levels and filters
      3.  
        About SNMP notifications
      4.  
        Configuring an email group
      5.  
        Configuring a syslog server
      6.  
        Exporting events in syslog format to a given URL
      7.  
        Displaying events on the console
      8.  
        Configuring events for event reporting
      9.  
        Configuring an SNMP management server
  6. Section VI. Provisioning and managing Veritas Access file systems
    1. Creating and maintaining file systems
      1.  
        About creating and maintaining file systems
      2.  
        About scale-out file systems
      3.  
        Read performance tunables for a cloud tier in a scale-out file system
      4.  
        About encryption at rest
      5. Considerations for creating a file system
        1.  
          Best practices for creating file systems
        2.  
          Choosing a file system layout type
        3.  
          Determining the initial extent size for a file system
        4.  
          About striping file systems
        5.  
          About creating a tuned file system for a specific workload
        6.  
          About FastResync
        7.  
          About fsck operation
        8.  
          Setting retention in files
        9.  
          Setting WORM over NFS
        10.  
          Manually setting WORM-retention on a file over CIFS
        11.  
          About managing application I/O workloads using maximum IOPS settings
      6.  
        Creating a file system
      7.  
        Bringing the file system online or offline
      8.  
        Listing all file systems and associated information
      9. Modifying a file system
        1.  
          Adding or removing a mirror from a file system
        2.  
          Adding or removing a column from a file system
        3.  
          Increasing the size of a file system
        4.  
          Decreasing the size of a file system
      10. Managing a file system
        1.  
          Defragmenting a file system
        2.  
          Checking and repairing a file system
        3.  
          Configuring FastResync for a file system
        4.  
          Disabling the FastResync option for a file system
        5.  
          Checking and resynchronizing stale mirrors
        6.  
          Setting file system alerts
        7.  
          Displaying file system alert values
        8.  
          Removing file system alerts
      11.  
        Destroying a file system
      12.  
        Upgrading disk layout versions
  7. Section VII. Configuring cloud storage
    1. Configuring the cloud gateway
      1.  
        About the cloud gateway
      2.  
        Configuring the cloud gateway
    2. Configuring cloud as a tier
      1.  
        Configuring the cloud as a tier for scale-out file systems
      2.  
        Moving files between tiers in a scale-out file system
      3. About policies for scale-out file systems
        1.  
          About pattern matching for data movement policies
        2.  
          About schedules for running policies
        3.  
          Creating and scheduling a policy for a scale-out file system
      4.  
        Obtaining statistics on data usage in the cloud tier
  8. Section VIII. Provisioning and managing Veritas Access shares
    1. Creating shares for applications
      1.  
        About file sharing protocols
      2.  
        About concurrent access
      3.  
        Sharing directories using CIFS and NFS protocols
      4.  
        Sharing a file system as a CIFS home directory
      5.  
        About concurrent access with NFS and S3
    2. Creating and maintaining NFS shares
      1.  
        About NFS file sharing
      2.  
        Displaying file systems and snapshots that can be exported
      3.  
        Exporting an NFS share
      4.  
        Displaying exported directories
      5.  
        About managing NFS shares using netgroups
      6.  
        Unexporting a directory or deleting NFS options
      7.  
        Exporting an NFS share for Kerberos authentication
      8.  
        Mounting an NFS share with Kerberos security from the NFS client
      9.  
        Exporting an NFS snapshot
    3. Creating and maintaining CIFS shares
      1.  
        About managing CIFS shares
      2.  
        Exporting a directory as a CIFS share
      3.  
        Configuring a CIFS share as secondary storage for an Enterprise Vault store
      4.  
        Exporting the same file system/directory as a different CIFS share
      5.  
        About the CIFS export options
      6.  
        Setting share properties
      7.  
        Displaying CIFS share properties
      8.  
        Hiding system files when adding a CIFS normal share
      9.  
        Allowing specified users and groups access to the CIFS share
      10.  
        Denying specified users and groups access to the CIFS share
      11.  
        Exporting a CIFS snapshot
      12.  
        Deleting a CIFS share
      13.  
        Modifying a CIFS share
      14.  
        Making a CIFS share shadow copy aware
      15.  
        Creating CIFS shares for a scale-out file system
    4. Using Veritas Access with OpenStack
      1.  
        About the Veritas Access integration with OpenStack
      2. About the Veritas Access integration with OpenStack Cinder
        1. About the Veritas Access integration with OpenStack Cinder architecture
          1. Veritas Access NFS-based Cinder driver
            1.  
              Configuring Veritas Access with OpenStack Cinder
          2.  
            Veritas Access iSCSI based Cinder driver
        2.  
          Configuring OpenStack Cinder
      3. About the Veritas Access integration with OpenStack Manila
        1.  
          OpenStack Manila use cases
        2.  
          Configuring Veritas Access with OpenStack Manila
        3.  
          Creating a new share backend on the OpenStack controller node
        4.  
          Creating an OpenStack Manila share type
        5.  
          Creating an OpenStack Manila file share
        6.  
          Creating an OpenStack Manila share snapshot
    5. Integrating Veritas Access with Data Insight
      1.  
        Veritas Access integration with Data Insight
  9. Section IX. Managing Veritas Access storage services
    1. Compressing files
      1. About compressing files
        1.  
          About the compressed file format
        2.  
          About the file compression attributes
        3.  
          About the file compression block size
      2.  
        Use cases for compressing files
      3.  
        Best practices for using compression
      4. Compression tasks
        1.  
          Compressing files
        2.  
          Showing the scheduled compression job
        3.  
          Scheduling compression jobs
        4.  
          Listing compressed files
        5.  
          Uncompressing files
        6.  
          Modifying the scheduled compression
        7.  
          Removing the specified schedule
        8.  
          Stopping the schedule for a file system
        9.  
          Removing the pattern-related rule for a file system
        10.  
          Removing the modified age related rule for a file system
    2. Configuring SmartTier
      1.  
        About Veritas Access SmartTier
      2.  
        How Veritas Access uses SmartTier
      3.  
        Configuring the policy of each tiered file system
      4.  
        Adding tiers to a file system
      5.  
        Adding or removing a column from a secondary tier of a file system
      6.  
        Configuring a mirror to a tier of a file system
      7.  
        Listing all of the files on the specified tier
      8.  
        Displaying a list of SmartTier file systems
      9.  
        About tiering policies
      10.  
        About configuring the policy of each tiered file system
      11.  
        Best practices for setting relocation policies
      12.  
        Relocating a file or directory of a tiered file system
      13.  
        Displaying the tier location of a specified file
      14.  
        About configuring schedules for all tiered file systems
      15.  
        Configuring schedules for tiered file systems
      16.  
        Displaying the files that may be moved or pruned by running a policy
      17.  
        Allowing metadata information on the file system to be written on the secondary tier
      18.  
        Restricting metadata information to the primary tier only
      19.  
        Removing a tier from a file system
    3. Configuring SmartIO
      1.  
        About SmartIO for solid-state drives
      2.  
        About configuring SmartIO
      3.  
        About SmartIO read caching for applications running on Veritas Access file systems
      4.  
        Setting up SmartIO read caching for Veritas Access
      5.  
        Verifying the VxFS cache area and monitoring the caching
      6.  
        Setting the caching mode
      7.  
        Customizing the caching behavior
      8.  
        Viewing the caching statistics for a cache area
    4. Configuring episodic replication
      1.  
        About Veritas Access episodic replication
      2.  
        How Veritas Access episodic replication works
      3.  
        Starting Veritas Access episodic replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file systems to replicate
      6.  
        Setting up files to exclude from an episodic replication unit
      7.  
        Scheduling the episodic replication
      8.  
        Defining what to replicate
      9.  
        About the maximum number of parallel episodic replication jobs
      10.  
        Managing an episodic replication job
      11.  
        Replicating compressed data
      12.  
        Displaying episodic replication job information and status
      13.  
        Synchronizing an episodic replication job
      14.  
        Behavior of the file systems on the episodic replication destination target
      15.  
        Accessing file systems configured as episodic replication destinations
      16. Episodic replication job failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
    5. Configuring continuous replication
      1.  
        About Veritas Access continuous replication
      2. How Veritas Access continuous replication works
        1.  
          How data flows in continuous replication synchronous mode
        2.  
          How data flows in continuous replication asynchronous mode
      3.  
        Starting Veritas Access continuous replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file system to replicate
      6.  
        Managing continuous replication
      7.  
        Displaying continuous replication information and status
      8.  
        Unconfiguring continuous replication
      9. Continuous replication failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
    6. Using snapshots
      1.  
        About snapshots
      2.  
        Creating snapshots
      3.  
        Displaying snapshots
      4.  
        Managing disk space used by snapshots
      5.  
        Bringing snapshots online or taking snapshots offline
      6.  
        Restoring a snapshot
      7.  
        About snapshot schedules
      8.  
        Configuring snapshot schedules
      9.  
        Managing automated snapshots
    7. Using instant rollbacks
      1.  
        About instant rollbacks
      2.  
        Creating a space-optimized rollback
      3.  
        Creating a full-sized rollback
      4.  
        Listing Veritas Access instant rollbacks
      5.  
        Restoring a file system from an instant rollback
      6.  
        Refreshing an instant rollback from a file system
      7.  
        Bringing an instant rollback online
      8.  
        Taking an instant rollback offline
      9.  
        Destroying an instant rollback
      10.  
        Creating a shared cache object for Veritas Access instant rollbacks
      11.  
        Listing cache objects
      12.  
        Destroying a cache object of a Veritas Access instant rollback
  10. Section X. Reference
    1. Appendix A. Veritas Access documentation
      1.  
        Using the Veritas Access product documentation
      2.  
        About accessing the online man pages
    2. Appendix B. Veritas Access tuning
      1.  
        File system mount-time memory usage
    3. Appendix C. Manual steps for addition and deletion of nodes in a non-SSH environment
      1.  
        Adding a new node to a Veritas Access cluster
      2.  
        Deleting a node from a Veritas Access cluster
  11.  
    Index

A

about
Active Directory (AD), About Active Directory (AD)
bonding Ethernet interfaces, About bonding Ethernet interfaces
buckets and objects, About buckets and objects
changing share properties, Setting share properties
configuring CIFS for AD domain mode, About configuring CIFS for Active Directory (AD) domain mode
configuring disks, About configuring disks
configuring in IPv4 and IPv6 mixed mode, Configuring Veritas Access in IPv4 and IPv6 mixed mode
configuring routing tables, About configuring routing tables
configuring storage pools, About configuring storage pools
configuring the policy of each tiered file system, About configuring the policy of each tiered file system
configuring Veritas Access for CIFS, About configuring Veritas Access for CIFS
configuring Veritas Access to use jumbo frames, Configuring Veritas Access to use jumbo frames
Continuous replication failover and failback, Continuous replication failover and failback
creating and maintaining file systems, About creating and maintaining file systems
episodic replication job failover and failback, Episodic replication job failover and failback
Ethernet interfaces, About Ethernet interfaces
FTP, About FTP
FTP local user set, About the settings for the FTP local user accounts
FTP set, About FTP server options
I/O fencing, About I/O fencing
IP load balancing, IP load balancing
iSCSI, About iSCSI
leaving AD domain, About leaving an AD domain
managing CIFS shares, About managing CIFS shares
Multi-protocol support for NFS with S3, Multi-protocol support for NFS with S3
NFS file sharing, About NFS file sharing
scale-out file systems, About scale-out file systems
setting trusted domains, About setting trusted domains
shares, About file sharing protocols
snapshot schedules, About snapshot schedules
snapshots, About snapshots
storage provisioning and management, About storage provisioning and management
storing account information, About storing account information
striping file systems, About striping file systems
the IP addresses for the Ethernet interfaces, About Ethernet interfaces
Veritas Access continuous replication, About Veritas Access continuous replication
Veritas Access episodic replication, About Veritas Access episodic replication
About
cloud gateway, About the cloud gateway
compressed file format, About the compressed file format
compressing files, About compressing files
concurrent access, About concurrent access
configuring SmartIO, About configuring SmartIO
FastResync, About FastResync
file compression attributes, About the file compression attributes
file compression block size, About the file compression block size
integration with OpenStack Cinder, About the Veritas Access integration with OpenStack Cinder
policies for scale-out file systems, About policies for scale-out file systems
SNMP notifications, About SNMP notifications
About Configuring
network, About configuring the Veritas Access network
about maximum IOPS, About managing application I/O workloads using maximum IOPS settings
about Veritas Access
as an iSCSI target, About Veritas Access as an iSCSI target
Access
accessing the CLISH, Accessing the Access CLISH
accessing
CLISH, Accessing the Access CLISH
episodic replication destinations, Accessing file systems configured as episodic replication destinations
man pages, About accessing the online man pages
Veritas Access product documentation, Using the Veritas Access product documentation
Active Directory
setting the trusted domains for, Setting Active Directory trusted domains
Active Directory (AD)
about, About Active Directory (AD)
joining Veritas Access to, Joining Veritas Access to Active Directory (AD)
verifying Veritas Access has joined successfully, Verifying that Veritas Access has joined Active Directory (AD) successfully
AD domain mode
changing domain settings, Changing domain settings for AD domain mode
configuring CIFS, About configuring CIFS for Active Directory (AD) domain mode
security settings, Changing domain settings for AD domain mode
AD interface
using, Removing the AD interface
AD trusted domains
disabling, Setting Active Directory trusted domains
add local user
FTP, Administering the FTP local user accounts
adding
a column to a file system, Adding or removing a column from a file system
a column to a tiered file system, Adding or removing a column from a secondary tier of a file system
a severity level to an email group, Configuring an email group
a syslog server, Configuring a syslog server
an email address to a group, Configuring an email group
an email group, Configuring an email group
CIFS share, Setting share properties
filter to a group, Configuring an email group
IP address to a cluster, Configuring IP addresses
Master, System Administrator, and Storage Administrator users, Adding Master, System Administrator, and Storage Administrator users
mirror to a file system, Adding or removing a mirror from a file system
mirror to a tier of a file system, Configuring a mirror to a tier of a file system
mirrored tier to a file system, Adding tiers to a file system
mirrored-striped tier to a file system, Adding tiers to a file system
second tier to a file system, Adding tiers to a file system
SNMP management server, Configuring an SNMP management server
striped tier to a file system, Adding tiers to a file system
striped-mirror tier to a file system, Adding tiers to a file system
users, Adding Master, System Administrator, and Storage Administrator users
VLAN interfaces, Configuring VLAN interfaces
adding a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
adding and configuring
Veritas Access to the Kerberos realm, Adding and configuring Veritas Access to the Kerberos realm
addition of nodes
non-SSH environment, Adding a new node to a Veritas Access cluster
aio_fork option
setting, Setting the CIFS aio_fork option
alerts
file system removing, Removing file system alerts
allowing
metadata information to be written on the secondary tier, Allowing metadata information on the file system to be written on the secondary tier
specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
as an iSCSI target
about Veritas Access, About Veritas Access as an iSCSI target
Authenticate
NFS clients, About authenticating NFS clients
authenticating
NFS clients using Kerberos, Setting up Kerberos authentication for NFS clients
authentication
configuring the LDAP client using the CLI, Configuring the LDAP client for authentication using the CLI

B

best practices
creating file systems, Best practices for creating file systems
setting relocation policies, Best practices for setting relocation policies
Best practices
using compression, Best practices for using compression
bind distinguished name
setting for LDAP server, Configuring LDAP server settings
bonding
Ethernet interfaces, Bonding Ethernet interfaces
bonding Ethernet interfaces
about, About bonding Ethernet interfaces
bringing
file system online or offline, Bringing the file system online or offline
buckets and objects
about, About buckets and objects

C

cache area
monitoring, Verifying the VxFS cache area and monitoring the caching
verifying, Verifying the VxFS cache area and monitoring the caching
viewing statistics, Viewing the caching statistics for a cache area
Cache behavior
customizing, Customizing the caching behavior
cache object
destroying for an instant rollback, Destroying a cache object of a Veritas Access instant rollback
cache objects
listing, Listing cache objects
caching mode
setting, Setting the caching mode
caching VxFS in read mode, Setting up SmartIO read caching for Veritas Access
changing
an IP address to online
on any running node, Configuring IP addresses
domain settings for AD domain mode, Changing domain settings for AD domain mode
local CIFS user password, Creating a local CIFS user
security settings, Changing security settings
share properties about, Setting share properties
changing the caching mode, Setting the caching mode
checking
and repairing a file system, Checking and repairing a file system
for stale mirrors on file systems, Checking and resynchronizing stale mirrors
I/O fencing status, Configuring disk-based I/O fencing
on the status of the NFS server, Accessing the NFS server
CIFS
allowing specified users and groups access to the CIFS share, Allowing specified users and groups access to the CIFS share
configuring schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
denying specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
export options, About the CIFS export options
mapuser commands, About the mapuser commands
standalone mode, About configuring CIFS for standalone mode
using multi-domain controller support, Using multi-domain controller support in CIFS
CIFS aio_fork option
setting, Setting the CIFS aio_fork option
CIFS and NFS protocols
share directories, Sharing directories using CIFS and NFS protocols
CIFS clustering modes
about, About configuring Veritas Access for CIFS
CIFS data migration
enabling, Enabling CIFS data migration
CIFS home directories
quotas, About quotas for CIFS home directories
CIFS operating modes
about, About configuring Veritas Access for CIFS
CIFS server
configuring with the LDAP backend, Configuring the CIFS server with the LDAP backend
starting, Reconfiguring the CIFS service
trusted domains that are allowed access, Specifying trusted domains that are allowed access to the CIFS server
CIFS server status
standalone mode, Configuring CIFS server status for standalone mode
CIFS service
standalone mode, Configuring CIFS server status for standalone mode
CIFS share
adding, Setting share properties
deleting, Deleting a CIFS share
exporting as a directory, Exporting a directory as a CIFS share
exporting the same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
making shadow copy aware, Making a CIFS share shadow copy aware
modifying, Modifying a CIFS share
CIFS share and home directory
migrating from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS shares
scale-out file system, Creating CIFS shares for a scale-out file system
CIFS shares and home directories
migrating from ctdb clustering modes, About migrating CIFS shares and home directories
migrating from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
CIFS snapshot
exporting, Exporting a CIFS snapshot
CIFS/NFS sharing
mapping user names, About mapping user names for CIFS/NFS sharing
clearing
DNS domain names, Configuring DNS settings
DNS name servers, Configuring DNS settings
LDAP configured settings, Configuring LDAP server settings
CLI
configure and manage storage, Workflow for configuring and managing storage using the Veritas Access CLI
client configurations
displaying, Administering the Veritas Access cluster's LDAP client
LDAP server, Administering the Veritas Access cluster's LDAP client
Cloud gateway
about, About the cloud gateway
cloud tier
obtaining data usage statistics, Obtaining statistics on data usage in the cloud tier
cluster
adding an IP address to, Configuring IP addresses
changing an IP address to online for any running node, Configuring IP addresses
displaying all the IP addresses for, Configuring IP addresses
Cluster
Excluding PCI IDs, Excluding PCI IDs from the cluster
clustering modes
ctdb, About CIFS clustering modes
clusters
FSS, About Flexible Storage Sharing
columns
adding or removing, Adding or removing a column from a file system
adding or removing from a tiered file system, Adding or removing a column from a secondary tier of a file system
command history
displaying, Displaying the command history
Command-Line Interface (CLI)
getting help on how to use, Getting help using the Access CLISH
communicating
source and destination clusters, Setting up communication between the source and the destination clusters, Setting up communication between the source and the destination clusters
Compressed file format
about, About the compressed file format
Compressing files
about, About compressing files
use cases, Use cases for compressing files
compression
tasks, Compression tasks
Concurrent access
about, About concurrent access
concurrent access
NFS and S3, About concurrent access with NFS and S3
Configure and manage storage
CLI, Workflow for configuring and managing storage using the Veritas Access CLI
configuring
AD schema with CIFS-schema extensions, Configuring the Active Directory schema with CIFS-schema extensions
CIFS for standalone mode, About configuring CIFS for standalone mode
CIFS server with the LDAP backend, Configuring the CIFS server with the LDAP backend
cloud gateway, Configuring the cloud gateway
event notifications, About event notifications
IP routing, Configuring routing tables
IPv4 and IPv6 mixed mode, Configuring Veritas Access in IPv4 and IPv6 mixed mode
iSCSI devices, Configuring the iSCSI devices
iSCSI discovery, Configuring discovery on iSCSI
iSCSI initiator, Configuring the iSCSI initiator
iSCSI initiator name, Configuring the iSCSI initiator name
iSCSI targets, Configuring the iSCSI targets
job resynchronization, Synchronizing an episodic replication job
NFS client for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NIC devices, Configuring NIC devices
NSS lookup order, Configuring NSS lookup order
the policy of each tiered file system, About configuring the policy of each tiered file system
Veritas Access for CIFS, About configuring Veritas Access for CIFS
VLAN interfaces, Configuring VLAN interfaces
Windows Active Directory as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
Configuring
Object Store server, Configuring the Object Store server
configuring CIFS share
secondary storage for an Enterprise Vault store, Configuring a CIFS share as secondary storage for an Enterprise Vault store
configuring disks
about, About configuring disks
configuring Ethernet interfaces
about, About Ethernet interfaces
configuring routing tables
about, About configuring routing tables
Configuring SmartIO
about, About configuring SmartIO
configuring storage pools
about, About configuring storage pools
configuring the cloud as a tier
scale-out file systems, Configuring the cloud as a tier for scale-out file systems
Configuring the Object Store server
use case, Use cases for configuring the Object Store server
Configuring Veritas Access
ID mapping for NFS version 4, Configuring Veritas Access for ID mapping for NFS version 4
configuring Veritas Access to use jumbo frames
about, Configuring Veritas Access to use jumbo frames
Considerations
creating a file system, Considerations for creating a file system
continuous replication
display status, Displaying continuous replication information and status
setting up file system, Setting up the file system to replicate
unconfiguring, Unconfiguring continuous replication
Continuous replication failover and failback
about, Continuous replication failover and failback
converting
existing file system into a cache object, Creating a shared cache object for Veritas Access instant rollbacks
coordinator disks
replacing, Configuring disk-based I/O fencing
creating
full-sized rollback, Creating a full-sized rollback
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
mirrored file systems, Creating a file system
mirrored-stripe file systems, Creating a file system
OpenStack Manila file share, Creating an OpenStack Manila file share
OpenStack Manila share snapshot, Creating an OpenStack Manila share snapshot
OpenStack Manila share type, Creating an OpenStack Manila share type
share backend on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
shared cache object, Creating a shared cache object for Veritas Access instant rollbacks
simple file systems, Creating a file system
snapshot schedules, Configuring snapshot schedules
snapshots, Creating snapshots
space-optimized instant rollbacks, Creating a space-optimized rollback
storage pools, Configuring storage pools
striped file systems, Creating a file system
striped-mirror file systems, Creating a file system
Creating a file system
considerations, Considerations for creating a file system
creating and maintaining file systems
about, About creating and maintaining file systems
creating and scheduling a policy
scale-out file system, Creating and scheduling a policy for a scale-out file system
creating directory
FTP, Creating the FTP home directory
creating file systems
best practices, Best practices for creating file systems
ctdb clustering mode
about, About CIFS clustering modes
directory-level share support, Exporting a directory as a CIFS share
switching the clustering mode, About switching the clustering mode
current Ethernet interfaces and states
displaying, Displaying current Ethernet interfaces and states
current users
displaying list, Adding Master, System Administrator, and Storage Administrator users
customizing server options
FTP, Customizing the FTP server options

D

data flow
continuous replication synchronous mode, How data flows in continuous replication synchronous mode
Data Insight
integrating Veritas Access, Veritas Access integration with Data Insight
decreasing
size of a file system, Decreasing the size of a file system
default
passwords
resetting Master, System Administrator, and Storage Administrator users, Adding Master, System Administrator, and Storage Administrator users
defining
what to replicate, Defining what to replicate
defrag, Defragmenting a file system
defragmenting
file systems, Defragmenting a file system
delete local user
FTP, Administering the FTP local user accounts
deleting
CIFS share, Deleting a CIFS share
configured mail server, Configuring an email group
email address from a specified group, Configuring an email group
email groups, Configuring an email group
filter from a specified group, Configuring an email group
home directories, Deleting home directories and disabling creation of home directories
home directory of given user, Deleting home directories and disabling creation of home directories
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS options, Unexporting a directory or deleting NFS options
route entries from routing tables of nodes in cluster, Configuring routing tables
severity from a specified group, Configuring an email group
snapshot schedules, Managing automated snapshots
syslog server, Configuring a syslog server
users, Adding Master, System Administrator, and Storage Administrator users
VLAN interfaces, Configuring VLAN interfaces
Deletion of node
non-SSH environment, Deleting a node from a Veritas Access cluster
denying
specified users and groups access to the CIFS share, Denying specified users and groups access to the CIFS share
description of Veritas Access continuous replication, How Veritas Access continuous replication works
description of Veritas Access episodic replication, How Veritas Access episodic replication works
destroying
a file system, Destroying a file system
cache object of an instant rollback, Destroying a cache object of a Veritas Access instant rollback
I/O fencing, Configuring disk-based I/O fencing
instant rollbacks, Destroying an instant rollback
snapshots, Managing disk space used by snapshots
storage pools, Configuring storage pools
directories
displaying exported, Displaying exported directories
unexporting the share, Unexporting a directory or deleting NFS options
directory-level share support
ctdb clustering mode, Exporting a directory as a CIFS share
disabling
AD trusted domains, Setting Active Directory trusted domains
creation of home directories, Deleting home directories and disabling creation of home directories
DNS settings, Configuring DNS settings
FastResync option, Disabling the FastResync option for a file system
I/O fencing, Configuring disk-based I/O fencing
LDAP clients
configurations, Administering the Veritas Access cluster's LDAP client
NIS clients, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
disk
formatting, Formatting or reinitializing a disk
removing, Removing a disk
disk layout versions
upgrading, Upgrading disk layout versions
Disk quotas
CIFS, About quotas for usage
file systems, About quotas for usage
usage, About quotas for usage
displaying
all the IP addresses for cluster, Configuring IP addresses
command history, Displaying the command history
current Ethernet interfaces and states, Displaying current Ethernet interfaces and states
current list of SNMP management servers, Configuring an SNMP management server
DNS settings, Configuring DNS settings
events on the console, Displaying events on the console
existing email groups or details, Configuring an email group
exported directories, Displaying exported directories
file system alert values, Displaying file system alert values
file systems that can be exported, Displaying file systems and snapshots that can be exported
files moved or pruned by running a policy, Displaying the files that may be moved or pruned by running a policy
home directory usage information, Displaying home directory usage information
information for all disk devices for the nodes in a cluster, Displaying information for all disk devices associated with the nodes in a cluster
LDAP client configurations, Administering the Veritas Access cluster's LDAP client
LDAP configured settings, Configuring LDAP server settings
list of current users, Adding Master, System Administrator, and Storage Administrator users
list of SmartTier systems, Displaying a list of SmartTier file systems
list of syslog servers, Configuring a syslog server
local CIFS group, Configuring a local group
local CIFS user, Creating a local CIFS user
NFS statistics, Displaying and resetting NFS statistics
NIS-related settings, Configuring the NIS-related settings
NSS configuration, Configuring NSS lookup order
policy of each tiered file system, Configuring the policy of each tiered file system
routing tables of the nodes in the cluster, Configuring routing tables
schedules for tiered file systems, Configuring schedules for tiered file systems
share properties, Displaying CIFS share properties
snapshot quotas, Managing disk space used by snapshots
snapshot schedules, Configuring snapshot schedules
snapshots, Displaying snapshots
snapshots that can be exported, Displaying file systems and snapshots that can be exported
tier location of a specified file, Displaying the tier location of a specified file
time interval or number of duplicate events for notifications, Configuring events for event reporting
values of the configured SNMP notifications, Configuring an SNMP management server
values of the configured syslog server, Configuring a syslog server
VLAN interfaces, Configuring VLAN interfaces
displaying a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
displaying WWN information, Displaying WWN information
DNS
domain names
clearing, Configuring DNS settings
name servers
clearing, Configuring DNS settings
specifying, Configuring DNS settings
settings
disabling, Configuring DNS settings
displaying, Configuring DNS settings
enabling, Configuring DNS settings
domain
setting, Reconfiguring the CIFS service
setting user name, Reconfiguring the CIFS service
domain controller
setting, Reconfiguring the CIFS service
domain name
for the DNS server
setting, Configuring DNS settings

E

email address
adding to a group, Configuring an email group
deleting from a specified group, Configuring an email group
email groups
adding, Configuring an email group
adding ignore-string functionality, Configuring an email group
deleting, Configuring an email group
deleting ignore-string functionality, Configuring an email group
displaying existing and details, Configuring an email group
enabling
CIFS data migration, Enabling CIFS data migration
DNS settings, Configuring DNS settings
FastResync for a file system, Configuring FastResync for a file system
I/O fencing, Configuring disk-based I/O fencing
LDAP client configurations, Administering the Veritas Access cluster's LDAP client
majority fencing, Manually enabling and disabling majority fencing in a non-SSH environment
NIS settings, Configuring the NIS-related settings
NTLM, Setting NTLM
quota limits used by snapshots, Managing disk space used by snapshots
enabling, disabling, and displaying
file system quotas, Enabling, disabling, and displaying the status of file system quotas
encryption
KMS, About encryption at rest
Enterprise Vault store
configuring CIFS share as secondary storage, Configuring a CIFS share as secondary storage for an Enterprise Vault store
episodic replication destination file system behavior
about, Behavior of the file systems on the episodic replication destination target
episodic replication destinations
accessing, Accessing file systems configured as episodic replication destinations
episodic replication job
displaying status, Displaying episodic replication job information and status
enabling compression, Replicating compressed data
managing, Managing an episodic replication job
show job, Displaying episodic replication job information and status
episodic replication jobs
maximum number of parallel, About the maximum number of parallel episodic replication jobs
episodic replication unit
setting up files to exclude, Setting up files to exclude from an episodic replication unit
Ethernet interfaces
bonding, Bonding Ethernet interfaces
event notifications
configuring, About event notifications
displaying time interval for, Configuring events for event reporting
event reporting
setting events for, Configuring events for event reporting
events
displaying on the console, Displaying events on the console
excluding directories and files
setting up, Setting up files to exclude from an episodic replication unit
Excluding PCI IDs
cluster, Excluding PCI IDs from the cluster
export options
CIFS, About the CIFS export options
exporting
an NFS share, Exporting an NFS share
CIFS snapshot, Exporting a CIFS snapshot
directory as a CIFS share, Exporting a directory as a CIFS share
events in syslog format to a given URL, Exporting events in syslog format to a given URL
NFS snapshot, Exporting an NFS snapshot
same file system/directory as a different CIFS share, Exporting the same file system/directory as a different CIFS share
SNMP MIB file to a given URL, Configuring an SNMP management server
exporting for Kerberos authentication
NFS share, Exporting an NFS share for Kerberos authentication

F

failover and failback
about, Continuous replication failover and failback
about episodic replication, Episodic replication job failover and failback
FastResync
about, About FastResync
File compression attributes
about, About the file compression attributes
File compression block size
about, About the file compression block size
file sharing
using FTP, File sharing for a scale-out file system using FTP
file system
converting into a cache object, Creating a shared cache object for Veritas Access instant rollbacks
file system alert values
displaying, Displaying file system alert values
file system alerts
removing, Removing file system alerts
setting, Setting file system alerts
File system mount-time
memory usage, File system mount-time memory usage
file system quotas
enabling, disabling, and displaying, Enabling, disabling, and displaying the status of file system quotas
setting and displaying, Setting and displaying file system quotas
file systems
adding a mirror to, Adding or removing a mirror from a file system
bringing online or offline, Bringing the file system online or offline
checking and repairing, Checking and repairing a file system
checking for stale mirrors, Checking and resynchronizing stale mirrors
creating, Creating a file system
decreasing the size of, Decreasing the size of a file system
defragmenting, Defragmenting a file system
destroying, Destroying a file system
disabling FastResync option, Disabling the FastResync option for a file system
enabling FastResync, Configuring FastResync for a file system
increasing the size of, Increasing the size of a file system
listing with associated information, Listing all file systems and associated information
removing a mirror from, Adding or removing a mirror from a file system
restoring from an instant rollback, Restoring a file system from an instant rollback
SmartTier
displaying, Displaying a list of SmartTier file systems
that can be exported
displayed, Displaying file systems and snapshots that can be exported
types of layout, Choosing a file system layout type
filter
about, About severity levels and filters
adding to a group, Configuring an email group
deleting from a specified group, Configuring an email group
firewall setting, Changing the firewall settings
forcefully
importing new LUNs for new or existing pools, Importing new LUNs forcefully for new or existing pools
formatting
a disk, Formatting or reinitializing a disk
fsck
about, About fsck operation
FSS
configuring erasure coding, Configuring erasure coding for a Flexible Storage Sharing file system
functionality, About Flexible Storage Sharing
limitations, Limitations of Flexible Storage Sharing
FTP
about, About FTP
add local user, Administering the FTP local user accounts
creating directory, Creating the FTP home directory
customizing server options, Customizing the FTP server options
delete local user, Administering the FTP local user accounts
local user password, Administering the FTP local user accounts
local user set download bandwidth, Configuring settings for the FTP local user accounts
local user set home directory, Configuring settings for the FTP local user accounts
local user set maximum connections, Configuring settings for the FTP local user accounts
local user set maximum disk usage, Configuring settings for the FTP local user accounts
local user set maximum files, Configuring settings for the FTP local user accounts
local user set upload bandwidth, Configuring settings for the FTP local user accounts
logupload, Uploading the FTP logs
server start, Using the FTP server commands
server status, Using the FTP server commands
server stop, Using the FTP server commands
session show, Administering the FTP sessions
session showdetail, Administering the FTP sessions
session terminate, Administering the FTP sessions
show local users, Administering the FTP local user accounts
FTP local user set
about, About the settings for the FTP local user accounts
FTP set
about, About FTP server options

G

group membership
managing, Creating a local CIFS user

H

hiding
system files when adding a CIFS normal share, Hiding system files when adding a CIFS normal share
history command
using, Displaying the command history
home directories
setting up, Setting up home directories
home directory file systems
setting, Setting the home directory file systems
home directory of given user
deleting, Deleting home directories and disabling creation of home directories
home directory usage information
displaying, Displaying home directory usage information
hostname or IP address
setting for LDAP server, Configuring LDAP server settings
how to use
Command-Line Interface (CLI), Getting help using the Access CLISH

I

I/O fencing
about, About I/O fencing
checking status, Configuring disk-based I/O fencing
destroying, Configuring disk-based I/O fencing
disabling, Configuring disk-based I/O fencing
enabling, Configuring disk-based I/O fencing
ID mapping for NFS version 4
configuring Veritas Access, Configuring Veritas Access for ID mapping for NFS version 4
importing
new LUNs forcefully for new or existing pools, Importing new LUNs forcefully for new or existing pools
increasing
LUN storage capacity, Increasing the storage capacity of a LUN
size of a file system, Increasing the size of a file system
initiating host discovery of LUNs, Initiating host discovery of LUNs
instant rollbacks
about, About instant rollbacks
bringing online, Bringing an instant rollback online
creating a shared cache object, Creating a shared cache object for Veritas Access instant rollbacks
creating full-sized, Creating a full-sized rollback
creating space-optimized, Creating a space-optimized rollback
destroying, Destroying an instant rollback
listing, Listing Veritas Access instant rollbacks
refreshing from a file system, Refreshing an instant rollback from a file system
restoring a file system from, Restoring a file system from an instant rollback
taking offline, Taking an instant rollback offline
integrating Veritas Access with Data Insight, Veritas Access integration with Data Insight
integration of Veritas Access
with OpenStack, About the Veritas Access integration with OpenStack
Integration with OpenStack Cinder
about, About the Veritas Access integration with OpenStack Cinder
IP addresses
adding to a cluster, Configuring IP addresses
displaying for the cluster, Configuring IP addresses
modifying, Configuring IP addresses
removing from the cluster, Configuring IP addresses
IP addresses for the Ethernet interfaces
about, About Ethernet interfaces
IP load balancing, IP load balancing
IP routing
configuring, Configuring routing tables
iSCSI
about, About iSCSI
iSCSI devices
configuring, Configuring the iSCSI devices
iSCSI discovery
configuring, Configuring discovery on iSCSI
iSCSI initiator
configuring, Configuring the iSCSI initiator
iSCSI initiator name
configuring, Configuring the iSCSI initiator name
iSCSI target service
managing, Managing the iSCSI target service
iSCSI targets
configuring, Configuring the iSCSI targets
managing, Managing the iSCSI targets

J

job resynchronization
configuring, Synchronizing an episodic replication job
joining
Veritas Access to Active Directory (AD), Joining Veritas Access to Active Directory (AD)

K

Kerberos authentication
authenticating NFS clients, Setting up Kerberos authentication for NFS clients
Kerberos realm
adding and configuring Veritas Access for, Adding and configuring Veritas Access to the Kerberos realm
Kerberos share
mounting from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
Kernel-based
NFS server, Using the kernel-based NFS server

L

layouts
types of file system, Choosing a file system layout type
LDAP
before configuring, About configuring LDAP settings
LDAP client
configuring for authentication using the CLI, Configuring the LDAP client for authentication using the CLI
LDAP password hash algorithm
setting password for, Configuring LDAP server settings
LDAP server
clearing configured settings, Configuring LDAP server settings
disabling client configurations, Administering the Veritas Access cluster's LDAP client
displaying client configurations, Administering the Veritas Access cluster's LDAP client
displaying configured settings, Configuring LDAP server settings
enabling client configurations, Administering the Veritas Access cluster's LDAP client
setting over SSL, Configuring LDAP server settings
setting port number, Configuring LDAP server settings
setting the base distinguished name, Configuring LDAP server settings
setting the bind distinguished name, Configuring LDAP server settings
setting the hostname or IP address, Configuring LDAP server settings
setting the password hash algorithm, Configuring LDAP server settings
setting the root bind DN, Configuring LDAP server settings
setting the users, groups, and netgroups base DN, Configuring LDAP server settings
leaving
AD domain, About leaving an AD domain
list of SmartTier file systems
displaying, Displaying a list of SmartTier file systems
listing
all file systems and associated information, Listing all file systems and associated information
all of the files on the specified tier, Listing all of the files on the specified tier
cache objects, Listing cache objects
free space for storage pools, Configuring storage pools
instant rollbacks, Listing Veritas Access instant rollbacks
storage pools, Configuring storage pools
Loading files to the cache, Customizing the caching behavior
local CIFS groups
creating, Configuring a local group
deleting, Configuring a local group
displaying, Configuring a local group
local CIFS user
creating, Creating a local CIFS user
deleting, Creating a local CIFS user
displaying, Creating a local CIFS user
local CIFS user password
changing, Creating a local CIFS user
local user and groups
managing, About managing local users and groups
local user password
FTP, Administering the FTP local user accounts
local user set download bandwidth
FTP, Configuring settings for the FTP local user accounts
local user set home directory
FTP, Configuring settings for the FTP local user accounts
local user set maximum connections
FTP, Configuring settings for the FTP local user accounts
local user set maximum disk usage
FTP, Configuring settings for the FTP local user accounts
local user set maximum files
FTP, Configuring settings for the FTP local user accounts
local user set upload bandwidth
FTP, Configuring settings for the FTP local user accounts
logupload
FTP, Uploading the FTP logs
LUN storage capacity
increasing, Increasing the storage capacity of a LUN
LUNs
initiating host discovery, Initiating host discovery of LUNs
managing, Managing the LUNs

M

mail server
deleting the configured mail server, Configuring an email group
obtaining details for, Configuring an email group
setting the details of external, Configuring an email group
majority fencing
enabling, Manually enabling and disabling majority fencing in a non-SSH environment
non-SSH environment, Manually enabling and disabling majority fencing in a non-SSH environment
majority-based fencing, Using majority-based fencing
man pages
how to access, About accessing the online man pages
managing
CIFS shares, About managing CIFS shares
continuous replication, Managing continuous replication
group membership, Creating a local CIFS user
home directories, About managing home directories
iSCSI target service, Managing the iSCSI target service
iSCSI targets, Managing the iSCSI targets
local users and groups, About managing local users and groups
LUNs, Managing the LUNs
mappings with iSCSI initiators, Managing the mappings with iSCSI initiators
users, Managing the users
managing NFS shares
using netgroups, About managing NFS shares using netgroups
mapping
of UNIX users from LDAP to Windows users, Automatically mapping UNIX users from LDAP to Windows users
mappings with iSCSI initiators
managing, Managing the mappings with iSCSI initiators
mapuser commands
about, About the mapuser commands
Master, System Administrator, and Storage Administrator users
adding, Adding Master, System Administrator, and Storage Administrator users
maximum number
parallel episodic replication jobs, About the maximum number of parallel episodic replication jobs
Memory usage
file system mount-time, File system mount-time memory usage
metadata information
allowing to be written on the secondary tier, Allowing metadata information on the file system to be written on the secondary tier
restricting to the primary tier only, Restricting metadata information to the primary tier only
migrating
CIFS share and home directory from ctdb to normal clustering mode, Migrating CIFS shares and home directories from ctdb to normal clustering mode
CIFS shares and home directories, About migrating CIFS shares and home directories
CIFS shares and home directories from normal to ctdb clustering mode, Migrating CIFS shares and home directories from normal to ctdb clustering mode
mirrored file systems
creating, Creating a file system
mirrored tier
adding to a file system, Adding tiers to a file system
mirrored-stripe file systems
creating, Creating a file system
mirrored-striped tier
adding to a file system, Adding tiers to a file system
modifying
an IP address, Configuring IP addresses
CIFS share, Modifying a CIFS share
policy of a tiered file system, Configuring the policy of each tiered file system
schedule of a tiered file system, Configuring schedules for tiered file systems
snapshot schedules, Configuring snapshot schedules
tunables for iSCSI, Modifying tunables for iSCSI
more command
using, Using the more command
mounting
NFS share from the NFS client, Mounting an NFS share with Kerberos security from the NFS client
mounting snapshots, Bringing snapshots online or taking snapshots offline
moving files between tiers
scale-out file system, Moving files between tiers in a scale-out file system
Multi-protocol support for NFS with S3
limitations, Multi-protocol support for NFS with S3

N

naming requirement for new users, About the naming requirements for adding new users
navigating CLISH
Access, Navigating the Access CLISH
network interfaces
swapping, Swapping network interfaces
NFS client
configuring for ID mapping, Configuring the NFS client for ID mapping for NFS version 4
NFS clients
authenticating, About authenticating NFS clients
NFS file sharing
about, About NFS file sharing
NFS options
deleting, Unexporting a directory or deleting NFS options
NFS server
about, About using the NFS server with Veritas Access
checking on the status, Accessing the NFS server
kernel-based, Using the kernel-based NFS server
starting, Accessing the NFS server
stopping, Accessing the NFS server
NFS Servers
switching, Switching between NFS servers
NFS share
exporting, Exporting an NFS share
exporting for Kerberos authentication, Exporting an NFS share for Kerberos authentication
NFS shares
managing using netgroups, About managing NFS shares using netgroups
NFS snapshot
exporting, Exporting an NFS snapshot
NFS statistics
displaying, Displaying and resetting NFS statistics
resetting, Displaying and resetting NFS statistics
NFS-Ganesha server
use, Using the NFS-Ganesha server
NFS-Ganesha version 3 and version 4
recommended tuning parameters, Recommended tuning for NFS-Ganesha version 3 and version 4
NIC devices
configuring, Configuring NIC devices
NIS
clients
disabling, Configuring the NIS-related settings
enabling, Configuring the NIS-related settings
domain name
setting on all the nodes of cluster, Configuring the NIS-related settings
related settings
displaying, Configuring the NIS-related settings
server name
setting on all the nodes of cluster, Configuring the NIS-related settings
nocache caching mode, Setting the caching mode
node
in a cluster
displaying information for all disk devices, Displaying information for all disk devices associated with the nodes in a cluster
non-SSH environment
restart, Shutdown and restart the Veritas Access cluster in a non-SSH environment
shutdown, Shutdown and restart the Veritas Access cluster in a non-SSH environment
NSS
displaying configuration, Configuring NSS lookup order
lookup order
configuring, Configuring NSS lookup order
NTLM
disabling, Setting NTLM
enabling, Setting NTLM

O

object server, About the Object Store server
Object Store server
configuring, Configuring the Object Store server
objectstore buckets, File systems used for objectstore buckets
obtaining
details of the configured email server, Configuring an email group
offline
taking an instant rollback offline, Taking an instant rollback offline
online
bringing an instant rollback online, Bringing an instant rollback online
OpenStack
about the integration with OpenStack, About the Veritas Access integration with OpenStack
OpenStack Manila
integration with Veritas Access, About the Veritas Access integration with OpenStack Manila
OpenStack Manila file share
creating, Creating an OpenStack Manila file share
OpenStack Manila share snapshot
creating, Creating an OpenStack Manila share snapshot
OpenStack Manila share type
creating, Creating an OpenStack Manila share type

Q

quota commands
setting and displaying file system quotas, Setting and displaying file system quotas
quota limits
enabling or disabling snapshot, Managing disk space used by snapshots
quotas
CIFS home directories, About quotas for CIFS home directories
setting user quotas for users of specified groups, Setting user quotas for users of specified groups

R

read caching, About SmartIO read caching for applications running on Veritas Access file systems
read caching mode, Setting the caching mode
read performance
scale-out file system, Read performance tunables for a cloud tier in a scale-out file system
recommended tuning parameters
NFS-Ganesha version 3 and version 4, Recommended tuning for NFS-Ganesha version 3 and version 4
refreshing
instant rollbacks from a file system, Refreshing an instant rollback from a file system
relocating
policy of a tiered file system, Relocating a file or directory of a tiered file system
removing
a column from a file system, Adding or removing a column from a file system
a column from a tiered file system, Adding or removing a column from a secondary tier of a file system
a disk, Removing a disk
IP address from the cluster, Configuring IP addresses
mirror from a file system, Adding or removing a mirror from a file system
mirror from a tier spanning a specified disk, Configuring a mirror to a tier of a file system
mirror from a tier spanning a specified pool, Configuring a mirror to a tier of a file system
mirror from a tiered file system, Configuring a mirror to a tier of a file system
policy of a tiered file system, Configuring the policy of each tiered file system
schedule of a tiered file system, Configuring schedules for tiered file systems
snapshot schedules, Managing automated snapshots
tier from a file system, Removing a tier from a file system
removing a mapping
between CIFS and NFS users, Adding, removing, or displaying the mapping between CIFS and NFS users
renaming
storage pools, Configuring storage pools
replacing
coordinator disks, Configuring disk-based I/O fencing
replicating file systems
setting up, Setting up the file systems to replicate
resetting
default passwords
Master, System Administrator, and Storage Administrator users, Adding Master, System Administrator, and Storage Administrator users
NFS statistics, Displaying and resetting NFS statistics
restoring
a file system from an instant rollback, Restoring a file system from an instant rollback
snapshots, Restoring a snapshot
restricting
metadata information to the primary tier only, Restricting metadata information to the primary tier only
resynchronizing
stale mirrors on file systems, Checking and resynchronizing stale mirrors
roles
about, About user roles and privileges
route entries
deleting from routing tables, Configuring routing tables
routing tables
of the nodes in the cluster
displaying, Configuring routing tables
running
policy of a tiered file system, Configuring the policy of each tiered file system

S

scale-out file system
CIFS shares, Creating CIFS shares for a scale-out file system
creating and scheduling a policy, Creating and scheduling a policy for a scale-out file system
file sharing, File sharing for a scale-out file system using FTP
move the files, Moving files between tiers in a scale-out file system
read performance
tubables, Read performance tunables for a cloud tier in a scale-out file system
scale-out file systems
about, About scale-out file systems
configuring the cloud as a tier, Configuring the cloud as a tier for scale-out file systems
schedule
displaying for tiered file systems, Configuring schedules for tiered file systems
modifying for a tiered file system, Configuring schedules for tiered file systems
removing from a tiered file system, Configuring schedules for tiered file systems
scheduling
episodic replication, Scheduling the episodic replication
second tier
adding to a file system, Adding tiers to a file system
security
standalone mode, Configuring CIFS server status for standalone mode
security settings
AD domain mode, Changing domain settings for AD domain mode
changing, Changing security settings
server start
FTP, Using the FTP server commands
server status
FTP, Using the FTP server commands
server stop
FTP, Using the FTP server commands
session show
FTP, Administering the FTP sessions
session showdetail
FTP, Administering the FTP sessions
session terminate
FTP, Administering the FTP sessions
setting
aio_fork option, Setting the CIFS aio_fork option
base distinguished name for the LDAP server, Configuring LDAP server settings
bind distinguished name for LDAP server, Configuring LDAP server settings
details of the external mail server, Configuring an email group
domain, Reconfiguring the CIFS service
domain controller, Reconfiguring the CIFS service
domain name for the DNS server, Configuring DNS settings
domain user name, Reconfiguring the CIFS service
events for event reporting, Configuring events for event reporting
file system alerts, Setting file system alerts
filter of the syslog server, Configuring a syslog server
home directory file systems, Setting the home directory file systems
IDMAP backend to ad for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
IDMAP backend to hash for accessing CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
IDMAP backend to ldap for trusted domain access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
IDMAP backend to rid for access to CIFS, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
LDAP password hash algorithm, Configuring LDAP server settings
LDAP server hostname or IP address, Configuring LDAP server settings
LDAP server over SSL, Configuring LDAP server settings
LDAP server port number, Configuring LDAP server settings
LDAP users, groups, and netgroups base DN, Configuring LDAP server settings
NIS domain name on all the nodes of cluster, Configuring the NIS-related settings
prior to configuring LDAP, About configuring LDAP settings
retention, Setting retention in files
root bind DN for the LDAP server, Configuring LDAP server settings
severity of the syslog server, Configuring a syslog server
SNMP filter notifications, Configuring an SNMP management server
SNMP severity notifications, Configuring an SNMP management server
the NIS server name on all the nodes of cluster, Configuring the NIS-related settings
trusted domains, About setting trusted domains
trusted domains for the Active Directory, Setting Active Directory trusted domains
user quotas for users of specified groups, Setting user quotas for users of specified groups
WORM over NFS, Setting WORM over NFS
WORM-retention over CIFS, Manually setting WORM-retention on a file over CIFS
setting relocation policies
best practices, Best practices for setting relocation policies
setting the caching mode, Setting the caching mode
setting up
home directories, Setting up home directories
replicating file systems, Setting up the file systems to replicate
setting up an episodic replication unit
to exclude directories and files, Setting up files to exclude from an episodic replication unit
severity levels
about, About severity levels and filters
adding to an email group, Configuring an email group
severity notifications
setting, Configuring an SNMP management server
shadow copy
making a CIFS share aware, Making a CIFS share shadow copy aware
share backend
creating on the OpenStack controller node, Creating a new share backend on the OpenStack controller node
share directories
CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
share properties
displaying, Displaying CIFS share properties
shared cache object
creating, Creating a shared cache object for Veritas Access instant rollbacks
shares
about, About file sharing protocols
show local users
FTP, Administering the FTP local user accounts
showing
snapshot schedules, Managing automated snapshots
SmartIO
about, About SmartIO for solid-state drives
snapshot schedules
about, About snapshot schedules
creating, Configuring snapshot schedules
deleting, Managing automated snapshots
displaying, Configuring snapshot schedules
modifying, Configuring snapshot schedules
preserving, Managing automated snapshots
removing, Managing automated snapshots
showing, Managing automated snapshots
snapshots
about, About snapshots
creating, Creating snapshots
destroying, Managing disk space used by snapshots
displaying, Displaying snapshots
displaying quotas, Managing disk space used by snapshots
enabling or disabling quota limits, Managing disk space used by snapshots
mounting, Bringing snapshots online or taking snapshots offline
restoring, Restoring a snapshot
that can be exported
displayed, Displaying file systems and snapshots that can be exported
unmounting, Bringing snapshots online or taking snapshots offline
SNMP
filter notifications
setting, Configuring an SNMP management server
management server
adding, Configuring an SNMP management server
deleting configured, Configuring an SNMP management server
displaying current list of, Configuring an SNMP management server
MIB file
exporting to a given URL, Configuring an SNMP management server
notifications
displaying the values of, Configuring an SNMP management server
server
setting severity notifications, Configuring an SNMP management server
SNMP notifications
about, About SNMP notifications
solid-state drives (SSDs)
about, About SmartIO for solid-state drives
source and destination clusters
communicating, Setting up communication between the source and the destination clusters, Setting up communication between the source and the destination clusters
specific workload
creating a tuned file system, About creating a tuned file system for a specific workload
specified group
deleting a severity from, Configuring an email group
specifying
DNS name servers, Configuring DNS settings
SSL
setting the LDAP server for, Configuring LDAP server settings
standalone mode
CIFS server status, Configuring CIFS server status for standalone mode
CIFS service, Configuring CIFS server status for standalone mode
security, Configuring CIFS server status for standalone mode
starting
CIFS server, Reconfiguring the CIFS service
NFS server, Accessing the NFS server
Veritas Access continuous replication, Starting Veritas Access continuous replication
Veritas Access episodic replication, Starting Veritas Access episodic replication
statistics
data usage in the cloud tier, Obtaining statistics on data usage in the cloud tier
stopping
NFS server, Accessing the NFS server
storage pools
creating, Configuring storage pools
destroying, Configuring storage pools
listing, Configuring storage pools
listing free space, Configuring storage pools
renaming, Configuring storage pools
storage provisioning and management
about, About storage provisioning and management
storing
account information, About storing account information
user and group accounts in LDAP, Storing user and group accounts
user and group accounts locally, Storing user and group accounts
striped file systems
creating, Creating a file system
striped tier
adding to a file system, Adding tiers to a file system
striped-mirror file systems
creating, Creating a file system
striped-mirror tier
adding to a file system, Adding tiers to a file system
striping file systems
about, About striping file systems
swapping
network interfaces, Swapping network interfaces
Switch
NFS servers, Switching between NFS servers
switching
ctdb clustering mode, About switching the clustering mode
syslog format
exporting events to a given URL, Exporting events in syslog format to a given URL
syslog server
adding, Configuring a syslog server
deleting, Configuring a syslog server
displaying the list of, Configuring a syslog server
displaying the values of, Configuring a syslog server
setting the filter of, Configuring a syslog server
setting the severity of, Configuring a syslog server
system files
hiding when adding a CIFS normal share, Hiding system files when adding a CIFS normal share

T

tier
adding a tier to a file system, Configuring a mirror to a tier of a file system
displaying location of a specified file, Displaying the tier location of a specified file
listing all of the specified files on, Listing all of the files on the specified tier
removing a mirror from, Configuring a mirror to a tier of a file system
removing a mirror spanning a specified pool, Configuring a mirror to a tier of a file system
removing from a file system, Removing a tier from a file system
removing from a tier spanning a specified disk, Configuring a mirror to a tier of a file system
trusted domains
allowing access to CIFS when setting an IDMAP backend to ad, Allowing trusted domains access to CIFS when setting an IDMAP backend to ad
allowing access to CIFS when setting an IDMAP backend to hash, Allowing trusted domains access to CIFS when setting an IDMAP backend to hash
allowing access to CIFS when setting an IDMAP backend to ldap, Allowing trusted domains access to CIFS when setting an IDMAP backend to ldap
allowing access to CIFS when setting an IDMAP backend to rid, Allowing trusted domains access to CIFS when setting an IDMAP backend to rid
specifying which are allowed access to the CIFS server, Specifying trusted domains that are allowed access to the CIFS server
tunables for iSCSI
modifying, Modifying tunables for iSCSI
tuned file system
creating for a specific workload, About creating a tuned file system for a specific workload

U

unexporting
share of exported directory, Unexporting a directory or deleting NFS options
UNIX users from LDAP to Windows users
automatic mapping of, Automatically mapping UNIX users from LDAP to Windows users
unmounting snapshots, Bringing snapshots online or taking snapshots offline
Unpinning files from the cache, Customizing the caching behavior
unplanned failback
process overview, Overview of the unplanned failback process, Overview of the unplanned failback process
unplanned failover
process overview, Overview of the unplanned failover process, Overview of the unplanned failover process
upgrading
disk layout versions, Upgrading disk layout versions
Use
NFS-Ganesha server, Using the NFS-Ganesha server
Use case
configuring the Object Store server, Use cases for configuring the Object Store server
Use cases
compressing files, Use cases for compressing files
user and group accounts in LDAP
storing, Storing user and group accounts
user and group accounts locally
storing, Storing user and group accounts
user names
mapping for CIFS/NFS sharing, About mapping user names for CIFS/NFS sharing
user roles and privileges
about, About user roles and privileges
users
adding, Adding Master, System Administrator, and Storage Administrator users
changing passwords, Adding Master, System Administrator, and Storage Administrator users
deleting, Adding Master, System Administrator, and Storage Administrator users
managing, Managing the users
using
AD interface, Removing the AD interface
history command, Displaying the command history
more command, Using the more command
multi-domain controller support in CIFS, Using multi-domain controller support in CIFS
Using compression
best practices, Best practices for using compression
Using NFS Server, About using the NFS server with Veritas Access

V

verifying
Veritas Access has joined Active Directory (AD), Verifying that Veritas Access has joined Active Directory (AD) successfully
Veritas Access
about, About Veritas Access
integration with OpenStack Manila, About the Veritas Access integration with OpenStack Manila
key features, About Veritas Access
product documentation, Using the Veritas Access product documentation
Veritas Access continuous replication
about, About Veritas Access continuous replication
description of feature, How Veritas Access continuous replication works
starting, Starting Veritas Access continuous replication
Veritas Access episodic replication
about, About Veritas Access episodic replication
compression, Replicating compressed data
description of feature, How Veritas Access episodic replication works
scheduling, Scheduling the episodic replication
starting, Starting Veritas Access episodic replication
Veritas Access file systems
read caching, About SmartIO read caching for applications running on Veritas Access file systems
Veritas Access SmartTier
about, About Veritas Access SmartTier
Veritas Access to the Kerberos realm
adding and configuring, Adding and configuring Veritas Access to the Kerberos realm
Veritas File System (VxFS)
configuring read caching, Setting up SmartIO read caching for Veritas Access
customizing caching, Customizing the caching behavior
viewing detailed cache statistics, Viewing the caching statistics for a cache area
viewing file system cache statistics, Viewing the caching statistics for a cache area
VLAN
adding interfaces, Configuring VLAN interfaces
configuring interfaces, Configuring VLAN interfaces
deleting interfaces, Configuring VLAN interfaces
displaying interfaces, Configuring VLAN interfaces

W

what to replicate
defining, Defining what to replicate
Windows Active Directory
configuring as an IDMAP backend, About configuring Windows Active Directory as an IDMAP backend for CIFS
workflow
object server, About the Object Store server
WORM over NFS
setting, Setting WORM over NFS
WORM-retention over CIFS
setting, Manually setting WORM-retention on a file over CIFS
writeback caching mode, Setting the caching mode
WWN information
displaying, Displaying WWN information