Please enter search query.
Search <book_title>...
Veritas Access Administrator's Guide
Last Published:
2021-04-15
Product(s):
Appliances (Version Not Specified)
Platform: 3340
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Configuring cloud storage
- Section VIII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section IX. Managing Veritas Access storage services
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Compressing files
- Section X. Reference
Unconfiguring continuous replication
You can unconfigure continuous replication.
To unconfigure continuous replication
- Stop the replication. Before you disable continuous replication, you have to stop replication using the following command.
Replication> continuous stop <fs_name>
fs_name
Specify the file system name.
Note:
This command should be executed from the source cluster.
- Check the replication status.
Replication> continuous status <fs_name>
fs_name
Specify the file system name.
- Disable continuous replication. All the configuration which was done for replication configuration when you enabled continuous replication from the source and the destination cluster is destroyed.
Replication> continuous disable <fs_name> <link_name>
fs_name
Specify the file system name.
link_name
Specify the link name.
Note:
This command should be executed from the source cluster.
- Delete the authentication links.
Replication> continuous config deauth <link_name>
link_name
Specify the link name.
Note:
The Replication> continuous config deauth command should be executed from the source cluster. The command deletes the link from the destination to the source cluster.
- Delete the keys from the source and the destination clusters.
Replication> continuous config del_keys <remote_console_ip>
remote_console_ip
Specify the remote console IP address.
- Stop the continuous service from the source and the destination clusters.
Replication> continuous service stop
- Unbind the replication IP from the source and the destination clusters.
Replication> continuous config unbind <replication_ip>
replication_ip
Specify the replication IP address.