Veritas Access 7.3 Administrator's Guide
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- About Flexible Storage Sharing
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring your NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring Veritas Access to work with Oracle Direct NFS
- Configuring an FTP server
- Configuring your NFS server
- Section V. Managing the Veritas Access Object Store server
- Section VI. Monitoring and troubleshooting
- Section VII. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Configuring cloud storage
- Configuring the cloud gateway
- Configuring cloud as a tier
- About policies for scale-out file systems
- Section IX. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Section X. Managing Veritas Access storage services
- Deduplicating data
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring replication
- Replication job failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring Veritas Access with the NetBackup client
- Section XI. Reference
About data deduplication
Data deduplication is the process by which redundant data is eliminated to improve storage utilization. Using data deduplication, you can reduce the amount of storage required for storing user and application data. It is most effective in use-cases where many copies of very similar or even identical copies of data are stored. The deduplication feature in Veritas Access provides storage optimization for primary storage (storage of active data).
Each file in the configured file system is broken into user-configurable chunks for evaluating duplicates. The smaller the chunk size, the higher the percentage of sharing due to better chances of matches.
The first deduplication of a file system is always a full deduplication of the entire file system. This is an end-to-end deduplication process that identifies and eliminates duplicate data. Any subsequent attempt to run deduplication on that file system results in incremental deduplication.
Note:
Deduplication with a small chunk size increases the deduplication time and load on the system.
Veritas Access deduplication is periodic, that is, as per the user-configured frequency, redundant data in the file system is detected and eliminated.
The following are potential use cases for Veritas Access file system deduplication:
Microsoft Exchange mailboxes
File systems hosting user home directories
Virtual Machine Disk Format (VMDK) or virtual image stores.
Table: Relationship between physical and logical data on a file system for two billion unique fingerprints with various deduplication ratios shows an estimated file system data size that can be supported for a Veritas Access deduplicated file system.
Table: Relationship between physical and logical data on a file system for two billion unique fingerprints with various deduplication ratios
Fingerprint block size | Deduplication ratio | Unique signature per TB | Physical file system data size | Effective logical file system data size |
---|---|---|---|---|
4 K | 50% | 128 M | 16 TB | 32 TB |
4 K | 65% | 90 M | 23 TB | 65 TB |
4 K | 80% | 51 M | 40 TB | 200 TB |
8 K | 50% | 64 M | 32 TB | 64 TB |
8 K | 65% | 45 M | 46 TB | 132 TB |
8 K | 80% | 25 M | 80 TB | 400 TB |
16 K | 50% | 32 M | 64 TB | 128 TB |
16 K | 65% | 22 M | 93 TB | 266 TB |
16 K | 80 % | 13 M | 158 TB | 800 TB |
The Storage> dedup commands perform administrative functions for the Veritas Access deduplication feature. The deduplication commands allow you to enable, disable, start, stop, and remove deduplication on a file system. You can also reset several deduplication configuration parameters and display the current deduplication status for your file system.
Note:
Some configuration parameters can be set as local (specific to a file system) and or global (applicable to all deduplication-enabled file systems). Local parameters override the value of a global parameter.