Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Access Appliance integration with Data Insight
The integration of Access Appliance with Data Insight enables organizations to improve data governance through insights into the ownership and usage of unstructured data, including files such as documents, spreadsheets, and emails.
Access Appliance allows DI to display NFS share-level activities on the DI GUI and thus helps the users to make better business decisions and risk-management strategy.
The integration of Access Appliance with Data Insight has the following functionalities:
You can monitor NFS share activities and get details such as who uses the data, who owns the data and who has access to the data.
You can gather audit information on operations such as create, delete, read, write, make directories, remove directories, and rename type.
You have full visibility into data access, which helps drive security remediation, and auditing and compliance efforts using the web-based graphical user interface (GUI).
You can automate the movement of stale, less accessed, and other unimportant data to cloud or cheaper storage alternative with the help of the DI reporting and Access Appliance policy engine.
You can have a cluster-level view of audit logs. Access Appliance has multiple nodes, so you can access the same share or even the same file from multiple nodes in the cluster. You can merge the audit logs from different nodes to give a unified view to DI.
You can monitor data for any potential security breaches or internal misuse of information. You can ensure that proper document protocols are followed consistently, and you can also prevent and track down fraud.
You can enhance your risk-management capabilities by running reports on a given end user and examine their activity. You can see which records have been accessed, edited, added, or deleted. You can also get details on deleted records like when it was deleted, who deleted it, and so on. You can track what goes on in the database.
Access Appliance helps the DI administrator to:
Add Access Appliance in the DI GUI.
Enable and disable auditing on a given NFS share.
Mount and scan the share as and when required.
Fetch the audit logs periodically from Access Appliance.
Allow showing the audit statistics on the DI console.
Prerequisites to configuring Access Appliance in the Data Insight GUI
An NFS server should be running on all the nodes.
xprtld
(Access Appliance UI REST server) should be running on all the nodes.sfsdg
disk group should be present
Configuring Access Appliance in the Data Insight GUI
You can add Access Appliance as one of the file system servers.
You can administer Access Appliance from the DI GUI and perform the following functions:
Scan the Access Appliance share from DI. For NFS scanning, the mount and scan approach is used.
Enable and disable audit logs for the share.
List file systems on which auditing is enabled.
You can get the information (path, permissions, and other details) about the shares. The Veritas File System Information Management Infrastructure (IMI) is used for collecting audit logs. The audit logs are created for each node and merged to give a cluster view.
DI can collect the audit logs periodically.
xprtld
(Access Appliance UI REST server) is used for transferring the logs. The audit logs of Access Appliance are shared with DI using the pull model.
Limitation
Only NFS shares scanning is supported for this release.
In case of a node restart, monitoring of shares does not work for that node.