Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the S3 server using GUI
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Configuring an episodic replication job using the GUI
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Configuring a continuous replication job using the GUI
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
Managing continuous replication
You can manage continuous replication by Replication> continuous start, Replication> continuous stop, Replication> continuous pause and Replication> continuous resume commands. It is recommended that you should run all these commands from the source cluster.
To start data replication
- To start data replication, enter the following command:
Replication> continuous start fs_name
fs_name
Specify the file system name that you have configured for continuous replication.
The data replication between source cluster and destination cluster starts.
To pause data replication
- To pause data replication, enter the following command:
Replication> continuous pause fs_name
fs_name
Specify the file system name that you have configured for continuous replication.
The data replication between source cluster and destination cluster is paused.
To resume data replication
- To resume data replication, enter the following command:
Replication> continuous resume fs_name
fs_name
Specify the file system name that you have configured for continuous replication.
The data replication between the source cluster and the destination cluster which was paused is resumed.
To stop data replication
- To stop data replication, enter the following command:
Replication> continuous stop fs_name
fs_name
Specify the file system name that you have configured for continuous replication.
The data replication between source cluster and destination cluster is stopped.
Note:
Veritas recommends that you should run replication continuous resume command when replication is in paused state. You should run Replication> continuous stop command when replication is in progress.
To modify the existing replication IP
- Before you modify the IP, ensure that you add the new IP address to the network IP address pool using the network ip addr add command and that the newly added IP is on the same node as the replication IP used for continuous replication.
To modify the existing virtual IP specified in a continuous replication job, enter the following command:
Replication> continuous config modifyip link_name src_ip_addr tgt_ip_addr [src_netmask] [tgt_netmask]
link_name
The name of the link.
src_ip_addr
The virtual IP of the source cluster.
tgt_ip_addr
The virtual IP of the destination cluster.
src_netmask
The netmask/prefix of the source replication IP address
tgt_netmask
The netmask/prefix of the destination replication IP address
After the command is run, the old replication IP on the source and target is deleted. You can verify using the network ip addr show command.