Veritas Access Online Help

Last Published:
Product(s): Access (7.4.2.400)
Platform: Linux
  1. Getting started
    1.  
      About Veritas Access
    2.  
      Enabling certificate-based authentication in Veritas Access
    3. About the dashboard
      1.  
        Viewing the IOPS details for all the file systems
      2.  
        Viewing the throughput details for all the file systems
      3.  
        Viewing the latency details for all the file systems
      4.  
        About the Quick Actions
    4.  
      Setting up the storage type for provisioning
    5. About the CIFS shares
      1.  
        Creating a CIFS share with continuous replication
      2.  
        Creating a CIFS share with episodic replication
      3.  
        Creating a CIFS share with encryption
      4.  
        Creating a CIFS share with episodic replication and encryption
      5.  
        Creating a CIFS share without replication and encryption
    6. About managing CIFS shares for Enterprise Vault
      1.  
        Creating a CIFS share for Enterprise Vault with replication
      2.  
        Creating a CIFS share for Enterprise Vault without replication
    7. About the NFS shares
      1.  
        Creating an NFS share with continuous replication
      2.  
        Creating an NFS share with episodic replication
      3.  
        Creating an NFS share with encryption
      4.  
        Creating an NFS share with episodic replication and encryption
      5.  
        Creating an NFS share without replication and encryption
    8.  
      About an iSCSI target
    9.  
      Creating an iSCSI target and provisioning LUNs
    10. About S3 buckets for NetBackup
      1.  
        Creating an S3 bucket for NetBackup without a cloud tier
      2.  
        Creating an S3 bucket for NetBackup with a cloud tier
    11.  
      Using the Veritas Access product documentation
    12.  
      Changing your password
    13.  
      Important release information
  2. Managing storage
    1. About storage provisioning and management
      1.  
        Adding disks to a storage pool
      2.  
        Removing disks from a storage pool
      3.  
        Removing disks from a cluster
      4.  
        Viewing information about disks
      5.  
        Accessing disk details
      6.  
        Viewing information about a node in a cluster
      7.  
        Accessing node details
      8.  
        Configuring a disk
      9.  
        Increasing the size of a disk
      10.  
        Running scanbus
      11.  
        Formatting a disk
      12.  
        Marking a disk as spare
      13. About SmartIO for solid-state drives
        1.  
          About SmartIO read caching for applications running on Veritas Access file systems
        2.  
          About SmartIO writeback caching for applications running on Veritas Access file systems
  3. Managing file sharing services
    1.  
      About using the NFS server with Veritas Access
    2.  
      About configuring Veritas Access for CIFS
    3.  
      About the Object Store server
  4. Monitoring and troubleshooting
    1.  
      About troubleshooting
    2.  
      Monitoring command activity
    3.  
      Monitoring alerts
    4.  
      Monitoring events
    5.  
      Viewing reports
    6.  
      Viewing cluster storage usage
    7.  
      Viewing file system usage
    8.  
      Running a full discovery
  5. Provisioning and managing file systems
    1. Creating a file system
      1.  
        Viewing the list of file systems
      2.  
        Viewing file system performance
      3.  
        Accessing file system details
      4.  
        Modifying a file system
      5.  
        Choosing a file system layout type
      6.  
        Setting up a file system online or offline
      7.  
        Deleting a file system
    2.  
      Setting the maximum IOPS
    3.  
      Creating a snapshot
    4.  
      Restoring a snapshot
    5. Configuring a replication job
      1.  
        Stopping or starting a replication job for VVR
      2.  
        Pausing and resuming a replication job for VVR
      3.  
        Enabling or disabling a replication job for VFR
      4.  
        Synchronizing a replication job for VFR
      5.  
        Failing over or failing back a replication job for VVR
      6.  
        Failing over or failing back a replication job for VFR
      7.  
        Unconfiguring a replication job for VFR
      8.  
        Unconfiguring a replication job for VVR
    6.  
      Viewing the list of iSCSI targets
    7.  
      Adding an initiator for an iSCSI target
    8.  
      Removing an initiator for an iSCSI target
    9.  
      Adding portal IPs for an iSCSI target
    10.  
      Setting up authentication for an iSCSI target
    11.  
      Viewing the list of initiators for an iSCSI target
    12.  
      Viewing the portal IPs for an iSCSI target
    13.  
      Removing portal IPs for an iSCSI target
    14.  
      Removing authentication settings for an iSCSI target
    15.  
      Removing an iSCSI target
    16.  
      Removing the file system store for an iSCSI target
    17.  
      Viewing the list of LUNs for an iSCSI target
    18.  
      Creating a LUN for an iSCSI target
    19.  
      Increasing the size of a LUN for an iSCSI target
    20.  
      Reducing the size of a LUN for an iSCSI target
    21.  
      Removing a LUN for an iSCSI target
    22.  
      Cloning a LUN for an iSCSI target
    23.  
      Creating a snapshot of a LUN for an iSCSI target
    24.  
      Viewing the list of snapshots for an iSCSI target
    25.  
      Removing a LUN snapshot
    26.  
      Restoring a LUN snapshot
  6. Provisioning and managing shares
    1.  
      About file sharing protocols
    2.  
      About concurrent access
    3.  
      About concurrent access with NFS and S3
    4.  
      Sharing directories using CIFS and NFS protocols
    5.  
      Adding a share
    6.  
      NFS protocol options
    7.  
      CIFS protocol options
    8.  
      About buckets and objects
    9.  
      About Active Directory (AD)
    10.  
      Logging on as an active directory user
    11.  
      Creating access and secret keys for an active directory user
    12.  
      Exporting an NFS share as an S3 bucket
    13.  
      Viewing information about a share
    14.  
      Accessing share details
    15.  
      Configuring a favorite share
    16.  
      Deleting a share
    17.  
      Managing permissions for CIFS shares
    18.  
      Managing clients for the NFS shares
  7. Managing policies
    1.  
      About policies for storage provisioning
    2.  
      About policies for long-term data retention
    3.  
      About policies for archiving data using Enterprise Vault
    4.  
      About policies for file systems
    5.  
      About pattern matching for data movement policies
    6.  
      Viewing information about policies
    7.  
      Activating storage policy templates
    8.  
      Activating long-term data retention policies
    9.  
      Activating archival policies
    10.  
      Creating an S3 bucket
    11.  
      About cloud-storage tiering
    12.  
      Workflow for adding a cloud tier
    13.  
      About tiering policies
    14.  
      Adding a secondary tier
    15.  
      Viewing information about the secondary tier
    16.  
      Adding or editing a tier policy on a secondary tier
    17.  
      Creating a policy schedule
  8. Managing settings
    1.  
      Viewing Veritas Access settings
    2.  
      About the cloud gateway
    3.  
      Viewing information about cloud services
    4.  
      Adding and removing a cloud service
    5.  
      Viewing discovery information about your cluster
    6.  
      About the Lightweight Directory Access Protocol
    7.  
      Configuring LDAP
    8.  
      Configuring Active Directory
    9.  
      Configuring the NTP server
    10.  
      Starting or stopping the CIFS or NFS servers
    11.  
      Starting or stopping the S3 server
    12.  
      Adding or removing storage pools for S3 users
    13.  
      Configuring the /etc/hosts file for mapping of S3 users
    14.  
      Registering a NetBackup master server or an EMM server
    15.  
      Modifying a NetBackup media server list
    16.  
      Viewing information about your NetBackup configuration with Veritas Access
    17.  
      About cluster management
    18.  
      Setting up the time and the time zone for the cluster
    19. About replication
      1.  
        Viewing information about replication
      2.  
        Setting up a virtual IP for replication
      3.  
        Creating a replication link
      4.  
        Deleting a replication link
      5.  
        Modifying a replication unit
      6.  
        Deleting a replication virtual IP
      7.  
        Setting a replication schedule
    20.  
      Viewing information about events
    21.  
      Purging events
    22. About Veritas Access product licensing
      1.  
        Adding a license
      2.  
        Per-TB licensing model
      3.  
        TB-Per-Core licensing model
      4.  
        Per-Core licensing model
      5.  
        Notes and functional enforcements for licensing
      6.  
        Viewing information about licensing
    23.  
      Setting object server default parameters
    24.  
      Setting up the object server group-specific parameters
    25.  
      Viewing information about S3
    26.  
      Configuring the KMS server
    27.  
      About the CIFS service management
    28.  
      Setting up the home directory
    29. About the File Transfer Protocol
      1.  
        Configuring the File Transfer Protocol
      2.  
        Viewing information about FTP
    30. About Veritas Data Deduplication
      1.  
        Viewing information about Veritas Data Deduplication
      2.  
        Starting or stopping the Veritas Data Deduplication service
      3.  
        Increasing storage for Veritas Data Deduplication
      4.  
        Unconfiguring Veritas Data Deduplication
    31. About alert management
      1.  
        Viewing information about alert management
      2.  
        Managing alerts
  9.  
    Index

A

about
Active Directory (AD), About Active Directory (AD)
buckets and objects, About buckets and objects
CIFS service management, About the CIFS service management
configuring Veritas Access for CIFS, About configuring Veritas Access for CIFS
policy-based storage provisioning, About policies for storage provisioning
quick actions, About the Quick Actions
replication, About replication
shares, About file sharing protocols
storage provisioning and management, About storage provisioning and management
Veritas Data Deduplication, About Veritas Data Deduplication
About
CIFS protocol options, CIFS protocol options
cloud gateway, About the cloud gateway
concurrent access, About concurrent access
NFS protocol options, NFS protocol options
policies, About policies for file systems
about S3
viewing information, Viewing information about S3
accessing
disk details, Accessing disk details
NFS server details, Accessing share details
node details, Accessing node details
Veritas Access product documentation, Using the Veritas Access product documentation
Active Directory
configuring, Configuring Active Directory
Active Directory (AD)
about, About Active Directory (AD)
active directory user
creating access and secret keys, Creating access and secret keys for an active directory user
logging on, Logging on as an active directory user
activity
monitoring, Monitoring command activity
adding
an initiator for an iSCSI target, Adding an initiator for an iSCSI target
cloud service, Adding and removing a cloud service
external NetBackup master server to work with Veritas Access, Registering a NetBackup master server or an EMM server
license, Adding a license
NetBackup Enterprise Media Manager (EMM) server, Registering a NetBackup master server or an EMM server
NetBackup media server, Registering a NetBackup master server or an EMM server
portal IPs for an iSCSI target, Adding portal IPs for an iSCSI target
secondary tier, Adding a secondary tier
share, Adding a share
tier policy, Adding or editing a tier policy on a secondary tier
an initiator for an iSCSI target
adding, Adding an initiator for an iSCSI target
authentication for an iSCSI target
removing, Removing authentication settings for an iSCSI target
setting up, Setting up authentication for an iSCSI target

B

buckets and objects
about, About buckets and objects

C

certificate-based authentication
enabling, Enabling certificate-based authentication in Veritas Access
CIFS and NFS protocols
share directories, Sharing directories using CIFS and NFS protocols
CIFS clustering modes
about, About configuring Veritas Access for CIFS
CIFS operating modes
about, About configuring Veritas Access for CIFS
CIFS or NFS
starting or stopping, Starting or stopping the CIFS or NFS servers
CIFS protocol options
about, CIFS protocol options
CIFS service management
about, About the CIFS service management
CIFS share
adding, Adding a share
CIFS share for Enterprise Vault with replication
creating, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication
creating, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication
creating, Creating a CIFS share with continuous replication
CIFS share with encryption
creating, Creating a CIFS share with encryption
CIFS share with episodic replication
creating, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption
creating, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption
creating, Creating a CIFS share without replication and encryption
clients for NFS shares
managing, Managing clients for the NFS shares
cloning
LUN for an iSCSI target, Cloning a LUN for an iSCSI target
Cloud gateway
about, About the cloud gateway
cloud service
adding, Adding and removing a cloud service
cloud tier
workflow for adding, Workflow for adding a cloud tier
cluster
viewing information about, Viewing information about a node in a cluster
cluster nodes
accessing details for, Accessing node details
Concurrent access
about, About concurrent access
concurrent access
NFS and S3, About concurrent access with NFS and S3
configuring
Active Directory, Configuring Active Directory
event notifications, Monitoring alerts
favorite share, Configuring a favorite share
file transfer protocol, Configuring the File Transfer Protocol
KMS server, Configuring the KMS server
LDAP, Configuring LDAP
Veritas Access for CIFS, About configuring Veritas Access for CIFS
creating
CIFS share for Enterprise Vault with replication, Creating a CIFS share for Enterprise Vault with replication
CIFS share for Enterprise Vault without replication, Creating a CIFS share for Enterprise Vault without replication
CIFS share with continuous replication, Creating a CIFS share with continuous replication
CIFS share with encryption, Creating a CIFS share with encryption
CIFS share with episodic replication, Creating a CIFS share with episodic replication
CIFS share with episodic replication and encryption, Creating a CIFS share with episodic replication and encryption
CIFS share without replication and encryption, Creating a CIFS share without replication and encryption
file systems, Creating a file system
iSCSI target, Creating an iSCSI target and provisioning LUNs
LUN for an iSCSI target, Creating a LUN for an iSCSI target
NFS share with continuous replication, Creating an NFS share with continuous replication
NFS share with encryption, Creating an NFS share with encryption
NFS share with episodic replication, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption, Creating an NFS share without replication and encryption
replication link, Creating a replication link
S3 bucket for NetBackup with a cloud tier , Creating an S3 bucket for NetBackup with a cloud tier
S3 bucket for NetBackup without a cloud tier, Creating an S3 bucket for NetBackup without a cloud tier
snapshot of a LUN for an iSCSI target, Creating a snapshot of a LUN for an iSCSI target
snapshots, Creating a snapshot
storage pools, Adding disks to a storage pool
creating access and secret keys
active directory user, Creating access and secret keys for an active directory user

D

dashboard
about, About the dashboard
deleting
configured NetBackup media server, Registering a NetBackup master server or an EMM server
file system, Deleting a file system
file system store for an iSCSI target, Removing the file system store for an iSCSI target
replication link, Deleting a replication link
share, Deleting a share
disabling
replication job for VFR, Enabling or disabling a replication job for VFR
disks
accessing details about, Accessing disk details
viewing information about, Viewing information about disks

E

editing
tier policy, Adding or editing a tier policy on a secondary tier
enabling
certificate-based authentication, Enabling certificate-based authentication in Veritas Access
replication job for VFR, Enabling or disabling a replication job for VFR
event notifications
configuring, Monitoring alerts
events
monitoring, Monitoring events
purging, Purging events
exporting
NFS share as an S3 bucket, Exporting an NFS share as an S3 bucket

F

failing back
replication job for VFR, Failing over or failing back a replication job for VFR
replication job for VVR, Failing over or failing back a replication job for VVR
failing over
replication job for VFR, Failing over or failing back a replication job for VFR
replication job for VVR, Failing over or failing back a replication job for VVR
favorite share
configuring, Configuring a favorite share
file system
deleting, Deleting a file system
modifying, Modifying a file system
file system offline
setting up, Setting up a file system online or offline
file system online
setting up, Setting up a file system online or offline
file system performance
viewing, Viewing file system performance
file system store for an iSCSI target
deleting, Removing the file system store for an iSCSI target
file systems
creating, Creating a file system
types of layout, Choosing a file system layout type
viewing information about, Viewing the list of file systems , Accessing file system details
file transfer protocol
configuring, Configuring the File Transfer Protocol
filter
about, Monitoring alerts
FTP
viewing information, Viewing information about FTP
full discovery
running, Running a full discovery

H

home directory
setting up, Setting up the home directory

I

increasing
size of a LUN for an iSCSI target, Increasing the size of a LUN for an iSCSI target
initiator for an iSCSI target
removing, Removing an initiator for an iSCSI target
iSCSI target
creating, Creating an iSCSI target and provisioning LUNs
removing, Removing an iSCSI target

K

KMS server
configuring, Configuring the KMS server

L

layouts
types of file system, Choosing a file system layout type
LDAP
configuring, Configuring LDAP
license
adding, Adding a license
licensing
viewing information about, Viewing information about licensing
list of initiators for an iSCSI target
viewing, Viewing the list of initiators for an iSCSI target
list of iSCSI targets
viewing , Viewing the list of iSCSI targets
list of snapshots for an iSCSI target
viewing, Viewing the list of snapshots for an iSCSI target
logging on
active directory user, Logging on as an active directory user
LUN for an iSCSI target
cloning, Cloning a LUN for an iSCSI target
creating, Creating a LUN for an iSCSI target
removing, Removing a LUN for an iSCSI target
LUN snapshot
removing, Removing a LUN snapshot
restoring, Restoring a LUN snapshot
LUNs
provisioning, Creating an iSCSI target and provisioning LUNs
LUNs for an iSCSI target
viewing, Viewing the list of LUNs for an iSCSI target

M

managing
clients for NFS shares, Managing clients for the NFS shares
permissions for CIFS, Managing permissions for CIFS shares
maximum IOPS
setting, Setting the maximum IOPS
modifying
file system, Modifying a file system
NetBackup media server list, Modifying a NetBackup media server list
monitoring
activity, Monitoring command activity
events, Monitoring events

N

NetBackup
viewing information about, Viewing information about your NetBackup configuration with Veritas Access
NetBackup EMM server (see NetBackup Enterprise Media Manager (EMM) server)
NetBackup Enterprise Media Manager (EMM) server
adding to work with Veritas Access, Registering a NetBackup master server or an EMM server
NetBackup master server
configuring to work with Veritas Access, Registering a NetBackup master server or an EMM server
NetBackup media server
adding, Registering a NetBackup master server or an EMM server
NetBackup media server list
modifying, Modifying a NetBackup media server list
NFS protocol options
about, NFS protocol options
NFS server
about, About using the NFS server with Veritas Access
accessing details about, Accessing share details
NFS share
adding, Adding a share
deleting, Deleting a share
viewing, Viewing information about a share
NFS share with continuous replication
creating, Creating an NFS share with continuous replication
NFS share with encryption
creating, Creating an NFS share with encryption
NFS share with episodic replication
creating, Creating an NFS share with episodic replication
NFS share with episodic replication and encryption
creating, Creating an NFS share with episodic replication and encryption
NFS share without replication and encryption
creating, Creating an NFS share without replication and encryption

O

object server, About the Object Store server
object server group-specific parameters
setting up, Setting up the object server group-specific parameters

Q

quick actions
about, About the Quick Actions

R

read caching, About SmartIO read caching for applications running on Veritas Access file systems
reducing
size of a LUN for an iSCSI target, Reducing the size of a LUN for an iSCSI target
registering
NetBackup master server or NetBackup EMM server, Registering a NetBackup master server or an EMM server
release information, Important release information
removing
authentication for an iSCSI target, Removing authentication settings for an iSCSI target
initiator for an iSCSI target, Removing an initiator for an iSCSI target
iSCSI target, Removing an iSCSI target
LUN for an iSCSI target, Removing a LUN for an iSCSI target
LUN snapshot, Removing a LUN snapshot
portal IPs for an iSCSI target, Removing portal IPs for an iSCSI target
replication
about, About replication
viewing information about, Viewing information about replication
replication job
configuring, Configuring a replication job
unconfigure, Unconfiguring a replication job for VFR
replication job for VFR
disabling, Enabling or disabling a replication job for VFR
enabling, Enabling or disabling a replication job for VFR
failing back, Failing over or failing back a replication job for VFR
failing over, Failing over or failing back a replication job for VFR
synchronizing, Synchronizing a replication job for VFR
replication job for VVR
failing back, Failing over or failing back a replication job for VVR
failing over, Failing over or failing back a replication job for VVR
pausing, Pausing and resuming a replication job for VVR
resuming, Pausing and resuming a replication job for VVR
starting, Stopping or starting a replication job for VVR
stopping, Stopping or starting a replication job for VVR
unconfiguring, Unconfiguring a replication job for VVR
replication link
creating a, Creating a replication link
deleting, Deleting a replication link
replication schedule
setting, Setting a replication schedule
replication unit
creating, Configuring a replication job
replication virtual IP
deleting, Deleting a replication virtual IP
restoring
LUN snapshot, Restoring a LUN snapshot
snapshot, Restoring a snapshot
resuming
replication job for VVR, Pausing and resuming a replication job for VVR
running
full discovery, Running a full discovery

S

S3 bucket
exporting an NFS share as, Exporting an NFS share as an S3 bucket
S3 bucket for NetBackup with a cloud tier
creating, Creating an S3 bucket for NetBackup with a cloud tier
S3 bucket for NetBackup without a cloud tier
creating, Creating an S3 bucket for NetBackup without a cloud tier
S3 share
adding, Adding a share
secondary tier
adding, Adding a secondary tier
viewing information about, Viewing information about the secondary tier
setting
maximum IOPS, Setting the maximum IOPS
replication schedule, Setting a replication schedule
setting up
authentication for an iSCSI target, Setting up authentication for an iSCSI target
file system offline, Setting up a file system online or offline
file system online, Setting up a file system online or offline
home directory, Setting up the home directory
object server group-specific parameters, Setting up the object server group-specific parameters
virtual IP for replication, Setting up a virtual IP for replication
severity levels
about, Monitoring alerts
share directories
CIFS and NFS protocols, Sharing directories using CIFS and NFS protocols
shares
about, About file sharing protocols
size of a LUN for an iSCSI target
increasing, Increasing the size of a LUN for an iSCSI target
reducing, Reducing the size of a LUN for an iSCSI target
SmartIO
about, About SmartIO for solid-state drives
snapshot
restoring, Restoring a snapshot
snapshot of a LUN for an iSCSI target
creating, Creating a snapshot of a LUN for an iSCSI target
snapshots
creating, Creating a snapshot
solid-state drives (SSDs)
about, About SmartIO for solid-state drives
starting
replication job for VVR, Stopping or starting a replication job for VVR
starting or stopping
CIFS or NFS servers, Starting or stopping the CIFS or NFS servers
stopping
replication job for VVR, Stopping or starting a replication job for VVR
storage pools
creating, Adding disks to a storage pool
storage provisioning and management
about, About storage provisioning and management
synchronizing
replication job for VFR, Synchronizing a replication job for VFR

T

tier policy
adding or editing, Adding or editing a tier policy on a secondary tier
troubleshooting
about, About troubleshooting

V

Veritas Access
about, About Veritas Access
key features, About Veritas Access
product documentation, Using the Veritas Access product documentation
Veritas Access file systems
read caching, About SmartIO read caching for applications running on Veritas Access file systems
writeback caching, About SmartIO writeback caching for applications running on Veritas Access file systems
Veritas Data Deduplication
about, About Veritas Data Deduplication
viewing
file system performance, Viewing file system performance
information about a node in a cluster, Viewing information about a node in a cluster
information about disks, Viewing information about disks
information about file systems, Viewing the list of file systems , Accessing file system details
information about NetBackup, Viewing information about your NetBackup configuration with Veritas Access
information about NFS shares, Viewing information about a share
list of initiators for an iSCSI target, Viewing the list of initiators for an iSCSI target
list of iSCSI targets, Viewing the list of iSCSI targets
list of snapshots for an iSCSI target, Viewing the list of snapshots for an iSCSI target
LUNs for an iSCSI target, Viewing the list of LUNs for an iSCSI target
portal IPs for an iSCSI target, Viewing the portal IPs for an iSCSI target
viewing information
about S3, Viewing information about S3
FTP, Viewing information about FTP
viewing information about
replication, Viewing information about replication
virtual IP for replication
setting up, Setting up a virtual IP for replication