Storage Foundation Cluster File System High Availability 7.2 Administrator's Guide - Solaris

Last Published:
Product(s): InfoScale & Storage Foundation (7.2)
Platform: Solaris
  1. Section I. Introducing Storage Foundation Cluster File System High Availability
    1. Overview of Storage Foundation Cluster File System High Availability
      1.  
        About Storage Foundation Cluster File System High Availability
      2.  
        About Dynamic Multi-Pathing (DMP)
      3.  
        About Veritas Volume Manager
      4. About Veritas File System
        1.  
          About the Veritas File System intent log
        2.  
          About extents
        3.  
          About file system disk layouts
      5. About Storage Foundation Cluster File System (SFCFS)
        1. About Veritas File System features supported in cluster file systems
          1.  
            Veritas File System features not in cluster file systems
      6.  
        About Veritas InfoScale Operations Manager
      7.  
        Use cases for Storage Foundation Cluster File System High Availability
    2. How Dynamic Multi-Pathing works
      1. How DMP works
        1. Device discovery
          1.  
            About enclosure-based naming
        2. How DMP monitors I/O on paths
          1. Path failover mechanism
            1.  
              Subpaths Failover Group (SFG)
            2.  
              Low Impact Path Probing (LIPP)
          2.  
            I/O throttling
        3.  
          Load balancing
        4.  
          Disabling Sun Multipath IO (MPxIO)
        5.  
          Dynamic Reconfiguration
        6.  
          DMP support for the ZFS root pool
        7.  
          About booting from DMP devices
        8. DMP in a clustered environment
          1.  
            About enabling or disabling controllers with shared disk groups
      2.  
        Veritas Volume Manager co-existence with Oracle Automatic Storage Management disks
    3. How Veritas Volume Manager works
      1. How Veritas Volume Manager works with the operating system
        1.  
          How data is stored
      2. How Veritas Volume Manager handles storage management
        1. Physical objects
          1.  
            About disk partitions
          2.  
            Disk arrays
        2. Virtual objects
          1.  
            Combining virtual objects in Veritas Volume Manager
        3.  
          About the configuration daemon in Veritas Volume Manager
        4.  
          Multiple paths to disk arrays
      3. Volume layouts in Veritas Volume Manager
        1.  
          Non-layered volumes
        2.  
          Layered volumes
        3.  
          Layout methods
        4.  
          Concatenation, spanning, and carving
        5.  
          Striping (RAID-0)
        6.  
          Mirroring (RAID-1)
        7.  
          Striping plus mirroring (mirrored-stripe or RAID-0+1)
        8.  
          Mirroring plus striping (striped-mirror, RAID-1+0, or RAID-10)
        9. RAID-5 (striping with parity)
          1.  
            Traditional RAID-5 arrays
          2.  
            Veritas Volume Manager RAID-5 arrays
          3.  
            Left-symmetric layout
          4.  
            RAID-5 logging
          5.  
            About layered volumes
      4. Online relayout
        1.  
          How online relayout works
        2.  
          Limitations of online relayout
        3.  
          Transformation characteristics
        4.  
          Transformations and volume length
      5. Volume resynchronization
        1.  
          Dirty flags
        2.  
          Resynchronization process
      6.  
        Hot-relocation
      7. Dirty region logging
        1.  
          Log subdisks and plexes
        2.  
          Sequential DRL
      8. Volume snapshots
        1.  
          Comparison of snapshot features
      9. FastResync
        1.  
          How FastResync works
        2.  
          How non-persistent FastResync works with snapshots
        3.  
          How persistent FastResync works with snapshots
        4. DCO volume versioning
          1.  
            Instant snap (version 20) DCO volume layout
          2.  
            Version 0 DCO volume layout
        5.  
          Effect of growing a volume on the FastResync map
        6.  
          FastResync limitations
      10.  
        Volume sets
      11.  
        Configuration of volumes on SAN storage
      12. How VxVM handles hardware clones or snapshots
        1.  
          How VxVM uses the unique disk identifier (UDID)
    4. How Veritas File System works
      1.  
        Veritas File System features
      2. Veritas File System performance enhancements
        1. Enhanced I/O performance
          1.  
            Enhanced I/O clustering
          2.  
            Veritas Volume Manager integration with Veritas File System for enhanced I/O performance
          3.  
            Application-specific parameters for enhanced I/O performance
        2.  
          Delayed allocation for extending writes
      3. Using Veritas File System
        1. Online system administration
          1.  
            About defragmentation
          2.  
            About file system resizing
          3.  
            Using UNIX Commands on File Systems Larger than One TB
        2. Application program interface
          1.  
            Expanded application facilities
    5. How Storage Foundation Cluster File System High Availability works
      1.  
        How Storage Foundation Cluster File System High Availability works
      2.  
        When to use Storage Foundation Cluster File System High Availability
      3. About Storage Foundation Cluster File System High Availability architecture
        1.  
          About the symmetric architecture
        2.  
          About Storage Foundation Cluster File System High Availability primary/secondary failover
        3.  
          About single-host file system semantics using Group Lock Manager
      4. About Veritas File System features supported in cluster file systems
        1.  
          Veritas File System features not in cluster file systems
      5.  
        About Cluster Server architecture
      6.  
        About the Storage Foundation Cluster File System High Availability namespace
      7.  
        About asymmetric mounts
      8.  
        About primary and secondary cluster nodes
      9.  
        Determining or moving primaryship
      10.  
        About synchronizing time on Cluster File Systems
      11.  
        About file system tunables
      12.  
        About setting the number of parallel fsck threads
      13.  
        Storage Checkpoints
      14.  
        About Storage Foundation Cluster File System High Availability backup strategies
      15.  
        About parallel I/O
      16.  
        About the I/O error handling policy for Cluster Volume Manager
      17.  
        About recovering from I/O failures
      18. About single network link and reliability
        1.  
          Configuring a low-priority link
      19.  
        Split-brain and jeopardy handling
      20. About I/O fencing
        1.  
          About I/O fencing for SFCFSHA in virtual machines that do not support SCSI-3 PR
        2. About preventing data corruption with I/O fencing
          1.  
            About SCSI-3 Persistent Reservations
          2.  
            About I/O fencing operations
        3. About I/O fencing components
          1.  
            About data disks
          2.  
            About coordination points
          3.  
            About preferred fencing
          4.  
            How preferred fencing works
        4.  
          About I/O fencing configuration files
        5.  
          How I/O fencing works in different event scenarios
        6. About server-based I/O fencing
          1.  
            I/O fencing enhancements provided by CP server
          2.  
            About the CP server database
          3.  
            About the CP server user types and privileges
        7. About secure communication between the SFCFSHA cluster and CP server
          1.  
            How secure communication works between the CP servers and the SFCFSHA clusters using the Veritas Product Authentication Services (AT)
          2. Security configuration details on CP server and SFCFSHA cluster
            1.  
              Settings in Veritas Product Authentication Services (AT) secure mode
            2.  
              Settings in non-secure mode
      21.  
        Storage Foundation Cluster File System High Availability and Veritas Volume Manager cluster functionality agents
      22.  
        Veritas Volume Manager cluster functionality
    6. How Cluster Volume Manager works
      1.  
        About the cluster functionality of VxVM
      2. Overview of clustering
        1.  
          Overview of cluster volume management
        2.  
          About private and shared disk groups
        3.  
          Activation modes of shared disk groups
        4.  
          Limitations of shared disk groups
      3. Cluster Volume Manager (CVM) tolerance to storage connectivity failures
        1.  
          Availability of shared disk group configuration copies
        2.  
          About redirection of application I/Os with CVM I/O shipping
        3. Storage disconnectivity and CVM disk detach policies
          1.  
            About the types of storage connectivity failures
          2.  
            About disk detach policies
          3.  
            How CVM handles local storage disconnectivity with the global detach policy
          4.  
            How CVM handles local storage disconnectivity with the local detach policy
          5.  
            Guidelines for choosing detach policies
          6.  
            How CVM detach policies interact with I/O shipping
          7.  
            CVM storage disconnectivity scenarios that are policy independent
        4.  
          Availability of cluster nodes and shared disk groups
      4. CVM initialization and configuration
        1. Cluster reconfiguration
          1.  
            vxclustadm utility
        2. Volume reconfiguration
          1.  
            vxconfigd daemon
          2.  
            vxconfigd daemon recovery
        3.  
          Node shutdown
        4.  
          Cluster shutdown
      5. Dirty region logging in cluster environments
        1.  
          How DRL works in a cluster environment
      6. Multiple host failover configurations
        1.  
          Import lock
        2.  
          Failover
        3.  
          Corruption of disk group configuration
      7. About Flexible Storage Sharing
        1.  
          Flexible Storage Sharing use cases
        2.  
          Limitations of Flexible Storage Sharing
  2. Section II. Provisioning storage
    1. Provisioning new storage
      1.  
        Provisioning new storage
      2.  
        Growing the existing storage by adding a new LUN
      3.  
        Growing the existing storage by growing the LUN
      4.  
        Displaying SFCFSHA information with vxlist
    2. Advanced allocation methods for configuring storage
      1. Customizing allocation behavior
        1.  
          Setting default values for vxassist
        2. Using rules to make volume allocation more efficient
          1.  
            Rule file format
          2.  
            Using rules to create a volume
        3. Understanding persistent attributes
          1.  
            Using persistent attributes
        4. Customizing disk classes for allocation
          1.  
            User-defined alias names for disk classes
          2.  
            User-defined precedence order for disk classes
          3.  
            User-defined disk classes
        5. Specifying allocation constraints for vxassist operations with the use clause and the require clause
          1.  
            About require constraints
          2.  
            About use constraints
          3.  
            Interaction of multiple require and use constraints
          4.  
            Examples of use and require constraints
        6.  
          Management of the use and require type of persistent attributes
      2. Creating volumes of a specific layout
        1.  
          Types of volume layouts
        2. Creating a mirrored volume
          1.  
            Creating a mirrored-concatenated volume
          2.  
            Creating a concatenated-mirror volume
        3. Creating a striped volume
          1.  
            Creating a mirrored-stripe volume
          2.  
            Creating a striped-mirror volume
        4.  
          Creating a RAID-5 volume
      3.  
        Creating a volume on specific disks
      4.  
        Creating volumes on specific media types
      5.  
        Specifying ordered allocation of storage to volumes
      6.  
        Site-based allocation
      7.  
        Changing the read policy for mirrored volumes
    3. Creating and mounting VxFS file systems
      1. Creating a VxFS file system
        1.  
          File system block size
        2.  
          Intent log size
      2.  
        Converting a file system to VxFS
      3. Mounting a VxFS file system
        1.  
          log mount option
        2.  
          delaylog mount option
        3. tmplog mount option
          1.  
            Logging mode persistence guarantees
        4.  
          logiosize mount option
        5.  
          nodatainlog mount option
        6.  
          blkclear mount option
        7.  
          mincache mount option
        8.  
          convosync mount option
        9. ioerror mount option
          1.  
            disable policy
          2.  
            wdisable policy and mwdisable policy
          3.  
            mdisable policy
        10. largefiles and nolargefiles mount options
          1.  
            Creating a file system with large files
          2.  
            Mounting a file system with large files
          3.  
            Managing a file system with large files
        11.  
          cio mount option
        12.  
          mntlock mount option
        13.  
          ckptautomnt mount option
        14.  
          Combining mount command options
      4.  
        Unmounting a file system
      5. Resizing a file system
        1.  
          Extending a file system using fsadm
        2.  
          Shrinking a file system
        3.  
          Reorganizing a file system
      6.  
        Displaying information on mounted file systems
      7.  
        Identifying file system types
      8. Monitoring free space
        1.  
          Monitoring fragmentation
    4. Extent attributes
      1. About extent attributes
        1.  
          Reservation: preallocating space to a file
        2.  
          Fixed extent size
        3.  
          How the fixed extent size works with the shared extents
        4. Other extent attribute controls
          1.  
            Extent attribute alignment
          2.  
            Extent attribute contiguity
          3.  
            Write operations beyond extent attribute reservation
          4.  
            Extent attribute reservation trimming
          5.  
            Extent attribute reservation persistence
          6.  
            Including an extent attribute reservation in the file
      2. Commands related to extent attributes
        1.  
          About failing to preserve extent attributes
  3. Section III. Administering multi-pathing with DMP
    1. Administering Dynamic Multi-Pathing
      1. Discovering and configuring newly added disk devices
        1.  
          Partial device discovery
        2. About discovering disks and dynamically adding disk arrays
          1.  
            How DMP claims devices
          2.  
            Disk categories
          3.  
            Adding DMP support for a new disk array
          4.  
            Enabling discovery of new disk arrays
        3.  
          About third-party driver coexistence
        4. How to administer the Device Discovery Layer
          1.  
            Listing all the devices including iSCSI
          2.  
            Listing all the Host Bus Adapters including iSCSI
          3.  
            Listing the ports configured on a Host Bus Adapter
          4.  
            Listing the targets configured from a Host Bus Adapter or a port
          5.  
            Listing the devices configured from a Host Bus Adapter and target
          6.  
            Getting or setting the iSCSI operational parameters
          7.  
            Listing all supported disk arrays
          8.  
            Displaying details about an Array Support Library
          9.  
            Excluding support for a disk array library
          10.  
            Re-including support for an excluded disk array library
          11.  
            Listing excluded disk arrays
          12.  
            Listing disks claimed in the DISKS category
          13.  
            Adding unsupported disk arrays to the DISKS category
          14.  
            Removing disks from the DISKS category
          15.  
            Foreign devices
      2.  
        Making devices invisible to VxVM
      3.  
        Making devices visible to VxVM
      4.  
        About enabling and disabling I/O for controllers and storage processors
      5.  
        About displaying DMP database information
      6.  
        Displaying the paths to a disk
      7. Administering DMP using the vxdmpadm utility
        1.  
          Retrieving information about a DMP node
        2.  
          Displaying consolidated information about the DMP nodes
        3.  
          Displaying the members of a LUN group
        4.  
          Displaying paths controlled by a DMP node, controller, enclosure, or array port
        5.  
          Displaying information about controllers
        6.  
          Displaying information about enclosures
        7.  
          Displaying information about array ports
        8.  
          Displaying information about devices controlled by third-party drivers
        9.  
          Displaying extended device attributes
        10.  
          Suppressing or including devices from VxVM control
        11. Gathering and displaying I/O statistics
          1.  
            Displaying cumulative I/O statistics
          2.  
            Displaying statistics for queued or erroneous I/Os
          3.  
            Examples of using the vxdmpadm iostat command
        12.  
          Setting the attributes of the paths to an enclosure
        13.  
          Displaying the redundancy level of a device or enclosure
        14.  
          Specifying the minimum number of active paths
        15.  
          Displaying the I/O policy
        16. Specifying the I/O policy
          1.  
            Scheduling I/O on the paths of an Asymmetric Active/Active or an ALUA array
          2.  
            Example of applying load balancing in a SAN
        17.  
          Disabling I/O for paths, controllers, array ports, or DMP nodes
        18.  
          Enabling I/O for paths, controllers, array ports, or DMP nodes
        19.  
          Renaming an enclosure
        20.  
          Configuring the response to I/O failures
        21.  
          Configuring the I/O throttling mechanism
        22.  
          Configuring Low Impact Path Probing (LIPP)
        23.  
          Configuring Subpaths Failover Groups (SFG)
        24.  
          Displaying recovery option values
        25.  
          Configuring DMP path restoration policies
        26.  
          Stopping the DMP path restoration thread
        27.  
          Displaying the status of the DMP path restoration thread
        28.  
          Configuring Array Policy Modules
      8.  
        DMP coexistence with native multi-pathing
      9. Managing DMP devices for the ZFS root pool
        1.  
          Configuring a mirror for the ZFS root pool using a DMP device
        2.  
          Using DMP devices as swap devices or dump devices
        3.  
          Cloning the boot environment with DMP
        4.  
          Creating a snapshot of an existing boot environment
        5.  
          Enabling and disabling DMP support for the ZFS root pool
    2. Dynamic Reconfiguration of devices
      1.  
        About online dynamic reconfiguration
      2. Reconfiguring a LUN online that is under DMP control using the Dynamic Reconfiguration tool
        1.  
          Removing LUNs dynamically from an existing target ID
        2.  
          Adding new LUNs dynamically to a target ID
        3.  
          Replacing LUNs dynamically from an existing target ID
        4.  
          Replacing a host bus adapter online
      3. Manually reconfiguring a LUN online that is under DMP control
        1.  
          Overview of manually reconfiguring a LUN
        2.  
          Manually removing LUNs dynamically from an existing target ID
        3.  
          Manually adding new LUNs dynamically to a new target ID
        4.  
          About detecting target ID reuse if the operating system device tree is not cleaned up
        5.  
          Scanning an operating system device tree after adding or removing LUNs
        6.  
          Manually cleaning up the operating system device tree after removing LUNs
        7.  
          Manually replacing a host bus adapter on an M5000 server
      4.  
        Changing the characteristics of a LUN from the array side
      5.  
        Upgrading the array controller firmware online
    3. Managing devices
      1. Displaying disk information
        1.  
          About Media Format Discovery
        2.  
          Viewing information about the native layouts of operating system
        3. Viewing information about the disk sector size
          1.  
            Supported operating systems
        4.  
          Displaying disk information with vxdiskadm
      2. Changing the disk device naming scheme
        1.  
          Displaying the disk-naming scheme
        2.  
          Setting customized names for DMP nodes
        3.  
          Regenerating persistent device names
        4.  
          Changing device naming for enclosures controlled by third-party drivers
        5. Simple or nopriv disks with enclosure-based naming
          1.  
            Removing the error state for simple or nopriv disks in the boot disk group
          2.  
            Removing the error state for simple or nopriv disks in non-boot disk groups
        6. About the Array Volume Identifier (AVID) attribute
          1.  
            Enclosure based naming with the Array Volume Identifier (AVID) attribute
      3.  
        About disk installation and formatting
      4. Adding and removing disks
        1. Adding a disk to VxVM
          1.  
            Disk reinitialization
          2.  
            Using vxdiskadd to put a disk under VxVM control
        2. Removing disks
          1.  
            Removing a disk with subdisks
          2.  
            Removing a disk with no subdisks
      5.  
        Renaming a disk
    4. Event monitoring
      1.  
        About the Dynamic Multi-Pathing (DMP) event source daemon (vxesd)
      2.  
        Fabric Monitoring and proactive error detection
      3.  
        Dynamic Multi-Pathing (DMP) automated device discovery
      4.  
        Dynamic Multi-Pathing (DMP) discovery of iSCSI and SAN Fibre Channel topology
      5.  
        DMP event logging
      6.  
        Starting and stopping the Dynamic Multi-Pathing (DMP) event source daemon
  4. Section IV. Administering Storage Foundation Cluster File System High Availability
    1. Administering Storage Foundation Cluster File System High Availability and its components
      1.  
        About Storage Foundation Cluster File System High Availability administration
      2. Administering CFS
        1.  
          Adding CFS file systems to a VCS configuration
        2.  
          Uses of cfsmount to mount and cfsumount to unmount CFS file system
        3.  
          Removing CFS file systems from VCS configuration
        4.  
          Resizing CFS file systems
        5.  
          Verifying the status of CFS file system nodes and their mount points
        6.  
          Verifying the state of the CFS port
        7.  
          CFS agents and AMF support
        8.  
          CFS agent log files
        9.  
          CFS commands
        10. About the mount, fsclustadm, and fsadm commands
          1.  
            About the mount command
          2.  
            About the fsclustadm command
          3.  
            About the fsadm command
          4.  
            Running UNIX commands safely in a shared environment
        11.  
          Synchronizing system clocks on all nodes
        12.  
          Growing a CFS file system
        13.  
          About the /etc/vfstab file
        14. When the CFS primary node fails
          1.  
            About distributing the workload on a cluster
        15.  
          About Storage Checkpoints on SFCFSHA
        16. About Snapshots on SFCFSHA
          1.  
            About cluster snapshot characteristics
          2.  
            Performance considerations
          3.  
            Creating a snapshot on a cluster
      3. Administering VCS
        1.  
          Viewing available Veritas device drivers
        2.  
          Configuring VCS to start Oracle with a specified Pfile
        3.  
          Verifying VCS configuration
        4.  
          Starting and stopping VCS
        5.  
          Configuring destination-based load balancing for LLT
      4. Administering CVM
        1.  
          Listing all the CVM shared disks
        2.  
          Viewing all available disks in a cluster
        3.  
          Establishing CVM cluster membership manually
        4.  
          Methods to control CVM master selection
        5. About setting cluster node preferences for master failover
          1.  
            Cluster node preference for master failover
          2.  
            Considerations for setting CVM node preferences
          3.  
            Setting the cluster node preference using the CVMCluster agent
          4.  
            Setting the cluster node preference value for master failover using the vxclustadm command
          5.  
            Example of setting the cluster node preference value for master failover
        6. About changing the CVM master manually
          1.  
            Considerations for changing the master manually
          2. Changing the CVM master manually
            1.  
              Errors during CVM master switching
        7.  
          Enabling the application isolation feature in CVM environments
        8.  
          Disabling the application isolation feature in a CVM cluster
        9.  
          Changing the disk group master manually
        10.  
          Setting the sub-cluster node preference value for master failover
        11.  
          Importing a shared disk group manually
        12.  
          Deporting a shared disk group manually
        13.  
          Mapping remote storage to a node in the cluster
        14.  
          Removing remote storage mappings from a node in the cluster
        15.  
          Starting shared volumes manually
        16.  
          Evaluating the state of CVM ports
        17.  
          Verifying if CVM is running in an SFCFSHA cluster
        18.  
          Verifying CVM membership state
        19.  
          Verifying the state of CVM shared disk groups
        20.  
          Verifying the activation mode
        21.  
          CVM log files
        22.  
          Requesting node status and discovering the master node
        23.  
          Determining if a LUN is in a shareable disk group
        24.  
          Listing shared disk groups
        25.  
          Creating a shared disk group
        26. Importing disk groups as shared
          1.  
            Forcibly importing a disk group
        27.  
          Converting a disk group from shared to private
        28.  
          Moving objects between shared disk groups
        29.  
          Splitting shared disk groups
        30.  
          Joining shared disk groups
        31.  
          Changing the activation mode on a shared disk group
        32.  
          Enabling I/O shipping for shared disk groups
        33.  
          Setting the detach policy for shared disk groups
        34.  
          Controlling the CVM tolerance to storage disconnectivity
        35.  
          Handling cloned disks in a shared disk group
        36.  
          Creating volumes with exclusive open access by a node
        37.  
          Setting exclusive open access to a volume by a node
        38.  
          Displaying the cluster protocol version
        39.  
          Displaying the supported cluster protocol version range
        40.  
          Recovering volumes in shared disk groups
        41.  
          Obtaining cluster performance statistics
        42.  
          Administering CVM from the slave node
      5. Administering Flexible Storage Sharing
        1.  
          About Flexible Storage Sharing disk support
        2.  
          About the volume layout for Flexible Storage Sharing disk groups
        3.  
          Setting the host prefix
        4.  
          Exporting a disk for Flexible Storage Sharing
        5.  
          Setting the Flexible Storage Sharing attribute on a disk group
        6.  
          Using the host disk class and allocating storage
        7.  
          Administering mirrored volumes using vxassist
        8.  
          Displaying exported disks and network shared disk groups
      6. Administering ODM
        1.  
          Verifying the ODM port
        2.  
          Starting ODM
      7. About administering I/O fencing
        1. About the vxfentsthdw utility
          1.  
            General guidelines for using the vxfentsthdw utility
          2.  
            About the vxfentsthdw command options
          3. Testing the coordinator disk group using the -c option of vxfentsthdw
            1.  
              Removing and replacing a failed disk
          4.  
            Performing non-destructive testing on the disks using the -r option
          5.  
            Testing the shared disks using the vxfentsthdw -m option
          6.  
            Testing the shared disks listed in a file using the vxfentsthdw -f option
          7.  
            Testing all the disks in a disk group using the vxfentsthdw -g option
          8.  
            Testing a disk with existing keys
        2. About the vxfenadm utility
          1.  
            About the I/O fencing registration key format
          2.  
            Displaying the I/O fencing registration keys
          3.  
            Verifying that the nodes see the same disk
        3. About the vxfenclearpre utility
          1.  
            Removing preexisting keys
        4. About the vxfenswap utility
          1.  
            Replacing I/O fencing coordinator disks when the cluster is online
          2.  
            Replacing the coordinator disk group in a cluster that is online
          3.  
            Adding disks from a recovered site to the coordinator disk group
          4.  
            Refreshing lost keys on coordinator disks
        5. About administering the coordination point server
          1.  
            CP server operations (cpsadm)
          2.  
            Adding and removing SFCFSHA cluster entries from the CP server database
          3.  
            Adding and removing a SFCFSHA cluster node from the CP server database
          4.  
            Adding or removing CP server users
          5.  
            Listing the CP server users
          6.  
            Listing the nodes in all the SFCFSHA clusters
          7.  
            Listing the membership of nodes in the SFCFSHA cluster
          8.  
            Preempting a node
          9.  
            Registering and unregistering a node
          10.  
            Enable and disable access for a user to a SFCFSHA cluster
          11.  
            Starting and stopping CP server outside VCS control
          12.  
            Checking the connectivity of CP servers
          13.  
            Adding and removing virtual IP addresses and ports for CP servers at run-time
          14.  
            Taking a CP server database snapshot
          15.  
            Replacing coordination points for server-based fencing in an online cluster
          16.  
            Refreshing registration keys on the coordination points for server-based fencing
          17.  
            Deployment and migration scenarios for CP server
          18.  
            Migrating from non-secure to secure setup for CP server and SFCFSHA cluster communication
        6. About migrating between disk-based and server-based fencing configurations
          1.  
            Migrating from disk-based to server-based fencing in an online cluster
          2.  
            Migrating from server-based to disk-based fencing in an online cluster
          3. Migrating between fencing configurations using response files
            1.  
              Sample response file to migrate from disk-based to server-based fencing
            2.  
              Sample response file to migrate from server-based fencing to disk-based fencing
            3.  
              Sample response file to migrate from single CP server-based fencing to server-based fencing
            4.  
              Response file variables to migrate between fencing configurations
        7.  
          Enabling or disabling the preferred fencing policy
        8.  
          About I/O fencing log files
      8. Administering SFCFSHA global clusters
        1.  
          About setting up a disaster recovery fire drill
        2. About configuring the fire drill service group using the Fire Drill Setup wizard
          1.  
            Running the fire drill setup wizard
          2.  
            About configuring local attributes in the fire drill service group
        3.  
          Verifying a successful fire drill
        4.  
          Scheduling a fire drill
    2. Using Clustered NFS
      1.  
        About Clustered NFS
      2.  
        Sample use cases
      3.  
        Requirements for Clustered NFS
      4. Understanding how Clustered NFS works
        1.  
          Basic design
        2. Internal Clustered NFS functionality
          1.  
            preonline trigger
          2.  
            postonline trigger
          3.  
            postoffline trigger
          4.  
            Actions
      5.  
        cfsshare manual page
      6. Configure and unconfigure Clustered NFS
        1. Configure Clustered NFS
          1.  
            Service group cfsnfssg_dummy
        2.  
          Unconfiguring Clustered NFS
      7. Reconciling major and minor numbers for NFS shared disks
        1.  
          Checking the major and minor number for VxVM volumes
      8. Administering Clustered NFS
        1.  
          Displaying the NFS shared CFS file systems
        2.  
          Sharing a CFS file system previously added to VCS
        3.  
          Unsharing the previous shared CFS file system
        4.  
          Adding an NFS shared CFS file system to VCS
        5.  
          Deleting the NFS shared CFS file system from VCS
        6.  
          Adding a virtual IP address to VCS
        7.  
          Deleting a virtual IP address from VCS
        8.  
          Adding an IPv6 virtual IP address to VCS
        9.  
          Deleting an IPv6 virtual IP address from VCS
        10.  
          Changing the share options associated with an NFS share
        11.  
          Sharing a file system checkpoint
        12. Samples for configuring a Clustered NFS
          1.  
            Sample 1 uses the cfsshare command to add a CFS file system to VCS configuration
          2.  
            Sample 2 uses the cfsshare command to configure
        13.  
          Sample main.cf file
      9.  
        How to mount an NFS-exported file system on the NFS clients
      10.  
        Disabling SMF for NFS daemons
      11.  
        Debugging Clustered NFS
    3. Using Common Internet File System
      1.  
        About CIFS
      2.  
        Requirements for CIFS
      3.  
        Understanding how Samba works
      4.  
        Configuring Clustered NFS and CIFS on CFS
      5.  
        cfsshare manual page
      6.  
        Configuring CIFS in user mode
      7.  
        Configuring CIFS in domain mode
      8.  
        Configuring CIFS in ads mode
      9. Administering CIFS
        1.  
          Sharing a CFS file system previously added to VCS
        2.  
          Unsharing the previous shared CFS file system
        3.  
          Sample main.cf file for CIFS
      10.  
        Debugging CIFS
    4. Deploying Oracle with Clustered NFS
      1.  
        Tasks for deploying Oracle with CNFS
      2. About deploying Oracle with CNFS
        1.  
          VCS service groups in a CNFS environment
      3.  
        Configuring the CNFS server for Oracle
      4. Configuring Oracle for Direct NFS
        1.  
          Recommended mount options for NFS
        2.  
          About oranfstab
      5.  
        Verifying Oracle Direct NFS usage
    5. Administering sites and remote mirrors
      1. About sites and remote mirrors
        1.  
          About site-based allocation
        2.  
          About site consistency
        3.  
          About site tags
        4.  
          About the site read policy
        5.  
          About disk detach policies for campus clusters
      2.  
        Making an existing disk group site consistent
      3.  
        Configuring a new disk group as a Remote Mirror configuration
      4. Fire drill - testing the configuration
        1.  
          Simulating site failure
        2.  
          Verifying the secondary site
        3.  
          Recovery from simulated site failure
      5. Changing the site name
        1.  
          Resetting the site name for a host
      6. Administering the Remote Mirror configuration
        1.  
          Configuring site tagging for disks or enclosures
        2.  
          Configuring automatic site tagging for a disk group
        3.  
          Configuring site consistency on a volume
      7.  
        Examples of storage allocation by specifying sites
      8.  
        Displaying site information
      9. Failure and recovery scenarios
        1.  
          Recovering from a loss of site connectivity
        2.  
          Recovering from host failure
        3.  
          Recovering from storage failure
        4.  
          Recovering from site failure
        5.  
          Recovering from disruption of connectivity to storage at the remote sites from hosts on all sites
        6.  
          Recovering from disruption to connectivity to storage at all sites from the hosts at a site
        7.  
          Automatic site reattachment
  5. Section V. Optimizing I/O performance
    1. Veritas File System I/O
      1.  
        About Veritas File System I/O
      2. Buffered and Direct I/O
        1. Direct I/O
          1.  
            Direct I/O requirements
          2.  
            Direct I/O versus synchronous I/O
          3.  
            Direct I/O CPU overhead
          4.  
            Discovered Direct I/O
        2.  
          Unbuffered I/O
        3. Data synchronous I/O
          1.  
            Data synchronous I/O vs. synchronous I/O
      3.  
        Concurrent I/O
      4.  
        Cache advisories
      5.  
        Freezing and thawing a file system
      6.  
        Getting the I/O size
      7.  
        About Veritas InfoScale product components database accelerators
    2. Veritas Volume Manager I/O
      1.  
        Veritas Volume Manager throttling of administrative I/O
  6. Section VI. Veritas Extension for Oracle Disk Manager
    1. Using Veritas Extension for Oracle Disk Manager
      1. About Oracle Disk Manager
        1. How Oracle Disk Manager improves database performance
          1.  
            About kernel asynchronous I/O support
          2.  
            About direct I/O support and avoiding double buffering
          3.  
            About avoiding kernel write locks on database files
          4.  
            About supporting many concurrent I/Os in one system call
          5.  
            About avoiding duplicate file open calls
          6.  
            About allocating contiguous data files
      2.  
        About Oracle Disk Manager and Storage Foundation Cluster File System High Availability
      3. About Oracle Disk Manager and Oracle Managed Files
        1.  
          How Oracle Disk Manager works with Oracle Managed Files
      4.  
        Setting up Veritas Extension for Oracle Disk Manager
      5.  
        Configuring Veritas Extension for Oracle Disk Manager
      6.  
        Preparing existing database storage for Oracle Disk Manager
      7.  
        Converting Quick I/O files to Oracle Disk Manager files
      8.  
        Verifying that Oracle Disk Manager is configured
      9.  
        Disabling the Oracle Disk Manager feature
      10. Using Cached ODM
        1.  
          Enabling Cached ODM for file systems
        2.  
          Modifying Cached ODM settings for individual files
        3.  
          Adding Cached ODM settings via the cachemap
        4.  
          Making the caching settings persistent across mounts
  7. Section VII. Using Point-in-time copies
    1. Understanding point-in-time copy methods
      1.  
        About point-in-time copies
      2. When to use point-in-time copies
        1.  
          Implementing point-in time copy solutions on a primary host
        2.  
          Implementing off-host point-in-time copy solutions
      3. About Storage Foundation point-in-time copy technologies
        1.  
          Comparison of Point-in-time copy solutions
      4. Volume-level snapshots
        1.  
          Persistent FastResync of volume snapshots
        2.  
          Data integrity in volume snapshots
        3.  
          Third-mirror break-off snapshots
        4. Space-optimized instant volume snapshots
          1.  
            How space-optimized instant snapshots work
        5.  
          Choices for snapshot resynchronization
        6.  
          Disk group split/join
      5. Storage Checkpoints
        1.  
          How Storage Checkpoints differ from snapshots
        2. How a Storage Checkpoint works
          1.  
            Copy-on-write
          2. Storage Checkpoint visibility
            1.  
              Storage Checkpoints and 64-bit inode numbers
        3. Types of Storage Checkpoints
          1.  
            Data Storage Checkpoints
          2.  
            Nodata Storage Checkpoints
          3.  
            Removable Storage Checkpoints
          4.  
            Non-mountable Storage Checkpoints
      6. About FileSnaps
        1.  
          Properties of FileSnaps
        2.  
          Concurrent I/O to FileSnaps
        3.  
          Copy-on-write and FileSnaps
        4.  
          Reading from FileSnaps
        5.  
          Block map fragmentation and FileSnaps
        6.  
          Backup and FileSnaps
      7. About snapshot file systems
        1.  
          How a snapshot file system works
    2. Administering volume snapshots
      1.  
        About volume snapshots
      2. Traditional third-mirror break-off snapshots
        1. Creating traditional third-mirror break-off snapshots
          1.  
            Converting a plex into a snapshot plex
          2.  
            Creating multiple snapshots with the vxassist command
          3.  
            Reattaching a snapshot volume
          4.  
            Adding plexes to a snapshot volume
          5.  
            Dissociating a snapshot volume
          6.  
            Displaying snapshot information
      3. Full-sized instant snapshots
        1. Creating instant snapshots
          1. Adding an instant snap DCO and DCO volume
            1.  
              Creating a shared cache object
            2.  
              Creating a volume for use as a full-sized instant or linked break-off snapshot
            3.  
              Upgrading the instant snap Data Change Objects (DCOs) and DCO volumes for a VxVM volume
          2.  
            Creating and managing space-optimized instant snapshots
          3.  
            Creating and managing full-sized instant snapshots
          4.  
            Creating and managing third-mirror break-off snapshots
          5.  
            Creating and managing linked break-off snapshot volumes
          6.  
            Creating multiple instant snapshots
          7.  
            Creating instant snapshots of volume sets
          8.  
            Adding snapshot mirrors to a volume
          9.  
            Removing a snapshot mirror
          10.  
            Removing a linked break-off snapshot volume
          11.  
            Adding a snapshot to a cascaded snapshot hierarchy
          12.  
            Refreshing an instant space-optimized snapshot
          13.  
            Reattaching an instant full-sized or plex break-off snapshot
          14.  
            Reattaching a linked break-off snapshot volume
          15.  
            Restoring a volume from an instant space-optimized snapshot
          16.  
            Dissociating an instant snapshot
          17.  
            Removing an instant snapshot
          18.  
            Splitting an instant snapshot hierarchy
          19.  
            Displaying instant snapshot information
          20. Controlling instant snapshot synchronization
            1.  
              Improving the performance of snapshot synchronization
          21.  
            Listing the snapshots created on a cache
          22.  
            Tuning the autogrow attributes of a cache
          23.  
            Monitoring and displaying cache usage
          24.  
            Growing and shrinking a cache
          25.  
            Removing a cache
      4.  
        Linked break-off snapshots
      5. Cascaded snapshots
        1.  
          Creating a snapshot of a snapshot
      6.  
        Creating multiple snapshots
      7.  
        Restoring the original volume from a snapshot
      8. Adding a version 0 DCO and DCO volume
        1.  
          Specifying storage for version 0 DCO plexes
        2.  
          Removing a version 0 DCO and DCO volume
        3.  
          Reattaching a version 0 DCO and DCO volume
    3. Administering Storage Checkpoints
      1.  
        About Storage Checkpoints
      2. Storage Checkpoint administration
        1.  
          Creating a Storage Checkpoint
        2.  
          Removing a Storage Checkpoint
        3.  
          Accessing a Storage Checkpoint
        4. Converting a data Storage Checkpoint to a nodata Storage Checkpoint
          1.  
            Showing the difference between a data and a nodata Storage Checkpoint
          2.  
            Converting multiple Storage Checkpoints
          3.  
            Creating a delayed nodata Storage Checkpoint
        5.  
          Enabling and disabling Storage Checkpoint visibility
      3.  
        Storage Checkpoint space management considerations
      4.  
        Restoring from a Storage Checkpoint
      5.  
        Storage Checkpoint quotas
    4. Administering FileSnaps
      1. FileSnap creation
        1.  
          FileSnap creation over Network File System
      2.  
        Using FileSnaps
      3. Using FileSnaps to create point-in-time copies of files
        1.  
          Using FileSnaps to provision virtual desktops
        2.  
          Using FileSnaps to optimize write intensive applications for virtual machines
        3.  
          Using FileSnaps to create multiple copies of data instantly
        4.  
          An example to perform FileSnap
      4.  
        Comparison of the logical size output of the fsadm -S shared, du, and df commands
    5. Administering snapshot file systems
      1.  
        Snapshot file system backups
      2.  
        Snapshot file system performance
      3.  
        About snapshot file system disk structure
      4.  
        Differences between snapshots and Storage Checkpoints
      5.  
        Creating a snapshot file system
  8. Section VIII. Optimizing storage with Storage Foundation Cluster File System High Availability
    1. Understanding storage optimization solutions in Storage Foundation Cluster File System High Availability
      1.  
        About thin provisioning
      2.  
        About thin optimization solutions in Storage Foundation Cluster File System High Availability
      3. About SmartMove
        1.  
          SmartMove for thin provisioning
      4.  
        About the Thin Reclamation feature
      5.  
        Determining when to reclaim space on a thin reclamation LUN
      6.  
        How automatic reclamation works
    2. Migrating data from thick storage to thin storage
      1.  
        About using SmartMove to migrate to Thin Storage
      2.  
        Migrating to thin provisioning
    3. Maintaining Thin Storage with Thin Reclamation
      1. Reclamation of storage on thin reclamation arrays
        1.  
          About Thin Reclamation of a disk, a disk group, or an enclosure
        2.  
          About Thin Reclamation of a file system
      2. Identifying thin and thin reclamation LUNs
        1.  
          Displaying detailed information about reclamation commands
      3.  
        Displaying VxFS file system usage on thin reclamation LUNs
      4.  
        Reclaiming space on a file system
      5.  
        Reclaiming space on a disk, disk group, or enclosure
      6.  
        About the reclamation log file
      7.  
        Monitoring Thin Reclamation using the vxtask command
      8.  
        Configuring automatic reclamation
    4. Veritas InfoScale 4k sector device support solution
      1.  
        About 4K sector size technology
      2.  
        Veritas InfoScale unsupported configurations
      3.  
        Migrating VxFS file system from 512-bytes sector size devices to 4K sector size devices
  9. Section IX. Maximizing storage utilization
    1. Understanding storage tiering with SmartTier
      1. About SmartTier
        1.  
          About VxFS multi-volume file systems
        2.  
          About VxVM volume sets
        3.  
          About volume tags
        4.  
          SmartTier file management
        5.  
          SmartTier sub-file object management
      2.  
        How the SmartTier policy works with the shared extents
      3.  
        SmartTier in a High Availability (HA) environment
    2. Creating and administering volume sets
      1.  
        About volume sets
      2.  
        Creating a volume set
      3.  
        Adding a volume to a volume set
      4.  
        Removing a volume from a volume set
      5.  
        Listing details of volume sets
      6.  
        Stopping and starting volume sets
      7. Managing raw device nodes of component volumes
        1.  
          Enabling raw device access when creating a volume set
        2.  
          Displaying the raw device access settings for a volume set
        3.  
          Controlling raw device access for an existing volume set
    3. Multi-volume file systems
      1.  
        About multi-volume file systems
      2.  
        About volume types
      3. Features implemented using multi-volume file system (MVFS) support
        1.  
          Volume availability
      4.  
        Creating multi-volume file systems
      5.  
        Converting a single volume file system to a multi-volume file system
      6. Adding a volume to and removing a volume from a multi-volume file system
        1.  
          Adding a volume to a multi-volume file system
        2.  
          Removing a volume from a multi-volume file system
        3.  
          Forcibly removing a volume in a multi-volume file system
        4.  
          Moving volume 0 in a multi-volume file system
      7. Volume encapsulation
        1.  
          Encapsulating a volume
        2.  
          Deencapsulating a volume
      8.  
        Reporting file extents
      9. Load balancing
        1.  
          Defining and assigning a load balancing allocation policy
        2.  
          Rebalancing extents
      10.  
        Converting a multi-volume file system to a single volume file system
    4. Administering SmartTier
      1. About SmartTier
        1.  
          About compressing files with SmartTier
      2.  
        Supported SmartTier document type definitions
      3. Placement classes
        1.  
          Tagging volumes as placement classes
        2.  
          Listing placement classes
      4. Administering placement policies
        1.  
          Assigning a placement policy
        2.  
          Unassigning a placement policy
        3.  
          Analyzing the space impact of enforcing a placement policy
        4.  
          Querying which files will be affected by enforcing a placement policy
        5.  
          Enforcing a placement policy
        6.  
          Validating a placement policy
      5.  
        File placement policy grammar
      6. File placement policy rules
        1.  
          SELECT statement
        2.  
          CREATE statement
        3. RELOCATE statement
          1.  
            Specifying the I/O temperature relocation criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            RELOCATE statement examples
        4. DELETE statement
          1.  
            DELETE statement examples
        5. COMPRESS statement
          1.  
            Specifying the I/O temperature compression criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            COMPRESS statement examples
        6. UNCOMPRESS statement
          1.  
            Specifying the I/O temperature uncompression criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            UNCOMPRESS statement examples
      7.  
        Calculating I/O temperature and access temperature
      8. Multiple criteria in file placement policy rule statements
        1.  
          Multiple file selection criteria in SELECT statement clauses
        2.  
          Multiple placement classes in <ON> clauses of CREATE statements and in <TO> clauses of RELOCATE statements
        3.  
          Multiple placement classes in <FROM> clauses of RELOCATE and DELETE statements
        4.  
          Multiple conditions in <WHEN> clauses of RELOCATE and DELETE statements
      9.  
        File placement policy rule and statement ordering
      10.  
        File placement policies and extending files
      11. Using SmartTier with solid state disks
        1.  
          Fine grain temperatures with solid state disks
        2.  
          Prefer mechanism with solid state disks
        3.  
          Average I/O activity with solid state disks
        4.  
          Frequent SmartTier scans with solid state disks
        5.  
          Quick identification of cold files with solid state disks
        6.  
          Example placement policy when using solid state disks
      12. Sub-file relocation
        1.  
          Moving sub-file data of files to specific target tiers
    5. Administering hot-relocation
      1.  
        About hot-relocation
      2. How hot-relocation works
        1.  
          Partial disk failure mail messages
        2.  
          Complete disk failure mail messages
        3.  
          How space is chosen for relocation
      3.  
        Configuring a system for hot-relocation
      4.  
        Displaying spare disk information
      5.  
        Marking a disk as a hot-relocation spare
      6.  
        Removing a disk from use as a hot-relocation spare
      7.  
        Excluding a disk from hot-relocation use
      8.  
        Making a disk available for hot-relocation use
      9.  
        Configuring hot-relocation to use only spare disks
      10. Moving relocated subdisks
        1. Moving relocated subdisks using vxunreloc
          1.  
            Moving hot-relocated subdisks back to their original disk
          2.  
            Moving hot-relocated subdisks back to a different disk
          3.  
            Forcing hot-relocated subdisks to accept different offsets
          4.  
            Examining which subdisks were hot-relocated from a disk
        2.  
          Restarting vxunreloc after errors
      11.  
        Modifying the behavior of hot-relocation
    6. Deduplicating data on Solaris SPARC
      1. About deduplicating data
        1.  
          About deduplication chunk size
        2.  
          Deduplication and file system performance
        3.  
          About the deduplication scheduler
      2. Deduplicating data
        1.  
          Enabling and disabling deduplication on a file system
        2.  
          Scheduling deduplication of a file system
        3.  
          Performing a deduplication dry run
        4.  
          Querying the deduplication status of a file system
        5.  
          Starting and stopping the deduplication scheduler daemon
      3.  
        Deduplication results
      4.  
        Deduplication supportability
      5.  
        Deduplication use cases
      6.  
        Deduplication limitations
    7. Compressing files
      1. About compressing files
        1.  
          About the compressed file format
        2.  
          About the file compression attributes
        3.  
          About the file compression block size
      2.  
        Compressing files with the vxcompress command
      3.  
        Interaction of compressed files and other commands
      4.  
        Interaction of compressed files and other features
      5.  
        Interaction of compressed files and applications
      6. Use cases for compressing files
        1. Compressed files and databases
          1.  
            Supported database versions and environment
          2.  
            Compressing archive logs
          3.  
            Compressing read-only tablespaces
          4.  
            Compressing infrequently accessed table partitions
          5.  
            Compressing infrequently accessed datafiles
          6.  
            Best practices for compressing files in an Oracle database
        2.  
          Compressing all files that meet the specified criteria
  10. Section X. Administering storage
    1. Managing volumes and disk groups
      1. Rules for determining the default disk group
        1.  
          Displaying the system-wide boot disk group
        2.  
          Displaying and specifying the system-wide default disk group
      2. Moving volumes or disks
        1.  
          Moving volumes from a VxVM disk
        2.  
          Moving disks between disk groups
        3. Reorganizing the contents of disk groups
          1.  
            Limitations of disk group split and join
          2. Listing objects potentially affected by a move
            1.  
              Moving DCO volumes between disk groups
          3.  
            Moving objects between disk groups
          4.  
            Splitting disk groups
          5.  
            Joining disk groups
      3. Monitoring and controlling tasks
        1.  
          Specifying task tags
        2. Managing tasks with vxtask
          1.  
            vxtask operations
          2.  
            Using the vxtask command
      4.  
        Using vxnotify to monitor configuration changes
      5. Performing online relayout
        1.  
          Permitted relayout transformations
        2.  
          Specifying a non-default layout
        3.  
          Specifying a plex for relayout
        4.  
          Tagging a relayout operation
        5.  
          Viewing the status of a relayout
        6.  
          Controlling the progress of a relayout
      6. Adding a mirror to a volume
        1.  
          Mirroring all volumes
        2.  
          Mirroring volumes on a VxVM disk
        3.  
          Additional mirroring considerations
      7.  
        Configuring SmartMove
      8.  
        Removing a mirror
      9.  
        Setting tags on volumes
      10. Managing disk groups
        1. Disk group versions
          1.  
            Upgrading the disk group version
          2.  
            Creating a disk group with an earlier disk group version
        2. Displaying disk group information
          1.  
            Displaying free space in a disk group
        3.  
          Creating a disk group
        4.  
          Removing a disk from a disk group
        5.  
          Deporting a disk group
        6. Importing a disk group
          1.  
            Setting the automatic recovery of volumes
        7.  
          Handling of minor number conflicts
        8. Moving disk groups between systems
          1.  
            Handling errors when importing disks
          2.  
            Reserving minor numbers for disk groups
          3.  
            Compatibility of disk groups between platforms
        9. Importing a disk group containing hardware cloned disks
          1.  
            Considerations when using EMC CLARiiON SNAPSHOT LUNs
          2.  
            Writing a new UDID to a disk
          3.  
            Importing the existing disk group with only the cloned disks
          4.  
            Importing the cloned disks as a new standard disk group
          5.  
            Importing a set of cloned disks with tags
        10.  
          Setting up configuration database copies (metadata) for a disk group
        11.  
          Renaming a disk group
        12. Handling conflicting configuration copies
          1.  
            Example of a serial split brain condition in a cluster
          2.  
            Correcting conflicting configuration information
        13.  
          Disabling a disk group
        14. Destroying a disk group
          1.  
            Recovering a destroyed disk group
        15. Backing up and restoring disk group configuration data
          1.  
            Backing up and restoring Flexible Storage Sharing disk group configuration data
        16.  
          Working with existing ISP disk groups
      11. Managing plexes and subdisks
        1. Reattaching plexes
          1.  
            Automatic plex reattachment
          2.  
            Reattaching a plex manually
        2.  
          Plex synchronization
      12. Decommissioning storage
        1.  
          Removing a volume
        2.  
          Removing a disk from VxVM control
        3.  
          About shredding data
        4.  
          Shredding a VxVM disk
        5.  
          Failed disk shred operation results in a disk with no label
        6. Removing and replacing disks
          1.  
            Replacing a failed or removed disk
          2.  
            Removing and replacing a disk in a Sun StorEdge A5x00 disk array
    2. Rootability
      1. Encapsulating a disk
        1.  
          Failure of disk encapsulation
        2. Using nopriv disks for encapsulation
          1.  
            Creating a nopriv disk for encapsulation
          2.  
            Creating volumes for other partitions on a nopriv disk
      2. Rootability
        1.  
          Booting root volumes
        2.  
          Boot-time volume restrictions
        3.  
          Creating redundancy for the root disk
        4.  
          Creating an archived back-up root disk for disaster recovery
        5.  
          Mirroring an encapsulated root disk
        6. Booting from alternate boot disks
          1. Booting from an alternate boot disk on Solaris SPARC systems
            1.  
              The boot process on Solaris SPARC systems
        7.  
          Mirroring other file systems on the root disk
        8. Encapsulating SAN disks
          1.  
            Best practices and guidelines for booting from SAN LUNS
      3. Administering an encapsulated boot disk
        1.  
          Creating a snapshot of an encapsulated boot disk
        2.  
          Growing an encapsulated boot disk
      4.  
        Unencapsulating the root disk
    3. Quotas
      1.  
        About Veritas File System quota limits
      2.  
        About quota files on Veritas File System
      3.  
        About Veritas File System quota commands
      4.  
        About quota checking with Veritas File System
      5. Using Veritas File System quotas
        1.  
          Turning on Veritas File System quotas
        2.  
          Turning on Veritas File System quotas at mount time
        3.  
          Editing Veritas File System quotas
        4.  
          Modifying Veritas File System quota time limits
        5.  
          Viewing Veritas File System disk quotas and usage
        6.  
          Displaying blocks owned by users or groups
        7.  
          Turning off Veritas File System quotas
        8.  
          Support for 64-bit Quotas
    4. File Change Log
      1.  
        About Veritas File System File Change Log
      2.  
        About the Veritas File System File Change Log file
      3.  
        Veritas File System File Change Log administrative interface
      4.  
        Veritas File System File Change Log programmatic interface
      5.  
        Summary of Veritas File System File Change Log API functions
  11. Section XI. Reference
    1. Appendix A. Reverse path name lookup
      1.  
        About reverse path name lookup
    2. Appendix B. Tunable parameters
      1.  
        About tuning Storage Foundation Cluster File System High Availability
      2. Tuning the VxFS file system
        1.  
          Tuning inode table size
        2.  
          Tuning performance optimization of inode allocation
        3.  
          Partitioned directories
        4.  
          vx_maxlink
        5. Veritas Volume Manager maximum I/O size
          1.  
            vol_maxio
      3.  
        DMP tunable parameters
      4. Methods to change Dynamic Multi-Pathing tunable parameters
        1.  
          Changing the values of DMP parameters with the vxdmpadm settune command line
        2. About tuning Dynamic Multi-Pathing (DMP) with templates
          1.  
            DMP tuning templates
          2.  
            Example DMP tuning template
          3.  
            Tuning a DMP host with a configuration attribute template
          4.  
            Managing the DMP configuration files
          5.  
            Resetting the DMP tunable parameters and attributes to the default values
          6.  
            DMP tunable parameters and attributes that are supported for templates
      5. Tunable parameters for VxVM
        1.  
          Tunable parameters for core VxVM
        2.  
          Tunable parameters for FlashSnap (FMR)
        3.  
          Tunable parameters for CVM
        4.  
          Tunable parameters for VVR
        5.  
          Points to note when changing the values of the VVR tunables
      6. Methods to change Veritas Volume Manager tunable parameters
        1.  
          Changing the values of the Veritas Volume Manager tunable parameters using the vxtune command line
        2.  
          Changing the value of the Veritas Volume Manager tunable parameters using templates
        3.  
          Changing the tunable values using the vxio.conf file
      7. About LLT tunable parameters
        1.  
          About LLT timer tunable parameters
        2.  
          About LLT flow control tunable parameters
        3.  
          Setting LLT timer tunable parameters
      8. About GAB tunable parameters
        1.  
          About GAB load-time or static tunable parameters
        2.  
          About GAB run-time or dynamic tunable parameters
      9. About VXFEN tunable parameters
        1.  
          Configuring the VXFEN module parameters
      10.  
        About AMF tunable parameters
    3. Appendix C. Veritas File System disk layout
      1.  
        About Veritas File System disk layouts
      2.  
        VxFS Version 7 disk layout
      3.  
        VxFS Version 8 disk layout
      4.  
        VxFS Version 9 disk layout
      5.  
        VxFS Version 10 disk layout
      6.  
        VxFS Version 11 disk layout
    4. Appendix D. Command reference
      1.  
        Command completion for Veritas commands
      2.  
        Veritas Volume Manager command reference
      3.  
        CVM commands supported for executing on the slave node
      4. Veritas Volume Manager manual pages
        1.  
          Section 1M - administrative commands
        2.  
          Section 4 - file formats
        3.  
          Section 7 - device driver interfaces
      5.  
        Veritas File System command summary
      6.  
        Veritas File System manual pages
      7.  
        SmartIO command reference
    5. Appendix E. Creating a starter database
      1. Creating a database for Oracle 11gr2
        1.  
          Creating database tablespace on shared raw VxVM volumes

Veritas File System features

Table: Veritas File System features lists the Veritas File System (VxFS) features.

The below mentioned table lists the Veritas File System (VxFS) features. The description provided in the table also mentions if the feature is supported for SFCFSHA or not.

Table: Veritas File System features

Feature

Description

Access Control Lists

An Access Control List (ACL) stores a series of entries that identify specific users or groups and their access privileges for a directory or file. A file may have its own ACL or may share an ACL with other files. ACLs have the advantage of specifying detailed access permissions for multiple users and groups.

On Solaris SPARC, ACLs are supported on cluster file systems.

This feature is supported in SFCFSHA.

See the getfacl(1) and setfacl(1) manual pages.

Cache advisories

Cache advisories are set with the mount command on individual file systems, but are not propagated to other nodes of a cluster.

Caching advisories are not set only with the mount command. Caching advisories can be set on per file basis (using VX_SETCACHE ioctl).

See About Veritas File System I/O.

Commands that depend on file access times

File access times may appear different across nodes because the atime file attribute is not closely synchronized in a cluster file system. So utilities that depend on checking access times may not function reliably.

Cross-platform data sharing

Cross-platform data sharing (CDS) allows data to be serially shared among heterogeneous systems where each system has direct access to the physical devices that hold the data. This feature can be used only in conjunction with Veritas Volume Manager (VxVM).

This feature is supported in SFCFSHA.

See the Veritas InfoScale Solutions Guide.

Data deduplication

You can perform post-process periodic deduplication in a file system to eliminate duplicate data without any continuous cost. You can verify whether data is duplicated on demand, and then efficiently and securely eliminate the duplicates. This feature is available with both Veritas InfoScale Storage and Veritas InfoScale Enterprise licenses.

This feature is available only for Solaris SPARC.

This feature is supported in SFCFSHA.

See About deduplicating data.

Defragmentation

You can perform defragmentation to remove unused space from directories, make all small files contiguous, and consolidate free blocks for file system use.

This feature is supported in SFCFSHA.

See About defragmentation.

Enhanced data integrity modes

VxFS has the following mount command options to enable the enhanced data integrity modes:

This feature is supported in SFCFSHA.

Enhanced performance mode

The default VxFS logging mode, mount -o delaylog, increases performance by delaying the logging of some structural changes. However, delaylog does not provide the equivalent data integrity as the enhanced data integrity modes because recent changes may be lost during a system failure. This option provides at least the same level of data accuracy that traditional UNIX file systems provide for system failures, along with fast file system recovery.

See the mount_vxfs(1M) manual page.

See delaylog mount option.

Extent attributes

VxFS allocates disk space to files in groups of one or more adjacent blocks called extents. VxFS defines an application interface that allows programs to control various aspects of the extent allocation for a given file. The extent allocation policies associated with a file are referred to as extent attributes.

This feature is supported in SFCFSHA.

See About extent attributes.

Extent-based allocation

An extent is a contiguous area of storage in a computer file system, reserved for a file. When starting to write to a file, a whole extent is allocated. When writing to the file again, the data continues where the previous write left off. This reduces or eliminates file fragmentation. An extent is presented as an address-length pair, which identifies the starting block address and the length of the extent (in file system or logical blocks). Since VxFS is an extent-based file system, addressing is done through extents (which can consist of multiple blocks) rather than in single-block segments. Extents can therefore enhance file system throughput.

This feature is supported in SFCFSHA.

See About extents.

Extended mount options

The VxFS file system provides the following enhancements to the mount command:

  • Enhanced data integrity modes

  • Enhanced performance mode

  • Temporary file system mode

  • Improved synchronous writes

  • Support for large file sizes

This feature is supported in SFCFSHA.

See Mounting a VxFS file system.

Fast file system recovery

Most file systems rely on full structural verification by the fsck utility as the only means to recover from a system failure. For large disk configurations, this involves a time-consuming process of checking the entire structure, verifying that the file system is intact, and correcting any inconsistencies. VxFS provides fast recovery with the VxFS intent log and VxFS intent log resizing features.

This feature is supported in SFCFSHA.

See About the Veritas File System intent log.

File Change Log

The VxFS File Change Log (FCL) tracks changes to files and directories in a file system. The File Change Log can be used by applications such as backup products, webcrawlers, search and indexing engines, and replication software that typically scan an entire file system searching for modifications since a previous scan. FCL functionality is available on all the four Veritas InfoScale licenses: Veritas InfoScale™ Storage, Veritas InfoScale™ Availability, Veritas InfoScale™ Foundation, and Veritas InfoScale™ Enterprise .

This feature is supported in SFCFSHA.

See About Veritas File System File Change Log.

File compression

Compressing files reduces the space used by files, while retaining the accessibility of the files and being transparent to applications. Compressed files look and behave almost exactly like uncompressed files: the compressed files have the same name, and can be read and written as with uncompressed files. Reads cause data to be uncompressed in memory, only; the on-disk copy of the file remains compressed. In contrast, after a write, the new data is uncompressed on disk.

This feature is supported in SFCFSHA.

See About compressing files.

File system snapshots

VxFS provides online data backup using the snapshot feature. An image of a mounted file system instantly becomes an exact read-only copy of the file system at a specific point in time. The original file system is called the snapped file system, while the copy is called the snapshot.

When changes are made to the snapped file system, the old data is copied to the snapshot. When the snapshot is read, data that has not changed is read from the snapped file system, changed data is read from the snapshot.

Backups require one of the following methods:

  • Copying selected files from the snapshot file system (using find and cpio)

  • Backing up the entire file system (using fscat)

  • Initiating a full or incremental backup (using vxdump)

This feature is supported in SFCFSHA.

See About snapshot file systems.

FileSnaps

A FileSnap is a space-optimized copy of a file in the same name space, stored in the same file system. VxFS supports FileSnaps on file systems with disk layout Version 8 or later.

This feature is supported in SFCFSHA.

See About FileSnaps.

Freezing and thawing file systems

Freezing a file system is a necessary step for obtaining a stable and consistent image of the file system at the volume level. Consistent volume-level file system images can be obtained and used with a file system snapshot tool.

This feature is supported in SFCFSHA. Synchronizing operations, which require freezing and thawing file systems, are done on a cluster-wide basis.

See Freezing and thawing a file system.

Improved synchronous writes

VxFS provides superior performance for synchronous write applications. The mount -o datainlog option greatly improves the performance of small synchronous writes.

The mount -o convosync=dsync option improves the performance of applications that require synchronous data writes but not synchronous inode time updates.

See the mount_vxfs(1M) manual page.

Warning:

The use of the -o convosync=dsync option violates POSIX semantics.

See convosync mount option.

Locking

For the F_GETLK command, if there is a process holding a conflicting lock, the l_pid field returns the process ID of the process holding the conflicting lock. The nodeid-to-node name translation can be done by examining the /etc/llthosts file or with the fsclustadm command.

This feature is supported in SFCFSHA except for mandatory locking, and deadlock detection supported by traditional fcntl locks.

See the fcntl(2) manual page.

maxlink support

Added support for more than 64K sub-directories. If maxlink is disabled on a file system, the sub-directory limit will be 32K by default. If maxlink is enabled on a file system, this allows you to create up to 4294967295(2^32 - 1) sub-directories.

By default maxlink is enabled.

To enable the maxlink option at mkfs time. For example:

# mkfs -F vxfs -o maxlink /dev/vx/rdsk/testdg/vol1

To disable the maxlink option at mkfs time. For example:

# mkfs -F vxfs -o nomaxlink /dev/vx/rdsk/testdg/vol1

To enable the maxlink option through the fsadm command on a mounted files system. For example:

# fsadm -F vxfs -o maxlink /mnt1
# fsadm -F vxfs -o maxlink /mnt1

To disable the maxlink option through the fsadm command on a mounted file system. For example:

# fsadm -F vxfs -o nomaxlink /mnt1

See the mkfs_vxfs(1M) and fsadm_vxfs(1M) manual pages.

Memory mapping

You can use the mmap() function to establish shared memory mapping.

This feature is supported in SFCFSHA.

See the mmap(2) manual page.

Multi-volume file systems

The multi-volume file system (MVFS) feature allows several volumes to be represented by a single logical object. All I/O to and from an underlying logical volume is directed by way of volume sets. You can create a single VxFS file system on this multi-volume set. This feature can be used only in conjunction with VxVM. MVFS functionality is available on all the four Veritas InfoScale licenses: Veritas InfoScale™ Storage, Veritas InfoScale™ Availability, Veritas InfoScale™ Foundation, and Veritas InfoScale™ Enterprise.

See About multi-volume file systems.

Nested Mounts

You can use a directory on a cluster mounted or local mounted file system as a mount point for a local file system or another cluster file system.

This feature is supported in SFCFSHA.

NFS mounts

You export the NFS file systems from the cluster. You can NFS export CFS file systems in a distributed highly available way.

This feature is supported in SFCFSHA.

Partitioned directories

Parallel threads that access a large volume and perform access and updates on a directory that commonly exist in a file system, suffer from an exponentially longer wait time for the threads.

This feature creates partitioned directories to improve the directory performance of file systems. When any directory crosses the tunable threshold, this feature takes an exclusive lock on the directory inode and redistributes the entries into various respective hash directories. These hash directories are not visible in the name-space view of the user or operating system. For every new create, delete, or lookup thread, this feature performs a lookup for the respective hashed directory (depending on the target name) and performs the operation in that directory. This leaves the parent directory inode and its other hash directories unobstructed for access, which vastly improves file system performance.

This feature operates only on disk layout Version 8 or later file systems.

This feature is supported in SFCFSHA.

See Partitioned directories.

See the vxtunefs(1M) and fsadm_vxfs(1M) manual pages.

Quotas

VxFS supports quotas, which allocate per-user and per-group quotas and limit the use of two principal resources: files and data blocks. You can assign quotas for each of these resources. Each quota consists of two limits for each resource: hard limit and soft limit.

The hard limit represents an absolute limit on data blocks or files. A user can never exceed the hard limit under any circumstances.

The soft limit is lower than the hard limit and can be exceeded for a limited amount of time. This allows users to exceed limits temporarily as long as they fall under those limits before the allotted time expires.

This feature is supported in SFCFSHA.

See About Veritas File System quota limits.

Reverse path name lookup

The reverse path name lookup feature obtains the full path name of a file or directory from the inode number of that file or directory. The reverse path name lookup feature can be useful for a variety of applications, such as for clients of the VxFS File Change Log feature, in backup and restore utilities, and for replication products. Typically, these applications store information by inode numbers because a path name for a file or directory can be very long, thus the need for an easy method of obtaining a path name.

This feature is supported in SFCFSHA.

See About reverse path name lookup.

SmartIO

The SmartIO feature of Storage Foundation and High Availability Solutions (SFHA Solutions) enables data efficiency on SSDs or other supported devices through I/O caching. Using SmartIO to improve efficiency, you can optimize the cost per IOPS. SmartIO uses advanced, customizable heuristics to determine what data to cache and how that data gets removed from the cache. The heuristics take advantage of SFHA Solutions' knowledge of the characteristics of the workload.

SmartIO uses a cache area on the target device or devices. The cache area is the storage space that SmartIO uses to store the cached data and the metadata about the cached data. The type of the cache area determines whether it supports VxFS caching or VxVM caching.

This feature is supported in SFCFSHA.

See the Veritas InfoScale SmartIO for Solid State Drives Solutions Guide.

SmartTier

The SmartTier option is built on a multi-volume file system. Using SmartTier, you can map more than one volume to a single file system. You can then configure policies that automatically relocate files from one volume to another, or relocate files by running file relocation commands. Having multiple volumes lets you determine where files are located, which can improve performance for applications that access specific types of files. SmartTier functionality is available with both Veritas InfoScale Storage and Veritas InfoScale Enterprise licenses.

Note:

In the previous VxFS 5.x releases, SmartTier was known as Dynamic Storage Tiering.

This feature is supported in SFCFSHA.

See About SmartTier.

Storage Checkpoints

To increase availability, recoverability, and performance, VxFS offers on-disk and online backup and restore capabilities that facilitate frequent and efficient backup strategies. Backup and restore applications can leverage a Storage Checkpoint, a disk- and I/O-efficient copying technology for creating periodic frozen images of a file system. Storage Checkpoints present a view of a file system at a point in time, and subsequently identifies and maintains copies of the original file system blocks. Instead of using a disk-based mirroring method, Storage Checkpoints save disk space and significantly reduce I/O overhead by using the free space pool available to a file system.

Storage Checkpoint functionality is available with both Veritas InfoScale Storage and Veritas InfoScale Enterprise licenses.

This feature is supported in SFCFSHA.

See About Storage Checkpoints.

Support for databases

Databases can be created on files exported as character devices to achieve the same performance as databases created on raw disks.

Databases are usually created on file systems to simplify backup, copying, and moving tasks and are slower compared to databases on raw disks.

Using the Quick I/O for Databases feature with VxFS lets systems retain the benefits of having a database on a file system without sacrificing performance. Quick I/O creates regular, preallocated files to use as character devices. Databases can be created on the character devices to achieve the same performance as databases created on raw disks.

Treating regular VxFS files as raw devices has the following advantages for databases:

  • Commercial database servers such as Oracle Server can issue kernel supported asynchronous I/O calls on these pseudo devices but not on regular files. Server can issue kernel supported asynchronous I/O calls on these pseudo devices but not on regular files.

  • read() and write() system calls issued by the database server can avoid the acquisition and release of read/write locks inside the kernel that take place on regular files.

  • VxFS can avoid double buffering of data already buffered by the database server. This ability frees up resources for other purposes and results in better performance.

  • Since I/O to these devices bypasses the system buffer cache, VxFS saves on the cost of copying data between user space and kernel space when data is read from or written to a regular file. This process significantly reduces CPU time per I/O transaction compared to that of buffered I/O.

The Quick I/O for Databases feature is supported in SFCFSHA.

Support for large files and large file systems

VxFS supports files larger than two gigabytes and large file systems up to 256 terabytes.

Warning:

Some applications and utilities might not work on large files.

See largefiles and nolargefiles mount options.

Swap files

Swap files are not supported on cluster-mounted file systems.

Temporary file system mode

On most UNIX systems, temporary file system directories, such as /tmp and /usr/tmp, often hold files that do not need to be retained when the system reboots. The underlying file system does not need to maintain a high degree of structural integrity for these temporary directories. VxFS provides the mount -o tmplog option, which allows the user to achieve higher performance on temporary file systems by delaying the logging of most operations.

See the mount_vxfs(1M) manual page.

See tmplog mount option.

Thin Reclamation

The Thin Reclamation feature allows you to release free data blocks of a VxFS file system to the free storage pool of a Thin Storage LUN. This feature is only supported on file systems created on a VxVM volume.