Veritas Access Appliance 8.3 Administrator's Guide

Last Published:
Product(s): Appliances (8.3)
Platform: Veritas 3360,Veritas 3350,Veritas 3340
  1. Section I. Introducing Access Appliance
    1. Introducing Access Appliance
      1.  
        About Access Appliance
      2.  
        About the Access Appliance Dashboard
      3. Getting started with the Access CLISH
        1.  
          Accessing the Access CLISH
        2.  
          Navigating the Access CLISH
        3.  
          Getting help using the Access CLISH
        4.  
          Displaying the command history
        5.  
          Using the more command
      4.  
        Getting started with Access Appliance APIs
  2. Section II. Configuring Access Appliance
    1. Managing users
      1.  
        About user management
      2.  
        About the naming requirements for adding new users
      3.  
        About the naming requirements when assigning roles to domain users
      4.  
        Adding and removing user roles using GUI
      5.  
        Performing user management using CLISH
    2. Managing licenses
      1.  
        About Access Appliance licenses
      2.  
        Managing licenses from the GUI
      3.  
        Managing licenses from the command-line interface
    3. Configuring the network
      1.  
        About configuring the Access Appliance network
      2.  
        About bonding Ethernet interfaces
      3.  
        Bonding Ethernet interfaces
      4.  
        Configuring DNS settings
      5.  
        About Ethernet interfaces
      6.  
        Displaying current Ethernet interfaces and states
      7.  
        Configuring IP addresses
      8.  
        Configuring IP addresses and FQDNs in a non-DNS environment
      9.  
        Configuring VLAN interfaces
      10.  
        Configuring NIC devices
      11.  
        About configuring routing tables
      12.  
        Configuring routing tables
      13.  
        Changing the firewall settings
      14.  
        Configuring Access Appliance in IPv4 and IPv6 mixed mode
      15.  
        Support for multiple data subnets
      16.  
        Adding console FQDN to the network and accessing the GUI using the console FQDN
    4. Configuring authentication services
      1.  
        About configuring LDAP settings
      2.  
        Configuring LDAP server settings
      3.  
        Administering the Access Appliance cluster's LDAP client
      4.  
        About Active Directory (AD)
      5.  
        Configuring AD server settings
      6.  
        Configuring entries for Access Appliance DNS for authenticating to Active Directory (AD)
      7.  
        Configuring AD/LDAP using the GUI
      8.  
        Configuring NSS lookup order
      9.  
        Sign-in options for the Access Appliance UI
      10. Configuring user authentication using digital certificates or smart cards
        1.  
          Adding CA certificates for smart card authentication
        2.  
          Deleting CA certificates
  3. Section III. Managing Access Appliance storage
    1. Configuring storage
      1.  
        About storage provisioning and management
      2.  
        About configuring disks
      3.  
        About configuring storage pools
      4.  
        Configuring storage pools
      5.  
        About quotas for usage
      6.  
        Enabling, disabling, and displaying the status of file system quotas
      7.  
        Setting and displaying file system quotas
      8.  
        Setting user quotas for users of specified groups
      9.  
        About quotas for CIFS home directories
      10.  
        Workflow for configuring and managing storage using the Access Appliance CLI
      11.  
        Displaying information for all disk devices associated with the nodes in a cluster
      12.  
        Displaying WWN information
      13.  
        Importing new LUNs forcefully for new or existing pools
      14.  
        Initiating host discovery of LUNs
    2. Managing disks
      1.  
        Adding disks to a storage pool
      2.  
        Removing disks from a storage pool
      3.  
        Viewing information about disks
      4.  
        Accessing disk details
      5.  
        Discovering disks
      6.  
        Formatting a disk
    3. Access Appliance as an iSCSI target
      1.  
        About Access Appliance as an iSCSI target
      2.  
        Managing the iSCSI target service
      3.  
        Managing the iSCSI targets
      4.  
        Managing the LUNs
      5.  
        Managing the mappings with iSCSI initiators
      6.  
        Managing the users
  4. Section IV. Managing Access Appliance file access services
    1. Configuring the NFS server
      1.  
        About using the NFS server with Access Appliance
      2.  
        Using the kernel-based NFS server
      3.  
        Accessing the NFS server
      4.  
        Displaying and resetting NFS statistics
      5.  
        Configuring Access Appliance for ID mapping for NFS version 4
      6.  
        Configuring the NFS client for ID mapping for NFS version 4
      7.  
        About authenticating NFS clients
      8. Setting up Kerberos authentication for NFS clients
        1.  
          Adding and configuring Access Appliance to the Kerberos realm
    2. Using Access Appliance as a CIFS server
      1.  
        About configuring Access Appliance for CIFS
      2. About configuring CIFS for Active Directory (AD) domain mode
        1.  
          Joining Access Appliance to Active Directory (AD)
        2.  
          Verifying that Access Appliance has joined Active Directory (AD) successfully
        3.  
          Using multi-domain controller support in CIFS
        4.  
          About leaving an AD domain
        5.  
          Changing domain settings for AD domain mode
        6.  
          Removing the AD interface
      3. About setting trusted domains
        1.  
          Specifying trusted domains that are allowed access to the CIFS server
        2.  
          Allowing trusted domains access to CIFS
        3.  
          Setting Active Directory trusted domains
      4.  
        About storing account information
      5.  
        Storing user and group accounts
      6.  
        Reconfiguring the CIFS service
      7.  
        About mapping user names for CIFS/NFS sharing
      8.  
        About the mapuser commands
      9.  
        Adding, removing, or displaying the mapping between CIFS and NFS users
      10.  
        Automatically mapping UNIX users from LDAP to Windows users
      11. About managing home directories
        1.  
          Setting the home directory file systems
        2.  
          Setting up home directories
        3.  
          Displaying home directory usage information
        4.  
          Deleting home directories and disabling creation of home directories
      12. About CIFS clustering modes
        1.  
          About switching the clustering mode
      13. About migrating CIFS shares and home directories
        1.  
          Migrating CIFS shares and home directories from normal to ctdb clustering mode
        2.  
          Migrating CIFS shares and home directories from ctdb to normal clustering mode
      14.  
        Setting the CIFS aio_fork option
      15.  
        Enabling CIFS data migration
    3. Using Access Appliance as an Object Store server
      1.  
        About the Object Store server
      2.  
        Use cases for configuring the Object Store server
      3.  
        Configuring the Object Store server
      4.  
        About buckets and objects
      5.  
        File systems used for objectstore buckets
      6.  
        Enabling WORM on buckets
      7.  
        Object Access SSL certificate
      8.  
        Object Access endpoints
      9.  
        S3 with NFS use case
      10.  
        S3 with NSP use case
      11. Configuring the S3 server using GUI
        1.  
          Setting Object Access server default parameters
        2.  
          Setting up the Object Access server group-specific parameters
        3.  
          Viewing information about S3
        4.  
          Provisioning the S3 bucket using GUI
  5. Section V. Managing Access Appliance security
    1. Managing security
      1.  
        Security overview
      2.  
        About the security meter
    2. Setting up FIPS mode
      1.  
        FIPS 140-2 conformance for Access Appliance
      2.  
        Viewing FIPS status for Access Appliance
      3.  
        Enabling FIPS for Access Appliance
      4.  
        Disabling FIPS mode for NetBackup MSDP
      5.  
        Managing the FIPS mode using the command-line interface
    3. Configuring STIG
      1.  
        STIG overview for Access Appliance
      2.  
        Enabling OS STIG hardening for Access Appliance
      3.  
        Viewing STIG status of an Access Appliance
      4.  
        Enabling STIG using the command-line interface
    4. Setting the banner
      1.  
        Managing the login banner using the UI
      2.  
        Managing the banner from the command-line interface
    5. Setting the password policy
      1.  
        Managing the password policy using the UI
      2.  
        Managing the password policy from the command-line interface
    6. Immutability in Access Appliance
      1.  
        Support for immutability in Access Appliance
      2.  
        About lockdown modes
      3.  
        Selecting or changing the lockdown mode
      4.  
        Accessing the root shell in lockdown mode
      5.  
        Configuring immutability using GUI
    7. Deploying certificates on Access Appliance
      1.  
        About system certificates on Access Appliance
      2.  
        About external certificates on Access Appliance
      3.  
        Deploying ECA using the GUI
      4.  
        Log locations
    8. Single Sign-On (SSO)
      1.  
        About single sign-on (SSO) configuration
      2.  
        Configuring SSO on Access Appliance
      3.  
        Limitations and log locations
    9. Configuring multifactor authentication
      1.  
        About multifactor authentication
      2.  
        Considerations when configuring multifactor authentication
      3.  
        Configuring multifactor authentication for your user account
      4.  
        Disabling multifactor authentication for your user account
      5.  
        Enforcing multifactor authentication for all users
      6.  
        Configuring multifactor authentication for your user account when it is enforced in the cluster
      7.  
        Resetting multifactor authentication for a user
  6. Section VI. Monitoring and troubleshooting
    1. Monitoring the appliance
      1.  
        Testing the appliance hardware
      2. About Veritas AutoSupport on the Access Appliance
        1.  
          Setting up AutoSupport on the appliance
        2.  
          Using a proxy server with the appliance
      3.  
        Setting up email notifications on the appliance
      4.  
        Setting up SNMP notifications on the appliance
    2. Configuring event notifications and audit logs
      1.  
        About troubleshooting
      2.  
        Monitoring command activity
      3.  
        Monitoring alerts
      4. About alert management
        1.  
          Viewing information about alert management
        2.  
          Managing alerts
      5.  
        Monitoring events
      6.  
        Viewing reports
      7.  
        Viewing cluster storage usage
      8.  
        Viewing file system usage
      9.  
        About event notifications
      10.  
        About severity levels and filters
      11.  
        About SNMP notifications
      12.  
        Configuring a syslog server
      13.  
        Displaying events on the console
    3. Appliance log files
      1.  
        About appliance log files
      2. Gathering device logs with the DataCollect command
        1.  
          Collecting default and additional diagnostic logs
      3.  
        Downloading logs using the Log Transfer Console
      4. Forwarding logs to an external server
        1.  
          Configuring log forwarding using the UI
        2.  
          Modifying log forwarding settings using the UI
        3.  
          Removing log forwarding using the UI
        4.  
          Setting up log forwarding using the command-line interface
        5.  
          Viewing the configured settings from the appliance shell menu
      5. Collecting logs using the UI
        1.  
          Uploading log packages to Veritas Support
        2.  
          Downloading log packages
        3.  
          Deleting log packages
  7. Section VII. Provisioning and managing Access Appliance file systems
    1. Creating and maintaining file systems
      1.  
        About creating and maintaining file systems
      2.  
        About encryption at rest
      3. Considerations for creating a file system
        1.  
          Best practices for creating file systems
        2.  
          Choosing a file system layout type
        3.  
          Determining the initial extent size for a file system
        4.  
          About striping file systems
        5.  
          About FastResync
        6.  
          About fsck operation
        7.  
          Enabling WORM on a file system
        8.  
          Setting retention in files
        9.  
          Setting WORM over NFS
        10.  
          Manually setting WORM-retention on a file over CIFS
        11. About managing application I/O workloads using maximum IOPS settings
          1.  
            Setting the maximum IOPS
      4.  
        Creating a file system
      5.  
        Bringing the file system online or offline
      6.  
        Listing all file systems and associated information
      7. Modifying a file system
        1.  
          Adding or removing a mirror from a file system
        2.  
          Adding or removing a column from a file system
        3.  
          Increasing the size of a file system
        4.  
          Decreasing the size of a file system
      8. Managing a file system
        1.  
          Defragmenting a file system
        2.  
          Checking and repairing a file system
        3.  
          Configuring FastResync for a file system
        4.  
          Disabling the FastResync option for a file system
        5.  
          Checking and resynchronizing stale mirrors
        6.  
          Setting file system alerts
        7.  
          Displaying file system alert values
        8.  
          Removing file system alerts
      9.  
        Destroying a file system
      10.  
        Upgrading disk layout versions
  8. Section VIII. Provisioning and managing Access Appliance shares
    1. Creating shares for applications
      1.  
        About file sharing protocols
      2.  
        About concurrent access
      3.  
        Sharing directories using CIFS and NFS protocols
      4.  
        Sharing a file system as a CIFS home directory
      5.  
        About concurrent access with NFS and S3
    2. Creating and maintaining NFS shares
      1.  
        About NFS file sharing
      2. About the NFS shares
        1.  
          Creating an NFS share with continuous replication
        2.  
          Creating an NFS share with encryption
        3.  
          Creating an NFS share without replication and encryption
      3.  
        Displaying file systems and snapshots that can be exported
      4.  
        Exporting an NFS share
      5.  
        Displaying exported directories
      6.  
        About managing NFS shares using netgroups
      7.  
        Unexporting a directory or deleting NFS options
      8.  
        Exporting an NFS share for Kerberos authentication
      9.  
        Mounting an NFS share with Kerberos security from the NFS client
      10.  
        Exporting an NFS snapshot
    3. Creating and maintaining CIFS shares
      1.  
        About managing CIFS shares
      2. About the CIFS shares
        1.  
          Creating a CIFS share with continuous replication
        2.  
          Creating a CIFS share with encryption
        3.  
          Creating a CIFS share without replication and encryption
      3.  
        Exporting a directory as a CIFS share
      4.  
        Configuring a CIFS share as secondary storage for an Enterprise Vault store
      5.  
        Exporting the same file system/directory as a different CIFS share
      6.  
        About the CIFS export options
      7.  
        Setting share properties
      8.  
        Displaying CIFS share properties
      9.  
        Hiding system files when adding a CIFS normal share
      10.  
        Allowing specified users and groups access to the CIFS share
      11.  
        Denying specified users and groups access to the CIFS share
      12.  
        Exporting a CIFS snapshot
      13.  
        Deleting a CIFS share
      14.  
        Modifying a CIFS share
      15.  
        Making a CIFS share shadow copy aware
      16. About managing CIFS shares for Enterprise Vault
        1.  
          Creating a CIFS share for Enterprise Vault with continuous replication
        2.  
          Creating a CIFS share for Enterprise Vault without replication
    4. Integrating Access Appliance with Data Insight
      1.  
        Access Appliance integration with Data Insight
  9. Section IX. Managing Access Appliance storage services
    1. Configuring continuous replication
      1.  
        About Access Appliance continuous replication
      2. How Access Appliance continuous replication works
        1.  
          How data flows in continuous replication synchronous mode
        2.  
          How data flows in continuous replication asynchronous mode
      3.  
        Starting Access Appliance continuous replication
      4.  
        Setting up communication between the source and the destination clusters
      5.  
        Setting up the file system to replicate
      6.  
        Managing continuous replication
      7.  
        Displaying continuous replication information and status
      8.  
        Unconfiguring continuous replication
      9.  
        Preserving the file system on the destination cluster
      10.  
        Cloud tiering with continuous replication
      11.  
        Configuring Enterprise Vault with continuous replication
      12. Configuring a continuous replication job using the GUI
        1.  
          Stopping or starting a continuous replication job
        2.  
          Pausing and resuming a continuous replication job
        3.  
          Failing over or failing back a continuous replication job
        4.  
          Unconfiguring a continuous replication job
      13. Continuous replication failover and failback
        1.  
          Process summary
        2.  
          Overview of the planned failover process
        3.  
          Overview of the planned failback process
        4.  
          Overview of the unplanned failover process
        5.  
          Overview of the unplanned failback process
      14.  
        Addition of multiple file systems to a Replicated Volume Group
    2. Using snapshots
      1.  
        About snapshots
      2.  
        Enabling WORM on storage snapshots
      3.  
        Creating snapshots
      4.  
        Displaying snapshots
      5.  
        Managing disk space used by snapshots
      6.  
        Bringing snapshots online or taking snapshots offline
      7.  
        Restoring a snapshot
      8.  
        About snapshot schedules
      9.  
        Configuring snapshot schedules
      10.  
        Managing automated snapshots
    3. Using instant rollbacks
      1.  
        About instant rollbacks
      2.  
        Creating a space-optimized rollback
      3.  
        Creating a full-sized rollback
      4.  
        Listing Access Appliance instant rollbacks
      5.  
        Restoring a file system from an instant rollback
      6.  
        Refreshing an instant rollback from a file system
      7.  
        Bringing an instant rollback online
      8.  
        Taking an instant rollback offline
      9.  
        Destroying an instant rollback
      10.  
        Creating a shared cache object for Access Appliance instant rollbacks
      11.  
        Listing cache objects
      12.  
        Destroying a cache object of a Access Appliance instant rollback
  10. Section X. Reference
    1. Appendix A. Access Appliance documentation
      1.  
        Using the Access Appliance product documentation
      2.  
        About accessing the online man pages
  11.  
    Index

Collecting logs using the UI

You can collect logs for an individual node in the cluster or for all the cluster nodes from the Access Appliance UI for error analysis and troubleshooting. You can choose to collect logs for all the components to get a comprehensive view of the system, or you can collect logs for specific components that have an issue.

  1. Sign in to the Access Appliance UI using the following URL:

    http://console-ip:14161

    where console-ip is the management console IP address where the web interface is hosted.

  2. In the left navigation pane click Settings > Diagnostics.
  3. Click Generate log package.

    On the Generate log package page, on the Basic tab select the components to include in the log package.

  4. To select the components for which you want to collect logs:
    • On the Basic tab under Log settings, select the components. To select all the components, click All.

      Component

      Description

      Service status

      Status of the services running on the cluster nodes.

      Performance logs

      Logs for collecting performance data.

      Common logs

      Common logs from multiple modules.

      Nas

      Product information from cluster nodes.

      OS

      Kernel and user-level debug logs.

      Sos report

      SOS reports collected from all nodes using the RHEL sos utility.

      Explorer

      Logs and environment data collected by the VxExplorer utility from all the nodes.

      Install

      Installation logs from the /opt/VRTS/install/logs/ log directory. If you encounter issues during the initial configuration, collect logs from this module.

      NAS procstats

      NAS process stacks from all the nodes. It includes the stack trace for all daemons running on the system.

      Appliance

      Hardware-specific logs.

      SDS

      Logs for the software-defined storage plug-in.

      Upgrade

      Logs generated during an upgrade from all the nodes

      Backup

      NetBackup client logs and other diagnostic information.

      VDD

      Veritas Data Deduplication (VDD) logs if VDD is configured on the cluster nodes.

    • Under Historical logs, you can collect archived logs or logs for a specific duration. To include historical logs, click Archived logs. To include logs for a specific duration, click Select date range and select the duration or select Custom range to customize the duration by specifying the start and the end date. Including logs for a specific time period reduces the size of the generated log package and the time required to collect the logs.

    • Under Package options, specify a name for the log package and optionally the case number if provided by Veritas Support.

    • Under Nodes, select the nodes for which you want to collect the logs.

  5. Click Generate.

    The log package is generated in the /log/support_logs location. To view the progress of the operation, click View details on the Diagnostics page.

    If you had specified the case number, it is prefixed to the package name. The generated log package is displayed under Packaged logs. You can now download the package or upload it to Veritas Support for error analysis.

See Uploading log packages to Veritas Support.

See Downloading log packages.

See Deleting log packages.