InfoScale™ 9.0 Storage Foundation Administrator's Guide - Linux
- Section I. Introducing Storage Foundation
- Overview of Storage Foundation
- How Dynamic Multi-Pathing works
- How Volume Manager works
- How Volume Manager works with the operating system
- How Volume Manager handles storage management
- Volume layouts in Veritas Volume Manager
- Online relayout
- Volume resynchronization
- Dirty region logging
- Volume snapshots
- FastResync
- How VxVM handles hardware clones or snapshots
- Volume encryption
- How Veritas File System works
- Section II. Provisioning storage
- Provisioning new storage
- Advanced allocation methods for configuring storage
- Customizing allocation behavior
- Using rules to make volume allocation more efficient
- Understanding persistent attributes
- Customizing disk classes for allocation
- Specifying allocation constraints for vxassist operations with the use clause and the require clause
- Creating volumes of a specific layout
- Customizing allocation behavior
- Creating and mounting VxFS file systems
- Creating a VxFS file system
- Mounting a VxFS file system
- tmplog mount option
- ioerror mount option
- largefiles and nolargefiles mount options
- Resizing a file system
- Monitoring free space
- Extent attributes
- Section III. Administering multi-pathing with DMP
- Administering Dynamic Multi-Pathing
- Discovering and configuring newly added disk devices
- About discovering disks and dynamically adding disk arrays
- How to administer the Device Discovery Layer
- Administering DMP using the vxdmpadm utility
- Gathering and displaying I/O statistics
- Specifying the I/O policy
- Discovering and configuring newly added disk devices
- Dynamic Reconfiguration of devices
- Reconfiguring a LUN online that is under DMP control using the Dynamic Reconfiguration tool
- Manually reconfiguring a LUN online that is under DMP control
- Managing devices
- Displaying disk information
- Changing the disk device naming scheme
- Adding and removing disks
- Event monitoring
- Administering Dynamic Multi-Pathing
- Section IV. Administering Storage Foundation
- Administering sites and remote mirrors
- About sites and remote mirrors
- Fire drill - testing the configuration
- Changing the site name
- Administering the Remote Mirror configuration
- Failure and recovery scenarios
- Administering sites and remote mirrors
- Section V. Optimizing I/O performance
- Veritas File System I/O
- Veritas Volume Manager I/O
- Managing application I/O workloads using maximum IOPS settings
- Section VI. Using Point-in-time copies
- Understanding point-in-time copy methods
- When to use point-in-time copies
- About Storage Foundation point-in-time copy technologies
- Volume-level snapshots
- Storage Checkpoints
- About FileSnaps
- About snapshot file systems
- Administering volume snapshots
- Traditional third-mirror break-off snapshots
- Full-sized instant snapshots
- Creating instant snapshots
- Adding an instant snap DCO and DCO volume
- Controlling instant snapshot synchronization
- Creating instant snapshots
- Cascaded snapshots
- Adding a version 0 DCO and DCO volume
- Administering Storage Checkpoints
- Storage Checkpoint administration
- Administering FileSnaps
- Administering snapshot file systems
- Understanding point-in-time copy methods
- Section VII. Optimizing storage with Storage Foundation
- Understanding storage optimization solutions in Storage Foundation
- Migrating data from thick storage to thin storage
- Maintaining Thin Storage with Thin Reclamation
- Reclamation of storage on thin reclamation arrays
- Identifying thin and thin reclamation LUNs
- InfoScale 4K sector device support solution
- Section VIII. Maximizing storage utilization
- Understanding storage tiering with SmartTier
- Creating and administering volume sets
- Multi-volume file systems
- Features implemented using multi-volume file system (MVFS) support
- Adding a volume to and removing a volume from a multi-volume file system
- Volume encapsulation
- Load balancing
- Administering SmartTier
- About SmartTier
- Placement classes
- Administering placement policies
- File placement policy rules
- Multiple criteria in file placement policy rule statements
- Using SmartTier with solid state disks
- Sub-file relocation
- Administering hot-relocation
- How hot-relocation works
- Moving relocated subdisks
- Compressing files
- About compressing files
- Use cases for compressing files
- Section IX. Administering and protecting storage
- Managing volumes and disk groups
- Rules for determining the default disk group
- Moving volumes or disks
- Monitoring and controlling tasks
- Performing online relayout
- Adding a mirror to a volume
- Encrypting existing volumes
- Managing disk groups
- Disk group versions
- Displaying disk group information
- Creating a disk group
- Importing a disk group
- Moving disk groups between systems
- Importing a disk group containing hardware cloned disks
- Handling conflicting configuration copies
- Destroying a disk group
- Backing up and restoring disk group configuration data
- Managing plexes and subdisks
- Decommissioning storage
- Rootability
- Encapsulating a disk
- Rootability
- Sample supported root disk layouts for encapsulation
- Encapsulating and mirroring the root disk
- Administering an encapsulated boot disk
- Quotas
- Using Veritas File System quotas
- File Change Log
- Support for protection against ransomware
- Non-modifiable storage checkpoints
- Soft WORM storage
- Secure file system
- Secure file system for Oracle Single Instance
- Secure file system for PostgreSQL database
- Managing volumes and disk groups
- Section X. Reference
- Appendix A. Reverse path name lookup
- Appendix B. Tunable parameters
- Tuning the VxFS file system
- Methods to change Dynamic Multi-Pathing tunable parameters
- Tunable parameters for VxVM
- Methods to change Veritas Volume Manager tunable parameters
- Appendix C. Command reference
- Appendix D. Executive Order logging
How Single Click Recovery works
Single Click Recovery simplifies and automates the recovery process by providing the following mechanism:
Ease of use:
A faster recovery process involving a few clicks ensures a better Recovery Time Objective (RTO). Single Click Recovery supports data recovery of at least one hour thereby supporting an improved Recovery Point Objective (RPO).
Checkpoints management and validation:
The vxschadm command has new options for listing and validating immutable SecureFS checkpoints, their status, integrity, and required space.
To display a list of checkpoints, run the following command:
#/opt/VRTS/bin/vxschadm show [checkpoint] <mntpt>
This command displays all the SecureFS checkpoints that have names starting with "
secfs_
" prefix, including their retention periods and flags. You can use the information to verify which checkpoints are available for recovery.To validate a checkpoint, run the following command:
#/opt/VRTS/bin/vxschadm validate [checkpoint] [-a application_name] <mntpt>
This command verifies if the checkpoint is present on all the application-related mount points. If these details are not available in the SecureFS config file, it verifies this information from the main database mount point. The command also performs a quick mount and unmount operation to ensure that the checkpoint can be accessed and is intact. Finally, the command verifies that there is enough free disk space available to perform the recovery.
Ensure that you have enough free disk space available or provisioned before you initiate a recovery. The general guideline is to have roughly twice the current used space. For example, a 500 GB checkpoint requires a minimum of an additional 500 GB of free space on the main file system.
Automated and safe recovery:
The recover command not only initiates the restore process, but also creates a temporary checkpoint to revert to in case the restore operation fails.
To initiate a restore, run the following command:
#/opt/VRTS/bin/vxschadm recover [checkpoint] <ckptname> [-a application_name] <mntpt>
This command repeats the checkpoint validation steps that are mentioned earlier (ensures that the checkpoint exists on every required mount point, is accessible, and there is enough storage disk space available). The source checkpoint that is used for recovery is marked as non-removable during the recovery to prevent any accidental deletions, for example in case of ENOSPC where the disk space is low.
Additionally, this command creates a temporary checkpoint with a prefix "
secfs_TIMESTAMP_temp
" for each mount point. This temporary checkpoint acts as a fallback in case the recovery fails, the system can revert to the original state. The temporary checkpoint is deleted after a successful recovery.The command also verifies that SecureFS is disabled so that no new changes are made and also checks that the Cluster Sever (VCS) resources are frozen. Note that disabling SecureFS and freezing VCS resources is done from VIOM.
Parallel processing:
The recovery process runs in parallel if there are multiple mount points to improve efficiency. The vxschadm utility determines the optimal number of parallel threads depending on the CPU count or the file systems involved. Any additional tasks are automatically queued and their status shows as "About to start..".
Application-level integration:
The recovery process enables interaction with application-level functions such as database shutdown and startup, thereby ensuring that the application state remains consistent throughout the restore operation. Application-aware recovery is supported for Oracle and PostgreSQL applications.
Interactive monitoring:
The VIOM GUI provides continuous updates on the restore process ensuring that you are aware of the status of the recovery.