Access Appliance Online Help
- Getting started
- About Access Appliance
- Enabling certificate-based authentication in Access Appliance
- Configuring storage for LTR
- About the dashboard
- Setting up the storage type for provisioning
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- About the NFS shares
- About an iSCSI target
- Creating an iSCSI target and provisioning LUNs
- About S3 buckets for NetBackup
- Using the Access Appliance product documentation
- Changing your password
- Managing storage
- Managing file sharing services
- Monitoring and troubleshooting
- Provisioning and managing file systems
- Creating a file system
- Setting the maximum IOPS
- Creating a snapshot
- Restoring a snapshot
- Configuring a replication job
- Stopping or starting a replication job for VVR
- Pausing and resuming a replication job for VVR
- Enabling or disabling a replication job for VFR
- Synchronizing a replication job for VFR
- Failing over or failing back a replication job for VVR
- Failing over or failing back a replication job for VFR
- Unconfiguring a replication job for VFR
- Unconfiguring a replication job for VVR
- Viewing the list of iSCSI targets
- Adding an initiator for an iSCSI target
- Removing an initiator for an iSCSI target
- Adding portal IPs for an iSCSI target
- Setting up authentication for an iSCSI target
- Viewing the list of initiators for an iSCSI target
- Viewing the portal IPs for an iSCSI target
- Removing portal IPs for an iSCSI target
- Removing authentication settings for an iSCSI target
- Removing an iSCSI target
- Removing the file system store for an iSCSI target
- Viewing the list of LUNs for an iSCSI target
- Creating a LUN for an iSCSI target
- Increasing the size of a LUN for an iSCSI target
- Reducing the size of a LUN for an iSCSI target
- Removing a LUN for an iSCSI target
- Cloning a LUN for an iSCSI target
- Creating a snapshot of a LUN for an iSCSI target
- Viewing the list of snapshots for an iSCSI target
- Removing a LUN snapshot
- Restoring a LUN snapshot
- Provisioning and managing shares
- About file sharing protocols
- About concurrent access
- About concurrent access with NFS and S3
- Sharing directories using CIFS and NFS protocols
- Adding a share
- NFS protocol options
- CIFS protocol options
- About buckets and objects
- About Active Directory (AD)
- Logging on as an active directory user
- Creating access and secret keys for an active directory user
- Exporting an NFS share as an S3 bucket
- Viewing information about a share
- Accessing share details
- Configuring a favorite share
- Deleting a share
- Managing permissions for CIFS shares
- Managing clients for the NFS shares
- Managing policies
- About policies for storage provisioning
- About policies for long-term data retention
- About policies for archiving data using Enterprise Vault
- About policies for file systems
- About pattern matching for data movement policies
- Viewing information about policies
- Activating storage policy templates
- Activating long-term data retention policies
- Activating archival policies
- Creating an S3 bucket
- About cloud-storage tiering
- Workflow for adding a cloud tier
- About tiering policies
- Adding a secondary tier
- Viewing information about the secondary tier
- Adding or editing a tier policy on a secondary tier
- Creating a policy schedule
- Managing settings
- Viewing Access Appliance settings
- About the cloud gateway
- Viewing information about cloud services
- Adding and removing a cloud service
- Viewing discovery information about your cluster
- About the Lightweight Directory Access Protocol
- Configuring LDAP
- Configuring Active Directory
- About user management
- Adding and removing user roles using GUI
- Performing user management using CLISH
- Configuring the NTP server
- Starting or stopping the CIFS or NFS servers
- Starting or stopping the S3 server
- Adding or removing storage pools for S3 users
- Configuring the /etc/hosts file for mapping of S3 users
- Registering a NetBackup master server or an EMM server
- Modifying a NetBackup media server list
- Viewing information about your NetBackup configuration with Access Appliance
- About cluster management
- Setting up the time and the time zone for the cluster
- About replication
- Viewing information about events
- Purging events
- About Access Appliance product licensing
- Setting object server default parameters
- Setting up the object server group-specific parameters
- Viewing information about S3
- Configuring the KMS server
- About the CIFS service management
- Setting up the home directory
- About the File Transfer Protocol
- About Veritas Data Deduplication
- About alert management
- STIG overview for Access Appliance
- FIPS compatibility list
- Index
Configuring Veritas Data Deduplication using the GUI
To configure Veritas Data Deduplication
- Log on to the Access Appliance application.
The Getting Started page is displayed.
Click Veritas Data Deduplication.
- By default, the Configure storage tab is displayed.
Create a storage pool, modify disk selections for the pool as required, and then click Create pool.
By default, all the available disks are selected for the pool.
When you create a Veritas Data Deduplication storage pool, you need to use five disks or volumes. You add disks or volumes in multiples of five.
- The storage pool gets configured. Click Finish.
- Under the Activate Policy tab, select the Veritas Data Deduplication policy, and then click Activate policy.
- The Veritas Data Deduplication policy is activated. Click Finish.
- Under the Provision storage tab, specify the storage options, enter the user name and password for the service, enter a virtual IP for the service, and then click Provision storage.
You are required to enter the following fields:
Size: Specify the size of the file system.
Veritas recommends that you grow the deduplication storage pool to a maximum supported size of 960 TiB.
You can grow the deduplication storage pool to a maximum supported size of 1.24 PiB.
Note:
The shrink operation is not supported. You cannot shrink the size of the deduplication storage server pool after configuration.
Storage pool: Specify the name of the storage pool.
Virtual IP address: The virtual IP that you want to use to configure the Veritas Data Deduplication server. This IP should not be the console IP, replication IP, NetBackup client IP, or the loadbalancer IP. If you use any of these IPs to configure deduplication, storage provisioning fails.
Run the Network> ipaddress show command from the Access command-line interface to find an available virtual IP address. Or navigate to Infrastructure > Nodes in the GUI, and click on the node name to see the virtual IP address.
If a virtual IP is not available to configure the Veritas Data Deduplication server, you should add at least one virtual IP to the cluster using the Access command-line interface.
Username and password: Credentials with which the Veritas Data Deduplication server gets configured.
The same credentials are required later to add the Veritas Data Deduplication server to NetBackup.
- Click Finish.
The storage provisioning is now complete.
View the Recent Activity panel for the status of the task.
An alert appears in the GUI when the memory usage of the Veritas Data Deduplication server is more than 75%. The alert displays the amount of memory used and the total RAM usage. If the situation persists for more than 24 hours, an AutoSupport alert is raised and an email is sent.
If you receive this alert, go to > and restart the service once you reach this threshold. For information about the issues that are caused when the Veritas Data Deduplication service consumes large amount of memory, see https://www.veritas.com/support/en_US/article.100045745.