Veritas InfoScale™ Operations Manager 8.0 User's Guide
- Section I. Getting started
- Introducing Veritas InfoScale Operations Manager
- Using the Management Server console
- About the Management Server console
- About the Management Server console Home page
- About the Global Dashboard
- About the elements in a perspective view
- About viewing the summarized information
- About selecting the objects
- About drilling down to more information on the selected object
- About searching for objects
- About viewing the solutions
- About viewing the reports
- About viewing tasks
- About viewing connectivity graphs
- About accessing the Veritas InfoScale Operations Manager Help
- Examples for using Veritas InfoScale Operations Manager
- Example: Creating a volume using Veritas InfoScale Operations Manager
- Example: Creating a service group, adding it to a cluster, and bringing it online using Veritas InfoScale Operations Manager
- Example: Cluster Server troubleshooting using Veritas InfoScale Operations Manager
- Example: Ensuring the correct level of protection for volumes controlled by Storage Foundation
- Example: Improving the availability and the disaster recovery readiness of a service group through fire drills
- Example: Identifying the performance issues of an application using Veritas InfoScale Operations Manager
- Example: Volume migration using Veritas InfoScale Operations Manager
- Examples: Identifying and reducing storage waste using Veritas InfoScale Operations Manager
- Section II. Managing Veritas InfoScale Operations Manager
- Managing user access
- Creating an Organization
- Modifying the name of an Organization
- Deleting an Organization
- Moving an object to an Organization in a perspective
- Assigning permissions to user groups on an Organization within a perspective
- Modifying permissions assigned to user groups on an Organization within a perspective
- Deleting permissions assigned to user groups on an Organization within a perspective
- Modifying permissions assigned to user groups on an object within a perspective
- Verifying a user group in the domain
- Viewing permissions information
- Viewing the permissions assigned on a perspective, an Organization, or on an object
- Setting up fault monitoring
- About alerts and rules
- Creating rules in a perspective
- Create Rule - Select the type of fault conditions to trigger this rule panel options
- Create Rule - Select one or more fault topics which will trigger this rule panel options
- Create Rule - Select organizations panel options
- Create Rule - Setup notifications panel options
- Create Rule - Enter name and description panel options
- Editing rules in a perspective
- Edit Rule - Select the type of fault condition to trigger this rule panel options
- Edit Rule - Select one or more fault topics which will trigger this rule panel options
- Edit Rule - Select organization panel options
- Edit Rule - Setup notifications panel options
- Edit Rule - Enter name and description panel options
- Deleting rules in a perspective
- Enabling rules in a perspective
- Disabling rules in a perspective
- About faults and risks
- Suppressing faults in a perspective
- Restoring a suppressed fault in a perspective
- Using reports
- About reports
- About using reports
- Running a report
- Saving a report
- Subscribing for a report
- Editing a report subscription
- Deleting a report subscription
- Sending a report through email
- Viewing my report subscriptions in a perspective
- Viewing all the report subscriptions in a perspective
- About the reports available in Veritas InfoScale Operations Manager
- About global reports
- Adding management servers in the Global Reports perspective
- Creating a report
- Managing user access
- Section III. Managing hosts
- Overview
- Working with the unmanaged hosts and clusters
- Working with the uncategorized hosts
- Managing File Replicator (VFR) operations
- About performing File Replicator operations
- Viewing the VFR option of a host
- Creating a consistency group
- Viewing consistency groups
- Deleting a consistency group
- Associating a consistency group to a replication job
- Disassociating a consistency group from a replication job
- Viewing consistency group properties
- Creating a replication job
- Viewing File Replication Jobs
- Starting a replication job
- Pausing a replication job
- Resuming a replication job
- Stopping a replication job
- Syncing a replication job
- Modifying a replication job
- Deleting a replication job
- Viewing properties of File Replication Jobs
- Managing disk groups and disks
- About managing disk groups
- Creating disk groups
- Recovering disk groups
- Deporting disk groups
- Destroying disk groups
- Importing disk groups
- Adding disks to disk groups
- Resizing disks in disk groups
- Renaming disks in disk groups
- Upgrading disk groups
- Splitting disk groups
- Moving disk groups
- Joining disk groups
- About managing disks
- Initializing disks
- Replacing disks
- Recovering disks
- Mapping disks
- Unmapping disks
- Disconnecting disks
- Removing disks from disk groups
- Setting host prefix for disks
- Bringing disks online
- Taking disks offline
- Setting disk usage
- Evacuating disks
- Running or scheduling Trim
- Rescanning disks
- Managing volumes
- About managing Storage Foundation volumes
- Creating Storage Foundation volumes
- Create Volume - Select Disk Group and Disk Selection method panel options
- Volume attributes panel options for creating volumes on UNIX or Linux hosts for specifying values
- Volume attributes panel options for creating volumes on Windows hosts
- Add Drive Letter, Path and Create File System details panel options
- Stopping volumes
- Recovering volumes
- Reactivating volumes
- Deleting volumes
- Moving volumes
- Renaming volumes
- Adding mirrors to volumes
- Removing the mirrors of volumes
- Creating instant volume snapshots
- Creating space optimized snapshots for volumes
- Creating mirror break-off snapshots for volumes
- Dissociating snapshots
- Reattaching snapshots
- Resizing volumes
- Restoring data from the snapshots of volumes
- Refreshing the snapshot of volumes
- Configuring a schedule for volume snapshot refresh
- Adding snapshot volumes to a refresh schedule
- Removing the schedule for volume snapshot refresh
- Setting volume usage
- Splitting snapshots
- Starting synchronization of snapshots
- Enabling FastResync on volumes
- Disabling FastResync on volumes
- Managing file systems
- About managing file systems
- Creating file systems
- Enabling change logs
- Disabling change logs
- Synchronizing change logs
- Removing change logs
- Defragmenting file systems
- Unmounting non clustered file systems from hosts
- Mounting non clustered file systems on hosts
- Unmounting clustered file systems
- Mounting clustered file systems on hosts
- Remounting file systems
- Checking file systems
- Creating file system snapshots
- Remounting file system snapshot
- Mounting file system snapshot
- Unmounting file system snapshot
- Removing file system snapshot
- Monitoring capacity of file systems
- Managing SmartIO
- About managing SmartIO
- Enabling or disabling SmartIO caching
- Creating a cache
- Viewing the cache details
- Viewing the SmartIO Impact analysis chart
- Changing SmartIO mode
- Modifying a cache
- Deleting a cache
- Loading files to a cache
- Pinning tablespaces or files to a cache
- Unpinning tablespaces or files from a cache
- About using SmartAssist
- Creating an I/O trace log
- Viewing I/O trace logs
- Analyzing an I/O trace log
- Removing an I/O trace log
- Managing application IO thresholds
- Managing replications
- About managing replications
- Configuring Storage Foundation replications
- Configure replication - Create primary panel options
- Configure replication - Create resources
- Configure replication - Create primary result panel options
- Configure replication - Consistency check on secondary host panel options
- Configure replication - Replication settings for secondary host panel options
- Configure replication - Add secondary result panel options
- Adding a Secondary
- Pausing the replication to a Secondary
- Resuming the replication of a Secondary
- Starting replication to a Secondary
- Stopping the replication to a Secondary
- Switching a Primary
- Taking over from an original Primary
- Associating a volume
- Resynchronizing a Secondary
- Removing a Secondary
- Unconfiguring replication
- About setting alerts for replication
- Monitoring replications
- Optimizing storage utilization
- Section IV. Managing high availability and disaster recovery configurations
- Overview
- Managing clusters
- Managing service groups
- About managing service groups
- Creating service groups
- Enabling service groups
- Disabling service groups
- Creating Atleast Count dependencies for a resource in a service group
- About Atleast Count dependency
- Autoenabling service groups
- Freezing service groups
- Unfreezing service groups
- Flushing service groups
- Enabling all resources of service groups
- Disabling all resources of service groups
- Deleting service groups
- About linking service groups in a cluster
- Linking service groups in a cluster
- Unlinking service groups
- About site aware service group operations
- Prerequisites for using site-related service group operations
- Limitations of site-related service group operations
- Bringing service groups online
- Taking service groups offline
- Switching service groups
- Clearing faults on service group
- Clearing the resources in a service group from the Admin Wait state
- Editing attributes of service groups
- Modifying the system list for a service group
- About dependency views
- Viewing the service group dependency view
- About modifying a service group
- About Cluster Server service group alerting and failover reporting
- Viewing VCS Failover Duration report
- Managing systems
- Managing VSystems
- Managing resources
- About managing resources
- Enabling resources
- Disabling resources
- Deleting resources
- Clearing faults on resources
- Probing resources
- Taking a resource offline and propagating the state
- Bringing resources online
- Taking resources offline
- Invoking a resource action
- Editing attributes of a resource
- Editing attributes of a resource type
- Linking resources in a service group
- Unlinking resources in a service group
- Adding or modifying resources
- Marking a resource as critical
- Marking a resource as non critical
- Viewing the resource dependency view
- Managing global cluster configurations
- Running fire drills
- About high availability and disaster recovery readiness
- About high availability fire drills
- Running the high availability fire drill
- About disaster recovery fire drills
- About configuring a fire drill service group
- Running the disaster recovery fire drill
- Editing a fire drill schedule
- Deleting fire drill schedules
- Enabling fire drill schedules
- Disabling fire drill schedules
- Viewing fire drill schedules
- Using recovery plans
- Managing ApplicationHA
- About ApplicationHA Management
- Prerequisites for ApplicationHA Management
- About the ApplicationHA operations
- Launching ApplicationHA operations from Veritas InfoScale Operations Manager
- About the ApplicationHA infrastructure
- Enabling the ApplicationHA infrastructure for a managed host
- Disabling the ApplicationHA infrastructure for a managed host
- Managing application configuration
- Multi Site Management
- Appendix A. List of high availability operations
- Section V. Monitoring Storage Foundation HA licenses in the data center
- Managing licenses
- About licenses
- About Veritas licensing and pricing
- About the Symantec Performance Value Unit
- About the Symantec Performance Value Unit for VMware virtual machines
- About the Symantec Performance Value Unit for Solaris LDOM virtualization server
- About the Symantec Performance Value Unit for kernel-based virtual machines
- About the Symantec Performance Value Unit for IBM LPAR
- About the per-core licensing
- About assigning price tiers to hosts
- About license deployment policies
- Assigning a price tier to a host automatically
- Assigning a price tier to a host manually
- Creating a license deployment policy
- Modifying a license deployment policy
- Deleting a license deployment policy
- Viewing deployment information
- Managing licenses
- Monitoring performance
- About performance metering statistics
- About metered resources
- About space estimation for data logs
- Enable performance metering for a host
- Disable performance metering for a host
- Enable performance metering for a virtualization server
- Disable performance metering for a virtualization server
- About Veritas InfoScale Operations Manager performance graphs
- Viewing the performance graphs for a host
- Viewing the performance graphs for a disk
- Viewing the performance graphs for volume and file system
- Viewing the performance graphs for a path
- Viewing the performance graphs for an initiator
- Viewing the performance graphs for virtualization server and virtual machines
- Viewing the performance graphs for a path of a virtualization server
- Viewing the performance graphs for an enclosure
- About threshold settings
- Adding threshold settings for an object
- Deleting the threshold settings for an object
- Enabling the threshold settings for an object
- Disabling the threshold settings for an object
- Managing Business Applications
- About Business Applications in Veritas InfoScale Operations Manager
- Creating or modifying a Business Application
- Renaming a Business Application
- Deleting a Business Application
- Viewing Business Applications in the data center
- Viewing the overview of a Business Application
- Viewing service availability for a Business Application
- Viewing data availability for a Business Application
- Viewing SAN connectivity for a Business Application
- About the makeBE script
- Creating Business Application using the makeBE script
- Importing Business Application using the makeBE script
- Exporting Business Application using the makeBE script
- Updating Business Application using the makeBE script
- Deleting Business Application using the makeBE script
- Managing extended attributes
- Managing policy checks
- About policy checks
- How signature registration settings work
- Registering policy signatures
- Unregistering a signature
- Setting signature tunables
- Running a manual policy scan
- Enabling or disabling policy signatures
- Viewing policy violation details
- Viewing or exporting a list of available policy signatures
- About using custom signatures for policy checks
- Creating a custom signature script
- Sample custom signature script
- Installing a custom signature script
- Copying the custom signature script
- Removing a custom signature
- About using the Distribution Manager Add-on to bundle custom signature scripts
- Sample setup.pl script for the custom signature
- Sample unsetup.pl script for a custom signature
- Managing Dynamic Multipathing paths
- About Dynamic Multi-Pathing in Veritas InfoScale Operations Manager
- Disabling the DMP paths on the initiators of a host
- Disabling the DMP paths on an enclosure
- Disabling the DMP paths on a virtualization server
- Re-enabling the DMP paths
- Removing a completed DMP maintenance case record
- Reviewing the output and results of a completed DMP maintenance case
- Managing CVM clusters
- Managing Flexible Storage Sharing
- Implementing Flexible Storage Sharing with Veritas InfoScale Operations Manager
- About Flexible Storage Sharing
- Flexible Storage Sharing use cases
- Flexible Storage Sharing features and support in Veritas InfoScale Operations Manager
- Exporting and un-exporting disks for Flexible Storage Sharing
- Enabling or disabling Flexible Storage Sharing on existing shared disk groups
- Monitoring the virtualization environment
- About the virtualization technologies supported
- About discovering the VMware Infrastructure using Veritas InfoScale Operations Manager
- How Veritas InfoScale Operations Manager discovers vCenter and ESX servers
- Information that Veritas InfoScale Operations Manager discovers on the VMware Infrastructure components
- Viewing the storage mapping information for VMware
- About the datastores in Veritas InfoScale Operations Manager
- About the multi-pathing discovery in the VMware environment
- About near real-time discovery of VMware events
- About discovering Solaris zones
- About discovering logical domains in Veritas InfoScale Operations Manager
- About discovering LPARs and VIOs in Veritas InfoScale Operations Manager
- About Microsoft Hyper-V virtualization discovery
- About the Kernel-based Virtual Machine (KVM) virtualization discovery in Veritas InfoScale Operations Manager
- About the reports related to virtualization
- Using Web services API
- About using Veritas InfoScale Operations Manager Web services API
- Logging in to Veritas InfoScale Operations Manager Web services API
- Logging out of Veritas InfoScale Operations Manager Web services API
- About objects supported by Veritas InfoScale Operations Manager Web services API
- About performing operations using Veritas InfoScale Operations Manager Web services API
- Examples of performing operations using Veritas InfoScale Operations Manager Web services API
- Examples of performing operations using XPRTLC and cURL
- Examples of the output in JSON format
- Veritas InfoScale Operations Manager command line interface
- About the vomadm utility
- Listing all configured enclosures using the vomadm utility
- Host management using the vomadm utility
- Deployment management using the vomadm utility
- Business Application management using the vomadm utility
- Service management using the vomadm utility
- Domain management using the vomadm utility
- List configured schedules using the vomadm utility
- Appendix B. Command file reference
- Appendix C. Application setup requirements
- Application setup requirements for Oracle database discovery
- Application setup requirements for Oracle Automatic Storage Management (ASM) discovery
- Application setup requirements for IBM DB2 discovery
- Application setup requirements for Sybase Adaptive Server Enterprise (ASE) discovery
- Application setup requirements for Microsoft SQL Server discovery
- Application setup requirements for Microsoft Exchange Server discovery
- Glossary
- Index
About deduplication chunk size
The deduplication chunk size, which is also referred to as deduplication granularity, is the unit at which fingerprints are computed. A valid chunk size is between 4k and 128k and power of two. Once set, the only way to change the chunk size is to remove and re-enable deduplication on the file system.
You should carefully select the chunk size, as the size has significant impact on deduplication as well as resource requirements. The size directly affects the number of fingerprint records in the deduplication database as well as temporary space required for sorting these records. A smaller chunk size results in a large number of fingerprints and hence requires a significant amount of space for the deduplication database.
While the amount of storage that you save after deduplication depends heavily on the dataset and distribution of duplicates within the dataset, the chunk size can also affect the savings significantly. You must understand your dataset to get the best results after deduplication. A general rule of thumb is that a smaller chunk size saves more storage. A smaller chunk size results in more granular fingerprints and in general results in identifying more duplicates. However, smaller chunks have additional costs in terms of database size, deduplication time, and, more importantly, fragmentation. The deduplication database size can be significantly large for small chunk sizes. Higher fragmentation normally results in more file system metadata and hence can require more storage. The space consumed by the deduplication database and the increased file system metadata can reduce the savings achieved via deduplication. Additionally, fragmentation can also have a negative effect on performance. The Veritas File System (VxFS) deduplication algorithms try to reduce fragmentation by coalescing multiple contiguous duplicate chunks.
Larger chunk sizes normally result in a smaller deduplication database size, faster deduplication, and less fragmentation. These benefits sometimes come at the cost of less storage savings. If you have a large number duplicate files that are small in size, you still can choose a chunk size that is larger than the file size. A larger chunk size does not affect the deduplication of files that are smaller than the chunk size. In such cases, the fingerprint is calculated on the whole file, and the files are still deduplicated.
The space consumed by the deduplication database is a function of the amount of data in the file system and the deduplication chunk size. The space consumed by the deduplication database grows with time as new data is added to file system. Additional storage is required for temporary use, such as sorting fingerprints. The temporary storage may be freed after the work completes. Ensure that sufficient free space is available for deduplication to complete successfully. The deduplication might not start if the file system free space is less than approximately 15%. The deduplication sometimes needs more than 15% free space for smaller chunk sizes. In general, the space consumed reduces significantly with larger chunk sizes. Veritas recommends that you have approximately 20% free space for 4k chunks.