Storage Foundation Cluster File System High Availability 7.4.1 Administrator's Guide - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.1)
Platform: Linux
  1. Section I. Introducing Storage Foundation Cluster File System High Availability
    1. Overview of Storage Foundation Cluster File System High Availability
      1.  
        About Storage Foundation Cluster File System High Availability
      2.  
        About Dynamic Multi-Pathing (DMP)
      3.  
        About Veritas Volume Manager
      4. About Veritas File System
        1.  
          About the Veritas File System intent log
        2.  
          About extents
        3.  
          About file system disk layouts
      5. About Storage Foundation Cluster File System (SFCFS)
        1. About Veritas File System features supported in cluster file systems
          1.  
            Veritas File System features not in cluster file systems
      6.  
        About Veritas InfoScale Operations Manager
      7. About Veritas Replicator
        1.  
          What is VFR?
        2.  
          Features of VFR
      8.  
        Use cases for Storage Foundation Cluster File System High Availability
    2. How Dynamic Multi-Pathing works
      1. How DMP works
        1. Device discovery
          1.  
            About enclosure-based naming
        2. How DMP monitors I/O on paths
          1. Path failover mechanism
            1.  
              Subpaths Failover Group (SFG)
            2.  
              Low Impact Path Probing (LIPP)
          2.  
            I/O throttling
        3.  
          Load balancing
        4. DMP in a clustered environment
          1.  
            About enabling or disabling controllers with shared disk groups
      2.  
        Veritas Volume Manager co-existence with Oracle Automatic Storage Management disks
    3. How Veritas Volume Manager works
      1. How Veritas Volume Manager works with the operating system
        1.  
          How data is stored
      2. How Veritas Volume Manager handles storage management
        1. Physical objects
          1.  
            About disk partitions
          2.  
            Disk arrays
        2. Virtual objects
          1.  
            Combining virtual objects in Veritas Volume Manager
        3.  
          About the configuration daemon in Veritas Volume Manager
        4.  
          Multiple paths to disk arrays
      3. Volume layouts in Veritas Volume Manager
        1.  
          Non-layered volumes
        2.  
          Layered volumes
        3.  
          Layout methods
        4.  
          Concatenation, spanning, and carving
        5.  
          Striping (RAID-0)
        6.  
          Mirroring (RAID-1)
        7.  
          Striping plus mirroring (mirrored-stripe or RAID-0+1)
        8.  
          Mirroring plus striping (striped-mirror, RAID-1+0, or RAID-10)
        9. RAID-5 (striping with parity)
          1.  
            Traditional RAID-5 arrays
          2.  
            Veritas Volume Manager RAID-5 arrays
          3.  
            Left-symmetric layout
          4.  
            RAID-5 logging
          5.  
            About layered volumes
      4. Online relayout
        1.  
          How online relayout works
        2.  
          Limitations of online relayout
        3.  
          Transformation characteristics
        4.  
          Transformations and volume length
      5. Volume resynchronization
        1.  
          Dirty flags
        2.  
          Resynchronization process
      6.  
        Hot-relocation
      7. Dirty region logging
        1.  
          Log subdisks and plexes
        2.  
          Sequential DRL
      8. Volume snapshots
        1.  
          Comparison of snapshot features
      9.  
        Support for atomic writes
      10. FastResync
        1.  
          How FastResync works
        2.  
          How non-persistent FastResync works with snapshots
        3.  
          How persistent FastResync works with snapshots
        4. DCO volume versioning
          1.  
            Instant snap (version 20) DCO volume layout
          2.  
            Version 0 DCO volume layout
        5.  
          Effect of growing a volume on the FastResync map
        6.  
          FastResync limitations
      11.  
        Volume sets
      12. How VxVM handles hardware clones or snapshots
        1.  
          How VxVM uses the unique disk identifier (UDID)
      13. Volume encryption
        1.  
          Using passphrases for encryption
        2.  
          Using Key Management Server for encryption
        3.  
          Recommendations for encryption
    4. How Veritas File System works
      1.  
        Veritas File System features
      2. Veritas File System performance enhancements
        1. Enhanced I/O performance
          1.  
            Enhanced I/O clustering
          2.  
            Veritas Volume Manager integration with Veritas File System for enhanced I/O performance
          3.  
            Application-specific parameters for enhanced I/O performance
        2.  
          Delayed allocation for extending writes
      3. Using Veritas File System
        1. Online system administration
          1.  
            About defragmentation
          2.  
            About file system resizing
        2. Application program interface
          1.  
            Expanded application facilities
    5. How Storage Foundation Cluster File System High Availability works
      1.  
        How Storage Foundation Cluster File System High Availability works
      2.  
        When to use Storage Foundation Cluster File System High Availability
      3. About Storage Foundation Cluster File System High Availability architecture
        1.  
          About the symmetric architecture
        2.  
          About Storage Foundation Cluster File System High Availability primary/secondary failover
        3.  
          About single-host file system semantics using Group Lock Manager
      4. About Veritas File System features supported in cluster file systems
        1.  
          Veritas File System features not in cluster file systems
      5.  
        About Cluster Server architecture
      6.  
        About the Storage Foundation Cluster File System High Availability namespace
      7.  
        About asymmetric mounts
      8.  
        About primary and secondary cluster nodes
      9.  
        Determining or moving primaryship
      10.  
        About synchronizing time on Cluster File Systems
      11.  
        About file system tunables
      12.  
        About setting the number of parallel fsck threads
      13.  
        Storage Checkpoints
      14.  
        About Storage Foundation Cluster File System High Availability backup strategies
      15.  
        About parallel I/O
      16.  
        About the I/O error handling policy for Cluster Volume Manager
      17.  
        About recovering from I/O failures
      18. About single network link and reliability
        1.  
          Configuring a low-priority link
      19.  
        Split-brain and jeopardy handling
      20. About I/O fencing
        1.  
          About I/O fencing for SFCFSHA in virtual machines that do not support SCSI-3 PR
        2. About preventing data corruption with I/O fencing
          1.  
            About SCSI-3 Persistent Reservations
          2.  
            About I/O fencing operations
        3. About I/O fencing components
          1.  
            About data disks
          2.  
            About coordination points
          3.  
            About preferred fencing
          4.  
            How preferred fencing works
        4.  
          About I/O fencing configuration files
        5.  
          How I/O fencing works in different event scenarios
        6. About server-based I/O fencing
          1.  
            I/O fencing enhancements provided by CP server
          2.  
            About the CP server database
          3.  
            About the CP server user types and privileges
        7. About secure communication between the SFCFSHA cluster and CP server
          1.  
            How secure communication works between the CP servers and the SFCFSHA clusters using the Veritas Product Authentication Services (AT)
          2. Security configuration details on CP server and SFCFSHA cluster
            1.  
              Settings in Veritas Product Authentication Services (AT) secure mode
            2.  
              Settings in non-secure mode
      21.  
        Storage Foundation Cluster File System High Availability and Veritas Volume Manager cluster functionality agents
      22.  
        Veritas Volume Manager cluster functionality
    6. How Cluster Volume Manager works
      1.  
        About the cluster functionality of VxVM
      2. Overview of clustering
        1.  
          Overview of cluster volume management
        2.  
          About private and shared disk groups
        3.  
          Activation modes of shared disk groups
        4.  
          Limitations of shared disk groups
      3. Cluster Volume Manager (CVM) tolerance to storage connectivity failures
        1.  
          Availability of shared disk group configuration copies
        2.  
          About redirection of application I/Os with CVM I/O shipping
        3. Storage disconnectivity and CVM disk detach policies
          1.  
            About the types of storage connectivity failures
          2.  
            About disk detach policies
          3.  
            How CVM handles local storage disconnectivity with the global detach policy
          4.  
            How CVM handles local storage disconnectivity with the local detach policy
          5.  
            Guidelines for choosing detach policies
          6.  
            How CVM detach policies interact with I/O shipping
          7.  
            CVM storage disconnectivity scenarios that are policy independent
        4.  
          Availability of cluster nodes and shared disk groups
      4. CVM initialization and configuration
        1. Cluster reconfiguration
          1.  
            vxclustadm utility
        2. Volume reconfiguration
          1.  
            vxconfigd daemon
          2.  
            vxconfigd daemon recovery
        3.  
          Node shutdown
        4.  
          Cluster shutdown
      5. Dirty region logging in cluster environments
        1.  
          How DRL works in a cluster environment
      6. Multiple host failover configurations
        1.  
          Import lock
        2.  
          Failover
        3.  
          Corruption of disk group configuration
      7. About Flexible Storage Sharing
        1.  
          Flexible Storage Sharing use cases
        2.  
          Limitations of Flexible Storage Sharing
      8. Application isolation in CVM environments with disk group sub-clustering
        1.  
          Behavioral changes in a disk group sub-cluster
        2.  
          Changes to CVM agents
  2. Section II. Provisioning storage
    1. Provisioning new storage
      1.  
        Provisioning new storage
      2.  
        Growing the existing storage by adding a new LUN
      3.  
        Growing the existing storage by growing the LUN
      4.  
        Displaying SFCFSHA information with vxlist
    2. Advanced allocation methods for configuring storage
      1. Customizing allocation behavior
        1.  
          Setting default values for vxassist
        2. Using rules to make volume allocation more efficient
          1.  
            Rule file format
          2.  
            Using rules to create a volume
        3. Understanding persistent attributes
          1.  
            Using persistent attributes
        4. Customizing disk classes for allocation
          1.  
            User-defined alias names for disk classes
          2.  
            User-defined precedence order for disk classes
          3.  
            User-defined disk classes
        5. Specifying allocation constraints for vxassist operations with the use clause and the require clause
          1.  
            About require constraints
          2.  
            About use constraints
          3.  
            Interaction of multiple require and use constraints
          4.  
            Examples of use and require constraints
        6.  
          Management of the use and require type of persistent attributes
      2. Creating volumes of a specific layout
        1.  
          Types of volume layouts
        2. Creating a mirrored volume
          1.  
            Creating a mirrored-concatenated volume
          2.  
            Creating a concatenated-mirror volume
        3. Creating a striped volume
          1.  
            Creating a mirrored-stripe volume
          2.  
            Creating a striped-mirror volume
        4.  
          Creating a RAID-5 volume
      3.  
        Creating a volume on specific disks
      4.  
        Creating volumes on specific media types
      5.  
        Creating encrypted volumes
      6.  
        Changing the encryption password
      7.  
        Viewing encrypted volumes
      8.  
        Automating startup for encrypted volumes
      9.  
        Configuring a Key Management Server
      10.  
        Specifying ordered allocation of storage to volumes
      11.  
        Site-based allocation
      12.  
        Changing the read policy for mirrored volumes
    3. Creating and mounting VxFS file systems
      1. Creating a VxFS file system
        1.  
          File system block size
        2.  
          Intent log size
      2.  
        Converting a file system to VxFS
      3. Mounting a VxFS file system
        1.  
          log mount option
        2.  
          delaylog mount option
        3. tmplog mount option
          1.  
            Logging mode persistence guarantees
        4.  
          logiosize mount option
        5.  
          nodatainlog mount option
        6.  
          blkclear mount option
        7.  
          mincache mount option
        8.  
          convosync mount option
        9. ioerror mount option
          1.  
            disable policy
          2.  
            wdisable policy and mwdisable policy
          3.  
            mdisable policy
        10. largefiles and nolargefiles mount options
          1.  
            Creating a file system with large files
          2.  
            Mounting a file system with large files
          3.  
            Managing a file system with large files
        11.  
          cio mount option
        12.  
          mntlock mount option
        13.  
          ckptautomnt mount option
        14.  
          Combining mount command options
      4.  
        Unmounting a file system
      5. Resizing a file system
        1.  
          Extending a file system using fsadm
        2.  
          Shrinking a file system
        3.  
          Reorganizing a file system
      6.  
        Displaying information on mounted file systems
      7.  
        Identifying file system types
      8. Monitoring free space
        1.  
          Monitoring fragmentation
    4. Extent attributes
      1. About extent attributes
        1.  
          Reservation: preallocating space to a file
        2.  
          Fixed extent size
        3.  
          How the fixed extent size works with the shared extents
        4. Other extent attribute controls
          1.  
            Extent attribute alignment
          2.  
            Extent attribute contiguity
          3.  
            Write operations beyond extent attribute reservation
          4.  
            Extent attribute reservation trimming
          5.  
            Extent attribute reservation persistence
          6.  
            Including an extent attribute reservation in the file
      2. Commands related to extent attributes
        1.  
          About failing to preserve extent attributes
  3. Section III. Administering multi-pathing with DMP
    1. Administering Dynamic Multi-Pathing
      1. Discovering and configuring newly added disk devices
        1.  
          Partial device discovery
        2. About discovering disks and dynamically adding disk arrays
          1.  
            How DMP claims devices
          2.  
            Disk categories
          3.  
            Adding DMP support for a new disk array
          4.  
            Enabling discovery of new disk arrays
        3.  
          About third-party driver coexistence
        4. How to administer the Device Discovery Layer
          1.  
            Listing all the devices including iSCSI
          2.  
            Listing all the Host Bus Adapters including iSCSI
          3.  
            Listing the ports configured on a Host Bus Adapter
          4.  
            Listing the targets configured from a Host Bus Adapter or a port
          5.  
            Listing the devices configured from a Host Bus Adapter and target
          6.  
            Getting or setting the iSCSI operational parameters
          7.  
            Listing all supported disk arrays
          8.  
            Displaying details about an Array Support Library
          9.  
            Excluding support for a disk array library
          10.  
            Re-including support for an excluded disk array library
          11.  
            Listing excluded disk arrays
          12.  
            Listing disks claimed in the DISKS category
          13.  
            Adding unsupported disk arrays to the DISKS category
          14.  
            Removing disks from the DISKS category
          15.  
            Foreign devices
      2.  
        Making devices invisible to VxVM
      3.  
        Making devices visible to VxVM
      4.  
        About enabling and disabling I/O for controllers and storage processors
      5.  
        About displaying DMP database information
      6.  
        Displaying the paths to a disk
      7. Administering DMP using the vxdmpadm utility
        1.  
          Retrieving information about a DMP node
        2.  
          Displaying consolidated information about the DMP nodes
        3.  
          Displaying the members of a LUN group
        4.  
          Displaying paths controlled by a DMP node, controller, enclosure, or array port
        5.  
          Displaying information about controllers
        6.  
          Displaying information about enclosures
        7.  
          Displaying information about array ports
        8.  
          Displaying information about devices controlled by third-party drivers
        9.  
          Displaying extended device attributes
        10.  
          Suppressing or including devices from VxVM control
        11. Gathering and displaying I/O statistics
          1.  
            Displaying cumulative I/O statistics
          2.  
            Displaying statistics for queued or erroneous I/Os
          3.  
            Examples of using the vxdmpadm iostat command
        12.  
          Setting the attributes of the paths to an enclosure
        13.  
          Displaying the redundancy level of a device or enclosure
        14.  
          Specifying the minimum number of active paths
        15.  
          Displaying the I/O policy
        16. Specifying the I/O policy
          1.  
            Scheduling I/O on the paths of an Asymmetric Active/Active or an ALUA array
          2.  
            Example of applying load balancing in a SAN
        17.  
          Disabling I/O for paths, controllers, array ports, or DMP nodes
        18.  
          Enabling I/O for paths, controllers, array ports, or DMP nodes
        19.  
          Renaming an enclosure
        20.  
          Configuring the response to I/O failures
        21.  
          Configuring the I/O throttling mechanism
        22.  
          Configuring Low Impact Path Probing (LIPP)
        23.  
          Configuring Subpaths Failover Groups (SFG)
        24.  
          Displaying recovery option values
        25.  
          Configuring DMP path restoration policies
        26.  
          Stopping the DMP path restoration thread
        27.  
          Displaying the status of the DMP path restoration thread
        28.  
          Configuring Array Policy Modules
    2. Dynamic Reconfiguration of devices
      1.  
        About online dynamic reconfiguration
      2. Reconfiguring a LUN online that is under DMP control using the Dynamic Reconfiguration tool
        1.  
          Removing LUNs dynamically from an existing target ID
        2.  
          Adding new LUNs dynamically to a target ID
        3.  
          Replacing LUNs dynamically from an existing target ID
        4.  
          Replacing a host bus adapter online
      3. Manually reconfiguring a LUN online that is under DMP control
        1.  
          Overview of manually reconfiguring a LUN
        2.  
          Manually removing LUNs dynamically from an existing target ID
        3.  
          Manually adding new LUNs dynamically to a new target ID
        4.  
          About detecting target ID reuse if the operating system device tree is not cleaned up
        5.  
          Scanning an operating system device tree after adding or removing LUNs
        6.  
          Manually cleaning up the operating system device tree after removing LUNs
      4.  
        Changing the characteristics of a LUN from the array side
      5.  
        Upgrading the array controller firmware online
      6.  
        Reformatting NVMe devices manually
    3. Managing devices
      1. Displaying disk information
        1.  
          About Media Format Discovery
        2.  
          Viewing information about the native layouts of operating system
        3. Viewing information about the disk sector size
          1.  
            Supported operating systems
        4.  
          Displaying disk information with vxdiskadm
      2. Changing the disk device naming scheme
        1.  
          Displaying the disk-naming scheme
        2.  
          Setting customized names for DMP nodes
        3.  
          Regenerating persistent device names
        4.  
          Changing device naming for enclosures controlled by third-party drivers
        5. About the Array Volume Identifier (AVID) attribute
          1.  
            Enclosure based naming with the Array Volume Identifier (AVID) attribute
      3.  
        About disk installation and formatting
      4. Adding and removing disks
        1. Adding a disk to VxVM
          1.  
            Disk reinitialization
          2.  
            Using vxdiskadd to put a disk under VxVM control
        2. Removing disks
          1.  
            Removing a disk with subdisks
          2.  
            Removing a disk with no subdisks
      5.  
        Renaming a disk
    4. Event monitoring
      1.  
        About the Dynamic Multi-Pathing (DMP) event source daemon (vxesd)
      2.  
        Fabric Monitoring and proactive error detection
      3.  
        Dynamic Multi-Pathing (DMP) discovery of iSCSI and SAN Fibre Channel topology
      4.  
        DMP event logging
      5.  
        Starting and stopping the Dynamic Multi-Pathing (DMP) event source daemon
  4. Section IV. Administering Storage Foundation Cluster File System High Availability
    1. Administering Storage Foundation Cluster File System High Availability and its components
      1.  
        About Storage Foundation Cluster File System High Availability administration
      2. Administering CFS
        1.  
          Adding CFS file systems to a VCS configuration
        2.  
          Uses of cfsmount to mount and cfsumount to unmount CFS file system
        3.  
          Removing CFS file systems from VCS configuration
        4.  
          Resizing CFS file systems
        5.  
          Verifying the status of CFS file system nodes and their mount points
        6.  
          Verifying the state of the CFS port
        7.  
          CFS agents and AMF support
        8.  
          CFS agent log files
        9.  
          CFS commands
        10. About the mount, fsclustadm, and fsadm commands
          1.  
            About the mount command
          2.  
            About the fsclustadm command
          3.  
            About the fsadm command
          4.  
            Running UNIX commands safely in a shared environment
        11.  
          Synchronizing system clocks on all nodes
        12.  
          Growing a CFS file system
        13.  
          About the /etc/fstab file
        14. When the CFS primary node fails
          1.  
            About distributing the workload on a cluster
        15.  
          About Storage Checkpoints on SFCFSHA
        16. About Snapshots on SFCFSHA
          1.  
            About cluster snapshot characteristics
          2.  
            Performance considerations
          3.  
            Creating a snapshot on a cluster
      3. Administering VCS
        1.  
          Configuring VCS to start Oracle with a specified Pfile
        2.  
          Verifying VCS configuration
        3.  
          Starting and stopping VCS
        4.  
          Configuring destination-based load balancing for LLT
      4. Administering CVM
        1.  
          Listing all the CVM shared disks
        2.  
          Viewing all available disks in a cluster
        3.  
          Establishing CVM cluster membership manually
        4.  
          Methods to control CVM master selection
        5. About setting cluster node preferences for master failover
          1.  
            Cluster node preference for master failover
          2.  
            Considerations for setting CVM node preferences
          3.  
            Setting the cluster node preference using the CVMCluster agent
          4.  
            Setting the cluster node preference value for master failover using the vxclustadm command
          5.  
            Example of setting the cluster node preference value for master failover
        6. About changing the CVM master manually
          1.  
            Considerations for changing the master manually
          2. Changing the CVM master manually
            1.  
              Errors during CVM master switching
        7.  
          Enabling the application isolation feature in CVM environments
        8.  
          Disabling the application isolation feature in a CVM cluster
        9.  
          Changing the disk group master manually
        10.  
          Setting the sub-cluster node preference value for master failover
        11.  
          Importing a shared disk group manually
        12.  
          Deporting a shared disk group manually
        13.  
          Mapping remote storage to a node in the cluster
        14.  
          Removing remote storage mappings from a node in the cluster
        15.  
          Starting shared volumes manually
        16.  
          Evaluating the state of CVM ports
        17.  
          Verifying if CVM is running in an SFCFSHA cluster
        18.  
          Verifying CVM membership state
        19.  
          Verifying the state of CVM shared disk groups
        20.  
          Verifying the activation mode
        21.  
          CVM log files
        22.  
          Requesting node status and discovering the master node
        23.  
          Determining if a LUN is in a shareable disk group
        24.  
          Listing shared disk groups
        25.  
          Creating a shared disk group
        26. Importing disk groups as shared
          1.  
            Forcibly importing a disk group
        27.  
          Converting a disk group from shared to private
        28.  
          Moving objects between shared disk groups
        29.  
          Splitting shared disk groups
        30.  
          Joining shared disk groups
        31.  
          Changing the activation mode on a shared disk group
        32.  
          Enabling I/O shipping for shared disk groups
        33.  
          Setting the detach policy for shared disk groups
        34.  
          Volume-level I/O shipping
        35.  
          Enabling or disabling volume-level I/O shipping
        36.  
          Controlling the CVM tolerance to storage disconnectivity
        37.  
          Handling cloned disks in a shared disk group
        38.  
          Creating volumes with exclusive open access by a node
        39.  
          Setting exclusive open access to a volume by a node
        40.  
          Displaying the cluster protocol version
        41.  
          Displaying the supported cluster protocol version range
        42.  
          Recovering volumes in shared disk groups
        43.  
          Obtaining cluster performance statistics
        44.  
          Administering CVM from the slave node
      5. Administering Flexible Storage Sharing
        1.  
          About Flexible Storage Sharing disk support
        2.  
          About the volume layout for Flexible Storage Sharing disk groups
        3.  
          Setting the host prefix
        4.  
          Exporting a disk for Flexible Storage Sharing
        5.  
          Setting the Flexible Storage Sharing attribute on a disk group
        6.  
          Using the host disk class and allocating storage
        7.  
          Administering mirrored volumes using vxassist
        8.  
          Displaying exported disks and network shared disk groups
        9.  
          Tuning LLT for memory and performance in FSS environments
      6. Administering ODM
        1.  
          Verifying the ODM port
        2.  
          Starting ODM
      7. About administering I/O fencing
        1. About the vxfentsthdw utility
          1.  
            General guidelines for using the vxfentsthdw utility
          2.  
            About the vxfentsthdw command options
          3. Testing the coordinator disk group using the -c option of vxfentsthdw
            1.  
              Removing and replacing a failed disk
          4.  
            Performing non-destructive testing on the disks using the -r option
          5.  
            Testing the shared disks using the vxfentsthdw -m option
          6.  
            Testing the shared disks listed in a file using the vxfentsthdw -f option
          7.  
            Testing all the disks in a disk group using the vxfentsthdw -g option
          8.  
            Testing a disk with existing keys
        2. About the vxfenadm utility
          1.  
            About the I/O fencing registration key format
          2.  
            Displaying the I/O fencing registration keys
          3.  
            Verifying that the nodes see the same disk
        3. About the vxfenclearpre utility
          1.  
            Removing preexisting keys
        4. About the vxfenswap utility
          1.  
            Replacing I/O fencing coordinator disks when the cluster is online
          2.  
            Replacing the coordinator disk group in a cluster that is online
          3.  
            Adding disks from a recovered site to the coordinator disk group
          4.  
            Refreshing lost keys on coordinator disks
        5. About administering the coordination point server
          1.  
            CP server operations (cpsadm)
          2.  
            Adding and removing SFCFSHA cluster entries from the CP server database
          3.  
            Adding and removing a SFCFSHA cluster node from the CP server database
          4.  
            Adding or removing CP server users
          5.  
            Listing the CP server users
          6.  
            Listing the nodes in all the SFCFSHA clusters
          7.  
            Listing the membership of nodes in the SFCFSHA cluster
          8.  
            Preempting a node
          9.  
            Registering and unregistering a node
          10.  
            Enable and disable access for a user to a SFCFSHA cluster
          11.  
            Starting and stopping CP server outside VCS control
          12.  
            Checking the connectivity of CP servers
          13.  
            Adding and removing virtual IP addresses and ports for CP servers at run-time
          14.  
            Taking a CP server database snapshot
          15.  
            Replacing coordination points for server-based fencing in an online cluster
          16.  
            Refreshing registration keys on the coordination points for server-based fencing
          17.  
            Deployment and migration scenarios for CP server
          18.  
            Migrating from non-secure to secure setup for CP server and SFCFSHA cluster communication
        6. About migrating between disk-based and server-based fencing configurations
          1.  
            Migrating from disk-based to server-based fencing in an online cluster
          2.  
            Migrating from server-based to disk-based fencing in an online cluster
          3. Migrating between fencing configurations using response files
            1.  
              Sample response file to migrate from disk-based to server-based fencing
            2.  
              Sample response file to migrate from server-based fencing to disk-based fencing
            3.  
              Sample response file to migrate from single CP server-based fencing to server-based fencing
            4.  
              Response file variables to migrate between fencing configurations
        7.  
          Enabling or disabling the preferred fencing policy
        8.  
          About I/O fencing log files
      8. Administering SFCFSHA global clusters
        1.  
          About setting up a disaster recovery fire drill
        2. About configuring the fire drill service group using the Fire Drill Setup wizard
          1.  
            Running the fire drill setup wizard
          2.  
            About configuring local attributes in the fire drill service group
        3.  
          Verifying a successful fire drill
        4.  
          Scheduling a fire drill
    2. Using Clustered NFS
      1. Understanding how Clustered NFS works
        1.  
          Basic design
        2. Internal Clustered NFS functionality
          1.  
            preonline trigger
          2.  
            postonline trigger
          3.  
            postoffline trigger
          4.  
            Actions
      2.  
        Sample use cases
      3.  
        cfsshare manual page
      4. Configure and unconfigure Clustered NFS
        1. Configure Clustered NFS
          1.  
            Service group cfsnfssg_dummy
        2.  
          Unconfiguring Clustered NFS
      5. Administering Clustered NFS
        1.  
          Displaying the NFS shared CFS file systems
        2.  
          Sharing a CFS file system previously added to VCS
        3.  
          Unsharing the previous shared CFS file system
        4.  
          Adding an NFS shared CFS file system to VCS
        5.  
          Deleting the NFS shared CFS file system from VCS
        6.  
          Adding a virtual IP address to VCS
        7.  
          Deleting a virtual IP address from VCS
        8.  
          Adding an IPv6 virtual IP address to VCS in a pure IPv6 configuration
        9.  
          Deleting an IPv6 virtual IP address from VCS in a pure IPv6 configuration
        10.  
          Adding a virtual IP address to VCS in a dual-stack configuration
        11.  
          Deleting a virtual IP address from VCS in a dual-stack configuration
        12.  
          Changing the share options associated with an NFS share
        13.  
          Sharing a file system checkpoint
        14. Samples for configuring a Clustered NFS
          1.  
            Sample 1 uses the cfsshare command to add a CFS file system to VCS configuration
          2.  
            Sample 2 uses the cfsshare command to configure
        15.  
          Sample main.cf file
      6.  
        How to mount an NFS-exported file system on the NFS clients
      7.  
        Debugging Clustered NFS
    3. Using Common Internet File System
      1.  
        About CIFS
      2.  
        Requirements for CIFS
      3.  
        Understanding how Samba works
      4.  
        Configuring Clustered NFS and CIFS on CFS
      5.  
        cfsshare manual page
      6.  
        Configuring CIFS in user mode
      7.  
        Configuring CIFS in domain mode
      8.  
        Configuring CIFS in ads mode
      9. Administering CIFS
        1.  
          Sharing a CFS file system previously added to VCS
        2.  
          Migrating a CFS file system previously added to VCS from IPv4 to IPv6
        3.  
          Adding dual-stack support to an existing share
        4.  
          Removing the dual stack support from an existing share
        5.  
          Unsharing the previous shared CFS file system
        6.  
          Sample main.cf file for CIFS
      10.  
        Debugging CIFS
    4. Deploying Oracle with Clustered NFS
      1.  
        Tasks for deploying Oracle with CNFS
      2. About deploying Oracle with CNFS
        1.  
          VCS service groups in a CNFS environment
      3.  
        Configuring the CNFS server for Oracle
      4. Configuring Oracle for Direct NFS
        1.  
          Recommended mount options for NFS
        2.  
          About oranfstab
      5.  
        Verifying Oracle Direct NFS usage
    5. Using SFCFSHA utilities for the Oracle database
      1.  
        About SFCFSHA utilities for the Oracle database
      2.  
        Installing SFCFSHA utilities for the Oracle database
      3.  
        Using the svsdbsnap command
    6. Administering sites and remote mirrors
      1. About sites and remote mirrors
        1.  
          About site-based allocation
        2.  
          About site consistency
        3.  
          About site tags
        4.  
          About the site read policy
        5.  
          About disk detach policies for campus clusters
      2.  
        Making an existing disk group site consistent
      3.  
        Configuring a new disk group as a Remote Mirror configuration
      4. Fire drill - testing the configuration
        1.  
          Simulating site failure
        2.  
          Verifying the secondary site
        3.  
          Recovery from simulated site failure
      5. Changing the site name
        1.  
          Resetting the site name for a host
      6. Administering the Remote Mirror configuration
        1.  
          Configuring site tagging for disks or enclosures
        2.  
          Configuring automatic site tagging for a disk group
        3.  
          Configuring site consistency on a volume
      7.  
        Examples of storage allocation by specifying sites
      8.  
        Displaying site information
      9. Failure and recovery scenarios
        1.  
          Recovering from a loss of site connectivity
        2.  
          Recovering from host failure
        3.  
          Recovering from storage failure
        4.  
          Recovering from site failure
        5.  
          Recovering from disruption of connectivity to storage at the remote sites from hosts on all sites
        6.  
          Recovering from disruption to connectivity to storage at all sites from the hosts at a site
        7.  
          Automatic site reattachment
    7. Administering iSCSI with SFCFSHA
      1.  
        About iSCSI with SFCFSHA
      2.  
        Prerequisites
      3.  
        svsiscsiadm manual page
      4. Administering iSCSI with SFCFSHA
        1.  
          Configuring the cluster for iSCSI
        2.  
          Creating targets
        3.  
          Adding LUNs to targets
        4.  
          Removing LUNs
        5.  
          Removing targets
        6.  
          Unconfiguring the cluster for iSCSI
        7.  
          Create a clone with FileSnap
        8.  
          Add iSCSI-backed SFCFSHA storage shares to vCenter and ESX
        9.  
          Online targets
        10.  
          Offline targets
        11.  
          Display LUN status
    8. Administering datastores with SFCFSHA
      1.  
        About administering datastores with SFCFSHA
      2.  
        About svsdatastore utility
      3.  
        Administering NFS datastores
  5. Section V. Optimizing I/O performance
    1. Veritas File System I/O
      1.  
        About Veritas File System I/O
      2. Buffered and Direct I/O
        1. Direct I/O
          1.  
            Direct I/O requirements
          2.  
            Direct I/O versus synchronous I/O
          3.  
            Direct I/O CPU overhead
          4.  
            Discovered Direct I/O
        2.  
          Unbuffered I/O
        3. Data synchronous I/O
          1.  
            Data synchronous I/O vs. synchronous I/O
      3.  
        Concurrent I/O
      4.  
        Cache advisories
      5.  
        Freezing and thawing a file system
      6.  
        Getting the I/O size
      7.  
        About Veritas InfoScale product components database accelerators
    2. Veritas Volume Manager I/O
      1.  
        Veritas Volume Manager throttling of administrative I/O
      2. Managing application I/O workloads using maximum IOPS settings
        1.  
          About application volume groups
        2.  
          Creating application volume groups
        3.  
          Viewing the list of application volume groups
        4.  
          Setting the maximum IOPS threshold on application volume groups
        5.  
          Viewing the IOPS statistics for application volume groups
        6.  
          Removing the maximum IOPS setting from application volume groups
        7.  
          Adding volumes to an application volume group
        8.  
          Removing volumes from an application volume group
        9.  
          Removing an application volume group
  6. Section VI. Veritas Extension for Oracle Disk Manager
    1. Using Veritas Extension for Oracle Disk Manager
      1. About Oracle Disk Manager
        1. How Oracle Disk Manager improves database performance
          1.  
            About kernel asynchronous I/O support
          2.  
            About direct I/O support and avoiding double buffering
          3.  
            About avoiding kernel write locks on database files
          4.  
            About supporting many concurrent I/Os in one system call
          5.  
            About avoiding duplicate file open calls
          6.  
            About allocating contiguous data files
      2.  
        About Oracle Disk Manager and Storage Foundation Cluster File System High Availability
      3. About Oracle Disk Manager and Oracle Managed Files
        1.  
          How Oracle Disk Manager works with Oracle Managed Files
      4.  
        Setting up Veritas Extension for Oracle Disk Manager
      5.  
        Configuring Veritas Extension for Oracle Disk Manager
      6.  
        Preparing existing database storage for Oracle Disk Manager
      7.  
        Verifying that Oracle Disk Manager is configured
      8.  
        Disabling the Oracle Disk Manager feature
      9. Using Cached ODM
        1.  
          Enabling Cached ODM for file systems
        2.  
          Modifying Cached ODM settings for individual files
        3.  
          Adding Cached ODM settings via the cachemap
        4.  
          Making the caching settings persistent across mounts
  7. Section VII. Using Point-in-time copies
    1. Understanding point-in-time copy methods
      1.  
        About point-in-time copies
      2. When to use point-in-time copies
        1.  
          Implementing point-in time copy solutions on a primary host
        2.  
          Implementing off-host point-in-time copy solutions
      3. About Storage Foundation point-in-time copy technologies
        1.  
          Comparison of Point-in-time copy solutions
      4. Volume-level snapshots
        1.  
          Persistent FastResync of volume snapshots
        2.  
          Data integrity in volume snapshots
        3.  
          Third-mirror break-off snapshots
        4. Space-optimized instant volume snapshots
          1.  
            How space-optimized instant snapshots work
        5.  
          Choices for snapshot resynchronization
        6.  
          Disk group split/join
      5. Storage Checkpoints
        1.  
          How Storage Checkpoints differ from snapshots
        2. How a Storage Checkpoint works
          1.  
            Copy-on-write
          2. Storage Checkpoint visibility
            1.  
              Storage Checkpoints and 64-bit inode numbers
        3. Types of Storage Checkpoints
          1.  
            Data Storage Checkpoints
          2.  
            Nodata Storage Checkpoints
          3.  
            Removable Storage Checkpoints
          4.  
            Non-mountable Storage Checkpoints
      6. About FileSnaps
        1.  
          Properties of FileSnaps
        2.  
          Concurrent I/O to FileSnaps
        3.  
          Copy-on-write and FileSnaps
        4.  
          Reading from FileSnaps
        5.  
          Block map fragmentation and FileSnaps
        6.  
          Backup and FileSnaps
      7. About snapshot file systems
        1.  
          How a snapshot file system works
    2. Administering volume snapshots
      1.  
        About volume snapshots
      2. Traditional third-mirror break-off snapshots
        1. Creating traditional third-mirror break-off snapshots
          1.  
            Converting a plex into a snapshot plex
          2.  
            Creating multiple snapshots with the vxassist command
          3.  
            Reattaching a snapshot volume
          4.  
            Adding plexes to a snapshot volume
          5.  
            Dissociating a snapshot volume
          6.  
            Displaying snapshot information
      3. Full-sized instant snapshots
        1. Creating instant snapshots
          1. Adding an instant snap DCO and DCO volume
            1.  
              Creating a shared cache object
            2.  
              Creating a volume for use as a full-sized instant or linked break-off snapshot
            3.  
              Upgrading the instant snap Data Change Objects (DCOs) and DCO volumes for a VxVM volume
          2.  
            Creating and managing space-optimized instant snapshots
          3.  
            Creating and managing full-sized instant snapshots
          4.  
            Creating and managing third-mirror break-off snapshots
          5.  
            Creating and managing linked break-off snapshot volumes
          6.  
            Creating multiple instant snapshots
          7.  
            Creating instant snapshots of volume sets
          8.  
            Adding snapshot mirrors to a volume
          9.  
            Removing a snapshot mirror
          10.  
            Removing a linked break-off snapshot volume
          11.  
            Adding a snapshot to a cascaded snapshot hierarchy
          12.  
            Refreshing an instant space-optimized snapshot
          13.  
            Reattaching an instant full-sized or plex break-off snapshot
          14.  
            Reattaching a linked break-off snapshot volume
          15.  
            Restoring a volume from an instant space-optimized snapshot
          16.  
            Dissociating an instant snapshot
          17.  
            Removing an instant snapshot
          18.  
            Splitting an instant snapshot hierarchy
          19.  
            Displaying instant snapshot information
          20. Controlling instant snapshot synchronization
            1.  
              Improving the performance of snapshot synchronization
          21.  
            Listing the snapshots created on a cache
          22.  
            Tuning the autogrow attributes of a cache
          23.  
            Monitoring and displaying cache usage
          24.  
            Growing and shrinking a cache
          25.  
            Removing a cache
      4.  
        Linked break-off snapshots
      5. Cascaded snapshots
        1.  
          Creating a snapshot of a snapshot
      6.  
        Creating multiple snapshots
      7.  
        Restoring the original volume from a snapshot
      8. Adding a version 0 DCO and DCO volume
        1.  
          Specifying storage for version 0 DCO plexes
        2.  
          Removing a version 0 DCO and DCO volume
        3.  
          Reattaching a version 0 DCO and DCO volume
    3. Administering Storage Checkpoints
      1.  
        About Storage Checkpoints
      2. Storage Checkpoint administration
        1.  
          Creating a Storage Checkpoint
        2.  
          Removing a Storage Checkpoint
        3.  
          Accessing a Storage Checkpoint
        4. Converting a data Storage Checkpoint to a nodata Storage Checkpoint
          1.  
            Showing the difference between a data and a nodata Storage Checkpoint
          2.  
            Converting multiple Storage Checkpoints
          3.  
            Creating a delayed nodata Storage Checkpoint
        5.  
          Enabling and disabling Storage Checkpoint visibility
      3.  
        Storage Checkpoint space management considerations
      4.  
        Restoring from a Storage Checkpoint
      5.  
        Storage Checkpoint quotas
    4. Administering FileSnaps
      1. FileSnap creation
        1.  
          FileSnap creation over Network File System
      2.  
        Using FileSnaps
      3. Using FileSnaps to create point-in-time copies of files
        1.  
          Using FileSnaps to provision virtual desktops
        2.  
          Using FileSnaps to optimize write intensive applications for virtual machines
        3.  
          Using FileSnaps to create multiple copies of data instantly
        4.  
          An example to perform FileSnap
      4.  
        Comparison of the logical size output of the fsadm -S shared, du, and df commands
    5. Administering snapshot file systems
      1.  
        Snapshot file system backups
      2.  
        Snapshot file system performance
      3.  
        About snapshot file system disk structure
      4.  
        Differences between snapshots and Storage Checkpoints
      5.  
        Creating a snapshot file system
  8. Section VIII. Optimizing storage with Storage Foundation Cluster File System High Availability
    1. Understanding storage optimization solutions in Storage Foundation Cluster File System High Availability
      1.  
        About thin provisioning
      2.  
        About thin optimization solutions in Storage Foundation Cluster File System High Availability
      3. About SmartMove
        1.  
          SmartMove for thin provisioning
      4.  
        About the Thin Reclamation feature
      5.  
        About reclaiming space on Solid State Devices (SSDs) with the TRIM operation
      6.  
        Determining when to reclaim space on a thin reclamation LUN
      7.  
        How automatic reclamation works
    2. Migrating data from thick storage to thin storage
      1.  
        About using SmartMove to migrate to Thin Storage
      2.  
        Migrating to thin provisioning
    3. Maintaining Thin Storage with Thin Reclamation
      1. Reclamation of storage on thin reclamation arrays
        1.  
          About Thin Reclamation of a disk, a disk group, or an enclosure
        2.  
          About Thin Reclamation of a file system
      2. Identifying thin and thin reclamation LUNs
        1.  
          Displaying detailed information about reclamation commands
      3.  
        Displaying VxFS file system usage on thin reclamation LUNs
      4.  
        Reclaiming space on a file system
      5.  
        Reclaiming space on a disk, disk group, or enclosure
      6.  
        About the reclamation log file
      7.  
        Monitoring Thin Reclamation using the vxtask command
      8.  
        Configuring automatic reclamation
    4. Veritas InfoScale 4k sector device support solution
      1.  
        About 4K sector size technology
      2.  
        Veritas InfoScale unsupported configurations
      3.  
        Migrating VxFS file system from 512-bytes sector size devices to 4K sector size devices
  9. Section IX. Maximizing storage utilization
    1. Understanding storage tiering with SmartTier
      1. About SmartTier
        1.  
          About VxFS multi-volume file systems
        2.  
          About VxVM volume sets
        3.  
          About volume tags
        4.  
          SmartTier file management
        5.  
          SmartTier sub-file object management
      2.  
        How the SmartTier policy works with the shared extents
      3.  
        SmartTier in a High Availability (HA) environment
    2. Creating and administering volume sets
      1.  
        About volume sets
      2.  
        Creating a volume set
      3.  
        Adding a volume to a volume set
      4.  
        Removing a volume from a volume set
      5.  
        Listing details of volume sets
      6.  
        Stopping and starting volume sets
      7. Managing raw device nodes of component volumes
        1.  
          Enabling raw device access when creating a volume set
        2.  
          Displaying the raw device access settings for a volume set
        3.  
          Controlling raw device access for an existing volume set
    3. Multi-volume file systems
      1.  
        About multi-volume file systems
      2.  
        About volume types
      3. Features implemented using multi-volume file system (MVFS) support
        1.  
          Volume availability
      4.  
        Creating multi-volume file systems
      5.  
        Converting a single volume file system to a multi-volume file system
      6. Adding a volume to and removing a volume from a multi-volume file system
        1.  
          Adding a volume to a multi-volume file system
        2.  
          Removing a volume from a multi-volume file system
        3.  
          Forcibly removing a volume in a multi-volume file system
        4.  
          Moving volume 0 in a multi-volume file system
      7. Volume encapsulation
        1.  
          Encapsulating a volume
        2.  
          Deencapsulating a volume
      8.  
        Reporting file extents
      9. Load balancing
        1.  
          Defining and assigning a load balancing allocation policy
        2.  
          Rebalancing extents
      10.  
        Converting a multi-volume file system to a single volume file system
    4. Administering SmartTier
      1. About SmartTier
        1.  
          About compressing files with SmartTier
      2.  
        Supported SmartTier document type definitions
      3. Placement classes
        1.  
          Tagging volumes as placement classes
        2.  
          Listing placement classes
      4. Administering placement policies
        1.  
          Assigning a placement policy
        2.  
          Unassigning a placement policy
        3.  
          Analyzing the space impact of enforcing a placement policy
        4.  
          Querying which files will be affected by enforcing a placement policy
        5.  
          Enforcing a placement policy
        6.  
          Validating a placement policy
      5.  
        File placement policy grammar
      6. File placement policy rules
        1.  
          SELECT statement
        2.  
          CREATE statement
        3. RELOCATE statement
          1.  
            Specifying the I/O temperature relocation criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            RELOCATE statement examples
        4. DELETE statement
          1.  
            DELETE statement examples
        5. COMPRESS statement
          1.  
            Specifying the I/O temperature compression criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            COMPRESS statement examples
        6. UNCOMPRESS statement
          1.  
            Specifying the I/O temperature uncompression criterion
          2.  
            Prefer attribute
          3.  
            Average I/O activity criteria
          4.  
            UNCOMPRESS statement examples
      7.  
        Calculating I/O temperature and access temperature
      8. Multiple criteria in file placement policy rule statements
        1.  
          Multiple file selection criteria in SELECT statement clauses
        2.  
          Multiple placement classes in <ON> clauses of CREATE statements and in <TO> clauses of RELOCATE statements
        3.  
          Multiple placement classes in <FROM> clauses of RELOCATE and DELETE statements
        4.  
          Multiple conditions in <WHEN> clauses of RELOCATE and DELETE statements
      9.  
        File placement policy rule and statement ordering
      10.  
        File placement policies and extending files
      11. Using SmartTier with solid state disks
        1.  
          Fine grain temperatures with solid state disks
        2.  
          Prefer mechanism with solid state disks
        3.  
          Average I/O activity with solid state disks
        4.  
          Frequent SmartTier scans with solid state disks
        5.  
          Quick identification of cold files with solid state disks
        6.  
          Example placement policy when using solid state disks
      12. Sub-file relocation
        1.  
          Moving sub-file data of files to specific target tiers
    5. Administering hot-relocation
      1.  
        About hot-relocation
      2. How hot-relocation works
        1.  
          Partial disk failure mail messages
        2.  
          Complete disk failure mail messages
        3.  
          How space is chosen for relocation
        4. How hot-relocation works in FSS environments
          1.  
            Hot-relocation scenarios with DAS storage
          2.  
            Hot-relocation scenarios in fully or partially shared FSS environments
      3.  
        Configuring a system for hot-relocation
      4.  
        Displaying spare disk information
      5.  
        Marking a disk as a hot-relocation spare
      6.  
        Removing a disk from use as a hot-relocation spare
      7.  
        Excluding a disk from hot-relocation use
      8.  
        Making a disk available for hot-relocation use
      9.  
        Configuring hot-relocation to use only spare disks
      10. Moving relocated subdisks
        1. Moving relocated subdisks using vxunreloc
          1.  
            Moving hot-relocated subdisks back to their original disk
          2.  
            Moving hot-relocated subdisks back to a different disk
          3.  
            Forcing hot-relocated subdisks to accept different offsets
          4.  
            Examining which subdisks were hot-relocated from a disk
        2.  
          Restarting vxunreloc after errors
      11.  
        Modifying the behavior of hot-relocation
    6. Deduplicating data
      1. About deduplicating data
        1.  
          About deduplication chunk size
        2.  
          Deduplication and file system performance
        3.  
          About the deduplication scheduler
      2. Deduplicating data
        1.  
          Enabling and disabling deduplication on a file system
        2.  
          Scheduling deduplication of a file system
        3.  
          Performing a deduplication dry run
        4.  
          Querying the deduplication status of a file system
        5.  
          Starting and stopping the deduplication scheduler daemon
      3.  
        Deduplication results
      4.  
        Deduplication supportability
      5.  
        Deduplication use cases
      6.  
        Deduplication limitations
    7. Compressing files
      1. About compressing files
        1.  
          About the compressed file format
        2.  
          About the file compression attributes
        3.  
          About the file compression block size
      2.  
        Compressing files with the vxcompress command
      3.  
        Interaction of compressed files and other commands
      4.  
        Interaction of compressed files and other features
      5.  
        Interaction of compressed files and applications
      6. Use cases for compressing files
        1. Compressed files and databases
          1.  
            Supported database versions and environment
          2.  
            Compressing archive logs
          3.  
            Compressing read-only tablespaces
          4.  
            Compressing infrequently accessed table partitions
          5.  
            Compressing infrequently accessed datafiles
          6.  
            Best practices for compressing files in an Oracle database
        2.  
          Compressing all files that meet the specified criteria
  10. Section X. Administering storage
    1. Managing volumes and disk groups
      1. Rules for determining the default disk group
        1.  
          Displaying the system-wide boot disk group
        2.  
          Displaying and specifying the system-wide default disk group
      2. Moving volumes or disks
        1.  
          Moving volumes from a VxVM disk
        2.  
          Moving disks between disk groups
        3. Reorganizing the contents of disk groups
          1.  
            Limitations of disk group split and join
          2. Listing objects potentially affected by a move
            1.  
              Moving DCO volumes between disk groups
          3.  
            Moving objects between disk groups
          4.  
            Splitting disk groups
          5.  
            Joining disk groups
      3. Monitoring and controlling tasks
        1.  
          Specifying task tags
        2. Managing tasks with vxtask
          1.  
            vxtask operations
          2.  
            Using the vxtask command
      4.  
        Using vxnotify to monitor configuration changes
      5. Performing online relayout
        1.  
          Permitted relayout transformations
        2.  
          Specifying a non-default layout
        3.  
          Specifying a plex for relayout
        4.  
          Tagging a relayout operation
        5.  
          Viewing the status of a relayout
        6.  
          Controlling the progress of a relayout
      6. Adding a mirror to a volume
        1.  
          Mirroring all volumes
        2.  
          Mirroring volumes on a VxVM disk
      7.  
        Configuring SmartMove
      8.  
        Removing a mirror
      9.  
        Setting tags on volumes
      10. Managing disk groups
        1. Disk group versions
          1.  
            Upgrading the disk group version
          2.  
            Creating a disk group with an earlier disk group version
        2. Displaying disk group information
          1.  
            Displaying free space in a disk group
        3.  
          Creating a disk group
        4.  
          Removing a disk from a disk group
        5.  
          Deporting a disk group
        6. Importing a disk group
          1.  
            Setting the automatic recovery of volumes
        7.  
          Handling of minor number conflicts
        8. Moving disk groups between systems
          1.  
            Handling errors when importing disks
          2.  
            Reserving minor numbers for disk groups
          3.  
            Compatibility of disk groups between platforms
        9. Importing a disk group containing hardware cloned disks
          1.  
            Considerations when using EMC CLARiiON SNAPSHOT LUNs
          2.  
            Writing a new UDID to a disk
          3.  
            Importing the existing disk group with only the cloned disks
          4.  
            Importing the cloned disks as a new standard disk group
          5.  
            Importing a set of cloned disks with tags
        10.  
          Setting up configuration database copies (metadata) for a disk group
        11.  
          Renaming a disk group
        12. Handling conflicting configuration copies
          1.  
            Example of a serial split brain condition in a cluster
          2.  
            Correcting conflicting configuration information
        13.  
          Disabling a disk group
        14. Destroying a disk group
          1.  
            Recovering a destroyed disk group
        15. Backing up and restoring disk group configuration data
          1.  
            Backing up and restoring Flexible Storage Sharing disk group configuration data
        16.  
          Working with existing ISP disk groups
      11. Managing plexes and subdisks
        1. Reattaching plexes
          1.  
            Automatic plex reattachment
          2.  
            Reattaching a plex manually
        2.  
          Plex synchronization
      12. Erasure coding in Veritas InfoScale storage environments
        1.  
          Using Distributed Parity
        2.  
          Allocating logs on different disks
        3.  
          Limitations of erasure coded volumes
        4. Erasure coding deployment scenarios
          1.  
            Creating erasure coded volumes on a single node with DAS or SAN storage
          2.  
            Creating erasure coded volumes in FSS environments
        5.  
          I/O operations on erasure coded volumes
        6.  
          Recovery of erasure coded volumes
        7.  
          Relocation of faulted storage containing erasure coded volumes
        8.  
          Initializing an erasure coded volume
        9.  
          Resizing an erasure coded volume
        10. Customized failure domain
          1.  
            Defining custom failure domain
          2.  
            Using Stripe Group and Stripe Confined Group while creating erasure coded volume
          3. Resize and relocation with Customized Failure Domain
            1.  
              Expected behavior when stripe group and stripe confined group both are specified
      13. Decommissioning storage
        1.  
          Removing a volume
        2.  
          Removing a disk from VxVM control
        3.  
          About shredding data
        4.  
          Shredding a VxVM disk
        5.  
          Failed disk shred operation results in a disk with no label
        6. Removing and replacing disks
          1.  
            Replacing a failed or removed disk
    2. Rootability
      1.  
        Root Disk Encapsulation (RDE) is not supported
      2. Encapsulating a disk
        1.  
          Failure of disk encapsulation
        2. Using nopriv disks for encapsulation
          1.  
            Creating a nopriv disk for encapsulation
          2.  
            Creating volumes for other partitions on a nopriv disk
      3.  
        Device name format changes in RHEL 7 environments after encapsulation
      4. Rootability
        1.  
          Restrictions on using rootability with Linux
        2. Sample supported root disk layouts for encapsulation
          1.  
            Example 1: supported root disk layouts for encapsulation
          2.  
            Example 2: supported root disk layouts for encapsulation
          3.  
            Example 3: supported root disk layouts for encapsulation
          4.  
            Example 4: supported root disk layouts for encapsulation
          5.  
            Sample unsupported root disk layouts for encapsulation
          6.  
            Example 1: unsupported root disk layouts for encapsulation
          7.  
            Example 2: unsupported root disk layouts for encapsulation
          8.  
            Example 3: unsupported root disk layouts for encapsulation
          9.  
            Example 4: unsupported root disk layouts for encapsulation
        3.  
          Booting root volumes
        4.  
          Boot-time volume restrictions
        5.  
          Creating redundancy for the root disk
        6.  
          Creating an archived back-up root disk for disaster recovery
        7. Encapsulating and mirroring the root disk
          1.  
            Allocation of METADATA Subdisks During Root Disk Encapsulation
        8.  
          Upgrading the kernel on a root encapsulated system
      5. Administering an encapsulated boot disk
        1.  
          Creating a snapshot of an encapsulated boot disk
      6.  
        Unencapsulating the root disk
    3. Quotas
      1.  
        About Veritas File System quota limits
      2.  
        About quota files on Veritas File System
      3.  
        About Veritas File System quota commands
      4.  
        About quota checking with Veritas File System
      5. Using Veritas File System quotas
        1.  
          Turning on Veritas File System quotas
        2.  
          Turning on Veritas File System quotas at mount time
        3.  
          Editing Veritas File System quotas
        4.  
          Modifying Veritas File System quota time limits
        5.  
          Viewing Veritas File System disk quotas and usage
        6.  
          Displaying blocks owned by users or groups
        7.  
          Turning off Veritas File System quotas
        8.  
          Support for 64-bit Quotas
    4. File Change Log
      1.  
        About Veritas File System File Change Log
      2.  
        About the Veritas File System File Change Log file
      3.  
        Veritas File System File Change Log administrative interface
      4.  
        Veritas File System File Change Log programmatic interface
      5.  
        Summary of Veritas File System File Change Log API functions
  11. Section XI. Reference
    1. Appendix A. Reverse path name lookup
      1.  
        About reverse path name lookup
    2. Appendix B. Tunable parameters
      1.  
        About tuning Storage Foundation Cluster File System High Availability
      2. Tuning the VxFS file system
        1.  
          Tuning inode table size
        2.  
          Tuning performance optimization of inode allocation
        3.  
          Tuning file system parallel direct I/O
        4.  
          Partitioned directories
        5.  
          Veritas Volume Manager maximum I/O size
        6.  
          Native asynchronous I/O with cloned processes
      3.  
        DMP tunable parameters
      4. Methods to change Dynamic Multi-Pathing tunable parameters
        1.  
          Changing the values of DMP parameters with the vxdmpadm settune command line
        2. About tuning Dynamic Multi-Pathing (DMP) with templates
          1.  
            DMP tuning templates
          2.  
            Example DMP tuning template
          3.  
            Tuning a DMP host with a configuration attribute template
          4.  
            Managing the DMP configuration files
          5.  
            Resetting the DMP tunable parameters and attributes to the default values
          6.  
            DMP tunable parameters and attributes that are supported for templates
      5. Tunable parameters for VxVM
        1.  
          Tunable parameters for core VxVM
        2.  
          Tunable parameters for FlashSnap (FMR)
        3.  
          Tunable parameters for CVM
        4.  
          Tunable parameters for VVR
        5.  
          Tunable parameters for hot-relocation in FSS environments
        6.  
          Points to note when changing the values of the VVR tunables
      6. Methods to change Veritas Volume Manager tunable parameters
        1.  
          Changing the values of the Veritas Volume Manager tunable parameters using the vxtune command line
        2.  
          Changing the value of the Veritas Volume Manager tunable parameters using templates
      7. About LLT tunable parameters
        1.  
          About LLT timer tunable parameters
        2.  
          About LLT flow control tunable parameters
        3.  
          Setting LLT timer tunable parameters
      8. About GAB tunable parameters
        1.  
          About GAB load-time or static tunable parameters
        2.  
          About GAB run-time or dynamic tunable parameters
      9. About VXFEN tunable parameters
        1.  
          Configuring the VXFEN module parameters
      10.  
        About AMF tunable parameters
    3. Appendix C. Command reference
      1.  
        Command completion for Veritas commands
      2.  
        Veritas Volume Manager command reference
      3.  
        CVM commands supported for executing on the slave node
      4. Veritas Volume Manager manual pages
        1.  
          Section 1M - administrative commands
        2.  
          Section 4 - file formats
      5.  
        Veritas File System command summary
      6.  
        Veritas File System manual pages
      7.  
        SmartIO command reference
    4. Appendix D. Creating a starter database
      1. Creating a database for Oracle 11gr2
        1.  
          Creating database tablespace on shared raw VxVM volumes

About Storage Foundation Cluster File System High Availability

Storage Foundation Cluster File System High Availability (SFCFSHA) is a storage management solution to enable robust, manageable, and scalable storage deployment. SFCFSHA maximizes your storage efficiency, availability, agility, and performance across heterogeneous server and storage platforms. SFCFSHA extends Storage Foundation to support shared data in a storage area network (SAN) environment. Using SFCFSHA, multiple servers can concurrently access shared storage and files transparently to applications. SFCFSHA also provides increased automation and intelligent management of availability and performance.

Storage Foundation Cluster File System High Availability consists of product components and features that can be used individually and together to improve performance, resilience and ease of management for your storage and applications.

Table: Storage Foundation Cluster File System High Availability components describes the components of Storage Foundation Cluster File System High Availability.

Table: Storage Foundation Cluster File System High Availability components

Component

Description

Dynamic Multi-Pathing (DMP)

Manages the I/O performance and path availability of the physical storage devices that are configured on the system.

DMP creates DMP metadevices across all of the paths to each LUN. DMP uses the DMP metadevices to manage path failover and I/O load balancing across the paths to the physical devices.

DMP metadevices provide the foundation for Veritas Volume Manager (VxVM) and Veritas File System (VxFS). DMP also supports native operating system volumes and file systems on DMP devices.

Veritas Volume Manager (VxVM)

Provides a logical storage abstraction layer or storage management between your operating system devices and your applications.

VxVM enables you to create logical devices called volumes on the physical disks and LUNs.The applications such as file systems or databases access the volumes as if the volumes were physical devices but without the physical limitations.

VxVM features enable you to configure, share, manage, and optimize storage I/O performance online without interrupting data availability. Additional VxVM features enhance fault tolerance and fast recovery from disk failure or storage array failure.

Cluster Volume Manager (CVM)

Extends the VxVM logical volume layer for use with multiple systems in a cluster.

Each system, or cluster node, can share access to the same logical devices or volumes. Each node sees the same logical storage in the same state.

CVM supports VxVM features that improve performance, such as striping, mirroring, and creating snapshots. You manage the shared storage using the standard VxVM commands from one node in the cluster. All other nodes immediately recognize any changes in disk group and volume configuration with no user interaction.

Veritas File System (VxFS)

Provides a high-performance journaling file system.

VxFS is designed for use in operating environments that deal with large amounts of data and that require high performance and continuous availability.

VxFS features provide quick-recovery for applications, scalable performance, continuous availability, increased I/O throughput, and increased structural integrity.

Cluster File System (CFS)

Extends the VxFS file system for use with multiple systems (or nodes) in a cluster.

CFS enables you to simultaneously mount the same file system on multiple nodes.

CFS features simplify management, improve performance, and enable fast failover of applications and databases.

Cluster Server (VCS)

Provides high availability functionality.

VCS provides monitoring and notification for failures of the cluster nodes. VCS controls the startup and shutdown of component layers and facilitates failover of services to another node.

Replicator (VR)

Enables you to maintain a consistent copy of application data at one or more remote locations for disaster recovery.

Replicator provides the flexibility of block-based continuous replication with Volume Replicator (VVR) and file-based periodic replication with File Replicator (VFR). Replicator option is a separately-licensable feature of Storage Foundation Cluster File System High Availability.

I/O fencing

Protects the data on shared disks when nodes in a cluster detect a change in the network cluster membership with a potential split brain condition.

A related product, Veritas Operations Manager, provides a centralized management console that you can use with Veritas InfoScale products.

See About Veritas InfoScale Operations Manager.

Note:

The commands used for the Red Hat Enterprise Linux (RHEL) operating system in this document also apply to supported RHEL-compatible distributions.