Veritas Access 7.3 Installation Guide

Last Published:
Product(s): Access (7.3)
Platform: Linux
  1. Introducing Veritas Access
    1.  
      About Veritas Access
  2. Licensing in Veritas Access
    1.  
      About Veritas Access product licensing
  3. System requirements
    1.  
      Important release information
    2. System requirements
      1. Linux requirements
        1.  
          Operating system RPM installation requirements and operating system patching
        2.  
          Kernel RPMs that are required to be installed with exact predefined RPM versions
        3.  
          OL kernel RPMs that are required to be installed with exact predefined RPM versions
        4.  
          Required operating system RPMs for OL 6.6
        5.  
          Required operating system RPMs for OL 6.7
        6.  
          Required operating system RPMs for OL 6.8
        7.  
          Required operating system RPMs for RHEL 6.6
        8.  
          Required operating system RPMs for RHEL 6.7
        9.  
          Required operating system RPMs for RHEL 6.8
      2.  
        Software requirements for installing Veritas Access in a VMware ESXi environment
      3.  
        Hardware requirements for installing Veritas Access virtual machines
      4.  
        Management Server Web browser support
      5.  
        Supported NetBackup versions
      6.  
        Supported OpenStack versions
      7.  
        Supported Oracle versions and host operating systems
      8.  
        Supported IP version 6 Internet standard protocol
    3. Network and firewall requirements
      1.  
        NetBackup ports
      2.  
        OpenDedup ports and disabling the iptable rules
      3.  
        CIFS protocols and firewall ports
    4.  
      Maximum configuration limits
  4. Preparing to install Veritas Access
    1.  
      Overview of the installation process
    2.  
      Hardware requirements for the nodes
    3. About using LLT over the RDMA network for Veritas Access
      1.  
        RDMA over InfiniBand networks in the Veritas Access clustering environment
      2.  
        How LLT supports RDMA for faster interconnections between applications
      3.  
        Configuring LLT over RDMA for Veritas Access
      4.  
        How the Veritas Access installer configures LLT over RDMA
      5.  
        LLT over RDMA sample /etc/llttab
    4.  
      Connecting the network hardware
    5. About obtaining IP addresses
      1.  
        About calculating IP address requirements
      2.  
        Reducing the number of IP addresses required at installation time
    6.  
      About checking the storage configuration
  5. Deploying virtual machines in VMware ESXi for Veritas Access installation
    1.  
      Setting up networking in VMware ESXi
    2.  
      Creating a datastore for the boot disk and LUNs
    3.  
      Creating a virtual machine for Veritas Access installation
  6. Installing and configuring a cluster
    1.  
      Installation overview
    2.  
      Summary of the installation steps
    3.  
      Before you install
    4. Installing the operating system on each node of the cluster
      1.  
        About the driver node
      2.  
        Installing the operating system on the target Veritas Access cluster
      3.  
        Installing the Oracle Linux operating system on the target Veritas Access cluster
      4.  
        Obtaining the Red Hat Enterprise Linux compatible kernels
    5. Installing Veritas Access on the target cluster nodes
      1.  
        Installing and configuring the Veritas Access software on the cluster
      2.  
        Veritas Access 7.3 Graphical User Interface (GUI)
    6. About NIC bonding and NIC exclusion
      1.  
        Excluding a NIC
      2.  
        Including a NIC
      3.  
        Creating a new NIC bond
      4.  
        Removing a NIC bond
      5.  
        Removing a NIC from the bond list
    7. About VLAN Tagging
      1.  
        Adding a VLAN device on a particular NIC
      2.  
        Limitations of VLAN Tagging
    8.  
      Replacing an Ethernet interface card
    9.  
      Configuring I/O fencing
    10.  
      About configuring Veritas NetBackup
    11.  
      About enabling kdump during an Veritas Access configuration
    12.  
      Reconfiguring the Veritas Access cluster name and network
    13.  
      Configuring a KMS server on the Veritas Access cluster
  7. Automating Veritas Access installation and configuration using response files
    1.  
      About response files
    2.  
      Performing a silent Veritas Access installation
    3.  
      Response file variables to install and configure Veritas Access
    4.  
      Sample response file for Veritas Access installation and configuration
  8. Displaying and adding nodes to a cluster
    1.  
      About the Veritas Access installation states and conditions
    2.  
      Displaying the nodes in the cluster
    3.  
      Before adding new nodes in the cluster
    4.  
      Adding a node to the cluster
    5.  
      Deleting a node from the cluster
    6.  
      Shutting down the cluster nodes
  9. Upgrading Veritas Access
    1.  
      About types of Veritas Access patches
    2.  
      Downloading Veritas Access 7.3 release
    3.  
      Upgrading to Veritas Access 7.3 release
    4.  
      Displaying the current version
    5.  
      Displaying upgrade history of Veritas Access
    6.  
      Downloading a Veritas Access patch release
    7.  
      Displaying all Veritas Access releases that are available in the repository
    8.  
      Installing Veritas Access patches
    9.  
      Automatically execute your customized script before or after upgrade
  10. Upgrading Veritas Access using a rolling upgrade
    1.  
      About rolling upgrades
    2.  
      Supported rolling upgrade paths for upgrades on RHEL and Oracle Linux
    3.  
      Performing a rolling upgrade using the installer
  11. Uninstalling Veritas Access
    1.  
      Before you uninstall Veritas Access
    2. Uninstalling Veritas Access using the installer
      1.  
        Removing Veritas Access 7.3 RPMs
      2.  
        Running uninstall from the Veritas Access 7.3 disc
  12. Appendix A. Installation reference
    1.  
      Installation script options
  13. Appendix B. Configuring the secure shell for communications
    1.  
      Manually configuring passwordless secure shell (ssh)
    2.  
      Setting up ssh and rsh connections using the pwdutil.pl utility

About Veritas Access

Veritas Access is a software-defined scale-out network-attached storage (NAS) solution for unstructured data that works on commodity hardware. Veritas Access provides resiliency, multi-protocol access, and data movement to and from the public or private cloud based on policies.

You can use Veritas Access in any of the following ways.

Table: Interfaces for using Veritas Access

Interface

Description

GUI

Centralized dashboard with operations for managing your storage.

See the GUI and the online Help for more information.

RESTful APIs

Enables automation using scripts, which run storage administration commands against the Veritas Access cluster.

See the Veritas Access RESTful API Guide for more information.

Command-line interface (CLI or CLISH)

Single point of administration for the entire cluster.

See the manual pages for more information.

Table: Veritas Access key features describes the features of Veritas Access.

Table: Veritas Access key features

Feature

Description

Multi-protocol access

Veritas Access includes support for the following protocols:

  • Amazon S3

  • CIFS

  • FTP

  • iSCSI target

  • NFS

  • Oracle Direct NFS

  • SMB 3

  • NFS with S3

WORM Storage for Enterprise Vault Archiving

Veritas Access can be configured as WORM primary storage for archival by Enterprise Vault.

Veritas Access 7.3 is certified as a CIFS primary WORM storage for Enterprise Vault 12.1.

For more information, see the Veritas Access Enterprise Vault Solutions Guide.

Creation of Partition Secure Notification (PSN) file for Enterprise Vault Archiving

A Partition Secure Notification (PSN) file is created at a source partition after the successful backup of the partition at the remote site.

For more information, see the Veritas Access Enterprise Vault Solutions Guide.

Managing application I/O workloads using maximum IOPS settings

The MAXIOPS limit determines the maximum number of I/Os processed per second collectively by the storage underlying the file system.

Flexible Storage Sharing (FSS)

Enables cluster-wide network sharing of local storage.

Scale-out file system

The following functionality is provided for a scale-out file system:

  • File system that manages a single namespace spanning over both on-premises storage as well as cloud storage, which provides better fault tolerance for large data sets.

  • Highly available NFS and S3 shares.

    You use scale-out file systems if you want to store a large capacity of data in a single namespace (3 PB is the maximum file system size).

Cloud as a tier for a scale-out file system

Veritas Access supports adding a cloud service as a storage tier for a scale-out file system. You can move data between the tiers based on file name patterns and when the files were last accessed or modified. Use scheduled policies to move data between the tiers on a regular basis.

Veritas Access moves the data from the on-premises tier to Amazon S3, Amazon Glacier, Amazon Web Services (AWS), GovCloud (US), Azure, Google cloud, Alibaba, Veritas Access S3, IBM Cloud Object Storage, and any S3-compatible storage provider based on automated policies. You can also retrieve data archived in Amazon Glacier.

SmartIO

Veritas Access supports both read and writeback caching on solid state drives (SSDs) for applications running on Veritas Access file systems.

SmartTier

Veritas Access's built-in SmartTier feature can reduce the cost of storage by moving data to lower-cost storage. Veritas Access storage tiering also facilitates the moving of data between different drive architectures and on-premises.

Snapshot

Veritas Access supports snapshots for recovering from data corruption. If files, or an entire file system, are deleted or become corrupted, you can replace them from the latest uncorrupted snapshot.

Deduplication

You can run post-process periodic deduplication in a file system, which eliminates duplicate data without any continuous cost.

Compression

You can compress files to reduce the space used, while retaining the accessibility of the files and having the compression be transparent to applications. Compressed files look and behave almost exactly like uncompressed files: the compressed files have the same name, and can be read and written as with uncompressed files.

NetBackup integration

Built-in NetBackup client for backing up your file systems to a NetBackup master or media server. Once data is backed up, a storage administrator can delete unwanted data from Veritas Access to free up expensive primary storage for more data.

OpenDedup integration

Integration with OpenDedup for deduplicating your data to on-premises or cloud storage for long-term data retention.

See the Veritas Access NetBackup Solutions Guide for more information.

OpenStack plug-in

Integration with OpenStack:

  • OpenStack Cinder integration that allows OpenStack instances to use the storage hosted by Veritas Access.

  • OpenStack Manila integration that lets you share Veritas Access file systems with virtual machines on OpenStack Manila.

Quotas

Support for setting file system quotas, user quotas, and hard quotas.

Replication

Periodic replication of data over IP networks.

See the replication(1) man page for more information.

Synchronous replication of data over IP networks

See the sync(1) man page for more information.

Support for LDAP, NIS, and AD

Veritas Access uses the Lightweight Directory Access Protocol (LDAP) for user authentication.

Partition Directory

With support for partitioned directories, directory entries are redistributed into various hash directories. These hash directories are not visible in the name-space view of the user or operating system. For every new create, delete, or lookup, this feature performs a lookup for the respective hashed directory and performs the operation in that directory. This leaves the parent directory inode and its other hash directories unobstructed for access, which vastly improves file system performance.

By default this feature is not enabled. See the storage_fs(1) manual page to enable this feature.

Isolated storage pools

Enables you to create an isolated storage pool with a self-contained configuration. An isolated storage pool protects the pool from losing the associated metadata even if all the configuration disks in the main storage pool fail.

Performance and tuning

Workload-based tuning for the following workloads:

  • Media server - Streaming media represents a new wave of rich Internet content. Recent advancements in video creation, compression, caching, streaming, and other content delivery technology have brought audio and video together to the Internet as rich media. You can use Veritas Access to store your rich media, videos, movies, audio, music, and photos.

  • Virtual machine support

  • Other workloads