Storage Foundation Cluster File System High Availability 7.4 Administrator's Guide - Solaris

Last Published:
Product(s): InfoScale & Storage Foundation (7.4)
Platform: Solaris
  1. Section I. Introducing Storage Foundation Cluster File System High Availability
    1. Overview of Storage Foundation Cluster File System High Availability
      1.  
        About Storage Foundation Cluster File System High Availability
      2.  
        About Dynamic Multi-Pathing (DMP)
      3.  
        About Veritas Volume Manager
      4. About Veritas File System
        1.  
          About the Veritas File System intent log
        2.  
          About extents
        3.  
          About file system disk layouts
      5. About Storage Foundation Cluster File System (SFCFS)
        1. About Veritas File System features supported in cluster file systems
          1.  
            Veritas File System features not in cluster file systems
      6.  
        About Veritas InfoScale Operations Manager
      7.  
        Use cases for Storage Foundation Cluster File System High Availability
    2. How Dynamic Multi-Pathing works
      1. How DMP works
        1. Device discovery
          1.  
            About enclosure-based naming
        2. How DMP monitors I/O on paths
          1. Path failover mechanism
            1.  
              Subpaths Failover Group (SFG)
            2.  
              Low Impact Path Probing (LIPP)
          2.  
            I/O throttling
        3.  
          Load balancing
        4.  
          Disabling Sun Multipath IO (MPxIO)
        5.  
          Dynamic Reconfiguration
        6.  
          DMP support for the ZFS root pool
        7.  
          About booting from DMP devices
        8. DMP in a clustered environment
          1.  
            About enabling or disabling controllers with shared disk groups
      2.  
        Veritas Volume Manager co-existence with Oracle Automatic Storage Management disks
    3. How Veritas Volume Manager works
      1. How Veritas Volume Manager works with the operating system
        1.  
          How data is stored
      2. How Veritas Volume Manager handles storage management
        1. Physical objects
          1.  
            About disk partitions
          2.  
            Disk arrays
        2. Virtual objects
          1.  
            Combining virtual objects in Veritas Volume Manager
        3.  
          About the configuration daemon in Veritas Volume Manager
        4.  
          Multiple paths to disk arrays
      3. Volume layouts in Veritas Volume Manager
        1.  
          Non-layered volumes
        2.  
          Layered volumes
        3.  
          Layout methods
        4.  
          Concatenation, spanning, and carving
        5.  
          Striping (RAID-0)
        6.  
          Mirroring (RAID-1)
        7.  
          Striping plus mirroring (mirrored-stripe or RAID-0+1)
        8.  
          Mirroring plus striping (striped-mirror, RAID-1+0, or RAID-10)
        9. RAID-5 (striping with parity)
          1.  
            Traditional RAID-5 arrays
          2.  
            Veritas Volume Manager RAID-5 arrays
          3.  
            Left-symmetric layout
          4.  
            RAID-5 logging
          5.  
            About layered volumes
      4. Online relayout
        1.  
          How online relayout works
        2.  
          Limitations of online relayout
        3.  
          Transformation characteristics
        4.  
          Transformations and volume length
      5. Volume resynchronization
        1.  
          Dirty flags
        2.  
          Resynchronization process
      6.  
        Hot-relocation
      7. Dirty region logging
        1.  
          Log subdisks and plexes
        2.  
          Sequential DRL
      8. Volume snapshots
        1.  
          Comparison of snapshot features
      9. FastResync
        1.  
          How FastResync works
        2.  
          How non-persistent FastResync works with snapshots
        3.  
          How persistent FastResync works with snapshots
        4. DCO volume versioning
          1.  
            Instant snap (version 20) DCO volume layout
          2.  
            Version 0 DCO volume layout
        5.  
          Effect of growing a volume on the FastResync map
        6.  
          FastResync limitations
      10.  
        Volume sets
      11.  
        Configuration of volumes on SAN storage
      12. How VxVM handles hardware clones or snapshots
        1.  
          How VxVM uses the unique disk identifier (UDID)
    4. How Veritas File System works
      1.  
        Veritas File System features
      2. Veritas File System performance enhancements
        1. Enhanced I/O performance
          1.  
            Enhanced I/O clustering
          2.  
            Veritas Volume Manager integration with Veritas File System for enhanced I/O performance
          3.  
            Application-specific parameters for enhanced I/O performance
        2.  
          Delayed allocation for extending writes
      3. Using Veritas File System
        1. Online system administration
          1.  
            About defragmentation
          2.  
            About file system resizing
          3.  
            Using UNIX Commands on File Systems Larger than One TB
        2. Application program interface
          1.  
            Expanded application facilities
    5. How Storage Foundation Cluster File System High Availability works
      1.  
        How Storage Foundation Cluster File System High Availability works
      2.  
        When to use Storage Foundation Cluster File System High Availability
      3. About Storage Foundation Cluster File System High Availability architecture
        1.  
          About the symmetric architecture
        2.  
          About Storage Foundation Cluster File System High Availability primary/secondary failover
        3.  
          About single-host file system semantics using Group Lock Manager
      4. About Veritas File System features supported in cluster file systems
        1.  
          Veritas File System features not in cluster file systems
      5.  
        About Cluster Server architecture
      6.  
        About the Storage Foundation Cluster File System High Availability namespace
      7.  
        About asymmetric mounts
      8.  
        About primary and secondary cluster nodes
      9.  
        Determining or moving primaryship
      10.  
        About synchronizing time on Cluster File Systems
      11.  
        About file system tunables
      12.  
        About setting the number of parallel fsck threads
      13.  
        Storage Checkpoints
      14.  
        About Storage Foundation Cluster File System High Availability backup strategies
      15.  
        About parallel I/O
      16.  
        About the I/O error handling policy for Cluster Volume Manager
      17.  
        About recovering from I/O failures
      18. About single network link and reliability
        1.  
          Configuring a low-priority link
      19.  
        Split-brain and jeopardy handling
      20. About I/O fencing
        1.  
          About I/O fencing for SFCFSHA in virtual machines that do not support SCSI-3 PR
        2. About preventing data corruption with I/O fencing
          1.  
            About SCSI-3 Persistent Reservations
          2.  
            About I/O fencing operations
        3. About I/O fencing components
          1.  
            About data disks
          2.  
            About coordination points
          3.  
            About preferred fencing
          4.  
            How preferred fencing works
        4.  
          About I/O fencing configuration files
        5.  
          How I/O fencing works in different event scenarios
        6. About server-based I/O fencing
          1.  
            I/O fencing enhancements provided by CP server
          2.  
            About the CP server database
          3.  
            About the CP server user types and privileges
        7. About secure communication between the SFCFSHA cluster and CP server
          1.  
            How secure communication works between the CP servers and the SFCFSHA clusters using the Veritas Product Authentication Services (AT)
          2. Security configuration details on CP server and SFCFSHA cluster
            1.  
              Settings in Veritas Product Authentication Services (AT) secure mode
            2.  
              Settings in non-secure mode
      21.  
        Storage Foundation Cluster File System High Availability and Veritas Volume Manager cluster functionality agents
      22.  
        Veritas Volume Manager cluster functionality
    6. How Cluster Volume Manager works
      1.  
        About the cluster functionality of VxVM
      2. Overview of clustering
        1.  
          Overview of cluster volume management
        2.  
          About private and shared disk groups
        3.  
          Activation modes of shared disk groups
        4.  
          Limitations of shared disk groups
      3. Cluster Volume Manager (CVM) tolerance to storage connectivity failures
        1.  
          Availability of shared disk group configuration copies
        2.  
          About redirection of application I/Os with CVM I/O shipping
        3. Storage disconnectivity and CVM disk detach policies
          1.  
            About the types of storage connectivity failures
          2.  
            About disk detach policies
          3.  
            How CVM handles local storage disconnectivity with the global detach policy
          4.  
            How CVM handles local storage disconnectivity with the local detach policy
          5.  
            Guidelines for choosing detach policies
          6.  
            How CVM detach policies interact with I/O shipping
          7.  
            CVM storage disconnectivity scenarios that are policy independent
        4.  
          Availability of cluster nodes and shared disk groups
      4. CVM initialization and configuration
        1. Cluster reconfiguration
          1.  
            vxclustadm utility
        2. Volume reconfiguration
          1.  
            vxconfigd daemon
          2.  
            vxconfigd daemon recovery
        3.  
          Node shutdown
        4.  
          Cluster shutdown
      5. Dirty region logging in cluster environments
        1.  
          How DRL works in a cluster environment
      6. Multiple host failover configurations
        1.  
          Import lock
        2.  
          Failover
        3.  
          Corruption of disk group configuration
      7. About Flexible Storage Sharing
        1.  
          Flexible Storage Sharing use cases
        2.  
          Limitations of Flexible Storage Sharing
  2. Section II. Provisioning storage
    1. Provisioning new storage
      1.  
        Provisioning new storage
      2.  
        Growing the existing storage by adding a new LUN
      3.  
        Growing the existing storage by growing the LUN
      4.  
        Displaying SFCFSHA information with vxlist
    2. Advanced allocation methods for configuring storage
      1. Customizing allocation behavior
        1.  
          Setting default values for vxassist
        2. Using rules to make volume allocation more efficient
          1.  
            Rule file format
          2.  
            Using rules to create a volume
        3. Understanding persistent attributes
          1.  
            Using persistent attributes
        4. Customizing disk classes for allocation
          1.  
            User-defined alias names for disk classes
          2.  
            User-defined precedence order for disk classes
          3.  
            User-defined disk classes
        5. Specifying allocation constraints for vxassist operations with the use clause and the require clause
          1.  
            About require constraints
          2.  
            About use constraints
          3.  
            Interaction of multiple require and use constraints
          4.  
            Examples of use and require constraints
        6.  
          Management of the use and require type of persistent attributes
      2. Creating volumes of a specific layout
        1.  
          Types of volume layouts
        2. Creating a mirrored volume
          1.  
            Creating a mirrored-concatenated volume
          2.  
            Creating a concatenated-mirror volume
        3. Creating a striped volume
          1.  
            Creating a mirrored-stripe volume
          2.  
            Creating a striped-mirror volume
        4.  
          Creating a RAID-5 volume
      3.  
        Creating a volume on specific disks
      4.  
        Creating volumes on specific media types
      5.  
        Specifying ordered allocation of storage to volumes
      6.  
        Site-based allocation
      7.  
        Changing the read policy for mirrored volumes
    3. Creating and mounting VxFS file systems
      1. Creating a VxFS file system
        1.  
          File system block size
        2.  
          Intent log size
      2.  
        Converting a file system to VxFS
      3. Mounting a VxFS file system
        1.  
          log mount option
        2.  
          delaylog mount option
        3. tmplog mount option
          1.  
            Logging mode persistence guarantees
        4.  
          logiosize mount option
        5.  
          nodatainlog mount option
        6.  
          blkclear mount option
        7.  
          mincache mount option
        8.  
          convosync mount option
        9. ioerror mount option
          1.  
            disable policy
          2.  
            wdisable policy and mwdisable policy
          3.  
            mdisable policy
        10. largefiles and nolargefiles mount options
          1.  
            Creating a file system with large files
          2.  
            Mounting a file system with large files
          3.  
            Managing a file system with large files
        11.  
          cio mount option
        12.  
          mntlock mount option
        13.  
          ckptautomnt mount option
        14.  
          Combining mount command options
      4.  
        Unmounting a file system
      5. Resizing a file system
        1.  
          Extending a file system using fsadm
        2.  
          Shrinking a file system
        3.  
          Reorganizing a file system
      6.  
        Displaying information on mounted file systems
      7.  
        Identifying file system types
      8. Monitoring free space
        1.  
          Monitoring fragmentation
    4. Extent attributes
      1. About extent attributes
        1.  
          Reservation: preallocating space to a file
        2.  
          Fixed extent size
        3.  
          How the fixed extent size works with the shared extents
        4. Other extent attribute controls
          1.  
            Extent attribute alignment
          2.  
            Extent attribute contiguity
          3.  
            Write operations beyond extent attribute reservation
          4.  
            Extent attribute reservation trimming
          5.  
            Extent attribute reservation persistence
          6.  
            Including an extent attribute reservation in the file
      2. Commands related to extent attributes
        1.  
          About failing to preserve extent attributes
  3. Section III. Administering multi-pathing with DMP
    1. Administering Dynamic Multi-Pathing
      1. Discovering and configuring newly added disk devices
        1.  
          Partial device discovery
        2. About discovering disks and dynamically adding disk arrays
          1.  
            How DMP claims devices
          2.  
            Disk categories
          3.  
            Adding DMP support for a new disk array
          4.  
            Enabling discovery of new disk arrays
        3.  
          About third-party driver coexistence
        4. How to administer the Device Discovery Layer
          1.  
            Listing all the devices including iSCSI
          2.  
            Listing all the Host Bus Adapters including iSCSI
          3.  
            Listing the ports configured on a Host Bus Adapter
          4.  
            Listing the targets configured from a Host Bus Adapter or a port
          5.  
            Listing the devices configured from a Host Bus Adapter and target
          6.  
            Getting or setting the iSCSI operational parameters
          7.  
            Listing all supported disk arrays
          8.  
            Displaying details about an Array Support Library
          9.  
            Excluding support for a disk array library
          10.  
            Re-including support for an excluded disk array library
          11.  
            Listing excluded disk arrays
          12.  
            Listing disks claimed in the DISKS category
          13.  
            Adding unsupported disk arrays to the DISKS category
          14.  
            Removing disks from the DISKS category
          15.  
            Foreign devices
      2.  
        Making devices invisible to VxVM
      3.  
        Making devices visible to VxVM
      4.  
        About enabling and disabling I/O for controllers and storage processors
      5.  
        About displaying DMP database information
      6.  
        Displaying the paths to a disk
      7. Administering DMP using the vxdmpadm utility
        1.  
          Retrieving information about a DMP node
        2.  
          Displaying consolidated information about the DMP nodes
        3.  
          Displaying the members of a LUN group
        4.  
          Displaying paths controlled by a DMP node, controller, enclosure, or array port
        5.  
          Displaying information about controllers
        6.  
          Displaying information about enclosures
        7.  
          Displaying information about array ports
        8.  
          Displaying information about devices controlled by third-party drivers
        9.  
          Displaying extended device attributes
        10.  
          Suppressing or including devices from VxVM control
        11. Gathering and displaying I/O statistics
          1.  
            Displaying cumulative I/O statistics
          2.  
            Displaying statistics for queued or erroneous I/Os
          3.  
            Examples of using the vxdmpadm iostat command
        12.  
          Setting the attributes of the paths to an enclosure
        13.  
          Displaying the redundancy level of a device or enclosure
        14.  
          Specifying the minimum number of active paths
        15.  
          Displaying the I/O policy
        16. Specifying the I/O policy
          1.  
            Scheduling I/O on the paths of an Asymmetric Active/Active or an ALUA array
          2.  
            Example of applying load balancing in a SAN
        17.  
          Disabling I/O for paths, controllers, array ports, or DMP nodes
        18.  
          Enabling I/O for paths, controllers, array ports, or DMP nodes
        19.  
          Renaming an enclosure
        20.  
          Configuring the response to I/O failures
        21.  
          Configuring the I/O throttling mechanism
        22.  
          Configuring Low Impact Path Probing (LIPP)
        23.  
          Configuring Subpaths Failover Groups (SFG)
        24.  
          Displaying recovery option values
        25.  
          Configuring DMP path restoration policies
        26.  
          Stopping the DMP path restoration thread
        27.  
          Displaying the status of the DMP path restoration thread
        28.  
          Configuring Array Policy Modules
      8.  
        DMP coexistence with native multi-pathing
      9. Managing DMP devices for the ZFS root pool
        1.  
          Configuring a mirror for the ZFS root pool using a DMP device
        2.  
          Using DMP devices as swap devices or dump devices
        3.  
          Cloning the boot environment with DMP
        4.  
          Creating a snapshot of an existing boot environment
        5.  
          Enabling and disabling DMP support for the ZFS root pool
    2. Dynamic Reconfiguration of devices
      1.  
        About online dynamic reconfiguration
      2. Reconfiguring a LUN online that is under DMP control using the Dynamic Reconfiguration tool
        1.  
          Removing LUNs dynamically from an existing target ID
        2.  
          Adding new LUNs dynamically to a target ID
        3.  
          Replacing LUNs dynamically from an existing target ID
        4.  
          Replacing a host bus adapter online
      3. Manually reconfiguring a LUN online that is under DMP control
        1.  
          Overview of manually reconfiguring a LUN
        2.  
          Manually removing LUNs dynamically from an existing target ID
        3.  
          Manually adding new LUNs dynamically to a new target ID
        4.  
          About detecting target ID reuse if the operating system device tree is not cleaned up
        5.  
          Scanning an operating system device tree after adding or removing LUNs
        6.  
          Manually cleaning up the operating system device tree after removing LUNs
        7.  
          Manually replacing a host bus adapter on an M5000 server
      4.  
        Changing the characteristics of a LUN from the array side
      5.  
        Upgrading the array controller firmware online
    3. Managing devices
      1. Displaying disk information
        1.  
          About Media Format Discovery
        2.  
          Viewing information about the native layouts of operating system
        3. Viewing information about the disk sector size
          1.  
            Supported operating systems
        4.  
          Displaying disk information with vxdiskadm
      2. Changing the disk device naming scheme
        1.  
          Displaying the disk-naming scheme
        2.  
          Setting customized names for DMP nodes
        3.  
          Regenerating persistent device names
        4.  
          Changing device naming for enclosures controlled by third-party drivers
        5. Simple or nopriv disks with enclosure-based naming
          1.  
            Removing the error state for simple or nopriv disks in the boot disk group
          2.  
            Removing the error state for simple or nopriv disks in non-boot disk groups
        6. About the Array Volume Identifier (AVID) attribute
          1.  
            Enclosure based naming with the Array Volume Identifier (AVID) attribute
      3.  
        About disk installation and formatting
      4. Adding and removing disks
        1. Adding a disk to VxVM
          1.  
            Disk reinitialization
          2.  
            Using vxdiskadd to put a disk under VxVM control
        2. Removing disks
          1.  
            Removing a disk with subdisks
          2.  
            Removing a disk with no subdisks
      5.  
        Renaming a disk
    4. Event monitoring
      1.  
        About the Dynamic Multi-Pathing (DMP) event source daemon (vxesd)
      2.  
        Fabric Monitoring and proactive error detection
      3.  
        Dynamic Multi-Pathing (DMP) automated device discovery
      4.  
        Dynamic Multi-Pathing (DMP) discovery of iSCSI and SAN Fibre Channel topology
      5.  
        DMP event logging
      6.  
        Starting and stopping the Dynamic Multi-Pathing (DMP) event source daemon
  4. Section IV. Administering Storage Foundation Cluster File System High Availability
    1. Administering Storage Foundation Cluster File System High Availability and its components
      1.  
        About Storage Foundation Cluster File System High Availability administration
      2. Administering CFS
        1.  
          Adding CFS file systems to a VCS configuration
        2.  
          Uses of cfsmount to mount and cfsumount to unmount CFS file system
        3.  
          Removing CFS file systems from VCS configuration
        4.  
          Resizing CFS file systems
        5.  
          Verifying the status of CFS file system nodes and their mount points
        6.  
          Verifying the state of the CFS port
        7.  
          CFS agents and AMF support
        8.  
          CFS agent log files
        9.  
          CFS commands
        10. About the mount, fsclustadm, and fsadm commands
          1.  
            About the mount command
          2.  
            About the fsclustadm command
          3.  
            About the fsadm command
          4.  
            Running UNIX commands safely in a shared environment
        11.  
          Synchronizing system clocks on all nodes
        12.  
          Growing a CFS file system
        13.  
          About the /etc/vfstab file
        14. When the CFS primary node fails
          1.  
            About distributing the workload on a cluster
        15.  
          About Storage Checkpoints on SFCFSHA
        16. About Snapshots on SFCFSHA
          1.  
            About cluster snapshot characteristics
          2.  
            Performance considerations
          3.  
            Creating a snapshot on a cluster
      3. Administering VCS
        1.  
          Viewing available Veritas device drivers
        2.  
          Configuring VCS to start Oracle with a specified Pfile
        3.  
          Verifying VCS configuration
        4.  
          Starting and stopping VCS
        5.  
          Configuring destination-based load balancing for LLT
      4. Administering CVM
        1.  
          Listing all the CVM shared disks
        2.  
          Viewing all available disks in a cluster
        3.  
          Establishing CVM cluster membership manually
        4.  
          Methods to control CVM master selection
        5. About setting cluster node preferences for master failover
          1.  
            Cluster node preference for master failover
          2.  
            Considerations for setting CVM node preferences
          3.  
            Setting the cluster node preference using the CVMCluster agent
          4.  
            Setting the cluster node preference value for master failover using the vxclustadm command
          5.  
            Example of setting the cluster node preference value for master failover
        6. About changing the CVM master manually
          1.  
            Considerations for changing the master manually
          2. Changing the CVM master manually
            1.  
              Errors during CVM master switching
        7.  
          Enabling the application isolation feature in CVM environments
        8.  
          Disabling the application isolation feature in a CVM cluster
        9.  
          Changing the disk group master manually
        10.  
          Setting the sub-cluster node preference value for master failover
        11.  
          Importing a shared disk group manually
        12.  
          Deporting a shared disk group manually
        13.  
          Mapping remote storage to a node in the cluster
        14.  
          Removing remote storage mappings from a node in the cluster
        15.  
          Starting shared volumes manually
        16.  
          Evaluating the state of CVM ports
        17.  
          Verifying if CVM is running in an SFCFSHA cluster
        18.  
          Verifying CVM membership state
        19.  
          Verifying the state of CVM shared disk groups
        20.  
          Verifying the activation mode
        21.  
          CVM log files
        22.  
          Requesting node status and discovering the master node
        23.  
          Determining if a LUN is in a shareable disk group
        24.  
          Listing shared disk groups
        25.  
          Creating a shared disk group
        26. Importing disk groups as shared
          1.  
            Forcibly importing a disk group
        27.  
          Converting a disk group from shared to private
        28.  
          Moving objects between shared disk groups
        29.  
          Splitting shared disk groups
        30.  
          Joining shared disk groups
        31.  
          Changing the activation mode on a shared disk group
        32.  
          Enabling I/O shipping for shared disk groups
        33.  
          Setting the detach policy for shared disk groups
        34.  
          Controlling the CVM tolerance to storage disconnectivity
        35.  
          Handling cloned disks in a shared disk group
        36.  
          Creating volumes with exclusive open access by a node
        37.  
          Setting exclusive open access to a volume by a node
        38.  
          Displaying the cluster protocol version
        39.  
          Displaying the supported cluster protocol version range
        40.  
          Recovering volumes in shared disk groups
        41.  
          Obtaining cluster performance statistics
        42.  
          Administering CVM from the slave node
      5. Administering Flexible Storage Sharing
        1.  
          About Flexible Storage Sharing disk support
        2.  
          About the volume layout for Flexible Storage Sharing disk groups
        3.  
          Setting the host prefix
        4.  
          Exporting a disk for Flexible Storage Sharing
        5.  
          Setting the Flexible Storage Sharing attribute on a disk group
        6.  
          Using the host disk class and allocating storage
        7.  
          Administering mirrored volumes using vxassist
        8.  
          Displaying exported disks and network shared disk groups
      6. Administering ODM
        1.  
          Verifying the ODM port
        2.  
          Starting ODM
      7. About administering I/O fencing
        1. About the vxfentsthdw utility
          1.  
            General guidelines for using the vxfentsthdw utility
          2.  
            About the vxfentsthdw command options
          3. Testing the coordinator disk group using the -c option of vxfentsthdw
            1.  
              Removing and replacing a failed disk
          4.  
            Performing non-destructive testing on the disks using the -r option
          5.  
            Testing the shared disks using the vxfentsthdw -m option
          6.  
            Testing the shared disks listed in a file using the vxfentsthdw -f option
          7.  
            Testing all the disks in a disk group using the vxfentsthdw -g option
          8.  
            Testing a disk with existing keys
        2. About the vxfenadm utility
          1.  
            About the I/O fencing registration key format
          2.  
            Displaying the I/O fencing registration keys
          3.  
            Verifying that the nodes see the same disk
        3. About the vxfenclearpre utility
          1.  
            Removing preexisting keys
        4. About the vxfenswap utility
          1.  
            Replacing I/O fencing coordinator disks when the cluster is online
          2.  
            Replacing the coordinator disk group in a cluster that is online
          3.  
            Adding disks from a recovered site to the coordinator disk group
          4.  
            Refreshing lost keys on coordinator disks
        5. About administering the coordination point server
          1.  
            CP server operations (cpsadm)
          2.  
            Adding and removing SFCFSHA cluster entries from the CP server database
          3.  
            Adding and removing a SFCFSHA cluster node from the CP server database
          4.  
            Adding or removing CP server users
          5.  
            Listing the CP server users
          6.  
            Listing the nodes in all the SFCFSHA clusters
          7.  
            Listing the membership of nodes in the SFCFSHA cluster
          8.  
            Preempting a node
          9.  
            Registering and unregistering a node
          10.  
            Enable and disable access for a user to a SFCFSHA cluster
          11.  
            Starting and stopping CP server outside VCS control
          12.  
            Checking the connectivity of CP servers
          13.  
            Adding and removing virtual IP addresses and ports for CP servers at run-time
          14.  
            Taking a CP server database snapshot
          15.  
            Replacing coordination points for server-based fencing in an online cluster
          16.  
            Refreshing registration keys on the coordination points for server-based fencing
          17.  
            Deployment and migration scenarios for CP server
          18.  
            Migrating from non-secure to secure setup for CP server and SFCFSHA cluster communication
        6. About migrating between disk-based and server-based fencing configurations
          1.  
            Migrating from disk-based to server-based fencing in an online cluster
          2.  
            Migrating from server-based to disk-based fencing in an online cluster
          3. Migrating between fencing configurations using response files
            1.  
              Sample response file to migrate from disk-based to server-based fencing
            2.  
              Sample response file to migrate from server-based fencing to disk-based fencing
            3.  
              Sample response file to migrate from single CP server-based fencing to server-based fencing
            4.  
              Response file variables to migrate between fencing configurations
        7.  
          Enabling or disabling the preferred fencing policy
        8.  
          About I/O fencing log files
      8. Administering SFCFSHA global clusters
        1.  
          About setting up a disaster recovery fire drill
        2. About configuring the fire drill service group using the Fire Drill Setup wizard
          1.  
            Running the fire drill setup wizard
          2.  
            About configuring local attributes in the fire drill service group
        3.  
          Verifying a successful fire drill
        4.  
          Scheduling a fire drill
    2. Using Clustered NFS
      1. Understanding how Clustered NFS works
        1.  
          Basic design
        2. Internal Clustered NFS functionality
          1.  
            preonline trigger
          2.  
            postonline trigger
          3.  
            postoffline trigger
          4.  
            Actions
      2.  
        Sample use cases
      3.  
        cfsshare manual page
      4. Configure and unconfigure Clustered NFS
        1. Configure Clustered NFS
          1.  
            Service group cfsnfssg_dummy
        2.  
          Unconfiguring Clustered NFS
      5. Reconciling major and minor numbers for NFS shared disks
        1.  
          Checking the major and minor number for VxVM volumes
      6. Administering Clustered NFS
        1.  
          Displaying the NFS shared CFS file systems
        2.  
          Sharing a CFS file system previously added to VCS
        3.  
          Unsharing the previous shared CFS file system
        4.  
          Adding an NFS shared CFS file system to VCS
        5.  
          Deleting the NFS shared CFS file system from VCS
        6.  
          Adding a virtual IP address to VCS
        7.  
          Deleting a virtual IP address from VCS
        8.  
          Adding an IPv6 virtual IP address to VCS in a pure IPv6 configuration
        9.  
          Deleting an IPv6 virtual IP address from VCS in a pure IPv6 configuration
        10.  
          Adding a virtual IP address to VCS in a dual-stack configuration
        11.  
          Deleting a virtual IP address from VCS in a dual-stack configuration
        12.  
          Changing the share options associated with an NFS share
        13.  
          Sharing a file system checkpoint
        14. Samples for configuring a Clustered NFS
          1.  
            Sample 1 uses the cfsshare command to add a CFS file system to VCS configuration
          2.  
            Sample 2 uses the cfsshare command to configure
        15.  
          Sample main.cf file
      7.  
        How to mount an NFS-exported file system on the NFS clients
      8.  
        Disabling SMF for NFS daemons
      9.  
        Debugging Clustered NFS
    3. Using Common Internet File System
      1.  
        About CIFS
      2.  
        Requirements for CIFS
      3.  
        Understanding how Samba works
      4.  
        Configuring Clustered NFS and CIFS on CFS
      5.  
        cfsshare manual page
      6.  
        Configuring CIFS in user mode
      7.  
        Configuring CIFS in domain mode
      8.  
        Configuring CIFS in ads mode
      9. Administering CIFS
        1.  
          Sharing a CFS file system previously added to VCS
        2.  
          Unsharing the previous shared CFS file system
        3.  
          Sample main.cf file for CIFS
      10.  
        Debugging CIFS
    4. Deploying Oracle with Clustered NFS
      1.  
        Tasks for deploying Oracle with CNFS
      2. About deploying Oracle with CNFS
        1.  
          VCS service groups in a CNFS environment
      3.  
        Configuring the CNFS server for Oracle
      4. Configuring Oracle for Direct NFS
        1.  
          Recommended mount options for NFS
        2.  
          About oranfstab
      5.  
        Verifying Oracle Direct NFS usage
    5. Administering sites and remote mirrors
      1. About sites and remote mirrors
        1.  
          About site-based allocation
        2.  
          About site consistency
        3.  
          About site tags
        4.  
          About the site read policy
        5.  
          About disk detach policies for campus clusters
      2.  
        Making an existing disk group site consistent
      3.  
        Configuring a new disk group as a Remote Mirror configuration
      4. Fire drill - testing the configuration
        1.  
          Simulating site failure
        2.  
          Verifying the secondary site
        3.  
          Recovery from simulated site failure
      5. Changing the site name
        1.  
          Resetting the site name for a host
      6. Administering the Remote Mirror configuration
        1.  
          Configuring site tagging for disks or enclosures
        2.  
          Configuring automatic site tagging for a disk group
        3.  
          Configuring site consistency on a volume
      7.  
        Examples of storage allocation by specifying sites
      8.  
        Displaying site information
      9. Failure and recovery scenarios
        1.  
          Recovering from a loss of site connectivity
        2.  
          Recovering from host failure
        3.  
          Recovering from storage failure
        4.  
          Recovering from site failure
        5.  
          Recovering from disruption of connectivity to storage at the remote sites from hosts on all sites
        6.  
          Recovering from disruption to connectivity to storage at all sites from the hosts at a site
        7.  
          Automatic site reattachment
  5. Section V. Optimizing I/O performance
    1. Veritas File System I/O
      1.  
        About Veritas File System I/O
      2. Buffered and Direct I/O
        1. Direct I/O
          1.  
            Direct I/O requirements
          2.  
            Direct I/O versus synchronous I/O
          3.  
            Direct I/O CPU overhead
          4.  
            Discovered Direct I/O
        2.  
          Unbuffered I/O
        3. Data synchronous I/O
          1.  
            Data synchronous I/O vs. synchronous I/O
      3.  
        Concurrent I/O
      4.  
        Cache advisories
      5.  
        Freezing and thawing a file system
      6.  
        Getting the I/O size
      7.  
        About Veritas InfoScale product components database accelerators
    2. Veritas Volume Manager I/O
      1.  
        Veritas Volume Manager throttling of administrative I/O
  6. Section VI. Veritas Extension for Oracle Disk Manager
    1. Using Veritas Extension for Oracle Disk Manager
      1. About Oracle Disk Manager
        1. How Oracle Disk Manager improves database performance
          1.