Documente Academic
Documente Profesional
Documente Cultură
Veritas Storage
Foundation 6.0 for
UNIX: Install and
Configure
100-002687-A
COURSE DEVELOPERS Copyright 2012 Symantec Corporation. All rights reserved.
Bilge Gerrits Symantec, the Symantec Logo, and VERITAS are trademarks or
James Kenney registered trademarks of Symantec Corporation or its affiliates in
Carly Storrie the U.S. and other countries. Other names may be trademarks of
their respective owners.
THIS PUBLICATION IS PROVIDED AS IS AND ALL
LEAD SUBJECT MATTER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS
EXPERTS AND WARRANTIES, INCLUDING ANY IMPLIED
Brad Willer WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
TECHNICAL SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
CONTRIBUTORS AND INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
REVIEWERS CONNECTION WITH THE FURNISHING, PERFORMANCE,
Margy Cassidy OR USE OF THIS PUBLICATION. THE INFORMATION
Steve Evans CONTAINED HEREIN IS SUBJECT TO CHANGE WITHOUT
Joe Gallagher NOTICE.
Freddie Gilyard No part of the contents of this book may be reproduced or
Graeme Gofton transmitted in any form or by any means without the written
Tony Griffiths permission of the publisher.
Gene Henriksen Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Kleber Saldanha Symantec Corporation
Kalyan Subramaniyam World Headquarters
Anand Raj Vengadassalam 350 Ellis Street
Stephen Williams Mountain View, CA 94043
Randal Williams United States
http://www.symantec.com
Copyright 2012 Symantec Corporation. All rights reserved.
Appendix A: Labs
Lab 1: VMware Workstation Introduction..................................................... A-7
Exercise 1: Starting virtual machines (VMware Workstation)............... A-10
Exercise 2: Logging on to virtual machines (VMware Workstation) ..... A-12
Exercise 3: Adjusting the VMware view (VMware Workstation)........... A-13
Exercise 4: Running basic commands (VMware Workstation)............. A-14
Lab 1: Hatsize Introduction ........................................................................ A-17
Exercise 1: Connecting to the lab environment (Hatsize) .................... A-20
Exercise 2: Connecting to additional virtual machines (Hatsize).......... A-23
Exercise 3: Running basic commands (Hatsize).................................. A-25
Exercise 4: Restarting virtual machines (Hatsize)................................ A-28
Lab 2: Installing SF and Accessing SF Interfaces ..................................... A-31
Exercise 1: Verifying that the system meets installation requirements A-33
Exercise 2: Installing Veritas Storage Foundation................................ A-36
Exercise 3: Performing post-installation and version checks ............... A-38
Exercise 4: Optional lab: Setting up Veritas Enterprise Administrator . A-40
Exercise 5: Optional lab: Text-based VxVM menu interface ................ A-42
Exercise 6: Optional lab: Accessing CLI commands............................ A-43
Lab 3: Getting Started with VOM ............................................................... A-45
Exercise 1: Installing the VOM management server (MS) ................... A-47
Exercise 2: Adding managed hosts to the MS ..................................... A-49
Exercise 3: Adding the active management add-on............................. A-51
Lab 4: Creating a Volume and File System ............................................... A-53
Exercise 1: Creating a volume and file system: VOM .......................... A-54
Exercise 1: Creating disk groups, volumes and file systems: CLI........ A-55
Exercise 2: Removing volumes and disks: CLI .................................... A-57
Exercise 3: Destroying disk data using disk shredding: CLI................. A-58
Exercise 4: Optional lab: Creating disk groups, volumes, and file
systems: VOM ...................................................................................... A-60
Copyright 2012 Symantec Corporation. All rights reserved.
Exercise 1: Creating disk groups, volumes and file systems: CLI ........ B-89
Exercise 2: Removing volumes and disks: CLI..................................... B-94
Exercise 3: Destroying disk data using disk shredding: CLI ................. B-95
Exercise 4: Optional lab: Creating disk groups, volumes, and file
systems: VOM....................................................................................... B-98
Exercise 5: Optional lab: Removing volumes, disks, and disk
groups: VOM....................................................................................... B-104
Lab 5: Working with Volumes with Different Layouts ............................... B-107
Exercise 1: Creating volumes with different layouts: CLI.................... B-109
Exercise 2: Optional lab: Setting up Storage Provisioning: VOM ....... B-114
Exercise 3: Optional lab: Creating layered volumes ........................... B-119
Index
Copyright 2012 Symantec Corporation. All rights reserved.
7
Course Introduction
Capacity
VxVM, VxFS, and DMP provide consistent management across Solaris, HP-
UX, AIX, and Linux platforms.
Storage Foundation provides additional benefits for array environments, such
as inter-array mirroring and hardware independent dynamic multipathing.
Hosts can be replaced without modifying storage.
Hosts with different operating systems can access the same storage.
Storage devices can be spanned.
Performance
I/O throughput can be maximized by measuring and modifying volume layouts
while storage remains online.
Extent-based allocation of space for files minimizes file level access time.
Read-ahead buffering dynamically tunes itself to the volume layout.
Aggressive caching of writes greatly reduces the number of disk accesses.
Direct I/O performs file I/O directly into and out of user buffers.
With VxFS, certain features are available for maximizing performance in a
database environment.
With VxFS, you can create a multi-tier storage environment where you benefit
from using a mixture of high-end disk arrays, solid state disks, low-end disk
arrays, and JBODs.
Availability
Management of storage and the file system is performed online in real time,
eliminating the need for planned downtime.
Online volume and file system management can be centralized through an
Copyright 2012 Symantec Corporation. All rights reserved.
Arrays can be of different manufacture or type; that is, one array can be a
RAID array and the other a JBOD.
VxVM facilitates data reorganization and maximizes available resources.
VxVM improves overall performance by making I/O activity parallel for a
volume through more than one I/O path to and within the array.
You can use snapshots with mirrors in different locations, which is beneficial
for disaster recovery and off-host processing.
If you include Veritas Volume Replicator (VVR) or Veritas File Replicator
(VFR) in your environment, VVR and VFR can be used to provide hardware-
independent replication services.
Objectives
After completing the Install and Configure training, you will be able to:
Identify VxVM virtual storage objects and volume layouts.
Install and configure Storage Foundation.
Administer the SF environment from a centralized Web console using Veritas
Operations Manager (VOM).
Copyright 2012 Symantec Corporation. All rights reserved.
Objectives
After completing the Manage and Administer training, you will be able to:
Monitor VxVM and change volume layouts to improve performance.
Manage the dynamic multipathing feature.
Resolve hardware problems that result in disk and disk group failures.
Create and manage point-in-time copies for off-host and on-host processing.
Use the compression, deduplication and FileSnap features of Veritas File
Copyright 2012 Symantec Corporation. All rights reserved.
The following tables describe the typographic conventions used in this course.
hdx[N]
In the syntax:
sd refers to a SCSI disk, and hd refers to an EIDE disk.
x is a letter that indicates the order of disks detected by the operating system.
For example, sda refers to the first SCSI disk, sdb refers to the second SCSI
disk, and so on.
N is an optional parameter that represents a partition number in the range 1
through 16. For example, sda7 references partition 7 on the first SCSI disk.
Primary partitions on a disk are 1, 2, 3, 4; logical partitions have numbers 5 and up.
If the partition number is omitted, the device name indicates the entire disk.
CONFIDENTIAL - NOT FOR DISTRIBUTION
25 Lesson 1 Virtual Objects
Copyright 2012 Symantec Corporation. All rights reserved.
15
Disk arrays
Reads and writes on unmanaged physical disks can be a relatively slow process,
because disks are physical devices that require time to move the heads to the
correct position on the disk before reading or writing. If all of the read and write
operations are performed to individual disks, one at a time, the read-write time can
become unmanageable.
A disk array is a collection of physical disks. Performing I/O operations on
multiple disks in a disk array can improve I/O speed and throughput.
Hardware arrays present disk storage to the host operating system as LUNs. A
LUN can be made up of a single physical disk, a collection of physical disks, or
even a portion of a physical disk. From the operating system point of view, a LUN
corresponds to a single storage device.
Copyright 2012 Symantec Corporation. All rights reserved.
Multipathing
Some disk arrays provide multiple ports to access disk devices. These ports,
coupled with the host bus adaptor (HBA) controller and any data bus or I/O
processor local to the array, compose multiple hardware paths to access the disk
devices. This is called multipathing.
In a multipathing environment, a single storage device may appear to the operating
system as multiple storage devices. Special multipathing software is usually
required to administer multipathed storage devices. Veritas Dynamic Multi-
Pathing (DMP) product which is part of the Storage Foundation software provides
seamless management of multiple access paths to storage devices in heterogeneous
operating system and storage environments.
CONFIDENTIAL - NOT FOR DISTRIBUTION
26 16 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
1
What is a volume?
A volume is a virtual object, created by Volume Manager, that stores data. A
volume consists of space from one or more physical disks on which the data is
physically stored.
disks. All users and applications access volumes as contiguous address space using
special device files in a manner similar to accessing a disk partition.
Volumes have block and character device nodes in the /dev tree. You can supply
the name of the path to a volume in your commands and programs, in your file
system and database configuration files, and in any other context where you would
otherwise use the path to a physical disk partition.
Public region: The public region consists of the remainder of the space on the
disk. The public region represents the available space that Volume Manager
can use to assign to volumes and is where an application stores data. Volume
Manager never overwrites this area unless specifically instructed to do so.
Subdisks
A VxVM disk can be divided into one or more subdisks. A subdisk is a set of
contiguous disk blocks that represent a specific portion of a VxVM disk, which is
mapped to a specific region of a physical disk. A subdisk is a subsection of a disks
public region. A subdisk is the smallest unit of storage in Volume Manager.
Therefore, subdisks are the building blocks for Volume Manager objects.
A subdisk is defined by an offset and a length in sectors on a VxVM disk.
Default subdisk name: DMname-##
A VxVM disk can contain multiple subdisks, but subdisks cannot overlap or share
the same portions of a VxVM disk. Any VxVM disk space that is not reserved or
that is not part of a subdisk is free space. You can use free space to create new
subdisks.
Conceptually, a subdisk is similar to a partition. Both a subdisk and a partition
divide a disk into pieces defined by an offset address and length. Each of those
pieces represent a reservation of contiguous space on the physical disk. However,
while the maximum number of partitions to a disk is limited by some operating
systems, there is no theoretical limit to the number of subdisks that can be attached
to a single plex. This number has been limited by default to a value of 4096. If
required, this default can be changed, using the vol_subdisk_num tunable
parameter. For more information on tunable parameters, see the Veritas Storage
Foundation and High Availability Solutions Tuning Guide.
Plexes
Volume Manager uses subdisks to build virtual objects called plexes. A plex is a
structured or ordered collection of subdisks that represents one copy of the data in
a volume. A plex consists of one or more subdisks located on one or more physical
disks. The length of a plex is determined by the last block that can be read or
Copyright 2012 Symantec Corporation. All rights reserved.
Volumes
A volume is a virtual storage device that is used by applications in a manner
similar to a physical disk. Due to its virtual nature, a volume is not restricted by the
physical size constraints that apply to a physical disk. A VxVM volume can be as
large as the total of available, unreserved free physical disk space in the disk
group. A volume consists of one or more plexes.
Volume layouts
RAID levels correspond to volume layouts. A volumes layout refers to the
organization of plexes in a volume. Volume layout is the way plexes are
configured to remap the volume address space through which I/O is redirected at
run-time. Volume layouts are based on the concepts of disk spanning, redundancy,
and resilience.
Disk spanning
Disk spanning is the combining of disk space from multiple physical disks to form
one logical drive. Disk spanning has two forms:
Data redundancy
To protect data against disk failure, the volume layout must provide some form of
data redundancy. Redundancy is achieved in two ways:
Mirroring: Mirroring is maintaining two or more copies of volume data.
A mirrored volume uses multiple plexes to duplicate the information contained
in a volume. Although a volume can have a single plex, at least two are
required for true mirroring (redundancy of data). Each of these plexes should
contain disk space from different disks for the redundancy to be useful.
Resilience: A resilient volume, also called a layered volume, is a volume that
is built on one or more other volumes. Resilient volumes enable the mirroring
of data at a more granular level. For example, a resilient volume can be
concatenated or striped at the top level and then mirrored at the bottom level.
A layered volume is a virtual Volume Manager object that nests other virtual
objects inside of itself. Layered volumes provide better fault tolerance by
mirroring data at a more granular level.
Parity: Parity is a calculated value used to reconstruct data after a failure by
doing an exclusive OR (XOR) procedure on the data. Parity information can be
stored on a disk. If part of a volume fails, the data on that portion of the failed
volume can be re-created from the remaining data and parity information.
A RAID-5 volume uses striping to spread data and parity evenly across
Copyright 2012 Symantec Corporation. All rights reserved.
multiple disks in an array. Each stripe contains a parity stripe unit and data
stripe units. Parity can be used to reconstruct data if one of the disks fails. In
comparison to the performance of striped volumes, write throughput of RAID-
5 volumes decreases, because parity information needs to be updated each time
data is accessed. However, in comparison to mirroring, the use of parity
reduces the amount of space required.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 1: VMware Workstation Introduction, page A-7
Appendix B provides complete lab instructions and solutions.
Lab 1: VMware Workstation Introduction, page B-7
CONFIDENTIAL - NOT FOR DISTRIBUTION
35 Lesson 1 Virtual Objects
Copyright 2012 Symantec Corporation. All rights reserved.
115
Copyright 2012 Symantec Corporation. All rights reserved.
Note: The VRTSvlic package can coexist with previous licensing packages, such
as VRTSlic. If you have old license keys installed in /etc/vx/elm,
leave this directory on your system. The old and new license utilities can
coexist.
Get the latest information about your SFHA and VCS products
The Installation and Upgrade service at the SORT Web site intends to help SF
administrators analyze their environment for suitability to install or upgrade SF.
This service can either be used to create a preinstallation checklist based on the
information provided by the user or to perform a set of checks on the SF server to
create a detailed custom report.
Symantec licenses
When the utility completes, it creates two files in the ./sort/reports
directory:
hostname_IAS_date_time.txt
This file is for immediate review on the server.
hostname_IAS_date_time.xml
This file can be uploaded to the SORT Web site to display detailed reports as
shown on the slide.
Other reports may also be generated if you choose different services while running
the data collector utility.
CONFIDENTIAL - NOT FOR DISTRIBUTION
46 210 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
2
Note: The example on the slide is from a Linux platform. You may have other
products available on other platforms.
4 If the licensing utilities are installed, the product status page is displayed. This
list displays the Veritas products on the installation media and the installation
and licensing status of each product. If the licensing utilities are not installed,
you receive a message indicating that the installation utility could not
determine product status.
5 Type I to install a product. Follow the instructions to select the product that
you want to install. Installation begins automatically.
When you add Storage Foundation packages by using the installer utility, all
packages are installed. If you want to add a specific package only, for example,
only the VRTSob package, then you must add the package manually from the
command line.
Installation input
The interactive installation prompts the user for information, such as the package
set to be installed, system names, licensing selection, license keys (if traditional
licensing is selected), and other configuration information, such as the product
mode or additional options. These answers are then stored in the
installer-timestamp+3characters.response file in the installation
log directory:
/opt/VRTS/install/logs/installer-timestamp+3characters
The .response file can then be used to install other systems non-interactively
using the ./installer -responsefile filename option. For details on
using a response file during installation, refer to Veritas Storage Foundation
Installation Guide.
Copyright 2012 Symantec Corporation. All rights reserved.
Note: SF 5.1 and later provide a Web user interface to the installation utilities.
The Web installer is explained in more detail later in this lesson.
Note: If you want to install more than one system using the installer utility,
provide the system names separated by space when prompted.
utilities in this directory to verify the version of the SF product installed on your
system using the -version option as shown on the slide. This option finds out
which packages are installed on the system and attempts to connect to the SORT
Web site to get the latest version and patch information about the product installed
on the system.
If you want to verify which packages are installed on the system, you can also
view information about installed packages by using OS-specific commands to list
package information.
Solaris
To list all installed packages on the system:
and configured.
When you run the webinstaller command to start the Web server, the URL is
displayed so you can connect from a browser. On some browsers, you must accept
a security exception and authenticate using the root account and password for the
system running the Web server. After you connect to the Web server, you can
select tasks, products, and systems to start installing and configuring the target
systems.
Reports
Use this tab to view and manage uploaded reports.
Notifications
This tab enables you to set e-mail alerts for being notified about the latest
information released about the Symantec enterprise products in your
environment.
Support
Use this tab to access detailed information about all Symantec resources from
product support to Symantec forums, from documentation to product training.
providing you with information and prompts. Default answers are provided for
many questions, so you can select common answers.
The menu also contains options for listing disk information, displaying help
information, and quitting the menu interface.
The tasks listed in the main menu are covered throughout this training. Options
available in the menu differ somewhat by platform. See the vxdiskadm(1m)
manual page for more details on how to use vxdiskadm.
Note: vxdiskadm can be run only once per host. A lock file prevents multiple
instances from running: /var/spool/locks/.DISKADD.LOCK.
On the Linux platform, you also need to execute the vxsvcctrl start
command to start the server process after activating it.
The VEA client can provide simultaneous access to multiple host machines. Each
host machine must be running the VEA server.
Note: Entries for your user name and password must exist in the password file or
corresponding Network Information Name Service table on the machine to
be administered. Your user name must also be included in the Veritas
administration group (vrtsadm, by default) in the group file or NIS group
table. If the vrtsadm entry does not exist, only root can run VEA.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 2: Installing SF and Accessing SF Interfaces, page A-31
Appendix B provides complete lab instructions and solutions.
Lab 2: Installing SF and Accessing SF Interfaces, page B-45
CONFIDENTIAL - NOT FOR DISTRIBUTION
65 Lesson 2 Installing Storage Foundation and Accessing SF Interfaces
Copyright 2012 Symantec Corporation. All rights reserved.
229
Copyright 2012 Symantec Corporation. All rights reserved.
All this makes todays data center increasingly more complex; there are too many
disparate tools, too many manual processes, and adopting new technologies, such
as virtualization, introduces its own set of challenges.
form business entities which are collections of related objects that are used by
applications with all the resources on which the applications depend. This enables
business entity-specific management and reporting capabilities.
components of SF products are installed and running. A typical data center can
have thousands of such hosts using some or all of the SF products.
Optional external authentication brokers (ABs) for additional domain support.
An AB is a system with Symantec Product Authentication Services (SPAS)
installed that provides access to user authentication with public domains, such
as Active Directory, NIS, or NIS+.
In a centrally managed deployment, managed hosts relay information about
storage resources and applications to the MS. The Management Server then
coalesces the data it receives from the managed hosts within its database.
It also includes support for hosts that do not have Veritas Storage Foundation,
Cluster Server, DMP, or ApplicationHA.
Note: For RHEL 6.0 on x86 64-bit, and RHEL 6.1 on x86 64-bit, the 32-bit glibc
package must be installed.
The system used as the management server needs to have sufficient system
resources, such as memory, processing power, and disk space to collect and
process data from all managed hosts. As the size of the managed environment
increases, the demand on the central management server also increases. For
Copyright 2012 Symantec Corporation. All rights reserved.
Note: The MS fully qualified hostname must be resolvable using domain name
services (DNS) for a successful installation.
After the initial configuration, you would only see one host (the management
server itself) when you connect to the MS console. You need to add other SF
servers as managed hosts to populate the database and start the discovery process.
Note: If you are using pop-up blockers (including Yahoo Toolbar or Google
Toolbar), either disable them or configure them to accept pop-ups from the
Web server to which you will connect.
you must have domain administrative privileges. The status information for the
solutions is maintained in the management server database.
There are two prebundled add-ons for VCS and SF administration. The rest of the
add-ons must be downloaded and deployed before being used.
The scope of an add-on indicates whether the add-on is installed on the central
management server only or on the managed hosts only or on both. For a full list of
available add-ons and their functionalities refer to the Veritas Operations Manager
Administrators Guide.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 3: Getting Started with VOM, page A-45
Appendix B provides complete lab instructions and solutions.
Lab 3: Getting Started with VOM, page B-73
CONFIDENTIAL - NOT FOR DISTRIBUTION
88 322 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Lesson 4
Creating a Volume and File System
Copyright 2012 Symantec Corporation. All rights reserved.
removed.
These disks are under Volume Manager control but cannot be used by Volume
Manager until they are added to a disk group.
Note: Encapsulation is another method of placing a disk under VxVM control in
which existing data on the disk is preserved. This method is covered in the Veritas
Storage Foundation 6.0 for UNIX: Manage and Administer course.
such as /dev/[r]dsk/device_name.
The free space in a disk group refers to the space on all disks within the disk group
that has not been allocated as subdisks. When you place a disk into a disk group,
its space becomes part of the free space pool of the disk group.
Notes
The definitions of bootdg and defaultdg are written to the volboot file. The
definition of bootdg results in a symbolic link from the named bootdg in
/dev/vx/dsk and /dev/vx/rdsk.
The rootdg disk group name is no longer a reserved name for VxVM versions
after 4.0. If you are upgrading from a version of Volume Manager earlier than
4.0 where the system disk is encapsulated in the rootdg disk group, the bootdg
is assigned the value of rootdg automatically.
Adding disks
To add a disk to a disk group, you select an uninitialized disk or a free disk. If the
disk is uninitialized, you must initialize the disk before you can add it to a disk
group.
Disk naming
When you add a disk to a disk group, the disk is assigned a disk media name. The
Copyright 2012 Symantec Corporation. All rights reserved.
disk media name is a logical name used for VxVM administrative purposes.
To create a volume from the command line, you use the vxassist command. In
the syntax:
Use the -g option to specify the disk group in which to create the volume.
make is the keyword for volume creation.
volume_name is a name you give to the volume. Specify a meaningful name
which is unique within the disk group.
length specifies the number of sectors in the volume. You can specify the
length by adding an m, k, g, or t to the length.
AIX
In AIX, you can use the following commands when working with the file system
table file, /etc/filesystems:
To view entries: lsfs mount_point
To change details of an entry, use chfs. For example, to turn off mount at
boot: chfs -A no mount_point
In the output:
A status of online, in addition to entries in the Disk and Group columns
indicates that the disk has been initialized or encapsulated, assigned a disk
media name, and added to a disk group. The disk is under Volume Manager
control and is available for creating volumes.
A status of online without entries in the Disk and Group columns indicates that
the drive has been initialized or encapsulated but is not currently assigned to a
disk group. Note that if there is a disk group name in parentheses without any
disk media name, it indicates that the disk belongs to a deported disk group.
TRANSPORT : iSCSI
ENCLOSURE_NAME : emc0
NUM_PATHS : 2
Notes:
The disk name and the disk group name are changeable. The disk ID and disk
group ID are never changed as long as the disk group exists or the disk is
initialized.
The detailed information displayed by the vxdisk list command is
discussed in more detail in the Veritas Storage Foundation 6.0 for UNIX:
Manage and Administer course.
plexes
TY NAME TYPE STATUS
plex appvol-01 simple attached
The vxinfo command prints the accessibility and the usability information on
VxVM volumes. The -p option with vxinfo also reports the name and status of
each plex within the volume.
Note: Use the -f option to force a shred operation on a Solid State Drive (SSD)
disk.
Copyright 2012 Symantec Corporation. All rights reserved.
command.
Note: You can bring back a destroyed disk group by importing it with its dgid if
its disks had not been re-used for other purposes.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 4: Creating a Volume and File System, page A-53
Appendix B provides complete lab instructions and solutions.
Lab 4: Creating a Volume and File System, page B-87
CONFIDENTIAL - NOT FOR DISTRIBUTION
118 430 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Lesson 5
Working with Volumes with Different Layouts
Copyright 2012 Symantec Corporation. All rights reserved.
map the volume address space across subdisks on different disks. The addresses
0 GB to 8 GB of volume address space map to the first 8-gigabyte subdisk, and
addresses 9 GB to 12 GB map to the second 4-gigabyte subdisk. An address offset
of 10 GB, therefore, maps to an address offset of 2 GB in the second subdisk.
stripe unit size can be in units of sectors, kilobytes, megabytes, or gigabytes. The
default stripe unit size is 64K, which provides adequate performance for most
general purpose volumes. Performance of an individual volume may be improved
by matching the stripe unit size to the I/O characteristics of the application using
the volume.
Concatenation: Advantages
Better utilization of free space: Concatenation removes the restriction on size
of storage devices imposed by physical disk size. It also enables better
utilization of free space on disks by providing for the ordering of available
discrete disk space on multiple disks into a single addressable volume. 5
Concatenation: Disadvantages
No protection against disk failure: Concatenation does not protect against disk
failure. A single disk failure results in the failure of the entire volume.
Copyright 2012 Symantec Corporation. All rights reserved.
Striping: Advantages
Improved performance through parallel data transfer: Improved
performance is obtained by increasing the effective bandwidth of the I/O path
to the data. This may be achieved by a single volume I/O operation spanning
across a number of disks or by multiple concurrent volume I/O operations to
more than one disk at the same time.
Load-balancing: Striping is also helpful in balancing the I/O load from
multiuser applications across multiple disks.
Mirroring: Advantages
Improved availability: With concatenation or striping, failure of any one disk
makes the entire plex unusable. With mirroring, data is protected against the
failure of any one disk. Mirroring improves the availability of a striped or
concatenated volume.
Improved read performance: Reads benefit from having multiple places
from which to read the data.
Mirroring: Disadvantages
Requires more disk space: Mirroring requires twice as much disk space,
which can be costly for large configurations. Each mirrored plex requires
enough space for a complete copy of the volumes data.
Slightly slower write performance: Writing to volumes is slightly slower,
because multiple copies have to be written in parallel. The overall time the
write operation takes is determined by the time needed to write to the slowest
disk involved in the operation.
The slower write performance of a mirrored volume is not generally significant
enough to decide against its use. The benefit of the resilience that mirrored
volumes provide outweighs the performance reduction.
RAID-5: Advantages
Redundancy through parity: With a RAID-5 volume layout, data can be re-
created from remaining data and parity in case of the failure of one disk.
Requires less space than mirroring: RAID-5 stores parity information, rather
than a complete copy of the data.
Improved read performance: RAID-5 provides similar improvements in read
performance as in a normal striped layout.
Copyright 2012 Symantec Corporation. All rights reserved.
The following additional attributes are used with the striped volume layout:
ncol=n designates the number of stripes, or columns, across which the volume
is created. This attribute has many aliases. For example, you can also use
nstripe=n or stripes=n.
limit, the volume is created using the upper limit as the volume length. If the
maximum possible size is smaller than this limit, the volume is created with the
maximum possible size.
When you create a mirrored volume, you can add a dirty region log by adding the
logtype=drl attribute:
vxassist -g diskgroup [-b] make volume_name length \
layout=mirror-concat logtype=drl [nlog=n]
A log plex that consists of a single subdisk is created.
If you plan to mirror the log, you can add more than one log plex by specifying
a number of logs using the nlog=n attribute, where n is the number of logs.
vxassist -g appdg make appvol 5m layout=mirror-concat \
logtype=drl
Note: Dirty regions logs are covered in a later lesson.
CONFIDENTIAL - NOT FOR DISTRIBUTION
129 Lesson 5 Working with Volumes with Different Layouts
Copyright 2012 Symantec Corporation. All rights reserved.
511
Creating a layered volume
What is a layered volume?
VxVM provides two ways to mirror your data:
Original VxVM mirroring: With the original method of mirroring, data is
mirrored at the plex level. The loss of a disk results in the loss of a complete
plex. A second disk failure could result in the loss of a complete volume if the
volume has only two mirrors. To recover the volume, the complete volume
contents must be copied from backup.
Enhanced mirroring: VxVM 3.0 introduced support for an enhanced type of
mirrored volume called a layered volume. A layered volume is a virtual
Volume Manager object that mirrors data at a more granular level. To do this,
VxVM creates subvolumes from traditional bottom-layer objects, or subdisks.
These subvolumes function much like volumes and have their own associated
Copyright 2012 Symantec Corporation. All rights reserved.
Note: You can also build a layered volume from the bottom up by using the
vxmake command. For more information, see the vxmake(1m) manual
page.
Regular mirroring
The example illustrates a regular mirrored volume layout called a mirror-stripe
layout. Data is striped across two disks, disk01 and disk03, to create one plex,
and that plex is mirrored and striped across two other disks, disk02 and disk04.
If two drives fail, the volume survives 2 out of 6 (1/3) times. As more subdisks are
added to each plex, the odds of a traditional volume surviving a two-disk failure
approach (but never equal) 50 percent.
If a disk fails in a mirror-stripe layout, the entire plex is detached, and redundancy
Copyright 2012 Symantec Corporation. All rights reserved.
is lost on the entire volume. When the disk is replaced, the entire plex must be
brought up-to-date, or resynchronized.
Note: When creating a volume, all storage attributes that you specify for use must
belong to the same disk group. Otherwise, VxVM does not use these
storage attributes to create a volume.
When you install the add-on, new wizards are added to the Solutions page on the
VOM console as shown on the slide.
Using this add-on, you can create storage templates from existing virtual storage
devices, such as volumes and file systems. The add-on extracts all the properties of
the virtual storage device, and recreates the entire stack. The supported file
systems are Veritas File System (VxFS) and NTFS.
Copyright 2012 Symantec Corporation. All rights reserved.
to the user as modifiable input fields when the template is used for provisioning
storage.
For details on the different methods used to create a storage template and all the
parameters that can be set, refer to the Veritas Storage Foundation Add-on for
Storage Provisioning User's Guide.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 5: Working with Volumes with Different Layouts, page A-63
Appendix B provides complete lab instructions and solutions.
Lab 5: Working with Volumes with Different Layouts, page B-107
CONFIDENTIAL - NOT FOR DISTRIBUTION
142 524 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Lesson 6
Making Configuration Changes
Copyright 2012 Symantec Corporation. All rights reserved.
Only disks in the same disk group as the volume can be used to create the new
Copyright 2012 Symantec Corporation. All rights reserved.
mirror. Unless you specify the disks to be used for the mirror, VxVM
automatically locates and uses available disk space to create the mirror.
A volume can contain up to 32 plexes (mirrors); however, the practical limit is 31.
One plex should be reserved for use by VxVM for background repair operations.
Removing a mirror
When a mirror (plex) is no longer needed, you can remove it. You can remove a
mirror to provide free space, to reduce the number of mirrors, to remove a
temporary mirror.
Caution: Removing a mirror results in loss of data redundancy. If a volume only
has two plexes, removing one of them leaves the volume unmirrored.
CONFIDENTIAL - NOT FOR DISTRIBUTION
145 Lesson 6 Making Configuration Changes Copyright 2012 Symantec Corporation. All rights reserved.
63
Migrating data to a new array
Without Storage Foundation, moving data from one array to another requires
downtime. Using Storage Foundation, you can mirror to a new array, ensure it is
stable, and then remove the plexes from the old array. No downtime is necessary.
This is useful in many situations, for example, if a company purchases a new array.
The high level steps for migrating data using Storage Foundation are listed on the
slide. Note that if you have multiple volumes on the old array, you would need to
repeat steps 6 to 9 for each volume. The following steps illustrate the commands
you need to use to perform the migration using a simple example where the appvol
volume in the appdg disk group is moved from the emc0 enclosure to the emc1
enclosure. To keep the example simple, only one LUN is used to mirror the simple
volume.
1 Set up LUNs on the new array.
Copyright 2012 Symantec Corporation. All rights reserved.
2 Get the OS to detect the LUNS. For example, type devfsadm on a Solaris
system.
3 vxdisk scandisks new (for VxVM to recognize LUNS from the new
emc1 enclosure)
4 vxdisksetup -i emc1_dd1 (Repeat for each new LUN to be used in the
volume.)
5 vxdg -g appdg adddisk appdg02=emc1_dd1
6 vxassist -g appdg mirror appvol appdg02
7 Wait for the synchronization to complete.
6
Copyright 2012 Symantec Corporation. All rights reserved.
If DRL is not used and a system failure occurs, all mirrors of the volumes must be
Copyright 2012 Symantec Corporation. All rights reserved.
restored to a consistent state by copying the full contents of the volume between its
mirrors. This process can be lengthy and I/O intensive.
When you enable logging on a mirrored volume, one log plex is created by default.
The log plex uses space from disks already used for that volume, or you can
specify which disk to use. To enhance performance, you should consider placing
the log plex on a disk that is not already in use by the volume.
Note: Before configuring the siteread policy, the Site Awareness feature must be
configured by assigning hosts and LUNs to different sites. The Site
Awareness feature is described in detail in the Veritas Storage Foundation
6.0 for UNIX: Manage and Administer course. Note that setting the
siteread policy on a volume has no impact if the site name has not been set
for the host. 6
You can also use the vxprint command to observe the read policy of a mirrored
Copyright 2012 Symantec Corporation. All rights reserved.
volume as shown in the following output extracts. Note that the fields related to the
read policy are displayed in bold font for emphasis:
The vxprint output with the default read policy:
V NAME RVG/VSET/CO KSTATE STATE LENGTH READPOL PREFPLEX
UTYPE
v appvol - ENABLED ACTIVE 2097152 SELECT -
fsgen
The vxprint output after the read policy is changed to preferred plex:
v appvol - ENABLED ACTIVE 2097152 PREFER appvol-02
fsgen
When you resize a volume, you can specify the length of a new volume in sectors,
kilobytes, megabytes, or gigabytes. The unit of measure is added as a suffix to the
length (s, k, m, or g). If no unit is specified, the default unit is sectors.
Note that this command does not change the size of the volume.
The ability to expand or shrink a file system depends on the file system type and
whether the file system is mounted or unmounted. The following table provides
some examples:
to specify a new host to which the disk group is imported at reboot. If you know
the name of the host to which the disk group will be imported, then you should
specify the new host during the operation. If you do not specify the new host, then
the disks could accidentally be added to another disk group, resulting in data loss.
You cannot specify a new host using the vxdiskadm utility.
A disk group must be deported from its previous system before it can be imported
to the new system. During the import operation, the system checks for host import
locks. If any locks are found, you are prompted to clear the locks.
To temporarily import a disk group, you use the -t option. This option does not
set the autoimport flag, which means that the import cannot survive a reboot.
To display all disk groups, including deported disk groups:
vxdisk -o alldgs list
DEVICE TYPE DISK GROUP STATUS
emc0_dd1 auto:cdsdisk appdg01 appdg online
emc0_dd2 auto:cdsdisk - (oradg) online
CONFIDENTIAL - NOT FOR DISTRIBUTION
162 620 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Renaming VxVM objects
Changing the disk media name
VxVM creates a unique disk media name for a disk when you add a disk to a disk
group. Sometimes you may need to change a disk name to reflect changes of
ownership or use of the disk. Renaming a disk does not change the physical disk
device name. The new disk name must be unique within the disk group.
Volumes are not affected when subdisks are named differently from the disks.
Using the CLI, for example, to rename the disk group appdg to oradg:
vxdg -n oradg deport appdg or vxdg deport appdg
vxdg import oradg vxdg -n oradg import appdg
From the command line, if you need to restart all volumes in the disk group:
vxvol -g new_dg_name startall
vxvol -g oradg startall
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 6: Making Configuration Changes, page A-73
Appendix B provides complete lab instructions and solutions.
Lab 6: Making Configuration Changes, page B-125
CONFIDENTIAL - NOT FOR DISTRIBUTION
168 626 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Lesson 7
Administering File Systems
Copyright 2012 Symantec Corporation. All rights reserved.
Extents allow disk I/O to take place in units of multiple blocks if storage is
allocated in consecutive blocks. This topic is analyzed in more detail in the
following pages.
7
Extent attributes
Extent attributes are the extent allocation policies associated with a file.
Online administration
A lot of the file system administration tasks, such as backing the file system up
or resizing the file system, can be performed while the file system is still
mounted. Online file system defragmentation is discussed later in this lesson.
Veritas Storage Foundation 6.0 for UNIX: Manage and Administer course.
Improved database performance
Databases can be created on the character devices to achieve the same
performance as databases created on raw disks.
Performance tuning options
The VxFS file system supports extended mount options to specify
enhanced data integrity modes, enhanced performance modes, temporary
file system modes. For more information on these modes of operation,
refer to the Veritas Storage Foundation Administrators Guide.
VxFS provides superior performance for synchronous write applications.
system, identifies the duplicate data and eliminates it without any continuous
cost.
File replication
7
Veritas File Replicator (VFR), which is available as an option to Storage
Foundation, included in the Veritas Replicator license, supports file-level
replication of application data. VFR tracks all updates to the file system and
periodically replicates these updates at the end of a configured time interval.
Cluster File System
Clustered file systems are an extension of VxFS that support concurrent direct
media access from multiple systems.
VxFS attempts to allocate each file in one extent of blocks. If this is not possible,
VxFS attempts to allocate all extents for a file close to each other.
Each file is associated with an index block, called an inode. In an inode, an extent
is represented as an address-length pair, which identifies the starting block address
and the length of the extent in logical blocks. This enables the file system to
directly access any block of the file.
VxFS automatically selects an extent size by using a default allocation policy that
is based on the size of I/O write requests. The default allocation policy attempts to
balance two goals:
Optimum I/O performance through large allocations
/lost+found/.fsadm. The lock file blocks any use of the fsadm utility
on this file system during the vxupgrade procedure.
2 The file system is frozen.
3 New file system structures are allocated and initialized.
4 The file system thaws, and the inodes are released.
5 The lock file in /lost+found/.fsadm is removed.
This process does not keep the file system frozen for more than a few seconds.
the size of the file system. For large disk configurations, running fsck is a time-
consuming process that checks, verifies, and corrects the entire file system.
The VxFS version of the fsck utility performs an intent log replay to recover a
7
file system without completing a full structural check of the entire file system. The
time required for log replay is proportional to the log size, not the file system size.
Therefore, the file system can be recovered and mounted seconds after a system
failure. Intent log recovery is not readily apparent to users or administrators, and
the intent log can be replayed multiple times with no adverse effects.
Note: Replaying the intent log may not completely recover the damaged file
system structure if the disk suffers a hardware failure. Such situations may require
a complete system check using the VxFS fsck utility.
CONFIDENTIAL - NOT FOR DISTRIBUTION
183 Lesson 7 Administering File Systems
Copyright 2012 Symantec Corporation. All rights reserved.
715
Maintaining file system consistency
You use the VxFS-specific version of the fsck command to check the consistency
of and repair a VxFS file system. The fsck utility replays the intent log by
default, instead of performing a full structural file system check, which is usually
sufficient to set the file system state to CLEAN. You can also use the fsck utility to
perform a full structural recovery in the unlikely event that the log is unusable.
The syntax for the fsck command is:
fsck [fstype] [generic_options] [-y|-Y] [-n|-N] \
[-o full,nolog] special
For a complete list of generic options, see the fsck(1m) manual page. Some of
the generic options include:
Option Description
Copyright 2012 Symantec Corporation. All rights reserved.
-o p can only be run with log fsck, not with full fsck.
CONFIDENTIAL - NOT FOR DISTRIBUTION
184 716 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
File change log
The VxFS file change log (FCL) is another type of log that tracks changes to files
and directories in a file system. Applications that can make use of the FCL are
those that are typically required to scan an entire file system to discover changes
since the last scan.
Note: The FCL records only that data has changed, not the actual data. It is the
responsibility of the application to examine the files that have changed data to
determine which data has changed.
FCL stores changes in a file in the file system namespace. The FCL log file is
always located in mount_point/lost+found/changelog.
To print the FCL, use fcladm print 0|offset mount_point.
To translate the log entries in inodes to full paths, type:
vxlsino inode_number mount_point
Copyright 2012 Symantec Corporation. All rights reserved.
The intent log is used to speed recovery of the file system after a crash. The FCL
has no such role. Instead, the FCL is used to improve the performance of
applications. For example, your IT department mandates that all systems undergo a
virus scan once a week. The virus scan takes some time and your system takes a
performance hit during the scan. To improve this situation, an FCL could be used
Types of fragmentation
VxFS addresses two types of fragmentation:
Copyright 2012 Symantec Corporation. All rights reserved.
Directory fragmentation: As files are created and removed, gaps are left in
directory inodes. This is known as directory fragmentation. Directory
fragmentation causes directory lookups to become slower. 7
Extent fragmentation: As files are created and removed, the free extent map
for an allocation unit changes from having one large free area to having many
smaller free areas. Extent fragmentation occurs when files cannot be allocated
in contiguous chunks and more extents must be referenced to access a file. In a
case of extreme fragmentation, a file system may have free space, none of
which can be allocated.
More than 50 percent of free space in extents of less than 64 blocks in length
Less than 5 percent of the total file system size available as free extents in
lengths of 64 or more blocks
Fragmentation can also be determined based on the fragmentation index. The
fragmentation report displays fragmentation indices for both the free space and the
files in the file system. A value of 0 for the fragmentation index means that the file
system has no fragmentation, and a value of 100 means that the file system has the
highest level of fragmentation. The fragmentation index is new with SF 6.0 and
enables you to determine whether you should perform extent defragmentation or
free space defragmentation.
If you use the -D and -E with the -d and -e options, fragmentation reports are
produced both before and after the reorganization.
You can use the -t and -p options to control the amount of work performed by 7
fsadm, either in a specified time or by a number of passes. By default, fsadm
runs five passes. If both -t and -p are specified, fsadm exits if either of the
terminating conditions is reached.
Note: On the Linux platform, the -T time option is used instead of the
-t time option because the -t switch is used for file system switchout
mechanism.
what you think is an appropriate interval for running extent reorganization and run
the fragmentation reports both before and after the reorganization. If the degree of
fragmentation is approaching the bad fragmentation figures, then the interval
7
between fsadm runs should be reduced. If the degree of fragmentation is low, then
the interval between fsadm runs can be increased.
You should schedule directory reorganization for file systems when the extent
reorganization is scheduled. The fsadm utility can run on demand and can be
scheduled regularly as a cron job.
The defragmentation process can take some time. You receive an alert when the
process is complete.
What is benchmarking?
Benchmarking is a testing technique that enables you to measure performance
based on a set of standards, or benchmarks. You can use benchmarking techniques
to try to predict the performance of a new file system configuration or to analyze
the performance of an existing file system.
What is vxbench?
Symantec engineering developed a benchmarking tool called vxbench that
enables you to create different combinations of I/O workloads.
The vxbench program is installed as part of the VRTSspt software installation
and exists under the /opt/VRTSspt/FS/VxBench directory.
Copyright 2012 Symantec Corporation. All rights reserved.
Command options
By adding options to the vxbench_platform command, you can simulate a
wide variety of I/O environments. The following table describes some of these
options and their uses. You can display a complete list of vxbench_platform
command options by typing vxbench_platform -h.
Option Use
-h Prints a detailed help message
-P Uses processes for users and uses threads for multithreaded I/O
(This is the default option.)
-p Uses processes for users and for multithreaded I/O
-t Uses threads for users and for multithreaded I/O
Locks I/O buffers in memory
Copyright 2012 Symantec Corporation. All rights reserved.
-m
-s For multiuser tests, only prints summary results
-v For multithreaded tests, prints per-thread results
7
-k Prints throughput in kilobytes/second (This is the default option.)
-M Prints throughput in megabytes/second
-i [suboptions] Specifies suboptions describing the test you want to perform
is created for the 1TB. The array then creates/resizes LUNs as actual data is
written to the virtual container. The administrator is not involved after the initial
virtual container is created unless the amount of actual physical storage is used up.
To truly benefit from thin storage, you need the right stack on all hosts:
A multi-pathing driver that supports the thin hardware
A file system optimized not to waste storage on thin volumes
A stack to reclaim space as you migrate to thin storage
A stack to continually optimize utilization of thin storage
SF unlocks thin provisionings full potential with DMP and VxFS which is the
only cross-platform thin storage friendly file system.
CONFIDENTIAL - NOT FOR DISTRIBUTION
194 726 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Displaying information on thin disks
SF automatically controls the applicability of features such as SmartMove and thin
reclamation based on known device attributes. If SmartMove is enabled only for
thin LUNs and a device is known to be thin by Storage Foundation, then mirroring
operations are optimized to keep the device thin. If a device is known to be
thinrclm, then SF allows thin reclamation commands to be issued to it.
SF 5.0 MP3 and later automatically discover thin LUNs and their attributes. If a
thin LUN is not automatically discovered as thin, you can use the following
command to manually inform SF that the LUN is thin or thin reclaim:
vxdisk -g diskgroup set dm_name thin=[on|reclaim]
The vxdisk -e list command prints the extended device attributes
(EXT_ATTR) as the last column to indicate the type of the device.
Copyright 2012 Symantec Corporation. All rights reserved.
To display properties of the devices that support thin provisioning, use the
vxdisk -o thin list command. This command also indicates whether the
LUN supports thin reclamation. Thin reclamation is the process of reclaiming
unused storage that is a result of deleted files and volumes back to the available 7
free pool of the thin provisioning capable array. Not all thin provisioning arrays
support thin reclamation. Use the vxdisk -o thin,fssize list command
to display and compare the physically allocated storage size to the storage size
used by the file system. If there is a big difference between the two sizes, it is time
to initiate a thin reclamation process on the corresponding device.
The vxdisk -p list command displays the discovered properties of the
disks including the attributes related to thin provisioning and thin reclamation.
Note: The Veritas file system must be mounted to get the benefits of the
SmartMove feature.
This feature can be used for faster plex creation and faster array migration.
CONFIDENTIAL - NOT FOR DISTRIBUTION
196 728 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Administering thin provisioning parameters
In SF 5.1 and later, the vxdefault command is used to modify and display the
tunable parameters that are stored in the /etc/vx/vxsf file as shown on the
slide.
The sharedminorstart tunable parameter is used with the dynamic disk group
reminoring feature. This feature is used to allocate minor numbers dynamically to
disk groups based on their private or shared status. Shared disk groups are used
with Cluster Volume Manager and are not covered in this course.
The fssmartmovethreshold defines a threshold value; only if the filesystem
%usage is less than this threshold, then the SmartMove feature is used. By default,
the fssmartmovethreshold is set to 100 which means that SmartMove is used with
all vxfs file systems with less than 100% usage.
The autostartvolumes tunable parameter turns on or off automatic volume
Copyright 2012 Symantec Corporation. All rights reserved.
recovery. If this parameter is set to on, VxVM automatically recovers and starts
disabled volumes when you import, join, move or split a disk group.
7
Thin reclamation can be triggered on one or more disks, enclosures or disk groups,
or at the file system level on a mounted VxFS file system as displayed on the slide.
When you reclaim at the file system level, the command goes through all the free 7
extents in the file system and issues the storage level reclaim on the regions which
are free. Every time the command is run, the complete file system is scanned.
VxVM is optimized to issue the reclaim only to the TP LUNs in the file system.
When you reclaim at the VxVM level, the reclaim command goes through the list
of all TP LUN-backed mounted file systems associated to the specified object, and
issues the reclaim on all the file systems. The output displays the list of volumes
skipped and the list of volumes reclaimed.
space. This is an additional option for reclamation that can only be triggered at the
file system level using the fsadm -R -A mount_point command. Note that
you can use the -o analyze option first to determine if you should perform a
normal reclaim operation or an aggressive reclaim operation.
Notes:
Aggressive reclamation can only be performed on file systems that are known
to use thin reclaim capable storage.
Aggressive reclamation can increase the thin storage usage temporarily during
the data compaction process.
The vxdg destroy diskgroup command does not reclaim any storage
automatically. The thin provision reclaimable LUNs belonging to the destroyed
disk group must be reclaimed manually using the vxdisk reclaim disk 7
command.
Labs and solutions for this lesson are located on the following pages:
Appendix A provides complete lab instructions.
Lab 7: Administering File Systems, page A-85
Appendix B provides complete lab instructions and solutions.
Lab 7: Administering File Systems, page B-147
CONFIDENTIAL - NOT FOR DISTRIBUTION
203 Lesson 7 Administering File Systems Copyright 2012 Symantec Corporation. All rights reserved.
735
Copyright 2012 Symantec Corporation. All rights reserved.
205
Labs
Appendix A
Note: In the following exercises, the virtual machines are identified by the system
names in the preceding table.
by the instructor
vom User: root
Password: veritas
sym1 User: root
Password: veritas
sym2 User: root
Password: veritas
A
Two parallel versions of the labs enable you to choose the level of detail that suits
Copyright 2012 Symantec Corporation. All rights reserved.
In this exercise, you start the virtual machines and display the existing snapshots
for each virtual machine.
mgt
3par
Note: The first two virtual machines must be turned on at all times during all lab
testing. Failure to start the mgt and 3par virtual machines results in
missing files and missing shared LUNs.
vom
sym1
sym2
Log on to each virtual machine to become familiar with the logon procedures for
each system type.
Note: Do not log onto the mgt and 3par virtual machines unless the instructor
requests you to do so.
vom
sym1
2 Log on to the first Storage Foundation Server (sym1) as the root user.
sym2
3 Log on to the second Storage Foundation Server (sym2) as the root user.
4 Press Ctrl+Alt to release keyboard and mouse controls from the virtual
Copyright 2012 Symantec Corporation. All rights reserved.
machine.
Adjust the VMware view controls to become familiar with navigating a virtual
machine.
vom
1 Select View > Quick Switch to enable the Quick Switch view.
How is the Quick Switch view different from the default view?
Note: When working through the lab exercises, use the F11 shortcut to toggle
between the default and Quick Switch views, as desired.
Copyright 2012 Symantec Corporation. All rights reserved.
vom
4 Use the nslookup command to view the fully qualified host name of the first
Storage Foundation Server (sym1).
sym1
8 Use the nslookup command to view the fully qualified host name of the
second Storage Foundation Server (sym2).
9 Ensure that iSCSI LUNs are available using the fdisk -l command.
Note: The mgt and 3par virtual machines must be running to have access to the
iSCSI LUNs. If only the sda and sdb disks are visible, contact the
instructor to isolate the issue.
sym2
13 Use the nslookup command to view the fully qualified host name of the
VOM management server (vom).
14 Ensure that iSCSI LUNs are available using the fdisk -l command.
Note: The mgt and 3par virtual machines must be running to have access to the
iSCSI LUNs. If only the sda and sdb disks are visible, contact the
instructor to isolate the issue.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Note: These exercises are to be used only if the class is using the hosted Hatsize
platform to access the lab environment. Exercises for other environments,
such as VMware Workstation, are located elsewhere in this document.
Two parallel versions of the labs enable you to choose the level of detail that suits
Copyright 2012 Symantec Corporation. All rights reserved.
Server
sym1 Storage Foundation S#.sym1
Server
sym2 Storage Foundation S#.sym2
Server
Log on to Hatsize and connect to the first system. For each lab environment in
Hatsize, a particular virtual machine is marked as a primary machine. All other
machines are marked as secondary machines. When you connect to the Hatsize
interface, you are initially connected to the primary virtual machine.
1 Locate the Hatsize portal URL and login credentials from your registration
e-mail. Record your credentials here:
Hatsize username:
Hatsize password:
2 Your student number is the number at the end of your Hatsize username
recorded in the previous step.
Note: When you use the Hatsize environment, all of the virtual machines
assigned to you are prefixed with a letter and your student number. For
example, if your student number is 8, the virtual machine named vom is
named something like k8-vom or s8-vom. Because the prefix is
different for each student, the lab exercises refer only to the system
name without the prefix.
3 In Internet Explorer, open the Hatsize portal URL and log in with your
Copyright 2012 Symantec Corporation. All rights reserved.
4 After logging in, find your class in the Current Classes table and click Enter.
Note that the name of your class will be different than the sample shown here.
5 In the Agenda for your class, find the Day 1 lab session and click OPEN.
6 Confirm that you see the primary machine connecting. Note that the machine
name you see will be different than the one shown in the following sample
Copyright 2012 Symantec Corporation. All rights reserved.
8 Click in the console window and log in to sym1 using the following
credentials:
Username root
Password veritas
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
sym2
2 Click in the console window and log in to the sym2 system using the following
credentials:
Username root
Password veritas
sym1
vom
5 Click in the console window and log in to vom using the following credentials:
A
Username root
Password veritas
CONFIDENTIAL - NOT FOR DISTRIBUTION
227 Lab 1: Hatsize Introduction Copyright 2012 Symantec Corporation. All rights reserved.
A23
6 Use the Operations menu to disconnect the secondary machine.
sym1
7 Using the Window menu, verify that the console window for the vom system
is closed.
Note: In further labs, use the steps you practiced in this exercise to navigate
between different virtual lab systems in the Hatsize environment. The lab
solutions will no longer display the steps needed to navigate from one
virtual machine to another.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
4 Use the nslookup command to view the fully qualified host name of the
second Storage Foundation Server (sym2).
5 Ensure that iSCSI LUNs are available using the fdisk -l command.
sym2
9 Use the nslookup command to view the fully qualified host name of the
Copyright 2012 Symantec Corporation. All rights reserved.
10 Ensure that iSCSI LUNs are available using the fdisk -l command.
vom
14 Use the nslookup command to view the fully qualified host name of the first
Storage Foundation Server (sym1).
If the lab steps instruct you to restart a VMware machine, you must preserve the
system state during the process. Otherwise, the machine is restored to the initial
state and loses any changes you have made. Only discard the state of the machine
after consulting with your instructor. There are two methods, either within the
operating system on the virtual machine, or in the console System Control menu.
sym2
2 From a terminal window, use the shutdown -ry now command to restart
the virtual machine.
sym1
Note: In this portion of the lab, you do not actually restart the virtual machine;
you stop at the screen where you can restart.
Copyright 2012 Symantec Corporation. All rights reserved.
4 If enabled for your course, you can start, stop, and restart the virtual machine,
either keeping state or discarding state. As previously mentioned, you do not
discard state without first consulting with your instructor.
Note: Do not click Do Action here. Instead, click Close. If you restart, you
may have to wait longer to start the next lab while the machine restarts.
5 At the end of the session, or when otherwise necessary, you can use the File
menu to quit out of the console.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
/etc/grub.conf
/etc/modprobe.conf
2 If you have access to the Internet, start a Web browser and navigate to the
Symantec Operations Readiness Tools (SORT) Web site at
https://sort.symantec.com. In the SORT section, click the link for
My SORT. Under the Custom Reports section, click the Data Collector tab.
Select the link for the Linux (x86-64) operating system. Save the SORT data
collector sharball to a local directory, such as /var/tmp, or to the Desktop.
If you do not have access to the Internet, copy the SORT data collector sharball
located in the /student/software/sf/sort directory to a local
directory, such as /var/tmp.
Note: The SORT data collector is updated for each release. You can download
the latest version from https://sort.symantec.com.
Copyright 2012 Symantec Corporation. All rights reserved.
3 Decompress the SORT data collector sharball you copied to the local directory.
Note that you may need to change file permissions to execute the sharball or
run it using sh. When the Would you like to run the data
collector now? prompt is displayed, enter n.
4 Run SORT data collector and verify completion using displayed text output.
a Start the SORT utility. If you need to install Storage Foundation on more A
than one system, start the SORT utility to check all systems.
e When prompted on which system to run the report, select option 2) One
or more remote systems and press Enter to continue.
f When prompted, type the names of the systems that you desire to test.
Note: SORT data collector uses the same code base as the CPI installer, so
you can specify multiple systems of the same OS and the utility
includes all specified systems in the test. A single XML file is
created that includes all systems.
g Provide the user name for accessing remote systems if you entered a
system other than the system that contains the SORT utility.
h After the SORT data collector checks for partial clusters and performs
some basic data collection, choose the Symantec enterprise product you
want to install or upgrade to. Select option 1) Veritas Storage
Foundation and press Enter to continue.
i Choose the product version to which you want to install or upgrade. Select
option 1) 6.0 and press Enter to continue.
Copyright 2012 Symantec Corporation. All rights reserved.
j The SORT data collector collects data and generates XML and TXT report
files. If the system has access to the SORT Web site you are prompted to
upload the file. Otherwise, a message is displayed stating that the SORT
Web site cannot be accessed and describing how to manually upload the
file.
k When all tasks have been completed, you are prompted to exit the data
collector; select y.
Note: Uploading the SORT .xml report to the SORT Web site requires that
there be access to the Internet from the classroom lab. If an external
connection is not available, the .xml file can be saved to a USB drive
and these steps can be performed at a later date.
6 Using the displayed output, determine if the system is ready for installation.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Open a terminal window and navigate to the directory that contains the Storage
Foundation 6.0 installer script.
d Type y to agree to the terms of the End User License Agreement (EULA).
f Type the names of your two systems when prompted. The server where the
installer script was executed on is the default value.
System communications
Release compatibility
Installed product
Prerequisite patches and rpms
Platform version
File system free space
Product licensing
Product prechecks
If you discover any issues, report them at this time.
i Select 2 for the Enable keyless licensing and complete system licensing
later option.
Notes:
Your lab systems are already configured with the PATH and MANPATH
environment variable settings. However, in a real-life environment, you
must modify /usr/.bash_profile or /etc/profile yourself.
The VxVM commands in the /opt/VRTS/bin directory are linked to
the same commands in /usr/lib/vxvm/bin.
4 Verify that Storage Foundation 6.0 packages have been properly installed.
5 View the log files from the installation using the location specified at the end
of the installation. The log file directory is located in
/opt/VRTS/install/logs.
6 Use the vxlicrep command to view the keys that were installed during the
installation.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Open a terminal window and navigate to the directory that contains the Storage
Foundation 6.0 installer script.
d Type the names of your two systems when prompted. The server where the
installer script was executed is the default value.
System communications
Release compatibility
Installed product
Platform version
Copyright 2012 Symantec Corporation. All rights reserved.
Product prechecks
If you discover any issues report them at this time.
3 Perform a version check of the installed Storage Foundation 6.0 systems. Start
the installer script with the -version option. Specify the sym1 and
sym2 system names.
CONFIDENTIAL - NOT FOR DISTRIBUTION
242 A38 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Note: The SF installer script is designed to check for SSH
communications first and then RSH communications if SSH is not
available.
Note: The installer script attempts to contact the SORT Web site to
check for product updates.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
The VEA GUI client package has been removed from the Storage Foundation
installed packages, although the object bus (VRTSob) is still present. This section
covers how to enable the server and install the VEA GUI client if desired.
4 Attempt to start the VEA GUI using the vea command. Observe the message
displayed.
Copyright 2012 Symantec Corporation. All rights reserved.
8 Verify that you can start the VEA GUI and connect to the local host.
10 Click the Connect to a Host or Domain link and connect to your system as
root.
11 On the left pane (object tree) view, navigate the system and observe the various
categories of VxVM objects.
12 Select the Assistant perspective, on the quick access bar and view tasks for
systemname.
13 Using the System perspective, determine which disks are available to the OS.
14 Execute the Disk Scan command and check if any messages are displayed on
the Console view.
17 Create a root equivalent administrative account named admin1 for use of VEA.
18 Test the new account. After you have tested the new account, exit VEA.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 From the command line, invoke the text-based VxVM menu interface using
the vxdiskadm command.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 From the command line, invoke the VxVM manual pages as follows and then
read about the vxassist command.
3 From the command line, invoke the VxVM manual pages to read about the
vxdisk command.
5 From the command line, invoke the VxVM manual pages to read about the
vxdg command.
7 From the command line, invoke the VxVM manual pages to read about the
vxprint command.
A
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
To perform this lab, you use the vom virtual machine, which is a Linux server that
is used to install and configure the VOM management server (MS). The other lab
systems (sym1 and sym2) already have SF 6.0 installed. Before starting this lab,
ensure that the VOM virtual machine is turned on.
Copyright 2012 Symantec Corporation. All rights reserved.
Object Value
root password veritas
VOM management server root veritas
password
Host name - Management server vom
Host name - Managed hosts sym1
sym2
Boot disk on lab systems: sda
Shared data disks: emc0_dd7 - emc0_dd12
3pardata0_49 - 3pardata0_60
Location of VOM 4.1 software: /student/software/vom/vom41
vom
1 On your system, navigate to the directory that contains the binary for the VOM
central management server
(Veritas_Operations_Manager_CMS_4.1_Linux.bin binary).
2 Copy the CMS binary to the /tmp directory. Then, navigate to the /tmp
directory. If necessary, change the permissions of the file so that the file is
executable. Execute the binary.
Note: You cannot execute this binary from an NFS share. If you do, the
extraction of the packages fails.
4 Open a Web browser and type the URL shown at the completion of the
installation. If the browser is unable to resolve the system name, replace the
system name with the IP address or use the fully qualified host name.
Notes:
This URL is only used for configuration. Do not use it after the VOM
management server is configured.
You may be prompted to choose a digital certificate. If a certificate is
displayed, choose the most appropriate certificate.
Copyright 2012 Symantec Corporation. All rights reserved.
5 You are prompted for a password. Type the root user and password for the
system that the VOM server was installed on.
8 Next, you are asked whether to Enable Analytics Gathering. This allows
Symantec to track the usage of the product so as to optimize the user interface
for future versions of this product. For the purpose of the labs, remove the tick.
Click Finish to complete the configuration.
9 After you complete all of the configuration steps, click the Launch Web
Console button. Log into the Web console as the root user.
Copyright 2012 Symantec Corporation. All rights reserved.
This section requires an additional system that has SF 6.0 pre-installed but is not
already configured in the VOM MS. For this lab section, use the sym1 and sym2
virtual machines.
sym1
1 Open a terminal window and use the ps -ef command to determine if the
vxsvc daemon is running. If it is not, use vxsvcctrl activate followed
by vxsvcctrl start to start the daemon.
Note: You are enabling the vxsvc service now for ease of use later in the lab.
2 Verify that the service (isisd) is online (enabled) on the system to be added
as a managed host on the MS server.
sym2
3 Open a terminal window and use the ps -ef command to determine if the
vxsvc daemon is running. If it is not, use vxsvcctrl activate followed
by vxsvcctrl start to start the daemon.
Note: You are enabling the vxsvc service now for ease of use later in the lab.
Copyright 2012 Symantec Corporation. All rights reserved.
4 Verify that the service (isisd) is online (enabled) on the system to be added
as a managed host on the MS server.
5 If the Web console is already open, skip this step. Otherwise, open a Web
browser and type the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate; click the buttons
necessary to continue to this Web site. Log on using the root username and
password for your server.
6 Select the Settings tab, and then from the submenu, select Host Management.
7 From the Actions pull-down menu, select Add Hosts(s). A new Add Host(s)
window opens.
8 Type the fully qualified host name of the first system to be added as a managed
host (sym1.example.com). Type root for the username and the root
password.
9 Click the Add Entries button and type the fully qualified hostname of the
second system to be added as a managed host (sym2.example.com). Type
root for the username and the root password.
Note: The VOM MS server and the managed host must be time synchronized.
Check the system times using the date command to ensure that the
time difference between the two systems is not greater than five
minutes.
Copyright 2012 Symantec Corporation. All rights reserved.
12 Verify that your hosts have been added. If so, they are now visible when you
navigate to Manage > Servers > Hosts.
vom
1 If the Web console is already open, skip this step; otherwise, open a Web
browser and type the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate. Click the link to
continue to this Web site. Log on using the root username and password for
your server.
2 Select the Settings tab and then, from the sub menu, select Deployment
Management.
4 In the Upload to Repository window, click the Browse button and browse to
the folder that contains the Active Management add-on (VRTSsfmunixadm-
4.1.100.0.sfa). Typically, this is located in /student/software/
vom/vom41/add-ons. If it is not, ask the instructor for the correct location.
Select the VRTSsfmunixadm-4.1.100.0.sfa file and click Open. Click
the Upload button to begin the upload of the add-on to the VOM MS. When
the upload is complete, click the Close button to exit the Upload to
Repository window.
Installed.
6 Select the Storage Foundation Administration for Unix add-on radio button
from the Deployment Management Repository. Then from the Actions pull-
down menu, select install. A new Install Solution window is displayed.
7 In the Install Solution window, click the Install button to start the deployment
A
of the add-on. After the deployment completed, the following message is
displayed:
8 The browser now displays the Deployment Summary. Note that the Result
shows Enabled.
Note: After the Web server is restarted, you may be asked to log back into the
Web console.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
CAUTION In this lab, do not include the boot disk in any of the tasks.
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four empty and unused
external disks to be used during the labs. A
Note: If there are multiple paths to each disk, the fdisk -l output will show a
higher number of devices than actually present.
Lab information
In preparation for this lab, you need the following information about your lab
environment.
Object Value
root password veritas
Host names of lab systems vom
sym1
Shared data disks: emc0_dd7 - emc0_dd12
3pardata0_49 - 3pardata0_60
sym1
1 View all the disk devices on the system. What is the status of the disks assigned
to you for the labs?
2 Choose a disk (emc0_dd7) and initialize it, if necessary, using the CLI. Using
the vxdisk -o alldgs list command observe the change in the Status
column. What is the status of the disk now?
Do not initialize the sda device, this is the system boot disk.
3 Create a new disk group using the disks you initialized in the previous step
(emc0_dd7). Name the new disk group appdg. Observe the change in the disk
status.
5 Create a Veritas file system on the appvol volume, mount the file system to the
/app directory. Create the directory if it does not exist.
7 Unmount the /app file system, verify the unmount, and remount using the
Copyright 2012 Symantec Corporation. All rights reserved.
mount -a command to mount all file systems in the file system table.
8 Identify the amount of free space in the appdg disk group. Try to create a
volume in this disk group named largevol with a size slightly larger than the
available free space, for example 2g on standard Symantec classroom systems.
What happens?
9 Choose a second disk (emc0_dd8), initialize it, if necessary, and add it to the A
appdg disk group. Observe the change in free space.
12 List the disk groups on your system using the vxdg list command.
13 Display disk property information for each disk in the appdg disk group using
the vxdisk -p list command. From the output record the following
information:
14 Display the OS native names for all the disks using the vxdisk -e list
command.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Unmount the /app file system and remove it from the file system table.
2 Remove the largevol volume in the appdg disk group. Observe the disk group
configuration information using the vxprint -g appdg -htr command.
3 Remove the second disk (appdg02) from the appdg disk group. Observe the
change in its status.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Mount the appvol volume to the /app directory. Do not add the entry to the
file system table.
2 Copy some data files into the /app file system. For this test, use the files
located in the /etc/default directory. List the contents of the /app
directory after the copy has completed.
6 To prove that the data files have not been destroyed, recreate the appdg disk
group and the appvol volume using the exact same steps as used in Exercise 1 -
steps 3-4. DO NOT create a new file system on the appvol volume.
7 Mount the appvol volume to the /app directory and list the contents of the
directory. The data files should still exist.
10 Use the vxdiskunsetup command with the -o shred option to shred the
disk that was used in the appdg disk group for the appvol volume. This
command may take a while to compete.
13 Attempt to mount the appvol volume to the /app directory. What happened?
vom
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
2 View all the disk devices on the system. What is the status of the disks assigned
to you for the labs?
4 Create a new disk group using the disk you initialized in the previous step.
Name the new disk group appdg. Observe the change in the disk status.
5 Using VOM, create a new 1g volume in the appdg disk group. Name the new
volume appvol. Create a file system on it and make sure that the file system is
mounted at boot time to /app directory.
6 Check if the file system is mounted and verify that there is an entry for this file
Copyright 2012 Symantec Corporation. All rights reserved.
7 View the properties of the disk in the appdg disk group and note the Size and
the Unallocated fields.
Size ___________________________
Unallocated ___________________
8 Try to create a second volume, largevol, in the appdg disk group and specify a
size slightly larger than the unallocated space on the existing disk in the disk
CONFIDENTIAL - NOT FOR DISTRIBUTION
264 A60 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
group, for example 2g in the standard Symantec classroom systems. Do not
create a file system on the volume. What happens?
10 Create the same volume, largevol, in the appdg disk group using the same size
as in step 8. Do not create a file system.
11 Observe the volumes displayed in the Volumes in Disk Group table. Can you
tell which volume has a mounted file system?
vom
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 Unmount both /app and /large file systems using VOM. Accept to remove
the file systems from the file system table if prompted. Check if the file
systems are unmounted and verify that any corresponding entries have been
removed from the file system table.
3 Select the Administer button, All Disk Groups, and then select the appdg disk
group. View the Disks tab. Observe the disks in the appdg disk group. Can you
identify which disk is empty?
4 Remove the disk you identified as empty from the appdg disk group.
5 Observe all the disks on the system. What is the status of the disk you removed
from the disk group?
7 Observe all the disks on the system. What is the status of the disks?
End of lab
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four empty and unused
Copyright 2012 Symantec Corporation. All rights reserved.
external disks to be used during the labs. Optional labs require the VOM
management server to be pre-installed and the SF servers to be managed hosts.
sym1
a If you have completed the Creating a Volume and File System lab
(lab 4), you should already have some initialized disks. You will need four
disks for this lab. If four disks are not initialized, then initialize the needed
disks from the same enclosure for use in Volume Manager (all disks on the
EMC array).
2 Create a 50-MB concatenated volume in appdg disk group called appvol with
one drive.
3 Display the volume layout. What names have been assigned to the plex and
subdisks?
5 Create a 50-MB striped volume on two disks in appdg and specify which two
disks to use in creating the volume. Name the volume stripevol.
6 Create a 20-MB, two-column striped volume with a mirror in appdg. Set the
Copyright 2012 Symantec Corporation. All rights reserved.
7 Create a 20-MB, two-column striped volume with a mirror. Set the stripe unit
size to 128K. Select at least one disk that you should not use. Name the volume
2colstrvol.
A
Was the volume created?
9 Create the same volume specified in the previous step using the same three
disks, but without the mirror. However, this time first determine what the
maximum size that the volume can be based on the remaining free space.
Create the volume with the maximum possible size for this layout.
b Create a new volume with the maximum possible volume size for the
layout specified in the previous step.
Note: Only perform the remaining steps if you do not intend to complete the
optional exercises towards the end of this lab. Otherwise, skip the next two
steps.
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
Note: Storage Provisioning requires that the Veritas Storage Foundation Add-on
for Storage Provisioning is installed. This lab section covers the steps to
install the add-on and to set up storage provisioning.
vom
1 If the Web console is already open, skip this step, otherwise, open a Web
browser and enter the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate, click the link to
continue to this Web site. Log on using the root username and password for
your server.
2 Select the Settings tab, then from the sub menu select Deployment
Management.
4 In the Upload to Repository window, click the Browse button and browse to
the folder that contains the Storage Provisioning add-on
(VRTSsfmvtp-4.1.119.0.sfa). This software is in
/student/software/vom/vom41/add-ons. Select the
VRTSsfmvtp-4.1.119.0.sfa file and click Open. Click the Upload
button to begin the upload of the add-on to the VOM MS. When the upload is
complete, click the Close button to exit the Upload to Repository window.
6 Select the Storage Provisioning add-on radio button from the Deployment
Management Repository. Then from the Actions pull-down menu, select
Install. A new Install Solution window will open.
7 In the Install Solution window, Click the Install button to start the
deployment of the add-on. After the deployment completes you will receive
the following message. Click the Ok button to close the wizard.
8 The browser will now display the Deployment Summary. Note that the
Result shows Enabled.
9 On a terminal session on the VOM management server, restart the Web server.
12 Using the VxFS file system created in the previous step, create a storage
template.
14 Using the storage template created in step 12, provision storage in the webdg
disk group on sym2.example.com.
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
Note: In order to perform the tasks in this exercise, you should have at least four
disks in the disk group that you are using.
sym1
1 First, ensure that any volumes created in the previous labs are removed from
the appdg disk group. You may need to first unmount any volumes that have
mounted file systems.
2 Create a 100-MB Striped Mirrored volume with no logging. Name the volume
strmirvol.
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
sym1
a Using the vi editor, create a file called vxassist that includes the
following:
nmirror=3
b Using the vi editor, create a file called alt_vxassist that includes the
following:
stripeunit=256k
Copyright 2012 Symantec Corporation. All rights reserved.
4 View the layout of these volumes using vxprint -g appdg -htr. What
do you notice?
5 Remove any vxassist default files that you created in this optional lab
section. The presence of these files can impact subsequent labs where default
behavior is assumed.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
Copyright 2012 Symantec Corporation. All rights reserved.
To perform this lab, you need two lab systems with Storage Foundation pre-
installed, configured and licensed. In addition to this, you also need four external
shared disks to be used during the labs.
At the beginning of this lab, you should have a disk group called appdg that has
four external disks and no volumes in it.
sym1
Note: In order to perform the tasks in this exercise, you should have at least four
disks in the disk group that you are using.
1 Ensure that you have a disk group called appdg with four disks in it. If not,
create the disk group using four disks.
Note: If you have completed the previous lab steps you should already have
the appdg disk group with four disks and no volumes.
3 Display the volume layout. How are the disks allocated in the volume? Note
the disk devices used for the volume.
Notice which two disks are allocated to the first plex and record your
observation.
4 Add a mirror to appvol, and display the volume layout. What is the layout of
the second plex? Which disks are used for the second plex?
5 Add a dirty region log to appvol and specify the disk to use for the DRL.
Copyright 2012 Symantec Corporation. All rights reserved.
6 Add a second dirty region log to appvol and specify another disk to use for the
DRL. Display the volume layout.
7 Remove the first dirty region log that you added to the volume. Display the
volume layout. Can you control which log was removed?
A
9 Remove the original mirror (appvol-01) from appvol, and display the volume
layout.
10 Remove appvol.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
2 View the layout of the volume and display the size of the file system.
3 Add data to the volume by creating a file in the file system and verify that the
file has been added.
4 Expand the file system and volume to 100 MB. Observe the volume layout to
see the change in size. Display file system size.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
2 Add data to the webvol volume by copying the /etc/group file to the
/web file system. Verify that the file has been added.
3 Try to deport and rename the appdg disk group to webdg while the /app and
/web file systems are still mounted. Can you do it?
5 Unmount all the mounted file systems in the appdg disk group.
6 Deport and rename the appdg disk group to webdg. Then import the newly
renamed webdg disk group.
9 Mount the /app and /web file systems, and observe their contents.
sym1
1 Copy new data to the /app and /web file systems. For example, copy the file
/etc/group to /app and the file /etc/hosts to /web.
3 Unmount all file systems in the webdg disk group and deport the disk group.
Do not assign it to a new host. View all the disk devices on the system.
sym2
4 Import the webdg disk group on the other system (sym2), ensure that the
volumes in the imported disk group are all started, and view all the disk
devices on the system.
5 Mount the /app and /web file systems. Note that you will need to create the
mount directories on the other system before mounting the file systems.
Observe the data in the file systems.
7 Deport webdg and assign the original machine name (sym1) as the new host.
sym1
A
8 Import the disk group and change its name back to appdg. View all the disk
devices on the system.
9 Deport the disk group appdg by assigning the ownership to a system called
anotherhost. View all the disk devices on the system. Why would you do this?
10 Display detailed information about one of the disks in the disk group
(emc0_dd7) using the vxdisk list command. Note the hostid field in
the output.
12 Now import appdg and overwrite the disk group lock. What did you have to do
to import it and why?
13 Display detailed information about the same disk in the disk group as you did
in step 10. Note the change in the hostid field in the output.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 Create a 50-MB concatenated volume named appvol in the appdg disk group.
2 Create a Veritas file system on the volume by using the mkfs command.
Specify the file system size as 40 MB.
3 Create a mount point /app on which to the mount the file system, if it does not
already exist.
4 Mount the newly created file system on the mount point /app.
5 Verify disk space using the df command. Observe that the total size of the file
system is smaller than the size of the volume.
6 Expand the file system to the full size of the underlying volume using the
fsadm -b newsize command.
Copyright 2012 Symantec Corporation. All rights reserved.
Note: On Linux there is more than one fsadm command, you must use the
command located in /opt/VRTS/bin.
8 Make a file on the file system mounted at /app, so that the free space is less
A
than 50 percent of the total file system size.
10 Unmount the /app file system and remove the appvol volume in appdg.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
In this optional lab, you will destroy the existing appdg disk group, recreate it as a
non-cds disk group with non-cds disks and then convert the disk group to a cds
disk group.
1 Use the vxdisk -o alldgs list command to determine the disks that
are a part of the appdg disk group.
2 Destroy the existing appdg disk group using the vxdg destroy command.
4 Use the vxdisk -o alldgs list command to verify that the disk now
shows as auto:sliced.
5 Recreate the 4 disk appdg disk group as a non-cds disk group using the vxdg
init command.
Copyright 2012 Symantec Corporation. All rights reserved.
6 List the appdg disk group using the vxdg list command. Note that the cds
flag is not set.
7 Try to turn the cds flag on using the vxdg set command. Was the command
successful?
10 List the appdg disk group using the vxdg list command. Note that the cds
flag is still not set.
11 Use the vxdg set command to turn the cds flag on.
12 List the appdg disk group using the vxdg list command. Note that the cds
flag is now set.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four external disks and
the second internal disk to be used during the labs. If you do not have a second
internal disk or if you cannot use the second internal disk, you need five external
disks to complete the labs.
At the beginning of this lab, you should have a disk group called appdg that has A
four external disks and no volumes in it. The second internal disk should be empty
and unused.
sym1
1 Identify the device name for the second internal disk on your lab system.
3 Create a non-cds disk group called testdg using the internal disk you initialized
in step 2.
4 In the testdg disk group create a 1-GB concatenated volume called testvol
initializing the volume space with zeros using the init=zero option to
vxassist.
This script restores a fragmented file system onto the volume and performs a
file system check so that the volume can be mounted. Whatever files are in the
existing file system will be lost.
7 Mount the file system on /test. Note that you may need to perform a file
Copyright 2012 Symantec Corporation. All rights reserved.
8 Ensure that the directory where the vxbench command is located is included
in your PATH definition.
sym1
1 In the appdg disk group create a 1-GB concatenated volume called appvol.
Note: On Linux there is more than one fsadm command, you must use the
command located in /opt/VRTS/bin.
5 If you were shown the following extent fragmentation report about a file
system, what would you conclude?
8 Use the getext command to display the extent attributes of the files in the
/test file system.
Note: Remount the file system before running each I/O test
10 Repeat the same test for an 8Mb file on an 8Mb extent (for example, using the
/test/test58 file). Note that the file system must be remounted between
the tests. Can you explain why?
11 Defragment /test and gather summary statistics after each pass through the
file system. After the defragmentation completes, determine if /test is
fragmented? Why or why not?
12 Measure the throughput of the unfragmented file system using the vxbench
utility on the same files as you did in steps 9 and 10. Is there any change in
throughput?
Notes:
The file system must be remounted before each test to clear the read
buffers. A
If you have used external shared disks on a disk array used by other
systems for this lab, the performance results may be impacted by the disk
CONFIDENTIAL - NOT FOR DISTRIBUTION
293 Lab 7: Administering File Systems Copyright 2012 Symantec Corporation. All rights reserved.
A89
array cache and may not provide a valid comparison between a fragmented
and defragmented file system.
sym1
In this lab section, you make a larger volume so that you can see the time
difference when using the SmartMove feature.
5 Mirror the appvol volume. Record the time it takes to complete the mirror
operation.
8 Mirror the appvol volume. Record the time it takes to complete the mirror
Copyright 2012 Symantec Corporation. All rights reserved.
operation.
sym1
1 View all the disk devices on the system. Then use the vxdisk -o thin
list command to list only the thin provisioning capable devices.
2 Locate the thin provisioning and thin reclamation capable devices from the
output in the previous step. The TYPE column in the output of the
vxdisk -o thin list command should display thinrclm. Choose
two thin reclamation capable devices (3pardata0_49 and 3pardata0_50), if they
are uninitialized use the vxdisksetup command to initialize them.
Note: If you do not see any thin provisioning and thin reclamation capable
devices in the vxdisk list output, contact your instructor. You
must have thin provisioning and thin reclamation capable devices to
complete this lab section.
3 Create a new disk group using the two disks (3pardata0_49 and 3pardata0_50)
you initialized in the previous step. Name the new disk group thindg. Observe
the change in the disk status.
5 Create a Veritas file system on the volume and mount it to /thin. Do not add
the file system to the file system table.
Copyright 2012 Symantec Corporation. All rights reserved.
6 Display the size of the file system using the df -k /thin command.
8 Use the dd command to make some 400MB files on the file system mounted at
/thin, so that the free space is less than 10 percent of the total file system
size. Use the df -k /thin command to monitor the file system free space.
12 Use the vxdisk reclaim command on the thindg disk group to reclaim
the space on the LUNS.
14 Unmount the /thin file system and destroy the thindg disk group.
15 If you are NOT planning to perform the optional exercises for this lab,
unmount /test file system and destroy the testdg disk group; otherwise, skip
this step.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 In the appdg disk group create a new 10-MB volume called appvol. Create a
VxFS file system on appvol.
2 Mount the file system using the Mountlock feature and a tag of
locktest. Mount it to /app.
3 Use the mount command to view that the mount lock was set.
5 Use the fsadm command to remove the lock on the mount point.
6 Use the mount command to view that the mount lock was removed.
9 If you are NOT planning to perform the rest of the optional exercises for this
lab, unmount /test file system and destroy the testdg disk group; otherwise,
skip this step.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 In the appdg disk group create a new 10-MB volume called appvol. Create a
VxFS file system on appvol and mount it on /fcl_test.
2 Turn the FCL using the fcladm command for /fcl_test, and ensure that it
is on.
3 Navigate to the directory that contains the FCL and list the contents.
5 How do you know that there have been no changes in the file system yet?
6 Add some files to /fcl_test. Then remove one of the files you just added
and rename one of the others.
/fcl_test command.
8 How do you know that changes have been made to the file system?
9 Print the contents of the FCL using the fcladm print 1024
/fcl_test command.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
This section uses the /test file system to analyze the impact of fragmentation on
the performance of a variety of I/O types on files using small and large extent
sizes.
1 Recreate the fragmented /test file system using the following steps:
c Mount the file system to /test. Note that you may need to perform a file
system check before mounting the file system.
2 Run a series of performance tests for a variety of I/O types using the vxbench
utility to compare the performance of the files with the 8K extent size
(/test/test48) and the 8000K extent size (/test/test58) by
performing the following steps.
Copyright 2012 Symantec Corporation. All rights reserved.
Note: Results can vary depending on the nature of the data and the model of
array used. No performance guarantees are implied by this lab.
You must unmount and remount the file system /test before each step to
clear and initialize the buffer cache.
a Ensure that the directory where the vxbench utility is located is included
in your PATH definition.
b Perform a sequential read I/O test on the 8K extent size using the
vxbench command. Use an I/O size of 8k and a count of 1000 I/Os.
c Perform a sequential read I/O test on the 8000K extent size using the
Copyright 2012 Symantec Corporation. All rights reserved.
d Perform a random read I/O test on the 8K extent size using the vxbench
command. Use an I/O size of 8k and a count of 1000 I/Os.
e Perform a random read I/O test on the 8000K extent size using the
vxbench command. Use an I/O size of 8k and a count of 1000 I/Os.
3 Defragment the /test file system. The defragmentation process takes some
time.
5 Compare the results of the defragmented file system with the fragmented file
system.
6 When finished comparing the results in the previous step, unmount the
/test file system and destroy the testdg disk group.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Note: In the following exercises, the virtual machines are identified by the system
names in the preceding table.
Required parameters
The software and the scripts required during the labs throughout the course exist in
subdirectories under the /student directory on each user system as displayed on
the slide.
by the instructor
vom User: root
Password: veritas
sym1 User: root
Password: veritas
sym2 User: root
Password: veritas
Two parallel versions of the labs enable you to choose the level of detail that suits
Copyright 2012 Symantec Corporation. All rights reserved.
In this exercise, you start the virtual machines and display the existing snapshots
for each virtual machine.
b Ensure that VMware Workstation opens and that the following tabs are
present - mgt, 3par, vom, sym1 and sym2. If these tabs are not present, do
not proceed until notifying the instructor.
End of Solution
Solution
b Use the Summary view to locate the Devices tab and review the
information showing the virtual machine configuration.
c Click each of the remaining tabs and review the Devices pane information
for each virtual machine.
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
mgt
Solution
c While the virtual machine is starting, proceed to the next virtual machine.
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
End of Solution
CAUTION Do not proceed to the next step until the login screen is visible on
both mgt and 3par. The mgt server will show a typical RHEL
graphical logon screen, while the 3par server will stop at a CLI
login prompt.
Note: The first two virtual machines must be turned on at all times during all lab
testing. Failure to start the mgt and 3par virtual machines results in
missing files and missing shared LUNs.
Copyright 2012 Symantec Corporation. All rights reserved.
vom
Solution
c While the virtual machine is starting, proceed to the next virtual machine. B
End of Solution
sym1
Solution
c While the virtual machine is starting, proceed to the next virtual machine.
End of Solution
sym2
Solution
End of Solution
Log on to each virtual machine to become familiar with the logon procedures for
each system type.
Note: Do not log onto the mgt and 3par virtual machines unless the instructor
requests you to do so.
vom
b On the login screen of the vom server, type the username and click the
Enter key.
c When prompted, type the password for this system and click the Enter key.
Password: veritas
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
2 Log on to the first Storage Foundation Server (sym1) as the root user.
Solution
Password: veritas
End of Solution
sym2
3 Log on to the second Storage Foundation Server (sym2) as the root user.
Solution
b On the login screen of the sym2 server, type the username and click the
Enter key.
c When prompted, type the password for this system and click the Enter key.
Password: veritas
End of Solution
4 Press Ctrl+Alt to release keyboard and mouse controls from the virtual
machine.
Adjust the VMware view controls to become familiar with navigating a virtual
machine.
vom
1 Select View > Quick Switch to enable the Quick Switch view.
How is the Quick Switch view different from the default view?
Solution
The workspace is enlarged to fit the screen, including the other virtual machine
tabs.
End of Solution
Solution
If the view does not change, press Ctrl+Alt on the keyboard to release controls
from the virtual machine and press F11 again.
End of Solution
Note: When working through the lab exercises, use the F11 shortcut to toggle
between the default and Quick Switch views, as desired.
Copyright 2012 Symantec Corporation. All rights reserved.
vom
Solution
End of Solution
Solution
ping 10.10.2.1
ping 10.10.3.1
End of Solution
4 Use the nslookup command to view the fully qualified host name of the first
Storage Foundation Server (sym1).
Solution
nslookup sym1
End of Solution
sym1
Solution
On the desktop, right-click and select Konsole.
End of Solution
Solution
End of Solution B
Solution
ping 10.10.2.1
ping 10.10.3.1
ping 10.10.4.1
ping 10.10.5.1
End of Solution
8 Use the nslookup command to view the fully qualified host name of the
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
nslookup sym2
End of Solution
9 Ensure that iSCSI LUNs are available using the fdisk -l command.
Solution
From one of the open terminal windows, type fdisk -l.
End of Solution
Note: The mgt and 3par virtual machines must be running to have access to the
iSCSI LUNs. If only the sda and sdb disks are visible, contact the
instructor to isolate the issue.
sym2
Solution
On the desktop, right-click and select Konsole.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
b Locate the entries for the eth0, eth1, eth2 and eth3 interfaces.
End of Solution
Solution
ping 10.10.2.1
ping 10.10.3.1
ping 10.10.4.1
ping 10.10.5.1
End of Solution
13 Use the nslookup command to view the fully qualified host name of the
VOM management server (vom).
Solution
nslookup vom
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
From one of the open terminal windows, type fdisk -l.
End of Solution
Note: The mgt and 3par virtual machines must be running to have access to the
iSCSI LUNs. If only the sda and sdb disks are visible, contact the
instructor to isolate the issue.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Note: These exercises are to be used only if the class is using the hosted Hatsize
platform to access the lab environment. Exercises for other environments,
such as VMware Workstation, are located elsewhere in this document.
Two parallel versions of the labs enable you to choose the level of detail that suits
Copyright 2012 Symantec Corporation. All rights reserved.
Server
sym1 Storage Foundation S#.sym1
Server
sym2 Storage Foundation S#.sym2
Server
Hatsize interface
The screen shot in the slide shows the Hatsize interface used to access the virtual
machines. Instead of using tabs, such as the tabs in VMware Workstation, you
access Hatsize virtual machines from the Operations and Window menus. Other
key interface elements include:
Title Bar: Indicates the currently connected machine and whether you have
control of the machine or are in view-only mode
Operations: Is used to connect to additional virtual machines
Window: Is used to switch between active virtual machines
System Control: Is used to start, stop and restart virtual machines
Time remaining: Indicates the time remaining in the session
Copyright 2012 Symantec Corporation. All rights reserved.
Log on to Hatsize and connect to the first system. For each lab environment in
Hatsize, a particular virtual machine is marked as a primary machine. All other
machines are marked as secondary machines. When you connect to the Hatsize
interface, you are initially connected to the primary virtual machine.
1 Locate the Hatsize portal URL and login credentials from your registration
e-mail. Record your credentials here:
Hatsize username:
Hatsize password:
2 Your student number is the number at the end of your Hatsize username
recorded in the previous step.
Note: When you use the Hatsize environment, all of the virtual machines
assigned to you are prefixed with a letter and your student number. For
example, if your student number is 8, the virtual machine named vom is
named something like k8-vom or s8-vom. Because the prefix is
different for each student, the lab exercises refer only to the system
name without the prefix.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
B
The logon screen in the browser is similar to this:
End of Solution
4 After logging in, find your class in the Current Classes table and click Enter.
Note that the name of your class will be different than the sample shown here.
Sample:
Copyright 2012 Symantec Corporation. All rights reserved.
6 Confirm that you see the primary machine connecting. Note that the machine
name you see will be different than the one shown in the following sample
sym1
8 Click in the console window and log in to sym1 using the following
credentials:
Copyright 2012 Symantec Corporation. All rights reserved.
Username root
Password veritas
sym1
End of Solution
2 Click in the console window and log in to the sym2 system using the following
credentials:
Username root
Password veritas
Solution
Select Window > S#.sym1.
End of Solution
sym1
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
Select Operations > Connect To Secondary > S#.vom.
End of Solution
vom
5 Click in the console window and log in to vom using the following credentials:
Username root
Password veritas
Solution
End of Solution
sym1
7 Using the Window menu, verify that the console window for the vom system
is closed.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
Select Window and note that the vom system name is no longer displayed.
End of Solution
Note: In further labs, use the steps you practiced in this exercise to navigate
between different virtual lab systems in the Hatsize environment. The lab
solutions will no longer display the steps needed to navigate from one
virtual machine to another.
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Solution
b Locate the entries for the eth0, eth1, eth2 and eth3 interfaces.
End of Solution
Solution
ping 10.10.2.12
ping 10.10.3.12
CONFIDENTIAL - NOT FOR DISTRIBUTION
338 B34 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
ping 10.10.4.12
ping 10.10.5.12
End of Solution
Solution
Yes, the output shows a reply has been received from the sym2 IP addresses.
End of Solution
4 Use the nslookup command to view the fully qualified host name of the
second Storage Foundation Server (sym2).
Solution
nslookup sym2
End of Solution
5 Ensure that iSCSI LUNs are available using the fdisk -l command.
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym2
Solution
On the desktop, right-click and select Konsole.
End of Solution
Solution
b Locate the entries for the eth0, eth1, eth2 and eth3 interfaces.
End of Solution
Solution
ping 10.10.2.11
ping 10.10.3.11
CONFIDENTIAL - NOT FOR DISTRIBUTION
340 B36 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
ping 10.10.4.11
ping 10.10.5.11
End of Solution
Solution
Yes, the output shows a reply has been received from the sym1 IP addresses.
End of Solution
9 Use the nslookup command to view the fully qualified host name of the
VOM management server (vom).
Solution
nslookup vom
End of Solution
10 Ensure that iSCSI LUNs are available using the fdisk -l command.
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
vom
Solution
On the desktop, right-click and select Konsole.
End of Solution
Solution
End of Solution
Solution
ping 10.10.2.11
ping 10.10.3.11
End of Solution
14 Use the nslookup command to view the fully qualified host name of the first
Storage Foundation Server (sym1).
Solution
nslookup sym1
End of Solution
If the lab steps instruct you to restart a VMware machine, you must preserve the
system state during the process. Otherwise, the machine is restored to the initial
state and loses any changes you have made. Only discard the state of the machine
after consulting with your instructor. There are two methods, either within the
operating system on the virtual machine, or in the console System Control menu.
sym2
2 From a terminal window, use the shutdown -ry now command to restart
the virtual machine.
Solution
shutdown -ry now
End of Solution
Solution
Select System Control > user_name > S#.sym1.
End of Solution
4 If enabled for your course, you can start, stop, and restart the virtual machine,
either keeping state or discarding state. As previously mentioned, you do not
discard state without first consulting with your instructor.
Copyright 2012 Symantec Corporation. All rights reserved.
Note: Do not click Do Action here. Instead, click Close. If you restart, you
may have to wait longer to start the next lab while the machine restarts.
Solution
You would select an action from the list, and click Do Action. Do not select an
action at this time. Click Close instead.
End of Solution
Note: If at any time, by timeout or other condition, you are disconnected from
the primary machine, you can reconnect by selecting Operations >
Connect To Primary from the menu, as shown in the following dialog
box.
5 At the end of the session, or when otherwise necessary, you can use the File
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
Select File > Quit.
End of Solution
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
/etc/grub.conf
/etc/modprobe.conf
Solution
a cp /etc/grub.conf /etc/grub.conf.preVM
b cp /etc/modprobe.conf /etc/modprobe.conf.preVM
c fdisk -l /dev/sda
Note: This lab section shows the steps for one lab system. These steps should
be repeated for all systems that SF 6.0 will be installed on, for example
sym2.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
2 If you have access to the Internet, start a Web browser and navigate to the
Symantec Operations Readiness Tools (SORT) Web site at
https://sort.symantec.com. In the SORT section, click the link for
My SORT. Under the Custom Reports section, click the Data Collector tab.
Select the link for the Linux (x86-64) operating system. Save the SORT data
collector sharball to a local directory, such as /var/tmp, or to the Desktop.
If you do not have access to the Internet, copy the SORT data collector sharball
located in the /student/software/sf/sort directory to a local
directory, such as /var/tmp.
Solution
cp /student/software/sf/sort/sort_linux_x64.sh /var/tmp
cd /var/tmp
End of Solution
3 Decompress the SORT data collector sharball you copied to the local directory.
Note that you may need to change file permissions to execute the sharball or
run it using sh. When the Would you like to run the data
collector now? prompt is displayed, enter n.
Solution
sh ./sort_linux_x64.sh
Would you like to run the data collector now? [y,n] (y) n
End of Solution
4 Run SORT data collector and verify completion using displayed text output.
a Start the SORT utility. If you need to install Storage Foundation on more
than one system, start the SORT utility to check all systems.
Note: If your system has access to the Internet and a more recent version of the
SORT utility is available than the version you are running, you are
prompted that a newer version is available. Symantec recommends that you
always use the latest version of the SORT utility.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
./sort/sortdc
End of Solution
Solution
B
What task do you want to accomplish?
1) Installation/Upgrade report (NetBackup,
Storage Foundation and HA Solutions)
2) Risk Assessment report (Storage Foundation
and HA Solutions)
3) License/Deployment report (Storage
Foundation and HA Solutions)
4) VxExplorer report
5) NetBackup Support Utility (NBSU) report
6) Other tasks
Solution
Main Menu->Installation/Upgrade report:
End of Solution
e When prompted on which system to run the report, select option 2) One
or more remote systems and press Enter to continue.
Solution
Main Menu->Installation/Upgrade report-
CONFIDENTIAL - NOT FOR DISTRIBUTION
353 Lab 2: Installing SF and Accessing SF Interfaces Copyright 2012 Symantec Corporation. All rights reserved.
B49
>SFProductFamily:
f When prompted, type the names of the systems that you desire to test.
Note: SORT data collector uses the same code base as the CPI installer, so
you can specify multiple systems of the same OS and the utility
includes all specified systems in the test. A single XML file is
created that includes all systems.
Solution
Enter space-separated system names: [q,?] sym1
sym2
End of Solution
g Provide the user name for accessing remote systems if you entered a
system other than the system that contains the SORT utility.
Solution
Enter a user name to access the remote system(s):
[q,?] (root)
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
h After the SORT data collector checks for partial clusters and performs
some basic data collection, choose the Symantec enterprise product you
want to install or upgrade to. Select option 1) Veritas Storage
Foundation and press Enter to continue.
Solution
Choose the Symantec enterprise product you want to
install or upgrade to. If
you are installing or upgrading multiple products,
run the data collector
CONFIDENTIAL - NOT FOR DISTRIBUTION
354 B50 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
for each one.
i Choose the product version to which you want to install or upgrade. Select
option 1) 6.0 and press Enter to continue.
Solution
Choose the product version you want to install or
upgrade to on the
system(s) in your environment.
SunOS_sparc, SunOS_x86_64)
2) 5.1SP1 (AIX, HP-UX, Linux_x86_64,
SunOS_sparc, SunOS_x86_64)
3) 5.1 (AIX, Linux_x86_64, SunOS_sparc,
SunOS_x86_64)
4) 5.0MP4 (Linux_ppc64, Linux_x86_64)
5) 5.0RU4 (Linux_ppc64, Linux_x86_64)
6) 5.0RU1 (Linux_x86_64)
7) 5.0MP3 (AIX, Linux_x86_64, SunOS_sparc,
SunOS_x86_64)
j The SORT data collector collects data and generates XML and TXT report
files. If the system has access to the SORT Web site you are prompted to
upload the file. Otherwise, a message is displayed stating that the SORT
Web site cannot be accessed and describing how to manually upload the
file.
Solution
Analyzing systems: 100%
.................... Done
k When all tasks have been completed, you are prompted to exit the data
collector; select y.
Solution
Your tasks are completed. Would you like to exit
the data collector? [y,n,q](y) y
End of Solution
Solution
more /var/tmp/sort/reports/
sym1andothers_IAS_20111101_111659.txt
End of Solution
5 If you have access to the Internet, upload the SORT .xml output file to the
SORT Web site. Otherwise, skip steps 5 and 6.
Note: Uploading the SORT .xml report to the SORT Web site requires that
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
End of Solution
6 Using the displayed output, determine if the system is ready for installation.
Solution
Mark the checkbox next to Passed in the Filter View By section at the top of
the page. In the Summary for this server section, ensure that each section
displays a green icon. If any of the sections display an orange or red icon,
record the steps that need to be taken before the installation can be performed
on the following lines.
_______________________________________________________________
______________________________________________________________
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Open a terminal window and navigate to the directory that contains the Storage
Foundation 6.0 installer script.
Solution
cd /student/software/sf/sf60
End of Solution
Solution
./installer
End of Solution
d Type y to agree to the terms of the End User License Agreement (EULA).
f Type the names of your two systems when prompted. The server where the
installer script was executed on is the default value.
Solution
sym1 sym2
End of Solution
System communications
Release compatibility
Installed product
Prerequisite patches and rpms
Platform version
File system free space
Product licensing
Product prechecks
If you discover any issues, report them at this time.
h Press Enter to scroll through the list of packages and start the package
installation.
i Select 2 for the Enable keyless licensing and complete system licensing
later option.
Notes:
Your lab systems are already configured with the PATH and MANPATH
environment variable settings. However, in a real-life environment, you
must modify /usr/.bash_profile or /etc/profile yourself.
Copyright 2012 Symantec Corporation. All rights reserved.
echo $MANPATH
End of Solution
Solution
rpm -qa | grep VRTS
B
VRTSvlic-3.02.60.007-0
VRTSfsadv-6.0.000.000-GA_RHEL5
VRTSob-3.4.526-0
VRTSsfmh-4.1.119.0-0
VRTSspt-6.0.000.000-GA
VRTSlvmconv-6.0.000.000-GA_RHEL5
VRTSdbed-6.0.000.000-GA_RHEL
VRTSvxvm-6.0.000.000-GA_RHEL5
VRTSvxfs-6.0.000.000-GA_RHEL5
VRTSodm-6.0.000.000-GA_RHEL5
VRTSaslapm-6.0.000.000-GA_RHEL5
VRTSsfcpi60-6.0.000.000-GA_GENERIC
VRTSperl-5.12.2.6-RHEL5.5
VRTSfssdk-6.0.000.000-GA_RHEL5
5 View the log files from the installation using the location specified at the end
of the installation. The log file directory is located in
/opt/VRTS/install/logs.
Solution
cd /opt/VRTS/install/logs/
ls
cd installer-unique_string/
Copyright 2012 Symantec Corporation. All rights reserved.
ls
installer-unique_string.summary
installer-unique_string.response
installer-unique_string.tunables
installer-unique_string.log#
install.package.system
start.SFprocess.system
End of Solution
Solution
vxlicrep | more
-----------------***********************---------
--------
Features :=
Reserved = 0
CPU Count = Not
Restricted
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Open a terminal window and navigate to the directory that contains the Storage
Foundation 6.0 installer script.
Solution
cd /student/software/sf/sf60
End of Solution
Solution
./installer
End of Solution
d Type the names of your two systems when prompted. The server where the
installer script was executed is the default value.
Solution
sym1 sym2
End of Solution
System communications
CONFIDENTIAL - NOT FOR DISTRIBUTION
363 Lab 2: Installing SF and Accessing SF Interfaces Copyright 2012 Symantec Corporation. All rights reserved.
B59
Release compatibility
Installed product
Platform version
Product prechecks
If you discover any issues report them at this time.
3 Perform a version check of the installed Storage Foundation 6.0 systems. Start
the installer script with the -version option. Specify the sym1 and
sym2 system names.
Solution
./installer -version sym1 sym2
Installed product(s) on sym1:
Veritas Storage Foundation - 6.0
Product:
Veritas Storage Foundation - 6.0
Packages:
Installed Required packages for Veritas
Storage Foundation 6.0:
#PACKAGE #VERSION
Copyright 2012 Symantec Corporation. All rights reserved.
VRTSaslapm 6.0.000.000
VRTSfsadv 6.0.000.000
VRTSperl 5.12.2.6
VRTSsfcpi60 6.0.000.000
VRTSvlic 3.02.60.007
VRTSvxfs 6.0.000.000
VRTSvxvm 6.0.000.000
Summary:
Packages:
7 of 7 required Veritas Storage Foundation
6.0 packages installed
7 of 7 optional Veritas Storage Foundation
6.0 packages installed
Product:
Veritas Storage Foundation - 6.0
Copyright 2012 Symantec Corporation. All rights reserved.
Packages:
Installed Required packages for Veritas
Storage Foundation 6.0:
#PACKAGE #VERSION
VRTSaslapm 6.0.000.000
VRTSfsadv 6.0.000.000
VRTSperl 5.12.2.6
VRTSsfcpi60 6.0.000.000
VRTSvlic 3.02.60.007
VRTSvxfs 6.0.000.000
CONFIDENTIAL - NOT FOR DISTRIBUTION
365 Lab 2: Installing SF and Accessing SF Interfaces Copyright 2012 Symantec Corporation. All rights reserved.
B61
VRTSvxvm 6.0.000.000
Summary:
Packages:
7 of 7 required Veritas Storage Foundation
6.0 packages installed
7 of 7 optional Veritas Storage Foundation
6.0 packages installed
Note: The installer script attempts to contact the SORT Web site to
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
The VEA GUI client package has been removed from the Storage Foundation
installed packages, although the object bus (VRTSob) is still present. This section
covers how to enable the server and install the VEA GUI client if desired.
Solution
chkconfig --list |grep isisd
isisd 0:off 1:off 2:off 3:on
Copyright 2012 Symantec Corporation. All rights reserved.
Note: The chkconfig command is used to list and maintain the /etc/
rc[0-6].d directories
End of Solution
Solution
ps -ef | grep vxsvc
/opt/VRTS/bin/vxsvcctrl start
/opt/VRTS/bin/vxsvcctrl status
End of Solution
4 Attempt to start the VEA GUI using the vea command. Observe the message
displayed.
Solution
vea &
VEA GUI is no longer packaged. Symantec recommends that you use VOM to
manage, monitor, and report on multi-host environments. You can download
this utility at no charge from http://go.symantec.com/vom. If you
wish to continue using VEA GUI, you can downloaded it from the same Web
site.
End of Solution
Solution
cd /student/software/sf/vea_gui
End of Solution
Solution
rpm -ivh VRTSobgui-3.4.15.0-0.i686.rpm
End of Solution
Solution B
rm /opt/VRTS/bin/vea
ln -s /opt/VRTSob/bin/vea /opt/VRTS/bin/vea
End of Solution
8 Verify that you can start the VEA GUI and connect to the local host.
Solution
/opt/VRTS/bin/vea &
End of Solution
9 In the Select Profile window, click the Manage Profiles button and configure
VEA to always start with the Default profile.
Solution
Set the Start VEA using profile option to Default, click Close, and then
click OK to continue.
End of Solution
10 Click the Connect to a Host or Domain link and connect to your system as
root.
Solution
Hostname: (For example, sym1)
Copyright 2012 Symantec Corporation. All rights reserved.
Username: root
Password: veritas
End of Solution
11 On the left pane (object tree) view, navigate the system and observe the various
categories of VxVM objects.
12 Select the Assistant perspective, on the quick access bar and view tasks for
systemname.
CONFIDENTIAL - NOT FOR DISTRIBUTION
369 Lab 2: Installing SF and Accessing SF Interfaces Copyright 2012 Symantec Corporation. All rights reserved.
B65
13 Using the System perspective, determine which disks are available to the OS.
Solution
In the System perspective object tree, expand your host and then select the
Disks node. Examine the Device column in the grid.
End of Solution
14 Execute the Disk Scan command and check if any messages are displayed on
the Console view.
Solution
In the VEA System perspective object tree, select your host. Select Actions >
Rescan.
End of Solution
Solution
Navigate to the Log perspective. Select the Task Log tab in the right pane and
double-click the Scan for new disks task.
End of Solution
Solution
In the VEA main window, select File > Exit. Confirm when prompted.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
17 Create a root equivalent administrative account named admin1 for use of VEA.
Solution
useradd admin1
passwd admin1
c Modify the /etc/group file to add the vrtsadm group and specify the
root and admin1 users by using the vi editor, as follows:
B
vi /etc/group
d In the file, navigate to the location where you want to insert the vrtsadm
entry, change to insert mode by typing i, and then add the line:
vrtsadm::99:root,admin1
e When you are finished editing, press Esc to leave insert mode.
:wq
End of Solution
18 Test the new account. After you have tested the new account, exit VEA.
Solution
vea &
Hostname: sym1
c Select the Connect using a different user account option and click
Connect.
Copyright 2012 Symantec Corporation. All rights reserved.
d Type the username and password for the new user, as follows:
User: admin1
Password: (Type the password that you created for admin1.)
End of Solution
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 From the command line, invoke the text-based VxVM menu interface using
the vxdiskadm command.
Solution
vxdiskadm
End of Solution
Solution
Type ? at any of the prompts within the interface.
End of Solution
Solution
Type list at the main menu and then type all.
End of Solution
Solution
Type q at the prompts until you exit vxdiskadm.
B
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 From the command line, invoke the VxVM manual pages as follows and then
read about the vxassist command.
Solution
man vxassist
End of Solution
Solution
The make parameter is used in creating a volume.
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
3 From the command line, invoke the VxVM manual pages to read about the
vxdisk command.
Solution
man vxdisk
End of Solution
Solution
vxdisk -o alldgs list
B
All the available disks are displayed in the list.
End of Solution
5 From the command line, invoke the VxVM manual pages to read about the
vxdg command.
Solution
man vxdg
End of Solution
Solution
vxdg list
Note: Because you have not created any disk groups yet, the command output
shows only the header statement at this stage in the labs.
End of Solution
7 From the command line, invoke the VxVM manual pages to read about the
vxprint command.
Solution
man vxprint
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
ps -ef | grep -i vx
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
To perform this lab, you use the vom virtual machine, which is a Linux server that
is used to install and configure the VOM management server (MS). The other lab
systems (sym1 and sym2) already have SF 6.0 installed. Before starting this lab,
ensure that the VOM virtual machine is turned on.
Copyright 2012 Symantec Corporation. All rights reserved.
Object Value
root password veritas
VOM management server root veritas
password
Host name - Management server vom
Host name - Managed hosts sym1
sym2
Boot disk on lab systems: sda
Shared data disks: emc0_dd7 - emc0_dd12
3pardata0_49 - 3pardata0_60
Location of VOM 4.1 software: /student/software/vom/vom41
vom
1 On your system, navigate to the directory that contains the binary for the VOM
central management server
(Veritas_Operations_Manager_CMS_4.1_Linux.bin binary).
Solution
cd /student/software/vom/vom41
End of Solution
2 Copy the CMS binary to the /tmp directory. Then, navigate to the /tmp
directory. If necessary, change the permissions of the file so that the file is
executable. Execute the binary.
Solution
a cp Veritas_Operations_Manager_CMS_4.1_Linux.bin
/tmp
b cd /tmp
c chmod 744
Veritas_Operations_Manager_CMS_4.1_Linux.bin
d ./Veritas_Operations_Manager_CMS_4.1_Linux.bin
Note: You cannot execute this binary from an NFS share. If you do, the
extraction of the packages fails.
Solution
ps -ef | grep xprtld
End of Solution
4 Open a Web browser and type the URL shown at the completion of the
installation. If the browser is unable to resolve the system name, replace the
system name with the IP address or use the fully qualified host name.
Copyright 2012 Symantec Corporation. All rights reserved.
Notes:
This URL is only used for configuration. Do not use it after the VOM
management server is configured.
You may be prompted to choose a digital certificate. If a certificate is
displayed, choose the most appropriate certificate.
Solution
B
End of Solution
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
End of Solution
8 Next, you are asked whether to Enable Analytics Gathering. This allows
Symantec to track the usage of the product so as to optimize the user interface
for future versions of this product. For the purpose of the labs, remove the tick.
Click Finish to complete the configuration.
Solution
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
B
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
This section requires an additional system that has SF 6.0 pre-installed but is not
already configured in the VOM MS. For this lab section, use the sym1 and sym2
virtual machines.
sym1
1 Open a terminal window and use the ps -ef command to determine if the
vxsvc daemon is running. If it is not, use vxsvcctrl activate followed
by vxsvcctrl start to start the daemon.
Note: You are enabling the vxsvc service now for ease of use later in the lab.
Solution
b /opt/VRTS/bin/vxsvcctrl activate
c /opt/VRTS/bin/vxsvcctrl start
End of Solution
2 Verify that the service (isisd) is online (enabled) on the system to be added
as a managed host on the MS server.
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
3 Open a terminal window and use the ps -ef command to determine if the
vxsvc daemon is running. If it is not, use vxsvcctrl activate followed
by vxsvcctrl start to start the daemon.
Note: You are enabling the vxsvc service now for ease of use later in the lab.
Solution
b /opt/VRTS/bin/vxsvcctrl activate
c /opt/VRTS/bin/vxsvcctrl start
End of Solution
4 Verify that the service (isisd) is online (enabled) on the system to be added
as a managed host on the MS server.
Solution
chkconfig --list | grep isisd
isisd 0:off 1:off 2:off 3:on 4:off
5:on 6:off
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
5 If the Web console is already open, skip this step. Otherwise, open a Web
browser and type the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate; click the buttons
necessary to continue to this Web site. Log on using the root username and
password for your server.
Solution
https://vom.example.com:14161/
End of Solution
6 Select the Settings tab, and then from the submenu, select Host Management.
7 From the Actions pull-down menu, select Add Hosts(s). A new Add Host(s)
window opens.
8 Type the fully qualified host name of the first system to be added as a managed
host (sym1.example.com). Type root for the username and the root
password.
9 Click the Add Entries button and type the fully qualified hostname of the
second system to be added as a managed host (sym2.example.com). Type
root for the username and the root password.
Note: The VOM MS server and the managed host must be time synchronized.
Copyright 2012 Symantec Corporation. All rights reserved.
Check the system times using the date command to ensure that the
time difference between the two systems is not greater than five
minutes.
12 Verify that your hosts have been added. If so, they are now visible when you
navigate to Manage > Servers > Hosts.
vom
1 If the Web console is already open, skip this step; otherwise, open a Web
browser and type the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate. Click the link to
continue to this Web site. Log on using the root username and password for
your server.
Solution
https://vom.example.com:14161/sfm
End of Solution
2 Select the Settings tab and then, from the sub menu, select Deployment
Management.
4 In the Upload to Repository window, click the Browse button and browse to
the folder that contains the Active Management add-on (VRTSsfmunixadm-
4.1.100.0.sfa). Typically, this is located in /student/software/
vom/vom41/add-ons. If it is not, ask the instructor for the correct location.
Select the VRTSsfmunixadm-4.1.100.0.sfa file and click Open. Click
the Upload button to begin the upload of the add-on to the VOM MS. When
the upload is complete, click the Close button to exit the Upload to
Copyright 2012 Symantec Corporation. All rights reserved.
Repository window.
6 Select the Storage Foundation Administration for Unix add-on radio button
from the Deployment Management Repository. Then from the Actions pull-
down menu, select install. A new Install Solution window is displayed.
8 The browser now displays the Deployment Summary. Note that the Result
shows Enabled.
Solution
/opt/VRTSsfmcs/bin/vomsc restart sfmcswd
Veritas Operations Manager Web Console
(sfmcswd)................[STOPPED]
Veritas Operations Manager Security Service
(sfmsecd)...........[STOPPED]
Veritas Operations Manager Messaging Service
(xprtld)...........[STOPPED]
Veritas Operations Manager Database Service
(vxsfmcsdb).........[STOPPED]
Veritas Operations Manager Distributed Command Line
Daemon (vxdcli[STOPPED]
Veritas Operations Manager watchdog (sfmh-
discovery)............[OFFLINE]
Veritas Operations Manager watchdog (sfmh-
discovery)............[STARTED]
Copyright 2012 Symantec Corporation. All rights reserved.
B
10 Refresh the browser and return to the Deployment Management page by
selecting the Settings tab, and then, from the sub menu, select Deployment
Management. Verify that the Installed Status shows Enabled.
Note: After the Web server is restarted, you may be asked to log back into the
Web console.
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
CAUTION In this lab, do not include the boot disk in any of the tasks.
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four empty and unused
external disks to be used during the labs.
Note: If there are multiple paths to each disk, the fdisk -l output will show a
higher number of devices than actually present.
Lab information
In preparation for this lab, you need the following information about your lab
environment.
Object Value
root password veritas
Host names of lab systems vom
sym1
Shared data disks: emc0_dd7 - emc0_dd12
3pardata0_49 - 3pardata0_60
sym1
1 View all the disk devices on the system. What is the status of the disks assigned
to you for the labs?
Solution
vxdisk -o alldgs list
End of Solution
2 Choose a disk (emc0_dd7) and initialize it, if necessary, using the CLI. Using
the vxdisk -o alldgs list command observe the change in the Status
column. What is the status of the disk now?
CAUTION Do not initialize the sda device, this is the system boot disk.
Solution
vxdisksetup -i emc0_dd7
vxdisk -o alldgs list
The TYPE field should change to auto:cdsdisk and the STATUS of the
disk should change to online but the DISK and GROUP columns should still
be empty.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
3 Create a new disk group using the disks you initialized in the previous step
(emc0_dd7). Name the new disk group appdg. Observe the change in the disk
status.
Solution
vxdg init appdg appdg01=emc0_dd7
vxdisk -o alldgs list
Solution
vxassist -g appdg make appvol 1g
End of Solution
5 Create a Veritas file system on the appvol volume, mount the file system to the
/app directory. Create the directory if it does not exist.
Solution
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol
mkdir /app
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
End of Solution
Solution
vi /etc/fstab
/dev/vx/dsk/appdg/appvol /app vxfs rw,\
largefiles,delaylog 0 2
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
7 Unmount the /app file system, verify the unmount, and remount using the
mount -a command to mount all file systems in the file system table.
Solution
umount /app
/bin/mount | grep app
/bin/mount -a
8 Identify the amount of free space in the appdg disk group. Try to create a B
volume in this disk group named largevol with a size slightly larger than the
available free space, for example 2g on standard Symantec classroom systems.
What happens?
Solution
vxdg -g appdg free
The free space is displayed in sectors in the LENGTH column.
9 Choose a second disk (emc0_dd8), initialize it, if necessary, and add it to the
appdg disk group. Observe the change in free space.
Solution
vxdisksetup -i emc0_dd8
vxdg -g appdg adddisk appdg02=emc0_dd8
vxdg -g appdg free
End of Solution
10 Create the same volume, largevol, in the appdg disk group using the same size
as in step 8.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
Note: The 2g volume size is used as an example here. You may need to use a
value more suitable to your lab environment if you are not working in a
standard Symantec classroom.
Solution
vxprint -g appdg -htr
End of Solution
12 List the disk groups on your system using the vxdg list command.
Solution
vxdg list
If you have followed the labs so far, you should have one disk group listed
appdg.
End of Solution
13 Display disk property information for each disk in the appdg disk group using
the vxdisk -p list command. From the output record the following
information:
14 Display the OS native names for all the disks using the vxdisk -e list
command.
Solution
vxdisk -e list
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Unmount the /app file system and remove it from the file system table.
Solution
umount /app
vi /etc/fstab
Navigate to the line with the entry corresponding to the /app file system and
type dd to delete the line.
Type :wq to save and close the file.
End of Solution
2 Remove the largevol volume in the appdg disk group. Observe the disk group
configuration information using the vxprint -g appdg -htr command.
Solution
vxassist -g appdg remove volume largevol
vxprint -g appdg -htr
There should be only appvol volume, and the second disk, appdg02, should be
unused.
End of Solution
3 Remove the second disk (appdg02) from the appdg disk group. Observe the
change in its status.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdg -g appdg rmdisk appdg02
vxdisk -o alldgs list
Note that the disk is still in online state; it is initialized.
End of Solution
sym1
1 Mount the appvol volume to the /app directory. Do not add the entry to the
file system table.
Solution
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
End of Solution
2 Copy some data files into the /app file system. For this test, use the files
located in the /etc/default directory. List the contents of the /app
directory after the copy has completed.
Solution
cp /etc/default/* /app
ls -al /app
End of Solution
Solution
umount /app
/bin/mount | grep app
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
vxdg destroy appdg
End of Solution
Solution
vxdisk -o alldgs list
End of Solution
6 To prove that the data files have not been destroyed, recreate the appdg disk
group and the appvol volume using the exact same steps as used in Exercise 1 -
steps 3-4. DO NOT create a new file system on the appvol volume.
Solution
vxdg init appdg appdg01=emc0_dd7
vxdisk -o alldgs list
vxassist -g appdg make appvol 1g
End of Solution
7 Mount the appvol volume to the /app directory and list the contents of the
directory. The data files should still exist.
Solution
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
ls -al /app
End of Solution
Solution
umount /app
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdg destroy appdg
End of Solution
Solution B
Solution
vxdisksetup -i emc0_dd7
End of Solution
12 Recreate the appdg disk group and the appvol volume using the exact same
steps as used in Exercise 1 - steps 3-4. DO NOT create a new file system on the
appvol volume.
Solution
vxdg init appdg appdg01=emc0_dd7
vxdisk -o alldgs list
vxassist -g appdg make appvol 1g
End of Solution
13 Attempt to mount the appvol volume to the /app directory. What happened?
Solution
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
Copyright 2012 Symantec Corporation. All rights reserved.
The volume will not mount because the file system information was shredded.
End of Solution
Solution
vxdg destroy appdg
End of Solution
vom
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
a https://vom:14161
b A warning message may appear to advise that this has an invalid security
certificate.
End of Solution
2 View all the disk devices on the system. What is the status of the disks assigned
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
a Manage > Servers > Hosts. Click the sym1.example.com link, and
choose the Disks tab.
Normally the disks should be in Free (Uninitialized) state unless they have
already been initialized for Volume Manager use and the state would be
CONFIDENTIAL - NOT FOR DISTRIBUTION
402 B98 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
Free (Initialized).
End of Solution
B
3 Select an uninitialized disk (emc0_dd7) and initialize it, if necessary, using
VOM. Observe the change in the Status column. What is the status of the disk
now?
Solution
a Select Administer > All Disks and mark the disk to initialize.
c Verify the selected disk in the Initialize view and click Next, Finish, then
Ok.
4 Create a new disk group using the disk you initialized in the previous step.
Name the new disk group appdg. Observe the change in the disk status.
Solution
b In the Create Disk Group screen, type the name of the disk group. Ensure
that Enable Cross-platform Data Sharing (CDS) remains checked and
click Next.
c Select the newly initialized disk(emc0_dd7) and click Next, Finish and
Copyright 2012 Symantec Corporation. All rights reserved.
Ok.
The status of the disk should change to Imported and the disk media name
(Internal name) and the disk group name should be visible in the disk table.
End of Solution
Solution
c Let volume manager decide what disks to use for this volume, and click
Next to continue.
e Specify the volume size and leave the other options at their default values.
g On the File System options page, select to create a VxFS file system.
Select Show mount options and click Next.
h Enter the mount point called /app and verify that Add to file system table
is checked. Click Next.
End of Solution
6 Check if the file system is mounted and verify that there is an entry for this file
system in the file system table.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
a Select the appdg disk group link from the table. The disk group details are
displayed.
b View the details of the volumes in the disk group. The /app file system
should be listed here. Note the Mounted column.
c You can also use the command line to verify the changes as follows:
mount
cat /etc/fstab
The /app file system should show as mounted and there should be a line
CONFIDENTIAL - NOT FOR DISTRIBUTION
404B100 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
in the file system table to ensure that it is mounted at boot time.
End of Solution
B
7 View the properties of the disk in the appdg disk group and note the Size and
the Unallocated fields.
Size ___________________________
Unallocated ___________________
Solution
Select Disks tab from the Disk Group Details display.
End of Solution
8 Try to create a second volume, largevol, in the appdg disk group and specify a
size slightly larger than the unallocated space on the existing disk in the disk
group, for example 2g in the standard Symantec classroom systems. Do not
create a file system on the volume. What happens?
Solution
c Let volume manager decide what disks to use for this volume, click Next to
continue.
e Specify the volume size and leave the other options at their default values,
click Next.
Copyright 2012 Symantec Corporation. All rights reserved.
You should receive an error indicating that Volume Manager cannot allocate
the requested space for the volume, and the volume is not created.
End of Solution
Solution
b Verify that the appdg disk group is selected, and click Next.
End of Solution
10 Create the same volume, largevol, in the appdg disk group using the same size
as in step 8. Do not create a file system.
Solution
c Let volume manager decide what disks to use for this volume, click Next to
continue.
e Specify the volume size and leave the other options at their default values,
click Next.
Solution
B
View the details of the volumes in the disk group from the volumes tab. You
should notice that the mount point and mounted columns have file system
information for appvol and not for largevol.
End of Solution
Solution
a Select the largevol volume and select Actions > Create File System.
b Verify the disk group and volumes names and that the file system type is
vxfs. Select Show mount options and click Next.
c Enter the mount point, uncheck the Add to file system table option, and
click Next.
e View the details of the volumes in the disk group from the volumes tab.
You should notice that the mount point and mounted columns have file
system information now for largevol with a mount point of /large.
The /large file system should show as mounted but there should be no
change in the file system table.
Copyright 2012 Symantec Corporation. All rights reserved.
f You can also use the command line to verify the changes as follows:
mount
cat /etc/fstab
End of Solution
vom
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 Unmount both /app and /large file systems using VOM. Accept to remove
the file systems from the file system table if prompted. Check if the file
systems are unmounted and verify that any corresponding entries have been
removed from the file system table.
Solution
c Confirm the unmount and select Yes for Would you like to remove /app
from file system table?. Click Finish then OK.
d Check the largevol volume. Select Actions > Unmount File System.
Confirm the unmount.
Solution
b Select Actions > Delete. Click Next, Finish and then OK.
End of Solution
Solution B
The Usage column should show 0% for the unused disk which is the second
disk in the disk group (appdg02).
End of Solution
4 Remove the disk you identified as empty from the appdg disk group.
Solution
Mark the empty disk and select Actions > Remove. Click Next, Finish, and
OK.
End of Solution
5 Observe all the disks on the system. What is the status of the disk you removed
from the disk group?
Solution
Select sym1.example.com Summary >All Disks and observe the disks.
The disk removed in step 4 should be in Free state.
End of Solution
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
Select hostname Summary >All Disks and observe the disks listed.
If you have followed all the lab steps, you should have 4 disks in Free state;
they are already initialized but not in a disk group.
End of Solution
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four empty and unused
Copyright 2012 Symantec Corporation. All rights reserved.
external disks to be used during the labs. Optional labs require the VOM
management server to be pre-installed and the SF servers to be managed hosts.
sym1 B
a If you have completed the Creating a Volume and File System lab
(lab 4), you should already have some initialized disks. You will need four
disks for this lab. If four disks are not initialized, then initialize the needed
disks from the same enclosure for use in Volume Manager (all disks on the
EMC array).
Solution
vxdisksetup -i emc0_dd9
vxdisksetup -i emc0_d10
Perform the above command for any disks that have not been initialized for
Volume Manager use and that will be used in this lab.
End of Solution
Solution
vxdg init appdg appdg01=emc0_dd7 \
appdg02=emc0_dd8 appdg03=emc0_dd9 \
appdg04=emc0_d10
Alternatively, you can also create the disk group using a single disk device
and then add each additional disk as follows:
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxassist -g appdg make appvol 50m
End of Solution
3 Display the volume layout. What names have been assigned to the plex and
subdisks?
Solution
To view the assigned names, view the volume using:
vxprint -g appdg -htr | more
End of Solution
Solution
vxassist -g appdg remove volume appvol
End of Solution
5 Create a 50-MB striped volume on two disks in appdg and specify which two
disks to use in creating the volume. Name the volume stripevol.
Solution
vxassist -g appdg make stripevol 50m layout=stripe \
appdg01 appdg02
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
B
vxassist -g appdg make strmirvol 20m \
layout=mirror-stripe ncol=2 stripeunit=256k
End of Solution
7 Create a 20-MB, two-column striped volume with a mirror. Set the stripe unit
size to 128K. Select at least one disk that you should not use. Name the volume
2colstrvol.
Solution
vxassist -g appdg make 2colstrvol 20m \
layout=mirror-stripe ncol=2 stripeunit=128k \
\!appdg03
Note: As you are using bash as your shell environment, you must use the
escape character before the exclamation mark; for example
\!appdg03.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxassist -g appdg make 3colstrvol 20m \
layout=mirror-stripe ncol=3 appdg01 appdg02 \
appdg03
End of Solution
9 Create the same volume specified in the previous step using the same three
disks, but without the mirror. However, this time first determine what the
maximum size that the volume can be based on the remaining free space.
Create the volume with the maximum possible size for this layout.
Solution
vxassist -g appdg maxsize layout=stripe ncol=3 \
appdg01 appdg02 appdg03
Maximum volume size: 12128256 (5922Mb)
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
B
vxassist -g appdg make 3colstrvol maxsize \
layout=stripe ncol=3 appdg01 appdg02 appdg03
End of Solution
Note: Only perform the remaining steps if you do not intend to complete the
optional exercises towards the end of this lab. Otherwise, skip the next two
steps.
Solution
vxassist -g appdg remove volume stripevol
vxassist -g appdg remove volume strmirvol
vxassist -g appdg remove volume 3colstrvol
End of Solution
Solution
vxdg destroy appdg
End of Solution
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
Note: Storage Provisioning requires that the Veritas Storage Foundation Add-on
for Storage Provisioning is installed. This lab section covers the steps to
install the add-on and to set up storage provisioning.
vom
1 If the Web console is already open, skip this step, otherwise, open a Web
browser and enter the URL for the VOM MS Web console on the address line.
You may receive an error about the Web sites certificate, click the link to
continue to this Web site. Log on using the root username and password for
your server.
Solution
https://vom.example.com:14161/sfm
End of Solution
2 Select the Settings tab, then from the sub menu select Deployment
Management.
Copyright 2012 Symantec Corporation. All rights reserved.
4 In the Upload to Repository window, click the Browse button and browse to
the folder that contains the Storage Provisioning add-on
(VRTSsfmvtp-4.1.119.0.sfa). This software is in
/student/software/vom/vom41/add-ons. Select the
VRTSsfmvtp-4.1.119.0.sfa file and click Open. Click the Upload
button to begin the upload of the add-on to the VOM MS. When the upload is
complete, click the Close button to exit the Upload to Repository window.
CONFIDENTIAL - NOT FOR DISTRIBUTION
418 B114 Veritas Storage Foundation 6.0 for UNIX: Install and Configure
Copyright 2012 Symantec Corporation. All rights reserved.
5 The Storage Provisioning add-on should now be present in the Deployment
Management Repository. Verify that the Installed Status shows Not
Installed.
B
6 Select the Storage Provisioning add-on radio button from the Deployment
Management Repository. Then from the Actions pull-down menu, select
Install. A new Install Solution window will open.
7 In the Install Solution window, Click the Install button to start the
deployment of the add-on. After the deployment completes you will receive
the following message. Click the Ok button to close the wizard.
8 The browser will now display the Deployment Summary. Note that the
Result shows Enabled.
9 On a terminal session on the VOM management server, restart the Web server.
Solution
/opt/VRTSsfmcs/bin/vomsc restart sfmcswd
End of Solution
Solution
a Manage > Servers > Hosts. Click the sym1.example.com link, and
choose Administer > All Volumes.
b Select the strmirvol volume and select Actions > Create File System.
d Enter the mount point /app, uncheck the Add to file system table
option, and click Next.
End of Solution
12 Using the VxFS file system created in the previous step, create a storage
template.
Solution
c In the Storage Template overview pane, select Actions > Create Storage
Template.
e Select the sym1.example.com host, then the appdg disk group and then
the /app file system, and click Next.
g Select the file system object from the left navigation tree. Click the
Parameters tab and remove any Rules for select LUNs on Mirror1 and
Mirror2. This is done by selecting the rule, then clicking the minus sign
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution B
b Select Administer > All Disks and mark four disks to initialize
(3pardata0_49 - 3pardata0_52). Select Actions > Initialize.
d In the Create Disk Group screen, type the name of the disk group
(webdg). Ensure that Enable Cross-platform Data Sharing (CDS)
remains checked and click Next.
e Select the newly initialized disks and click Next, Finish and Ok.
End of Solution
14 Using the storage template created in step 12, provision storage in the webdg
disk group on sym2.example.com.
Solution
c Select the sym2.example.com host, then the webdg disk group, and click
Next.
Copyright 2012 Symantec Corporation. All rights reserved.
e Ensure that the status of the storage provisioning shows the State as
Completed.
End of Solution
Solution
a Manage > Servers > Hosts. Click the sym2.example.com link, and
choose the Volumes tab.
c Note that the volume contains a file system and is mounted on /app_0.
End of Solution
Solution
a Select Administer > All Volumes and mark the strmirvol_0 volume.
b Select Actions > Unmount file system. In the Unmount File System
window, answer Yes, click Next, Finish and Ok.
c Mark the strmirvol_0 volume again. Select Actions > Delete. In the
Delete window, answer Yes, click Next, Finish and Ok.
e Mark the webdg disk group. Select Actions > Destroy. In the Destroy
window, click Next, Finish and Ok.
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
B
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
Note: In order to perform the tasks in this exercise, you should have at least four
disks in the disk group that you are using.
sym1
1 First, ensure that any volumes created in the previous labs are removed from
the appdg disk group. You may need to first unmount any volumes that have
mounted file systems.
Solution
vxprint -g appdg -htr | more
df -k
umount /app
2 Create a 100-MB Striped Mirrored volume with no logging. Name the volume
strmirvol.
Solution
vxassist -g appdg make strmirvol 100m \
layout=stripe-mirror nmirror=2 ncol=2
End of Solution
Solution
vxassist -g appdg make concatmirvol 3g \
layout=concat-mirror nmirror=2
End of Solution
Solution
vxprint -g appdg -htr | more
End of Solution
Solution
vxassist -g appdg remove volume strmirvol
vxassist -g appdg remove volume concatmirvol
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
B
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
sym1
a Using the vi editor, create a file called vxassist that includes the
following:
nmirror=3
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vi vxassist
# When mirroring create three mirrors
nmirror=3
End of Solution
b Using the vi editor, create a file called alt_vxassist that includes the
following:
Solution
vxassist -g appdg make mirrorvol 100m \
layout=mirror
End of Solution
Solution
vxassist -g appdg -d /etc/default/alt_vxassist \
make 2colstrvol 100m layout=stripe
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
4 View the layout of these volumes using vxprint -g appdg -htr. What
do you notice?
Solution
The first volume should show three plexes rather than the standard two.
5 Remove any vxassist default files that you created in this optional lab
section. The presence of these files can impact subsequent labs where default
behavior is assumed.
Solution
rm -f /etc/default/vxassist
rm -f /etc/default/alt_vxassist
End of Solution
Solution
vxassist -g appdg remove volume mirrorvol
vxassist -g appdg remove volume 2colstrvol
End of Solution
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
Copyright 2012 Symantec Corporation. All rights reserved.
To perform this lab, you need two lab systems with Storage Foundation pre-
installed, configured and licensed. In addition to this, you also need four external
shared disks to be used during the labs.
At the beginning of this lab, you should have a disk group called appdg that has
four external disks and no volumes in it.
sym1
Note: In order to perform the tasks in this exercise, you should have at least four
disks in the disk group that you are using.
1 Ensure that you have a disk group called appdg with four disks in it. If not,
create the disk group using four disks.
Note: If you have completed the previous lab steps you should already have
the appdg disk group with four disks and no volumes.
Solution
vxdisk -o alldgs list
End of Solution
Solution
vxassist -g appdg make appvol 50m layout=stripe \
ncol=2
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
3 Display the volume layout. How are the disks allocated in the volume? Note
the disk devices used for the volume.
Solution
vxprint -g appdg -htr
End of Solution
Notice which two disks are allocated to the first plex and record your
observation.
Solution
vxassist -g appdg mirror appvol
vxprint -g appdg -htr
Note the disk devices used for the second plex. Note that the default layout
used for the second plex is the same as the first plex.
End of Solution
5 Add a dirty region log to appvol and specify the disk to use for the DRL.
Display the volume layout.
Solution
vxassist -g appdg addlog appvol logtype=drl \
appdg01
vxprint -g appdg -htr
End of Solution
6 Add a second dirty region log to appvol and specify another disk to use for the
DRL. Display the volume layout.
Solution
vxassist -g appdg addlog appvol logtype=drl \
appdg02
vxprint -g appdg -htr
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
7 Remove the first dirty region log that you added to the volume. Display the
volume layout. Can you control which log was removed?
Solution
vxassist -g appdg remove log appvol \!appdg01
Note: As you are using bash as your shell environment, you must use the
escape character before the exclamation mark; for example
\!appdg01.
8 Find out what the current volume read policy for appvol is. Change the volume B
read policy to round robin, and display the volume layout.
Solution
vxprint -g appdg -htr
You should observe that the read policy shows as SELECT which is the value
used for selected based on layouts.
9 Remove the original mirror (appvol-01) from appvol, and display the volume
layout.
Solution
vxassist -g appdg remove mirror appvol \
\!disk_used_by_original_mirror
vxprint -g appdg -htr
Note: As you are using bash as your shell environment, you must use the
escape character before the exclamation mark; for example
\!appdg01. The appdg01 disk was used by the original plex.
Copyright 2012 Symantec Corporation. All rights reserved.
Note that the DRL log will also be removed automatically with this command
because the volume is no longer mirrored.
End of Solution
10 Remove appvol.
Solution
vxassist -g appdg remove volume appvol
End of Solution
sym1
2 View the layout of the volume and display the size of the file system.
Solution
vxprint -g appdg -htr
df -k /app
End of Solution
3 Add data to the volume by creating a file in the file system and verify that the
file has been added.
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
B
vxresize -g appdg appvol 100m
vxprint -g appdg -htr
df -k /app
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
2 Add data to the webvol volume by copying the /etc/group file to the
/web file system. Verify that the file has been added.
Solution
cp /etc/group /web
ls -l /web
End of Solution
3 Try to deport and rename the appdg disk group to webdg while the /app and
/web file systems are still mounted. Can you do it?
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdg -n webdg deport appdg
You receive an error message indicating that the volumes in the disk group are
in use.
End of Solution
Solution
B
ls -lR /dev/vx/rdsk
This directory contains a subdirectory for each imported disk group, which
contains the character devices for the volumes in that disk group.
ls -lR /dev/vx/dsk
This directory contains a subdirectory for each imported disk group, which
contains the block devices for the volumes in that disk group.
End of Solution
5 Unmount all the mounted file systems in the appdg disk group.
Solution
umount /app
umount /web
End of Solution
6 Deport and rename the appdg disk group to webdg. Then import the newly
renamed webdg disk group.
Solution
vxdg -n webdg deport appdg
vxdg import webdg
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
ls -lR /dev/vx/rdsk
ls -lR /dev/vx/dsk
Solution
vxdisk -o alldgs list
vxprint -g webdg -htr
9 Mount the /app and /web file systems, and observe their contents.
Solution
mount -t vxfs /dev/vx/dsk/webdg/appvol /app
mount -t vxfs /dev/vx/dsk/webdg/webvol /web
ls -l /app
ls -l /web
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 Copy new data to the /app and /web file systems. For example, copy the file
/etc/group to /app and the file /etc/hosts to /web.
Solution
cp /etc/group /app
cp /etc/hosts /web
End of Solution
Solution
vxdisk -o alldgs list
End of Solution
3 Unmount all file systems in the webdg disk group and deport the disk group.
Do not assign it to a new host. View all the disk devices on the system.
Solution
umount /app
umount /web
vxdg deport webdg
vxdisk -o alldgs list
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
4 Import the webdg disk group on the other system (sym2), ensure that the
volumes in the imported disk group are all started, and view all the disk
devices on the system.
Solution
vxdg import webdg
vxprint -g webdg -htr
vxdisk -o alldgs list
End of Solution
5 Mount the /app and /web file systems. Note that you will need to create the
mount directories on the other system before mounting the file systems.
Observe the data in the file systems.
Solution
mkdir /app
mkdir /web
mount -t vxfs /dev/vx/dsk/webdg/appvol /app
mount -t vxfs /dev/vx/dsk/webdg/webvol /web
ls -l /app
ls -l /web
Solution
umount /app
umount /web
End of Solution
Solution
vxdg -h sym1 deport webdg
B
End of Solution
sym1
8 Import the disk group and change its name back to appdg. View all the disk
devices on the system.
Note: Because the hostname of the sym1 system is assigned to the disk group
during the deport operation, the disk group can be automatically
imported if you execute the vxdctl enable command on your
system.
Solution
vxdg -n appdg import webdg
vxdisk -o alldgs list
End of Solution
9 Deport the disk group appdg by assigning the ownership to a system called
anotherhost. View all the disk devices on the system. Why would you do this?
Solution
vxdg -h anotherhost deport appdg
Copyright 2012 Symantec Corporation. All rights reserved.
You would do this to ensure that the disks are not imported accidentally by any
system other than the one whose name you assigned to the disks.
End of Solution
Solution
vxdisk list emc0_dd7
End of Solution
Solution
vxdg import appdg
12 Now import appdg and overwrite the disk group lock. What did you have to do
to import it and why?
Solution
vxdg -C import appdg
You had to forcefully clear the host lock using the -C option because the disks
in the disk group were locked to anotherhost.
End of Solution
13 Display detailed information about the same disk in the disk group as you did
in step 10. Note the change in the hostid field in the output.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdisk list emc0_dd7
End of Solution
Solution
vxassist -g appdg remove volume appvol
B
vxassist -g appdg remove volume webvol
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 Create a 50-MB concatenated volume named appvol in the appdg disk group.
Solution
vxassist -g appdg make appvol 50m
End of Solution
2 Create a Veritas file system on the volume by using the mkfs command.
Specify the file system size as 40 MB.
Solution
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol 40m
0
End of Solution
3 Create a mount point /app on which to the mount the file system, if it does not
already exist.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
mkdir /app (if necessary)
End of Solution
Solution
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
B
End of Solution
5 Verify disk space using the df command. Observe that the total size of the file
system is smaller than the size of the volume.
Solution
df -k
End of Solution
6 Expand the file system to the full size of the underlying volume using the
fsadm -b newsize command.
Note: On Linux there is more than one fsadm command, you must use the
command located in /opt/VRTS/bin.
Solution
/opt/VRTS/bin/fsadm -b 50m -r \
/dev/vx/rdsk/appdg/appvol /app
End of Solution
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
df -k
End of Solution
Solution
dd if=/dev/zero of=/app/25_mb bs=1024k count=25
End of Solution
9 Shrink the file system to 50 percent of its current size. What happens?
Solution
/opt/VRTS/bin/fsadm -b 25m -r \
/dev/vx/rdsk/appdg/appvol /app
The command fails. You cannot shrink the file system because blocks are
currently in use.
End of Solution
10 Unmount the /app file system and remove the appvol volume in appdg.
Solution
umount /app
vxassist -g appdg remove volume appvol
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
In this optional lab, you will destroy the existing appdg disk group, recreate it as a
non-cds disk group with non-cds disks and then convert the disk group to a cds
disk group.
1 Use the vxdisk -o alldgs list command to determine the disks that
are a part of the appdg disk group.
Solution
vxdisk -o alldgs list
End of Solution
2 Destroy the existing appdg disk group using the vxdg destroy command.
Solution
vxdg destroy appdg
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdisksetup -i emc0_dd7 format=sliced
End of Solution
Solution
vxdisk -o alldgs list
End of Solution
5 Recreate the 4 disk appdg disk group as a non-cds disk group using the vxdg
init command.
Solution
vxdg init appdg appdg01=emc0_dd7 appdg02=emc0_dd8 \
appdg03=emc0_dd9 appdg04=emc0_d10 cds=off
End of Solution
6 List the appdg disk group using the vxdg list command. Note that the cds
flag is not set.
Solution
vxdg list appdg
End of Solution
7 Try to turn the cds flag on using the vxdg set command. Was the command
successful?
Solution
vxdg -g appdg set cds=on
Copyright 2012 Symantec Corporation. All rights reserved.
The command fails because one of the disks in the disk group is not a CDS
disk.
End of Solution
Solution
B
vxcdsconvert -g appdg alldisks
End of Solution
9 Use the vxdisk list to verify that all disks in the appdg disk group have
been converted to cds disks.
Solution
vxdisk -o alldgs list
End of Solution
10 List the appdg disk group using the vxdg list command. Note that the cds
flag is still not set.
Solution
vxdg list appdg
End of Solution
11 Use the vxdg set command to turn the cds flag on.
Solution
vxdg -g appdg set cds=on
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxdg list appdg
End of Solution
End of lab
Copyright 2012 Symantec Corporation. All rights reserved.
Prerequisite setup
To perform this lab, you need a lab system with Storage Foundation pre-installed,
configured and licensed. In addition to this, you also need four external disks and
the second internal disk to be used during the labs. If you do not have a second
internal disk or if you cannot use the second internal disk, you need five external
disks to complete the labs.
At the beginning of this lab, you should have a disk group called appdg that has
four external disks and no volumes in it. The second internal disk should be empty
and unused.
sym1
1 Identify the device name for the second internal disk on your lab system.
Solution
df -k
vxdisk -o alldgs list
Solution
vxdisksetup -i sdb format=sliced
End of Solution
3 Create a non-cds disk group called testdg using the internal disk you initialized
in step 2.
Solution
vxdg init testdg testdg01=sdb cds=off
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
4 In the testdg disk group create a 1-GB concatenated volume called testvol
initializing the volume space with zeros using the init=zero option to
vxassist.
Solution
vxassist -g testdg make testvol 1g init=zero
End of Solution
Solution
mkfs -t vxfs /dev/vx/rdsk/testdg/testvol
End of Solution
This script restores a fragmented file system onto the volume and performs a
file system check so that the volume can be mounted. Whatever files are in the
existing file system will be lost.
Solution
cd /student/labs/sf/sf60
./extentfrag_vxfs.pl
End of Solution
7 Mount the file system on /test. Note that you may need to perform a file
system check before mounting the file system.
Solution
fsck -t vxfs /dev/vx/rdsk/testdg/testvol (if necessary)
mkdir /test
mount -t vxfs /dev/vx/dsk/testdg/testvol /test
End of Solution
8 Ensure that the directory where the vxbench command is located is included
in your PATH definition.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
echo $PATH | grep -i vxbench
If necessary:
PATH=$PATH:/opt/VRTSspt/FS/VxBench
export PATH
End of Solution
sym1
1 In the appdg disk group create a 1-GB concatenated volume called appvol.
Solution
vxassist -g appdg make appvol 1g
End of Solution
Solution
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
End of Solution
Solution
/opt/VRTS/bin/fsadm -D -E /app
End of Solution
Solution
A fragmented file system is a file system where the free space and/or file data
is in relatively small extents scattered throughout different allocation units
within the file system.
End of Solution
5 If you were shown the following extent fragmentation report about a file
system, what would you conclude?
Solution
A high total in the Dirs to Reduce column indicates that the directories are not
optimized. This file system's directories should be optimized by directory
defragmentation.
End of Solution
Solution
umount /app
vxassist -g appdg remove volume appvol
End of Solution
Solution
/opt/VRTS/bin/fsadm -D -E /test
8 Use the getext command to display the extent attributes of the files in the
/test file system.
Solution
/opt/VRTS/bin/getext /test/*
...
/test/test42: Bsize 1024 Reserve 0 Extent
Size 2
/test/test44: Bsize 1024 Reserve 0 Extent
Size 4
/test/test46: Bsize 1024 Reserve 0 Extent
Size 6
/test/test48: Bsize 1024 Reserve 0 Extent
Size 8
/test/test50: Bsize 1024 Reserve 0 Extent
Size 0
Copyright 2012 Symantec Corporation. All rights reserved.
Note: Remount the file system before running each I/O test
Solution
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
/opt/VRTSspt/FS/VxBench/vxbench_rhel5_x86_64 \
-w read -i iosize=8k,iocount=1000 /test/test48
A sample output is provided here as an example:
total: 7.147 sec 1119.40 KB/s cpu: 0.12 sys 0.00 user
End of Solution
10 Repeat the same test for an 8Mb file on an 8Mb extent (for example, using the
/test/test58 file). Note that the file system must be remounted between
the tests. Can you explain why?
Solution
The file system must be remounted to clear the read buffers.
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
Copyright 2012 Symantec Corporation. All rights reserved.
/opt/VRTSspt/FS/VxBench/vxbench_rhel5_x86_64 \
-w read -i iosize=8k,iocount=1000 /test/test58
B
Note: The defragmentation can take about 5 minutes to complete.
Solution
/opt/VRTS/bin/fsadm -e -E -s /test
12 Measure the throughput of the unfragmented file system using the vxbench
utility on the same files as you did in steps 9 and 10. Is there any change in
throughput?
Notes:
The file system must be remounted before each test to clear the read
buffers.
If you have used external shared disks on a disk array used by other
systems for this lab, the performance results may be impacted by the disk
array cache and may not provide a valid comparison between a fragmented
and defragmented file system.
Solution
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
Copyright 2012 Symantec Corporation. All rights reserved.
/opt/VRTSspt/FS/VxBench/vxbench_rhel5_x86_64 \
-w read -i iosize=8k,iocount=1000 /test/test48
/opt/VRTSspt/FS/VxBench/vxbench_rhel5_x86_64 \
CONFIDENTIAL - NOT FOR DISTRIBUTION
461 Lab 7: Administering File Systems Copyright 2012 Symantec Corporation. All rights reserved.
B157
-w read -i iosize=8k,iocount=1000 /test/test58
Solution
A fragmented file system has free space scattered throughout the file system in
relatively small extents whereas an unfragmented file system has free space in
just a few relatively large extents.
End of Solution
Solution
Yes, volatile environments wherein files are grown, shrunk, erased, moved,
and so on, especially where the file systems do not have much free space, are
prone to fragmentation.
Stable environments, such as Oracle databases and logs, have very little impact
on the supporting file system so require infrequent defragmentation.
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1 B
In this lab section, you make a larger volume so that you can see the time
difference when using the SmartMove feature.
Solution
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol
mkdir /app (if necessary)
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
End of Solution
Solution
cp /etc/hosts /app
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
umount /app
End of Solution
5 Mirror the appvol volume. Record the time it takes to complete the mirror
operation.
Solution
time -p vxassist -g appdg mirror appvol
Time to create mirror _____________________________________
End of Solution
Solution
vxassist -g appdg remove mirror appvol
End of Solution
Solution
mount -t vxfs /dev/vx/dsk/appdg/appvol /app
End of Solution
8 Mirror the appvol volume. Record the time it takes to complete the mirror
operation.
Solution
time -p vxassist -g appdg mirror appvol
Note: The mirroring operation should not take as long as it did the first time
the mirror was created. This is because it is only mirroring the used
data in the file system and not the whole volume by using SmartMove,
as the file system is now mounted.
End of Solution
Solution
umount /app
B
End of Solution
Solution
vxassist -g appdg remove volume appvol
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
1 View all the disk devices on the system. Then use the vxdisk -o thin
list command to list only the thin provisioning capable devices.
Solution
vxdisk -o alldgs list
vxdisk -o thin list
End of Solution
2 Locate the thin provisioning and thin reclamation capable devices from the
output in the previous step. The TYPE column in the output of the
vxdisk -o thin list command should display thinrclm. Choose
two thin reclamation capable devices (3pardata0_49 and 3pardata0_50), if they
are uninitialized use the vxdisksetup command to initialize them.
Note: If you do not see any thin provisioning and thin reclamation capable
devices in the vxdisk list output, contact your instructor. You
must have thin provisioning and thin reclamation capable devices to
complete this lab section.
Solution
vxdisksetup -i 3pardata0_49
vxdisksetup -i 3pardata0_50
vxdisk -o alldgs list
vxdisk -o thin list
Copyright 2012 Symantec Corporation. All rights reserved.
The TYPE field in the output of the vxdisk -o alldgs list command
should change to auto:cdsdisk and the STATUS of the disk should change
to online thinrclm but the DISK and GROUP columns should still be
empty.
End of Solution
Solution B
The TYPE and STATUS of the disks are the same but the DISK and GROUP
columns now show the new disk media name and the disk group name
respectively.
End of Solution
Solution
vxassist -g thindg make thinvol 3g
End of Solution
5 Create a Veritas file system on the volume and mount it to /thin. Do not add
the file system to the file system table.
Solution
mkfs -t vxfs /dev/vx/rdsk/thindg/thinvol
mkdir /thin (if necessary)
mount -t vxfs /dev/vx/dsk/thindg/thinvol /thin
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
6 Display the size of the file system using the df -k /thin command.
Solution
df -k /thin
End of Solution
Solution
vxdisk -o thin,fssize list
End of Solution
8 Use the dd command to make some 400MB files on the file system mounted at
/thin, so that the free space is less than 10 percent of the total file system
size. Use the df -k /thin command to monitor the file system free space.
Solution
dd if=/dev/zero of=/thin/file1 bs=1024k count=400
dd if=/dev/zero of=/thin/file2 bs=1024k count=400
dd if=/dev/zero of=/thin/file3 bs=1024k count=400
dd if=/dev/zero of=/thin/file4 bs=1024k count=400
dd if=/dev/zero of=/thin/file5 bs=1024k count=400
dd if=/dev/zero of=/thin/file6 bs=1024k count=400
dd if=/dev/zero of=/thin/file7 bs=1024k count=400
df -k /thin
End of Solution
Solution
vxdisk -o thin,fssize list
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
rm -f /thin/file*
End of Solution
Solution B
df -k /thin
vxdisk -o thin,fssize list
End of Solution
12 Use the vxdisk reclaim command on the thindg disk group to reclaim
the space on the LUNS.
Solution
vxdisk reclaim thindg
End of Solution
Solution
vxdisk -o thin,fssize list
End of Solution
14 Unmount the /thin file system and destroy the thindg disk group.
Solution
umount /thin
vxdg destroy thindg
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
umount /test
vxdg destroy testdg
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1 B
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 In the appdg disk group create a new 10-MB volume called appvol. Create a
VxFS file system on appvol.
Solution
vxassist -g appdg make appvol 10m
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol
End of Solution
2 Mount the file system using the Mountlock feature and a tag of
locktest. Mount it to /app.
Solution
mkdir /app (if necessary)
mount -t vxfs -o mntlock="locktest" \
/dev/vx/dsk/appdg/appvol /app
End of Solution
3 Use the mount command to view that the mount lock was set.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
/bin/mount | grep locktest
End of Solution
Solution
umount /app
CONFIDENTIAL - NOT FOR DISTRIBUTION
471 Lab 7: Administering File Systems Copyright 2012 Symantec Corporation. All rights reserved.
B167
umount: /app: device is busy
End of Solution
5 Use the fsadm command to remove the lock on the mount point.
Solution
/opt/VRTS/bin/fsadm -o mntunlock="locktest" /app
End of Solution
6 Use the mount command to view that the mount lock was removed.
Solution
/bin/mount | grep locktest
End of Solution
Solution
umount /app
Solution
Copyright 2012 Symantec Corporation. All rights reserved.
Solution B
umount /test
vxdg destroy testdg
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
1 In the appdg disk group create a new 10-MB volume called appvol. Create a
VxFS file system on appvol and mount it on /fcl_test.
Solution
vxassist -g appdg make appvol 10m
mkfs -t vxfs /dev/vx/rdsk/appdg/appvol
mkdir /fcl_test
mount -t vxfs /dev/vx/dsk/appdg/appvol /fcl_test
End of Solution
2 Turn the FCL using the fcladm command for /fcl_test, and ensure that it
is on.
Solution
fcladm on /fcl_test
fcladm state /fcl_test
ON
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
3 Navigate to the directory that contains the FCL and list the contents.
Solution
cd /fcl_test/lost+found
ls
changelog
End of Solution
Solution
B
fcladm print 0 /fcl_test
magic a506fcf5 version 4
time 1255029926 866253 (October 8, 2009 12:25:26 PM
PDT PDT)
state ON sync 1
foff 1024 loff 1024
eventmask 0x217effc event change time October 8, 2009
12:25:26 PM PDT PDT (nsecs 864434000)
End of Solution
5 How do you know that there have been no changes in the file system yet?
Solution
The superblock (foff) and the end of the FCL file (loff) are the same
number.
End of Solution
6 Add some files to /fcl_test. Then remove one of the files you just added
and rename one of the others.
Solution
cd /fcl_test
touch a b c
rm -f b
mv a d
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
Solution
fcladm print 0 /fcl_test
magic a506fcf5 version 4
time 1255029926 866253 (October 8, 2009 12:25:26 PM
PDT PDT)
CONFIDENTIAL - NOT FOR DISTRIBUTION
475 Lab 7: Administering File Systems Copyright 2012 Symantec Corporation. All rights reserved.
B171
state ON sync 1
foff 1024 loff 1312
eventmask 0x217effc event change time October 8, 2009
12:25:26 PM PDT PDT (nsecs 864434000)
End of Solution
8 How do you know that changes have been made to the file system?
Solution
The superblock (foff) and the end of the FCL file (loff) are different
numbers.
End of Solution
9 Print the contents of the FCL using the fcladm print 1024
/fcl_test command.
Solution
fcladm print 1024 /fcl_test
The fields displayed in the output are Change Type, Inode Number,
Inode Generation, and Timestamp.
The Unlink and Rename types list the name of the file on the following line,
preceded by the parents inode number.
End of Solution
10 Use the vxlsino command to determine which files are identified by the
inode numbers that are listed in the Create type that do not have an Unlink
type as well?
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
vxlsino inode_number /fcl_test
End of Solution
Solution
cd /
Solution
umount /test
vxdg destroy testdg
End of Solution
Copyright 2012 Symantec Corporation. All rights reserved.
sym1
Note: Check with your instructor to see if you have more time to complete the
optional lab exercises. You do not need to perform the optional lab
exercises unless you have extra time. The optional exercises do not have
any impact on further labs.
This section uses the /test file system to analyze the impact of fragmentation on
the performance of a variety of I/O types on files using small and large extent
sizes.
1 Recreate the fragmented /test file system using the following steps:
Solution
umount /test
End of Solution
Solution
cd /student/labs/sf/sf60
./extentfrag_vxfs.pl
Copyright 2012 Symantec Corporation. All rights reserved.
End of Solution
c Mount the file system to /test. Note that you may need to perform a file
system check before mounting the file system.
Solution
fsck -t vxfs /dev/vx/rdsk/testdg/testvol
mount -t vxfs /dev/vx/dsk/testdg/testvol /test
End of Solution
Note: Results can vary depending on the nature of the data and the model of
array used. No performance guarantees are implied by this lab.
You must unmount and remount the file system /test before each step to
clear and initialize the buffer cache.
a Ensure that the directory where the vxbench utility is located is included
in your PATH definition.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
echo $PATH
PATH=$PATH:/opt/VRTSspt/FS/VxBench (if necessary)
export PATH
End of Solution
Solution
To test the 8K extent size:
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
vxbench_rhel5_x86_64 -w read -i \
iosize=8k,iocount=1000 /test/test48
End of Solution
c Perform a sequential read I/O test on the 8000K extent size using the
vxbench command. Use an I/O size of 8k and a count of 1000 I/Os.
Solution
To test the 8000K extent size:
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
vxbench_rhel5_x86_64 -w read -i \
iosize=8k,iocount=1000 /test/test58
End of Solution
d Perform a random read I/O test on the 8K extent size using the vxbench
command. Use an I/O size of 8k and a count of 1000 I/Os.
Solution
To test the 8K extent size:
mount -t vxfs -o remount \
Copyright 2012 Symantec Corporation. All rights reserved.
/dev/vx/dsk/testdg/testvol /test
vxbench_rhel5_x86_64 -w rand_read -i \
iosize=8k,iocount=1000,maxfilesize=8000 \
/test/test48
End of Solution
Solution
B
To test the 8000K extent size:
mount -t vxfs -o remount \
/dev/vx/dsk/testdg/testvol /test
vxbench_rhel5_x86_64 -w rand_read -i \
iosize=8k,iocount=1000,maxfilesize=8000 \
/test/test58
End of Solution
3 Defragment the /test file system. The defragmentation process takes some
time.
Solution
/opt/VRTS/bin/fsadm -e -E -d -D -s /test
End of Solution
4 Repeat the vxbench performance tests and complete the table with these
performance results.
5 Compare the results of the defragmented file system with the fragmented file
system.
6 When finished comparing the results in the previous step, unmount the
/test file system and destroy the testdg disk group.
Copyright 2012 Symantec Corporation. All rights reserved.
Solution
umount /test
vxdg destroy testdg
End of Solution
End of lab
C
Copyright 2012 Symantec Corporation. All rights reserved.
C
Copyright 2012 Symantec Corporation. All rights reserved.
A D
address-length pair 7-6
data change object 4-22, 7-34
aixdisk 1-10
data redundancy 1-14
array 1-6
DataInsight for Storage 3-5
authentication broker 3-7
defaultdg 4-8
defragmentation
Copyright 2012 Symantec Corporation. All rights reserved.
B scheduling 7-23
defragmenting a file system 7-21
block device file 4-12
deporting a disk group
block-based allocation 7-6 and renaming 6-18
bootdg 4-8, 4-29 to new host 6-18
destroying a disk group 4-29
C device path 4-17
devicetag 4-17
CDS 1-9 directory fragmentation 7-19
CDS disk 1-10 dirty region logging 6-7
J
G
JFS 7-8
group name 4-18 JFS2 7-8
Journaled File System 7-8
H journaling 7-15
HFS 7-8
Hierarchical File System 7-8 K
high availability 6-17 kernel issues
host locks and VxFS 2-16
clearing 6-19 keyless licensing 2-6, 2-18
hostid 4-17
hpdisk 1-10
L
layered volume 1-14, 5-12
I advantages 5-13
importing a disk group creating 5-12
and renaming 6-19 creating in CLI 5-17
forcing 6-19 disadvantages 5-13
Copyright 2012 Symantec Corporation. All rights reserved.
RAID 1-13
N RAID array
benefits with VxVM Intro-8
naming disks
defaults 4-9 RAID levels 1-13
ncol 5-9 RAID-5 column 5-6
newfs 4-12 RAID-5 volume 1-14, 5-6
nlog 5-11 random read 7-25
nmirror 5-10 random write 7-25
nodg 4-8 raw device file 4-12
read policy 6-10
vxdiskunsetup 4-27
layered 1-14
mirrored 1-14 VxFS 7-8
RAID-5 1-14 allocation 7-6
selecting 5-3 command locations 7-8
striped 1-14 command syntax 7-9
defragmenting 7-21
Volume Manager control 1-9
features 7-3, 7-4
Volume Manager disk 1-11 file change log 7-17
naming 1-11 file system switchout mechanisms 7-9
Volume Manager Support Operations 2-24, 2- file system type 7-11
26 fragmentation types 7-19
identifying free space 7-11
X
XOR 1-14, 5-6
xprtld 3-13
xprtlwid 2-17
Copyright 2012 Symantec Corporation. All rights reserved.