The Veritas Access 3340 Appliance: Administration course is intended for the IT professional tasked with designing, installing, configuring, and maintaining Veritas Access Appliance environments.
This course covers how to use Veritas Access 3340 Appliance to manage storage, file systems, and shares using the Veritas Access web-based GUI and command line. You learn about file system and file share administration as well as creating and maintaining NFS, CIFS, S3, and FTP file shares. You learn how to configure cloud-based storage as a secondary tier in Veritas Access, how to integrate Veritas Access as LTR storage for NetBackup, and how to integrate Access as Archiving and restoring of files for Enterprise Vault.
Note: Participants are required to use their own AWS account to perform Lab 08: Using Cloud as a Tier for Scaleout File System.
By the completion of this course, you will be able to:
- Configure a Veritas Access appliance cluster.
- Configure authentication services in Veritas Access.
- Configure Veritas Access shares (NFS/CIFS/S3/FTP).
- Configure and administer storage tiers.
- Deduplicate and compress data.
- Configure file retention for WORM-enabled file systems.
- Configure continuous and episodic replication.
- Create a scale-out file system.
- Configure a cloud tier in AWS S3 and Glacier.
- Move files between primary and cloud tiers.
- Backup and restore data using NetBackup.
- Install and configure Veritas Access as NetBackup LTR storage with optional migration to the cloud.
- Perform archiving and restoring the CIFS files using Enterprise Vault on Access appliance.
Who Can Benefit
This course is for UNIX/Linux system architects, system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration/development staff who will be designing, installing, operating, and/or integrating Veritas Access.
You must have working knowledge of advanced computer terminology, including TCP/IP networking and Internet
concepts, and administrator-level knowledge of RedHat. Enterprise Linux 7.4. Knowledge of cloud technologies and Microsoft Windows 2008/2012 operating systems is a plus.
This course includes practical hands-on exercises that enable you to test your new skills and begin to transfer them into your working environment.
- About this course
- Education and support resources
Introducing the Access 3340 Appliance
- Access appliance overview and use cases
- Access appliance software overview
- Access appliance hardware overview
- Exercise A: Exploring the Veritas Access 3340 Appliance hardware
- Exercise B: Understanding the simulated lab environment
- Exercise C: Accessing the lab environment
Configuring the Appliance Cluster
- Preparing for configuration
- Configuring the appliance for the first time
- Validating the configuration using Veritas Access interfaces
- Exercise A: Preparing for cluster configuration
- Exercise B: Configuring the Veritas Access cluster
- Exercise C: Verifying the cluster configuration
Provisioning Storage for NetBackup using the Getting Started Wizard
- Configuring storage
- Configuring the S3 server
- Activating an LTR policy
- Generating S3 keys
- Provisioning an S3 bucket
- Reviewing the storage configuration
- Exercise A: Using the Veritas Access Appliance Setup wizard
- Exercise B: Observing the configuration using Veritas Access GUI
- Exercise C: Navigating the Veritas Access Command Line Shell (CLISH)
Using the Access Appliance in a NetBackup Domain
- Configuring Access as a cloud storage server
- Configuring the Access Appliance as a primary backup target for verification
- Configuring the Access Appliance as a LTR Target
- Integrating appliances in a NetBackup environment
- Performing backups and restores with appliances
- Exercise A: Preparing the NetBackup servers
- Exercise B: Configuring the cloud storage server with CloudCatalyst
- Exercise C: Using the Access Appliance as the primary backup target with deduplication
- Exercise D: Using the Access Appliance for long-term retention
- Exercise E: (Optional) Configuring the cloud storage server without CloudCatalyst
- Exercise F: (Optional) Using the Access Appliance as the primary backup target without deduplication
- Overview of storage provisioning in Veritas Access
- Administering storage pools
- Displaying disk information
- Protecting data using I/O fencing
- Exercise A: Creating a storage pool using the Access CLISH
- Exercise B: Creating a storage pool using the Access GUI
Creating File Systems
- File systems in Veritas Access Appliance
- Creating a file system
- Modifying and deleting a file system
- Checking and repairing a file system
- Exercise A: Creating a file system using the Access GUI
- Exercise B: Creating a file system using the Access CLISH
Configuring Veritas Access Shares
- Introducing file sharing protocols
- Configuring authentication
- Configuring S3 shares
- Configuring CIFS shares
- Exercise A: Enabling Active Directory authentication
- Exercise B: Creating a CIFS share using the Access GUI
- Exercise C: Accessing the CIFS share from the client system
- Exercise D: Using Active Directory accounts for S3 shares
- Exercise E: Creating S3 objects
Using Cloud as a Tier for Scale-out File System
- Cloud tiering overview
- Using a cloud as a tier in AWS
- Moving files between tiers
- Using data movement policies
- Monitoring data usage in the cloud tier
- Exercise A: Creating a scale-out file system with a cloud tier
- Exercise B: Migrating files to the cloud
- Exercise C: Creating a data movement policy
- Exercise D: Scheduling data movement policies
- Exercise E: Removing the policies from a scale-out file system
- Exercise F: Using multi-cloud tiering
Using the Access Appliance as an Archiving Target
- Veritas Access Appliance integration with Enterprise Vault
- Provisioning primary storage for Enterprise Vault
- Provisioning secondary storage for Enterprise Vault
- Replicating Data storage for Enterprise Vault
- Exercise A: Configuring simple file system (cifs share) for evserver
- Exercise B: Configuring Primary Storage (evserver) on Access appliance
- Exercise C: Performing archiving and restoring data tasks on Access appliance
- Exercise D: Configuring Secondary Storage (evserver) on Access appliance
Monitoring Appliance Health
- Configuring event notifications
- Monitoring with Veritas Remote Management
- Monitoring with the Appliance Shell Menu (CLISH)
- Monitoring with Access CLISH
- Monitoring with the Appliance GUI
- Using Veritas AutoSupport
- Exercise A: Monitoring the Access Appliance with Access GUI
- Exercise B: Monitoring the Access Appliance with Access CLISH
Maintaining the Access Appliance
- Configuring User Roles
- Configuring LDAP and AD Authentication
- Maintaining Storage
- Maintaining Appliance Security
- Exercise A: Checking the storage details from Access CLISH interface
Troubleshooting the Access Appliance
- Appliance Online Resources
- Appliance Physical Inspection
- Resolving common hardware faults
- Viewing and gathering appliance log files
Reconfiguring the Access Appliance
- Access appliance factory reset overview
- Performing a single node factory reset
- Performing a full appliance cluster factory reset
- Managing software and storage