Veritas Access Administrator's Guide
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring an FTP server
- Using Veritas Access as an Object Store server
- Configuring the NFS server
- Section V. Monitoring and troubleshooting
- Section VI. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VII. Configuring cloud storage
- Configuring the cloud gateway
- Configuring cloud as a tier
- Section VIII. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Integrating Veritas Access with Data Insight
- Section IX. Managing Veritas Access storage services
- Deduplicating data
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Section X. Reference
About data deduplication
Data deduplication is the process by which redundant data is eliminated to improve storage utilization. Using data deduplication, you can reduce the amount of storage required for storing user and application data. It is most effective in use-cases where many copies of very similar or even identical copies of data are stored. The deduplication feature in Veritas Access provides storage optimization for primary storage (storage of active data).
Each file in the configured file system is broken into user-configurable chunks for evaluating duplicates. The smaller the chunk size, the higher the percentage of sharing due to better chances of matches.
The first deduplication of a file system is always a full deduplication of the entire file system. This is an end-to-end deduplication process that identifies and eliminates duplicate data. Any subsequent attempt to run deduplication on that file system results in incremental deduplication.
Note:
Deduplication with a small chunk size increases the deduplication time and load on the system.
Veritas Access deduplication is periodic, that is, as per the user-configured frequency, redundant data in the file system is detected and eliminated.
The following are potential use cases for Veritas Access file system deduplication:
Microsoft Exchange mailboxes
File systems hosting user home directories
Virtual Machine Disk Format (VMDK) or virtual image stores.
Table: Relationship between physical and logical data on a file system for two billion unique fingerprints with various deduplication ratios shows an estimated file system data size that can be supported for a Veritas Access deduplicated file system.
Table: Relationship between physical and logical data on a file system for two billion unique fingerprints with various deduplication ratios
Fingerprint block size | Deduplication ratio | Unique signature per TB | Physical file system data size | Effective logical file system data size |
---|---|---|---|---|
4 K | 50% | 128 M | 16 TB | 32 TB |
4 K | 65% | 90 M | 23 TB | 65 TB |
4 K | 80% | 51 M | 40 TB | 200 TB |
8 K | 50% | 64 M | 32 TB | 64 TB |
8 K | 65% | 45 M | 46 TB | 132 TB |
8 K | 80% | 25 M | 80 TB | 400 TB |
16 K | 50% | 32 M | 64 TB | 128 TB |
16 K | 65% | 22 M | 93 TB | 266 TB |
16 K | 80 % | 13 M | 158 TB | 800 TB |
The Storage> dedup commands perform administrative functions for the Veritas Access deduplication feature. The deduplication commands allow you to enable, disable, start, stop, and remove deduplication on a file system. You can also reset several deduplication configuration parameters and display the current deduplication status for your file system.
Note:
Some configuration parameters can be set as local (specific to a file system) and or global (applicable to all deduplication-enabled file systems). Local parameters override the value of a global parameter.