Veritas Volume Manager 4.1 & 5.1 Training Provided by Revanth Technologies Training Institute in Hyderabad
Veritas Volume Manager 4.1 & 5.1 free videos and free material uploaded by Revanth Technologies Training Institute staff .
Module 1 - Sun
Storage Concepts
Describe the major disk storage administration tasks
Describe Sun storage interface types
Describe available Redundant Array of Independent Disks
(RAID) technologies including:
Host-based RAID technology
Controller-based RAID technology
Describe disk storage concepts that are common to many
storage installations, including:
Hot swapping
Storage area networking
Multihost access
Multipath access
Identify storage configurations by:
Conducting a physical inventory
Displaying storage configurations
Identifying controller addresses
Decoding logical device paths
Verify storage array firmware revisions
Module 2 - Managing Data
List the advantages of using virtual disk management
Describe standard RAID terminology
List the common features of each supported RAID level
including:
Concatenation - RAID 0
Striping - RAID 0
Mirroring - RAID 1
Mirrored Stripe (Striping plus mirroring) - RAID 0+1
Mirrored Concatenation - RAID 0+1
Striped Mirror (Mirroring plus striping) - RAID 1+0
Concatenated Mirror - RAID 1+0
Striping with distributed parity - RAID 5
Describe the optimum hardware configuration for each
supported RAID level
Module 3 - VERITAS
Volume Manager Installation
Identify the new features of VERITAS Volume Manager 4.1
List the key elements of preinstallation planning
Research VxVM software patch requirements
Install the VxVM software
Describe the three installation methods:
The installvm method
The installer method
The pkgadd method
Initialize the VxVM software
Module 4 - VERITAS
Volume Manager Basic Operations
Describe the function of VxVM disk groups
List disk group administrative operations including:
Initialize disk drives for VxVM use
Create disk groups
Add and remove disk drives for a disk group
Import and deport disk groups
Destroy a disk group
Rename VxVM disk drives
Administer disk groups using the vxdiskadm utility
Administer disk groups using command-line programs
Administer disk groups using the Veritas Enterprise
Administrator (VEA) GUI
Module 5 - VERITAS
Volume Manager Volume Operations
Interpret volume structure listings
Describe volume planning activities
Create volumes using the vxassist command
Create volumes using the VEA GUI
Modify volume access attributes
Add file systems to existing volumes
Add and remove volume logs
Use the VEA GUI to analyze volume structures
Module 6 - VERITAS
Volume Manager Advanced Operations
Encapsulate and mirror the system boot disk
Administer hot spares and hot relocation
Evacuate all subdisks from a disk drive
Move a disk drive without preserving data
Move a populated disk drive to a new disk group
Back up and restore a disk group configuration
Describe how to import a disk group after a system crash
Perform a volume snapshot backup
Perform an online volume relayout
Create VxVM layered volumes
Perform basic Intelligent Storage Provisioning
administration
Replace a failed disk drive
Module 7 - VERITAS
File System Basic Operations
Describe basic VxFS features
Install the VxFS software
Create VxFS file systems
Use extended VxFS mount options
Perform online VxFS administration tasks
Modify kernel tunable parameters
Describe Storage Checkpoints
Describe VxFS file system quotas
Module 8 - VERITAS
Volume Manager Advanced Operations
Encapsulate and mirror the system boot disk
Administer hot spares and hot relocation
Evacuate allSubdisk from a disk drive
Move a populated disk drive to a new disk group
Backup and restore a disk group configuration
Describe how to import a disk group after a system crash
Perform a volume Snapshot backup
Perform an online volume relayout
Create Vxvm Layered volumes
Replace a failed disk drive
Module9 - VERITAS
Volume Manager Performance Management
Describe performance improvement techniques
Use the vxstat and vxtrace performance analysis tools
Describe RAID-5 write performance characteristics
Veritas Cluster 4.1
& 5.1
High Availability
Concepts
High availability concepts
Clustering concepts
HA application services
Clustering prerequisites
High availability references
VCS Building Blocks
VCS Terminology
Cluster Communication
VCS Architecture
Preparing a Site for
VCS Implementation
Hardware requirements and recommendations
Software requirements and recommendations
Preparing installation information
Preparing to upgrade
Installing VCS
Using the Veritas Product Installer
VCS Configuration Files
Viewing the Default VCS Configuration
Other Installation Considerations
VCS Operations
Common VCS tools and operations
Service group operations
Resource operations
Using the VCS Simulator
VCS Configuration
Methods
Starting and Stopping VCS
Overview of Configuration Methods
Online Configuration
Offline Configuration
Controlling Access to VCS
Preparing Services
for High Availability
Preparing applications for VCS
Performing one-time configuration tasks
Testing the application service
Stopping and migrating an application service
Collecting configuration information
Online Configuration
Online Service Group Configuration
Adding Resources
Solving Common Configuration Errors
Testing the Service Group
Offline Configuration
Offline configuration procedures
Solving offline configuration problems
Testing the service group
Cluster
Communications
VCS Communications Review
Cluster Membership
Cluster Interconnect Configuration
Joining the Cluster Membership
Changing the Interconnect Configuration
Clustering NFS
Preparing NFS for high availability
Testing the NFS service
Configuring NFS resources
NFS lock failover
Alternative NFS configurations
System and
Communication Faults
Ensuring data integrity
Cluster interconnect failures
I/O Fencing
Data protection requirements
I/O fencing concepts and components
I/O fencing operations
I/O fencing implementation
Configuring I/O fencing
Coordination point server
Troubleshooting
Monitoring VCS
Troubleshooting Guide
Archiving VCS-Related Files
The Implementation Methodology is based upon Enterprise
Project Methodology with special attention to the capabilities that Ab Initio
software provides for complex and/or data intensive applications and systems.
This methodology has been built on various experiences utilizing Ab Initio
software. Just as the functionality of Ab Initio software is ever expanding in
meeting (and often exceeding) market need, so too does Ab Initio methodology.
Write a public review