Beruflich Dokumente
Kultur Dokumente
Student Guide
Course ID: STRSW-ILT-D8CADM-REV04
Catalog Number: STRSW-ILT-D8CADM-REV04-SG
Content Version: 1.1
COPYRIGHT
2015 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this document covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of NetApp, Inc.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, ASUP, AutoSupport, Campaign Express, Customer Fitness, CyberSnap,
Data ONTAP, DataFort, FilerView, Fitness, Flash Accel, Flash Cache, Flash Pool, FlashRay, FlexCache, FlexClone,
FlexPod, FlexScale, FlexShare, FlexVol, GetSuccessful, LockVault, Manage ONTAP, Mars, MetroCluster, MultiStore,
OnCommand, ONTAP, ONTAPI, RAID DP, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator,
SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore,
Snapshot, SnapValidator, SnapVault, StorageGRID, Tech OnTap, and WAFL are trademarks or registered trademarks of
NetApp, Inc. in the United States and/or other countries.
Other product and service names might be trademarks of NetApp or other companies. A current list of NetApp trademarks
is available on the Web at http://www.netapp.com/us/legal/netapptmlist.aspx.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Structure Support
Activities
Participation rules
Participants panel
Breakout sessions
Participation rules
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOGISTICS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LEARN TOGETHER
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
This is a three-day foundational course that is intended as an introduction to Clustered Data ONTAP.
This course is targeted at students who are new to NetApp storage, or who have no previous clustered
Data ONTAP experience.
This course is part of a comprehensive Data ONTAP curriculum that is outlined below.
You will examine the features of clustered Data ONTAP through lectures and hands-on exercises.
To help orient you, we will compare Data ONTAP 8.3 features with those of Data ONTAP 7-Mode.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
COURSE OBJECTIVES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Day 1
Module 1: Exploring Data ONTAP Storage Fundamentals
Module 2: Hardware and Initial Setup
Module 3: Initial Storage System Configuration
Module 4: Storage Management
Day 2
Module 5: Network Management
Module 6: Implementing NAS Protocols
Module 7: Implementing SAN Protocols
Module 8: Snapshot Copies
Day 3
Module 9: Managing Storage Space
Module 10: Data Protection
Module 11: Monitoring Your Storage System
Module 12: Upgrading and Transitioning to Clustered Data ONTAP
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE AGENDA
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BONUS MODULES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Classroom,
Windows Server CentOS
Desktop, or 6.5
Your Laptop 2012 R2
Remote
Desktop
Location Username
Windows Administrator
CentOS root
Clustered Data ONTAP admin
(case-sensitive)
Password for all: Netapp123
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-1 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-2 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-3 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-4 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-5 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-6 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-7 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-8 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-9 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Portfolio
336 TB 518 TB 576 TB 1,920 TB
84 Drives 144 Drives 144 Drives 480 Drives
FAS
4-TB VST Flash 4-TB VST Flash 4-TB VST Flash 24-TB VST Flash
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-10 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NFS iSCSI
SMB
FCoE
FC
NAS SAN
(File-Level (Block-Level
Access) Access)
NetApp FAS
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-11 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-12 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-13 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-Mode Clustered
Ava Av va
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HIGH-AVAILABILITY CONFIGURATIONS
High-availability (HA) pairs provide hardware redundancy that, along with redundant disk cabling, provides
the basis for nondisruptive operations and fault tolerance. Each node has the ability to take over its partners
storage and network traffic in case of an outage, and return it when the problem is resolved.
The controllers are connected to each other through an HA interconnect. Each node continually monitors its
partner, mirroring the data for each others nonvolatile memory (NVRAM or NVMEM). If both controllers
are in the same chassis, the interconnect is internal and requires no external cabling. Otherwise, external
cabling is required to connect the two controllers.
Clusters are built for continuous operation; no single failure on a port, disk, card, or motherboard will cause
data to become inaccessible in a system. Clustered scaling and load balancing are both transparent.
Clusters provide a robust feature set, including data protection features such as Snapshot copies, intracluster
asynchronous mirroring, SnapVault backups, and NDMP backups.
1-14 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CAPACITY SCALING
In this example, more capacity is needed for Project B. You can increase the capacity by adding disks to an
HA pair, and then you can transparently move some of the data to the new storage. You can then expand the
amount of storage that is dedicated to Project B.
This expansion and movement are transparent to client machines.
1-15 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LINEAR SCALING
Clustered Data ONTAP solutions can scale from 1 to 24 nodes and are primarily managed as one large
system. More importantly, to client systems, a cluster looks like a single file system. The performance of the
cluster scales linearly to multiple gigabytes per second of throughput, and the capacity scales to petabytes.
Clusters are a fully integrated solution. This example shows a 16-node cluster that includes 10 FAS systems
with 6 disk shelves each, and 10 FAS systems with 5 disk shelves each.
1-16 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Departments
Customers
Applications
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-17 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-Mode Clustered VM
HA
Node SVMs
ct
Data ONTAP Data ONTAP with
with vFiler0 three vFiler units Admin SVMs
Data SVMs
Interco
Clus
HA
How might you use vFiler units or
SVMs in a production environment?
Data SVM
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-18 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-19 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-20 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-21 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-Mode Clustered
CLI: system> aggr create CLI: c1::> aggr create
GUI: GUI:
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-22 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Clustershell
System System
Shell Shell
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-23 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-24 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1.cluster>
2.x::storage aggregate*>
3.cluster#
4.::cluster999>
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-25 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-26 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-27 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-28 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-29 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Tab
c1::storage aggregate> modify
aggr0_c_01 aggr0_c_02 aggr_NFS1 aggr_CIFS1
c1::storage aggregate> modify aggregate aggr _NFS1
-state online
Tab
c1::storage aggregate>
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-30 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
c1::storage aggregate> ..
c1::storage> top
c1::>
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-31 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-32 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-33 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Clustered
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-34 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage pools
SVM workflows
Summarizing disks
IPv6 support
On-box operation
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-35 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-36 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-37 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-38 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
http://www.NetApp.com
https://Twitter.com/NetApp
https://www.facebook.com/NetApp
http://www.youtube.com/user/NetAppTV
Clustered Data ONTAP Storage Platform Mixing Rules
NetApp Hardware Universe:
http://hwu.netapp.com/home.aspx
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
1-39 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
1-40 Clustered Data ONTAP Administration: Exploring Data ONTAP Storage Fundamentals
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS2500 FAS8000
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Single-chassis standalone 3
LINK
e0c e0d
LINK LINK
e0e e0f
LINK
6
LINK
0a 0b
LINK LINK
0c 0d
LINK
0 e0a e0b
LINK
e0c e0d
LINK LINK
e0e e0f
LINK
LINK
0a 0b
LINK LINK
0c 0d
LINK
High-availability (HA)
configuration
3
0 e0a e0b
e0c e0d e0e e0f 0a 0b 0c 0d
0a 0b 0c 0d
7 13
9 15
10 16
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAS CONFIGURATIONS
This slide shows an example of the FAS6200 series controller configuration. Although configurations can
vary with models, they have a few things in common:
Single-chassis configuration:
Standalone configuration with controller and blank panel: good for single-node configurations where high
availability is not a requirement, or where the controllers of an HA pair are spread out in the data center.
Standalone configuration with controller and I/O expansion module (IOXM): good for configurations that
require additional PCIe cards.
NOTE: This configuration is available only with the FAS3200 and FAS6200 series.
High-availability (HA) configuration with two controllers: Sometimes called HA-in-a-box; the HA
interconnect is handled within the chassis connection (rather than over external cables).
Dual-chassis HA configuration, which requires MetroCluster software
NOTE: This configuration is available only with the FAS8000 series.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SAN NAS
Enterprise Departmental Enterprise Departmental
NFS
Vol
Aggregate
HITACHI CB1
D A T A SYST EMS
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DS4243
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
DS2246
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
2U, 24 disks DS2246 10K SAS
SSD
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Advantages: Disadvantages:
Controller or Node 1
Low cost Storage system is the
single point of failure
Controller and disk
shelves have redundant Loss of a controller or
fans and power supplies cable could lead to loss
to keep hardware of data or loss of data
running access
Does not enable
nondisruptive
Disk Shelves
operations (NDO)
Storage System
SAS or FC (simplified)
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NDO: During
maintenance and
Disk Shelves Disk Shelves
upgrades, takeover
occurs while the HA Pair
partner is being
upgraded SAS or FC (simplified)
HA interconnect
Cluster interconnect (clustered Data ONTAP only)
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SAS or FC (simplified)
Cluster Interconnect
HA interconnect
Switches
Cluster interconnect
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Advantages: Disadvantages:
Controller Controller
Mirrored HA pairs 1 2 Cost is higher
maintain two
complete copies of Each node is
all mirrored data managed
separately and
MetroCluster has its own
software provides disks, resources,
failover to another and mirrors of
site that contains a the other node
nearly real-time Disk Shelves Disk Shelves
copy of the data at
the failed site HA Pair
SAS or FC (simplified)
HA interconnect
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HARDWARE UNIVERSE
Hardware Universe (HWU) is a web-based tool that replaces the System Configuration Guide. HWU provides
you with a visual presentation of the complete NetApp line of hardware products. HWU provides a powerful
configuration resource for NetApp employees, partners, and customers by consolidating hardware
specifications for the following products and components:
Controllers: FAS and V-Series
Adapters
Shelves
Drives
Cabinets
Cables
You can make a side-by-side comparison of the various controllers in terms of system capacity, memory size,
maximum spindle count, and other features so that you can decide which controllers will meet your
requirements.
In addition, you can save your personal queries for re-use, or draw from your last 20 queries. This
functionality is a convenient way to revisit your favorite configurations over time.
Hardware Universe is also available for iOS and Android mobile phones and tablets. To download the mobile
HWU apps, visit http://app.netapp.com/public/hardware.html.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Connect:
HA interconnect
Controllers to disk shelves
Controllers to networks
Any tape devices
Controllers and disk shelves to power
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HARDWARE SETUP
Connect controllers to disk shelves. Verify that shelf IDs are set properly.
If required for your controller type, connect NVRAM HA cable between partners. The connections can be
through the chassis, 10-gigabit Ethernet (10-GbE), or InfiniBand, depending on your storage controllers.
Connect controllers to networks.
If present, connect any tape devices. (This task can be performed later.)
Connect controllers and disk shelves to power.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Can be either:
External cables (dedicated 10-GbE or InfiniBand)
Internal interconnect (over the backplane in the chassis)
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HA INTERCONNECT LINKS
HA interconnects connect the two nodes of each HA pair for all controllers. These connections are internally
provided over the backplane in the chassis of a dual-controller configuration. For chassis with single
controllers, a dedicated InfiniBand or 10-GbE link is required, depending on the model and enclosure. Visit
the NetApp Support site to see the appropriate hardware configuration guide for your model storage
controller.
The following types of traffic flow over the HA interconnect links:
Failover: The directives are related to performing storage failover (SFO) between the two nodes,
regardless of whether the failover is:
Negotiated (planned and in response to an administrator request)
Not negotiated (unplanned and in response to an improper system shutdown or booting)
Disk firmware: Nodes in an HA pair coordinate the update of disk firmware. While one node is updating
the firmware, the other node must not perform any I/O to that disk.
Heartbeats: Regular messages demonstrate availability.
Version information: The two nodes in an HA pair must be kept at the same major and minor revision
levels for all software components.
For 7-Mode only, the HA interconnect also provides Virtual Target Interconnect (VTIC), which connects the
two nodes in an HA pair. In FC SAN environments, VTIC enables LUNs to be served through target ports on
both nodes. For example, the output of igroup show v displays the FC initiator that is logged in on
physical ports and a port that is called vtic.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
X1107A
X1107A
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
1 Chelsio Chelsio
Communications 1 Communications
X1107A
X1107A
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
0a 0b 2 Chelsio
Communications 0a 0b 2 Chelsio
Communications
LNK LNK LNK LNK
Controller 1 Controller 2
D
A
D
A
B
X1139A
X2065A
X2065A
10GbEE CNA
3 5 3 5
SAN LAN
SAN LAN
PORT 1
PORT 2
4 6 4 6
Shelf 1 Shelf 1
IOM6 B IOM6 IOM6 B IOM6
DC AC DC AC DC AC DC AC
1 1
x2 x2
2 2 2
x2
2 2 x2
2
Shelf 2 Shelf 2
IOM6 B IOM6 IOM6 B IOM6
DC AC DC AC DC AC DC AC
1 1
x2 x2 x2 x2
2 2 2 2 2 2
Stack 1 Stack 2
Starting with shelf ID 10 Starting with shelf ID 20
DISK-SHELF CABLING
This diagram combines SAS and ACP shelf cabling and the HA cabling for controller 1 and controller 2 of an
HA pair. For a complete course in Data ONTAP Cluster-Mode cabling, see the Data ONTAP 8 Cabling
course (STRHW-WBT-DOTCABL).
ACP is a protocol that enables Data ONTAP to manage and control a SAS-connected storage shelf
subsystem. It uses a separate network (an alternate path) from the data path, so management communication
is not dependent on the data path being intact and available.
You do not need to actively manage the SAS-connected storage shelf subsystem. Data ONTAP automatically
monitors and manages the subsystem without operator intervention. However, you must provide the required
physical connectivity and configuration parameters to enable the ACP functionality.
NOTE: You can install SAS-connected storage shelves without configuring ACP. However, for maximum
storage availability and stability, you should always have ACP configured and enabled.
After you enable ACP, you can use the storage show acp and acpadmin list_all commands
(available through the node shell in clustered Data ONTAP) to display information about your ACP
subsystem.
Because ACP communication is on a separate network, it does not affect data access.
NOTE: Although FC shelves are supported in Data ONTAP, they are no longer sold with new systems.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Best practices:
Single-controller
configuration must use
a dual path
FAS22xx systems with
external storage must
use a dual path
Dual path is
recommended for
greater resiliency
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Best Practices:
HA pair configuration must
use multipath high
availability (MPHA)
FAS22xx systems with
external drives must use
MPHA
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Best Practices:
ACP protocol is recommended
Configuration is cabled by
using daisy-chained method
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Interconnect*
ISLs
X1107A
X1107A
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
1 1 1
X1107A
Chelsio Chelsio Chelsio
LINK/ACT
LINK/ACT
Communications Communications Communications 1 Chelsio
Communications
c0a 0c e0a c0a 0c e0a c0a 0c e0a c0a 0c e0a
X1107A
X1107A
X1107A
2 2 2
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
LINK/ACT
0a 0b 0a 0b 0a 0b
X1107A
Chelsio Chelsio Chelsio 2
LINK/ACT
LINK/ACT
Communications Communications Communications 0a 0b Chelsio
Communications
LNK LNK LNK LNK LNK LNK
LNK LNK
3 5 3 5 3 5 3 5
4 6 4 6 4 6 4 6
SLOT2
PS1
STAT
PS2
CONSOLE
L1 L2 MGMTO MGMT1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 10 19 20
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETWORKS
Data ONTAP operating in 7-Mode and clustered Data ONTAP begin to differ the most when it comes to
networking. Because clustered Data ONTAP is essentially a cluster of HA pairs, a cluster network or cluster
interconnect is needed for all the nodes to communicate with each other.
On this slide you see a four-node cluster and three distinct networks. 7-Mode and clustered Data ONTAP both
require data and management connectivity, which could coexist on the same network.
In multinode configurations, clustered Data ONTAP also requires a cluster interconnect for cluster traffic. In a
two-node configuration, the cluster interconnect can be as simple as two cables between the nodes, or a
cluster network if expansion is desired. In clusters of more than two nodes, a cluster network is required.
Single-node clusters do not require a cluster interconnect unless the cluster is expanded later.
Two cluster connections to each node are typically required for redundancy and improved cluster traffic flow.
For larger clusters that use higher-end platforms (FAS8040 or FAS8060) that are running clustered Data
ONTAP 8.2.1 or later, four cluster interconnects are recommended.
For proper configuration of the NetApp CN1601 and CN1610 switches, refer to the CN1601 and CN1610
Switch Setup and Configuration Guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMUNICATION CONNECTIONS
Each controller should have a console connection, which is required to get to the firmware and the boot menu
(for the setup, installation, and initialization options, for example). A remote management device connection,
although not required, is helpful in the event that you cannot get to the UI or console. Remote management
enables remote booting, the forcing of core dumps, and other actions.
Use a serial console port to set up and monitor the storage system. When you set up your system, use a serial
cable to connect to your PC. An RJ45 port that is marked IOIOI is located on the rear panel. Connect the DB9
end to a serial port on a host computer.
Properties:
Speed: 9,600 bits per second (bps)
Data bits: 8
Stop bits: 1
Parity: none
Flow control: hardware or none
Each node must have two connections to the dedicated cluster network. Each node should have at least one
data connection, although these data connections are necessary only for client access. Because the nodes are
clustered together, it is possible to have a node that participates in the cluster with its storage and other
resources but doesnt field client requests. Typically, however, each node has data connections.
The cluster connections must be on a network that is dedicated to cluster traffic. The data and management
connections must be on a network that is distinct from the cluster network.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
e0M interface:
Dedicated for management traffic
Used for Data ONTAP administrative tasks
RLM or SP interface:
Is used to manage and provide remote management capabilities for the
storage system
Provides remote access to console, and monitoring,
troubleshooting, logging, and alerting features
Remains operational
Command to set up SP:
system node service-processor
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGEMENT INTERFACES
Some storage system models include an e0M interface. This interface is dedicated to Data ONTAP
management activities. An e0M interface enables you to separate management traffic from data traffic on
your storage system for better security and throughput.
To set up a storage system that has the e0M interface, remember this information:
The Ethernet port that is indicated by a wrench icon on the rear of the chassis connects to an internal
Ethernet switch.
Follow the Data ONTAP setup script.
To manage LAN in environments where dedicated LANs isolate management traffic from data traffic,
e0M is the preferred interface.
Configure e0M separately from the RLM or SP configuration.
Both configurations require unique IP and MAC addresses to enable the Ethernet switch to direct traffic
to either the management interfaces or the RLM or SP.
For more information on configuring remote support, refer to the Data ONTAP System Administration Guide
and Data ONTAP Remote Support Agent Configuration Guide.
Enhancements to SP in Data ONTAP 8.2.1:
Available through Ethernet or serial console:
Shares management wrench port with e0M for Ethernet
Toggle from serial console into SP with Ctrl+G
Toggle back to serial console with Ctrl+D
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ADMINISTRATIVE INTERFACES
Types of administrative interfaces:
A serial terminal connected to the console port of the storage system
An Ethernet connection to the remote management device in the storage system
A Telnet session to the storage system
A remote shell program, such as the UNIX RSH utility (provides access for a limited set of commands)
A secure shell application program, such as SSH or OpenSSH for UNIX
Most of the time, you use the NetApp OnCommand System Manager program as your UI connection.
OnCommand System Manager is a web-based graphical management interface that enables you to manage
storage systems and storage objects, such as disks, volumes, and aggregates.
You can also administer NetApp storage systems through management software such as:
SnapManager
SnapProtect
Snap Creator Framework
Third-party management software using the NetApp Manageability Software Development Kit (SDK)
The CLI enables you to execute all Data ONTAP administrative commands, except some Windows server
administrative commands.
The management device enables you to remotely execute all Data ONTAP administrative commands.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
POWERING ON A SYSTEM
This order is the recommended order for powering on the hardware devices in a cluster.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FIRMWARE
1. Use LOADER firmware.
2. From the console, early in the booting process, press any key to enter the firmware.
3. Use version to show the firmware version.
4. Two boot device images exist (depending on the platform): flash0a and flash0b.
CompactFlash
USB flash
5. Use printenv to show the firmware environment variables.
6. Use setenv to set the firmware environment variables; for example, setenv AUTOBOOT true.
To copy flash0a to flash0b, run flash flash0a flash0b.
To put (flash) a new image onto the primary flash, you must first configure the management interface. The
auto option of ifconfig can be used if the management network has a Dynamic Host Configuration
Protocol (DHCP) or BOOTP server. If it doesnt, you must run ifconfig <interface> addr=<ip>
mask=<netmask> gw=<gateway>.
After the network is configured, ensure that you can ping the IP address of the TFTP server that contains the
new flash image. Then, to flash the new image, run
flash tftp://<tftp_server>/<path_to_image> flash0a.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
You need:
Access to an FTP, Trivial File Transfer Protocol (TFTP), or HTTP server
The software image file on that server
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Set up your FAS2200, FAS3200, and FAS8000 systems three times faster
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. Perform console-free
discovery.
2. Set up cluster
management.
3. Configure AutoSupport.
6. Enable protocols.
Congratulations!
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Initialize disks.
5. System setup: Create a cluster on the first node, then join additional nodes to the cluster.
8. Create an SVM.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ADDITIONAL TRAINING
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Initialize disks.
5. System setup: Create a cluster on the first node, then join additional nodes to the
This Module
cluster.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Clustered Data ONTAP administrators are associated with cluster or data SVMs.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ADMINISTRATIVE ACCESS
You can use the default system administration account for managing a storage system, or you can create
additional administrator user accounts to manage administrative access to the storage system.
You might want to create an administrator account for these reasons:
You can specify administrators and groups of administrators with differing degrees of administrative
access to your storage systems.
You can limit an administrators access to specific storage systems by providing an administrative
account on only those systems.
Creating different administrative users enables you to display information about who is performing which
commands on the storage system.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RBAC:
Manages a set of capabilities for users and administrators
Enables you to monitor user and administrator actions
To implement RBAC:
Create a role with specific capabilities
Create a group with one or more assigned roles
Create one or more users, and assign them to a group or groups
Users
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Role 1
User:
Authenticated by the cluster
Capability 1
Authenticated for administration, not for
Capability 2 data access
Created as cluster or SVM administrators
Role 2
Role:
Capability 3
A named set of capabilities and commands
Role 3 Defined for cluster or SVM administration
Capability 4 Capability:
Capability 5 Includes a command
Capability 6 Includes an access level
all
readonly
none
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster-scoped roles
admin backup
readonly autosupport
none
c1::> security login role show vserver c1
vsadmin vsadmin-backup
vsadmin-volume vsadmin-readonly
vsadmin-protocol
c1::> security login role show vserver svm1
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Role name
Command directory
Query
c1::> security login role create
c1::> security login modify vserver svm1 user ken -role svm1vols
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ADMINISTRATIVE SECURITY
cliset: Allow user to create or modify settings by using the clustershell
cliget: Allow user to view settings by using the clustershell
httpset: Allow user to create or modify settings with management tools that use the http protocol
httpget: Allow user to view settings with management tools that use the http protocol
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: LICENSING
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Standard license
Locked to a node
Feature functions with one licensed node if
a licensed node is running
Site license
Single license that enables the feature on
the entire cluster
Is not carried with nodes that are removed
from the cluster
Evaluation license
Also known as a demo license
Temporary license with an expiration date
Cluster-wide and not locked to a node
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LICENSE TYPES
Standard license: A standard license is a node-locked license. It is issued for a node with a specific
system serial number and is valid only for the node that has the matching serial number. Installing a
standard, node-locked license entitles a node to the licensed functionality. It does not entitle the entire
cluster to use the feature. For the cluster to be enabled, though not entitled, to use the licensed
functionality, at least one node must be licensed for the functionality. However, if only one node in a
cluster is licensed for a feature, and that node fails, then the feature will no longer function on the rest of
the cluster until the licensed node is restarted.
Site license: A site license is not tied to a specific system serial number. When you install a site license,
all nodes in the cluster are entitled to the licensed functionality. The system license show
command displays site licenses under the cluster serial number. If your cluster has a site license and you
remove a node from the cluster, the node does not carry the site license with it, and that node is no longer
entitled to the licensed functionality. If you add a node to a cluster that has a site license, the node is
automatically entitled to the functionality that is granted by the site license.
Evaluation license: An evaluation license is a temporary license that expires after a certain period of
time. It enables you to try certain software functionality without purchasing an entitlement. It is a cluster-
wide license, and it is not tied to a specific serial number of a node. If your cluster has an evaluation
license for a package and you remove a node from the cluster, the node does not carry the evaluation
license with it.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
c1::> license ?
(system license)
add Add one or more licenses
clean-up Remove unnecessary licenses
delete Delete a license
show Display licenses
status> Display license status
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LICENSE COMMANDS
Data ONTAP enables you to manage feature licenses in the following ways:
Add one or more license keys
Display information about installed licenses
Display the packages that require licenses and their current license status on the cluster
Delete a license from a cluster or from a node whose serial number you specify
NOTE: The cluster base license is required for the cluster to operate. Data ONTAP does not enable you
to delete it.
Display or remove expired or unused licenses
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Policy:
A collection of rules that are created and managed by the cluster or
SVM administrator
Predefined or created to manage data access
Policy examples:
Firewall and security
Export, quota, file, and data
Snapshot copy and SnapMirror
Quality of service (QoS)
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
policyA fwall_policy1
Rule1 criteria1 192.168.1.0/24 ssh
Rule2 criteria2 192.168.1.0/24 http
Rule3 criteria3
policyB Rule3 criteria3
fwall_policy2
property property
192.168.21.0/24 ssh
Rule1 criteria1
property property
192.168.22.0/24 ssh
Rule2 criteria2 property
property
Rule3 criteria3 192.169.23.0/24 ssh
property allow
property
property
POLICY EXAMPLE
A policya concept that is specific to clustered Data ONTAPis a collection of rules that are created and
managed by the cluster or SVM administrator. Policies are predefined as defaults or they are created to
manage the properties of various types of objects. Examples of policy use include firewall, security, export,
quota, storage quality of service, and replication rules.
Some rules are indexed, meaning that you can specify the order in which each rule is considered for use in a
particular situation. Rule indexes can be modified, and additional rules can be inserted in the list by
specifying the rules new position in the list.
In Data ONTAP operating in 7-Mode, you have to create rules at the object level. As a result, there is a
separate rule for every instance of the object, even if the rule is identical to others. With clustered Data
ONTAP policies, you create the set of rules one time, and then you associate it with all objects that adhere to
the same set of rules.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
JOB SCHEDULES
Schedules apply to Data ONTAP 7-Mode and clustered Data ONTAP. Schedules are used to control events
that are automated and time-based. The most common examples are data replication and AutoSupport
messages.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Manually set the date, time, and time zone with system date
modify.
Kerberos is time-sensitive and typically requires the Network Time
Protocol (NTP).
NTP enablement and disablement are cluster-wide.
NTP configuration is per node in releases that are earlier than Data
ONTAP 8.3
Data ONTAP 7-Mode
system> options timed.proto ntp
system> options timed.servers <ntp-server>
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The cluster-wide ntp command does not work until the entire
cluster is running Data ONTAP 8.3 or later.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
HTTP or HTTPS
SMTP
Email Server
AutoSupport messages are generated:
When triggering events occur
When you initiate a test message
When the system reboots
Daily (logs only)
Weekly (logs, configuration, and health data)
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURING AUTOSUPPORT
AutoSupport configuration involves identifying the transport of choice (SMTP, HTTP, or HTTPS) and the
details that are necessary to transport the message to NetApp. The steps to configure AutoSupport on Data
ONTAP operating in 7-Mode are quite different from the steps on clustered Data ONTAP, but they both
involve basically the same information, including mail host, the from email address, and any recipients,
including NetApp Support. You can also use the noteto option to send notifications to internal and external
recipients without sending the entire AutoSupport payload.
After configuring AutoSupport, always send a test message to verify that you get the desired result. For
testing your AutoSupport configuration on 7-Mode, NetApp recommends that you use the message TEST or
TESTING. In clustered Data ONTAP, sending a message of the type test is sufficient.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
AutoSupport
Identifies risks and provides best Messages
practice tips
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MY AUTOSUPPORT
My AutoSupport is a suite of web-based applications hosted on the NetApp Support site and accessible via
your web browser. Using the data from AutoSupport, My AutoSupport proactively identifies storage
infrastructure issues through a continuous health-check feature and automatically provides guidance on
remedial actions that help increase uptime and avoid disruptions to your business.
My AutoSupport provides four primary functions.
First, it identifies risks and provides best practice tips. For example, My AutoSupport might find a
configuration issue, a bad disk drive, or version incompatibility on your system.
Second, My AutoSupport can compare your hardware and software versions and alert you to potential
obsolescence. For example, My AutoSupport alerts you about end-of-life (EOL) issues or an upcoming
support contract expiration date.
Third, My AutoSupport provides performance and storage utilization reports to help you proactively plan
capacity needs.
Finally, My AutoSupport provides new system visualization tools and transition advisor tools for clustered
Data ONTAP systems.
If you plan any changes to your controllers, NetApp recommends manually triggering an AutoSupport
message before you make the changes. This manually triggered AutoSupport message provides a before
snapshot for comparison, in case a problem arises later.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Initialize disks.
5. System setup: Create a cluster on the first node, then join additional nodes to the cluster.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Logical Layer
FlexVol volumes
Aggregate
RAID Groups
Physical Layer
Disks
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hot spares
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RAID-DP (default)
Double parity for double-disk
Data Parity dParity
Disk Disk Disk failure
RAID 0 Minimum three disks
One
or
RAID 0 (striping)
Many Storage array provides RAID
Array LUNs protection; Data ONTAP does not
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data Aggregate
Data
Single-tiered (HDD, SDD, or
array LUNs)
rg0
Flash pool (multi-tier of HDDs
Data Disks Parity dParity and SSDs)
Disk Disk NetApp enforces a 5-disk
minimum
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexVol volumes:
Depend on their associated
aggregate for their physical
storage
Can increase or decrease in size
as needed
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
volume
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The WAFL (Write Anywhere File Layout) file system optimizes writes to disk.
The operation by which the calculated RAID stripes are written to disk is
called a consistency point (CP).
FlexVol
Volume
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Indirect
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node 1
Host Node 2
Node 3 Node 4
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node 1
Host Node 2
Node 3 Node 4
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONSISTENCY POINTS
At the start of a consistency point, consistent image of the in-memory filesystem is frozen. The frozen image
is then transferred to disk. While the CP completes, incoming modify operations continue to be serviced and
will become part of the following CP.
Certain circumstances trigger a CP:
An NVRAM buffer fills up, and it is time to flush the writes to disk.
A ten-second timer runs out.
A resource is exhausted or hits a predefined scenario that indicates that it is time to flush the writes to
disk.
In the latter case, all other CP types occur. This situation can happen if Snapshot copies are created or the
system halts.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node 1
Host Node 2
Node 3 Node 4
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node 1
Host Node 2
Node 3 Node 4
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Allocation Unit
1 2 3 4 5
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node1
Node2
1 2 3 4 5
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2 3 4 5 6
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RAID-DP
Aggr5 D D D D P P D D D D D D D D D D D D
Aggr6 D D D D D P D D D D D D D D X X X X
D D D D D P D D D D D D D D X X X X
Aggr7 D D D D D P D D D D D D D D X X X X
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
RAID 4
Maximum RAID group size is 28 for RAID-DP and 14 for RAID 4
Storage pool is expanded to 18 drives (12 new SSDs are added)
To avoid orphaned SSD partitions, use one RAID type across all
allocation units in an SSD storage pool
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
45 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
46 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Aggregate
3. Create Aggregate
48 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The shelf ID and bay designate the specific shelf and bay
number where the disk is located.
Bay 0 3.0TB
Bay1 3.0TB
Bay 2 3.0TB
Bay 3 3.0TB
DS4486
Bay 20 3.0TB
Bay 21 3.0TB
Bay 22 3.0TB
Bay 23 3.0TB
DS4486
SAS Disk Name = <node>:<slot><port>.<shelfID>.<bay>
Before 8.3: Example: node1:0a.0.22
49 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IDENTIFYING DISKS
Disks are numbered in all storage systems. Disk numbering enables you to interpret messages that are
displayed on your screen, such as command output or error messages, and to quickly locate a disk that is
associated with a displayed message.
With Data ONTAP 8.2.x and earlier, disks are numbered based on a combination of their node name, slot
number, and port number, and either the loop ID for FC-AL-attached shelves or the shelf ID and bay number
for SAS-attached shelves.
With Data ONTAP 8.3 and later, when a node is part of a functioning cluster, the disk name is independent of
the nodes to which the disk is physically connected and from which the client accesses the disk.
Data ONTAP assigns the stack ID. Stack IDs are unique across the cluster and they start with 1.
The shelf ID is set on the storage shelf when the shelf is added to the stack or loop. If a shelf ID conflict exists
for SAS shelves, then the shelf ID is replaced with the shelf serial number in the drive name.
The bay is the position of the disk within its shelf. Clients can find the bay map in the administration guide for
the storage shelf. The position is used only for multidisk carrier storage shelves. For carriers that house two
disks, the position can be 1 or 2.
During system boot, before the node has joined the cluster or if certain cluster components become
unavailable, drive names revert to the classic format, based on physical connectivity.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
50 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DISK OWNERSHIP
Disk are not useable in Data ONTAP until ownership is assigned to a controller. Fortunately, Data ONTAP
automatically assigns disks to a controller in the initial setup and checks occasionally to see if new disks are
added. When the disk is assigned, the disk ownership information is written to the disk so the assignment
remains persistent.
Ownership can be modified or removed. A disks data contents are not destroyed when the disk is marked as
unowned; only the disks ownership information is erased. Unowned disks that reside on an FC-AL, where
the owned disks exist, have ownership information applied automatically to guarantee that all disks on the
same loop have the same owner.
Automatic ownership assignment is enabled by default and is invoked at the following times:
Every five minutes during normal system operation
Ten minutes after the initial system initialization. (This delay enables the person configuring the system
enough time to finish the initial disk assignments so that the results of the automatic ownership
assignment are correct.)
Whenever you enable automatic ownership assignment
The automatic ownership assignment can also be manually initiated by using the disk assign command
with the auto parameter.
If your system is not configured to assign ownership automatically, or if your system contains array LUNs,
you must assign ownership manually.
NOTE: It is a NetApp best practice to unassign only spare disks.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SPARE DISKS
You can add spare disks to an aggregate to increase its capacity or to replace a failed disk. If the spare is
larger than the other data disks, it becomes the parity disk. However, it does not use the excess capacity unless
another disk of similar size is added. The second largest additional disk has full use of additional capacity.
Zeroing used disks:
After you assign ownership to a disk, you can add that disk to an aggregate on the storage system that owns it,
or leave it as a spare disk on that storage system. If the disk has been used previously in another aggregate,
you should use the disk zero spares command to zero the disk to reduce delays when the disk is used.
Zeroing disks in Data ONTAP 7-Mode:
Use the disk zero spares command.
Zeroing disks in clustered Data ONTAP:
Use the storage disk zerospares command.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Larger Size:
Unused Capacity
!! Degraded Mode:
No replacement
52 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
-t = RAID type
-T = Disk type
Data ONTAP chooses disks, or
manually lists disks by name.
53 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
AGGREGATES
Aggregates provide storage to volumes. They are composed of RAID groups of disks or array LUNs, but not
both. The Data ONTAP operating system organizes the disks or array LUNs in an aggregate into one or more
RAID groups. RAID groups are then collected into one or two plexes, depending on whether RAID-level
mirroring (SyncMirror technology) is in use.
The Data ONTAP storage architecture contains:
Aggregates: Each aggregate contains a plex or plexes, a RAID configuration, and a set of assigned
physical disks to provide storage to the volumes that the aggregate contains.
Plexes: Each plex is associated with an aggregate and contains RAID groups. Typically, an aggregate has
only one plex. Aggregates that use SyncMirror technology have two plexes (plex0 and plex1); plex1
contains a mirror of the plex0 data.
RAID groups: Each RAID group contains physical disks and is associated with a plex. A RAID group
has either a RAID 4 or RAID-DP configuration.
Disks: Disks play different roles at different times, depending on the state of the disk.
Disk states:
Data
Parity
Double-parity
Spare
Broken
Unowned
Uninitialized (not zeroed)
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Flash pools:
Data Disks Parity dParity
Disk Disk SSD RAID group size and type
can be different from HDD RAID
SSD rg
group size
54 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
55 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS2520 FAS2552
56 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
100%
NODE1ROOT PARITY
NODE1ROOT PARITY
NODE2ROOT PARITY
NODE2ROOT PARITY
USER AGGR PARITY
USER AGGR PARITY
NODE1ROOT
NODE2ROOT
USER AGGR
USER AGGR
SPARE
SPARE 0%
1 2 3 4 5 6 7 8 9 10 11 12
57 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
<- N1ROOTPARITY
<- N1ROOTPARITY
<- N2ROOTPARITY
<- N2ROOTPARITY
<- NODE1ROOT
<- NODE2ROOT
<- NODE1ROOT
<- NODE2ROOT
<- NODE1ROOT
<- NODE2ROOT
<- SPARE
<- SPARE
Root Partition
PARITY
PARITY
SPARE
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DataPartition
1 2 3 4 5 6 7 8 9 10 11 12
58 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
100%
Root Par
PARITY
PARITY
SPARE
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DataPartition
59 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
60 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
64-bit aggregate:
Maximum size: dependent on controller model and Data ONTAP
version
Is the default
32-bit
64 bit
32-bit aggregate:
Maximum size: 16 TB
Not supported in Data ONTAP 8.3 and later
61 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
AGGREGATE FORMATS
Aggregates have two formats, with different maximum sizes:
32-bit: Maximum size is 16 TB.
64-bit: Maximum size depends on the FAS model and the Data ONTAP version.
For more information about 64-bit aggregates, see Technical Report 3786, A Thorough Introduction to 64-Bit
Aggregates.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
62 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
63 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Using cluster2 on your lab kit, enter the storage disk show
command.
Are any disks unassigned?
On your lab kit, could you unassign a disk or reassign it to
another node?
If so, what commands would you use?
64 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
65 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
data
LIFs
mgmt -----
LIF NFS
CIFS
SVM Admin FlexVol iSCSI
Client Access
Volumes FC
66 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
67 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data
NAS: Contain file systems for user
data
SAN: Contain LUNs
68 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Resize
system> vol modify vs svm1 name vol1 size +10gb
Destroy
Must be offline
system> vol delete vserver svm1 name vol1
69 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
70 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
71 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
72 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
73 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Interconnect*
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETWORKS
Networking is where Data ONTAP operating in 7-Mode and clustered Data ONTAP differ most. Because a
clustered Data ONTAP system is essentially a cluster of high-availability (HA) pairs, you need a cluster
network or cluster interconnect for all the nodes to communicate with each other. You should always keep
this principle in mind: If a node cannot see the cluster interconnect, it is not part of the cluster. Therefore, the
cluster interconnect requires adequate bandwidth and resiliency.
This graphic shows a four-node cluster and three distinct networks. 7-Mode and clustered Data ONTAP
require both data and management connectivity, which can coexist on the same data network.
In multi-node configurations, clustered Data ONTAP also requires a cluster interconnect for cluster traffic. In
a two-node configuration, the cluster interconnect can be as simple as cabling the two nodes or using switches
if expansion is desired. In clusters of more than two nodes, switches are required. Single-node clusters do not
require a cluster interconnect if the environment does not require high availability and nondisruptive
operations (NDO).
Two cluster connections to each node are typically required for redundancy and improved cluster traffic flow.
For the larger clusters that use higher-end platforms (FAS8040, FAS8060, and FAS8080) that are running
clustered Data ONTAP 8.2.1, four cluster interconnects are the default. Optionally, a FAS8080 can be
configured to use 6 cluster interconnect ports with expansion 10-gigabit Ethernet network interface cards (10-
GbE NICs).
For proper configuration of the NetApp CN1601 and CN1610 switches, refer to the CN1601 and CN1610
Switch Setup and Configuration Guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ifgrp a0a
Port
Physical
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Physical port
Ethernet
FC
Unified Target Adapter (UTA)
UTA is a 10-GbE port
UTA2 is configured as either:
10-GbE
or 16-Gbps FC
Virtual port
Interface group (ifgrp)
Virtual LAN (VLAN)
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PORT TYPES
Port types can be either physical or virtual.
Physical:
Ethernet port: 1-Gb or 10-Gb Ethernet (10-GbE) ports that can be used in NFS, CIFS, and iSCSI
environments
FC port: 4-Gbps, 8-Gbps, or 16-Gbps port that can be used as a target in FC SAN environment. It can be
configured as an initiator for disk shelves or tape drives.
Unified Target Adapter (UTA) port: 10-GbE port that can be used in NFS, CIFS, iSCSI and FCoE
environments
Unified Target Adapter 2 (UTA2) port: Configured as either a 10-GbE Ethernet or 16-Gbps FC port
10-Gb ports can be used in NFS, CIFS, iSCSI, and FCoE environments
16-Gbps FC ports can be used as targets in FC SAN environments
NOTE: UTA2 FC ports are not supported with DS14 disk shelves or FC tape drives.
Virtual:
Interface group: An interface group implements link aggregation by providing a mechanism to group
together multiple network interfaces (links) into one logical interface (aggregate). After an interface group
is created, it is indistinguishable from a physical network interface.
VLAN: Traffic from multiple VLANs can traverse a link that interconnects two switches by using VLAN
tagging. A VLAN tag is a unique identifier that indicates the VLAN to which a frame belongs. A VLAN
tag is included in the header of every frame that is sent by an end-station on a VLAN. On receiving a
tagged frame, a switch identifies the VLAN by inspecting the tag, then forwards the frame to the
destination in the identified VLAN.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10-GbE and UTA2 ports use either twinax copper (Cu) or Management port:
optical (LC) cables, depending on the personality and type of e0M or Service Processor (SP)
small form-factor pluggable (SFP) module.
SAS 10-GbE cluster* or data ports: GbE data ports: ACP Console port
e0a*, e0b, e0c*, and e0d e0i, e0j, e0k, and e0l (also SP)
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Using cluster1 on your lab kit, use the net port show
command.
What ports do you see?
In what slots are the adapters attached?
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Interface Groups
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTERFACE GROUPS
The following network terms are described as they are implemented within Data ONTAP:
Interface groups aggregate network interfaces into a trunk.
You can implement link aggregation on your storage system to group multiple network interfaces (links)
into one logical interface (aggregate).
After an interface group is created, the interface group is indistinguishable from a physical network
interface.
Be aware that different vendors refer to interface groups by the following terms:
Virtual aggregations
Link aggregations
Trunks
EtherChannel
Interface groups can be implemented in two modes: single-mode and multimode.
In single-mode link aggregation, one interface is active, and the other interface is inactive (on standby).
In multimode, all links in the link aggregation are active.
A dynamic multimode interface group can detect loss of link status and data flow.
Multimode requires a compatible switch to implement configuration.
Data ONTAP link aggregation complies with the IEEE 802.3ad static standard and multimode dynamic link:
Link Aggregation Control Protocol (LACP).
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Switch 1
Switch 2
Mgmt
Router Switch
VLAN70
Clients Tenant B Tenant A Mgmt
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VLANS
A port or interface group can be subdivided into multiple VLANs. Each VLAN has a unique tag that is
communicated in the header of every packet. The switch must be configured to support VLANs and the tags
that are in use. In Data ONTAP, a VLAN's ID is configured into the name. For example, VLAN "e0a-70" is a
VLAN with tag 70 configured on physical port e0a. VLANs that share a base port can belong to the same or
different IP spaces, and it follows that the base port could be in a different IP space than its VLANs.
Different configurations of LIFs, failover groups, VLANs, and interface groups are possible in a clustered
Data ONTAP environment. The best practice recommendation is to use a configuration that takes advantage
of the cluster-wide failover capabilities of failover groups, the port aggregation functionality of interface
groups, and the security aspects of VLANs.
For more examples, refer to the Clustered Data ONTAP 8.2 Network Management Guide and TR-4182:
Ethernet Storage Best Practices for Clustered Data ONTAP Configurations.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATING VLANS
You can create a VLAN for ease of administration, confinement of broadcast domains, reduced network
traffic, and enforcement of security policies.
7-Mode:
In 7-Mode, You can use the vlan create command to include an interface in one or more VLANs, as
specified by the VLAN identifier, enable VLAN tagging, and optionally enable GVRP (enabled with the g
option). VLANs that you create by using the vlan create command are not persistent across reboots
unless you add them to the /etc/rcfile or you use System Manager.
Clustered Data ONTAP:
In clustered Data ONTAP, interface groups are handled in a similar way.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
vlan vlan
ifgrp
port port
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: IPSPACES
The MultiStore feature for Data ONTAP software was created to enable service providers to partition the
resources of a single storage system so that it appears as multiple virtual storage systems on a network.
The IPspace feature was created for MultiStore to enable a single storage system to be accessed by clients
from more than one disconnected network, even if those clients are using the same IP address.
Clustered Data ONTAP has had a feature similar to MultiStore virtual storage systems, and IPspaces were
introduced to clustered Data ONTAP in version 8.3.
Conceptually, IPspaces in 7-Mode and clustered Data ONTAP are similar, but the configuration is very
different. In this lesson only, clustered Data ONTAP 8.3 examples are discussed. For information on how to
configure IPspaces for MultiStore environments in 7-Mode, refer to the MultiStore Management Guide For 7-
Mode for the version of Data ONTAP that you are configuring.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IPSPACES: OVERVIEW
The IPspace feature enables a storage system or cluster to be accessed by clients from more than one
disconnected network, even if those clients are using the same IP address.
An IPspace defines a distinct IP address space in which virtual storage systems can participate. IP addresses
that are defined for an IPspace are applicable only within that IPspace. A distinct routing table is maintained
for each IPspace. No cross-IPspace traffic routing happens. Each IPspace has a unique loopback interface that
is assigned to it. The loopback traffic on each IPspace is completely isolated from the loopback traffic on
other IPspaces.
Example:
A storage service provider (SSP) needs to connect customers of companies A and B to a storage system on
the SSP's premises. The SSP creates storage virtual machines (SVMs) on the clusterone per customerand
provides a dedicated network path from one SVM to As network and one from the other SVM to Bs
network.
This deployment should work if both companies use nonprivate IP address ranges. However, because the
companies use the same private addresses, the SVMs on the cluster at the SSP location have conflicting IP
addresses.
To overcome this problem, two IPspaces are defined on the clusterone per company. Because a distinct
routing table is maintained for each IPspace, and no cross-IPspace traffic is routed, the data for each company
is securely routed to its respective network, even if the two SVMs are configured in the 10.0.0.0 address
space.
Additionally, the IP addresses that are referred to by the various configuration files (such as the /etc/hosts file,
the /etc/hosts.equivfile, and the /etc/rcfile) are relative to that IPspace. Therefore, the IPspaces enable the SSP
to use the same IP address for the configuration and authentication data for both SVMs, without conflict.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Two IPspaces and two system SVMs are created automatically when the
cluster is initialized:
Default IPspace
A container for ports, subnets, and SVMs that serve data for configurations that
do not need separate IPspaces for clients
Also contains the cluster management and node management ports
For the Default IPspace, a system SVM named after the cluster is created
Cluster IPspace
Contains all cluster ports from all nodes in the cluster
Provides connectivity to the internal private cluster network
For the Cluster IPspace, a system SVM named Cluster is created
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IPSPACES: DEFAULTS
Two special IPspaces are created by default when the cluster is first created, and a special SVM is created for
each IPspace.
Default IPspace
This IPspace is a container for ports, subnets, and SVMs that serve data. If your configuration does not
need separate IPspaces for clients, all SVMs can be created in this IPspace. This IPspace also contains the
cluster management and node management ports.
Cluster IPspace
This IPspace contains all cluster ports from all nodes in the cluster. It is created automatically when the
cluster is created. It provides connectivity to the internal private cluster network. As additional nodes join
the cluster, cluster ports from those nodes are added to the Cluster IPspace.
A system SVM exists for each IPspace. When you create an IPspace, a default system SVM of the same name
is created:
The system SVM for the Cluster IPspace carries cluster traffic between nodes of a cluster on the
internal private cluster network. It is managed by the cluster administrator, and it has the name Cluster.
The system SVM for the Default IPspace carries management traffic for the cluster and nodes,
including the intercluster traffic between clusters. It is managed by the cluster administrator, and it uses
the same name as the cluster.
The system SVM for a custom IPspace that you create carries management traffic for that SVM. It is
managed by the cluster administrator, and it uses the same name as the IPspace
One or more SVMs for clients can exist in an IPspace. Each client SVM has its own data volumes and
configurations, and it is administered independently of other SVMs.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
You can create IPspaces when you need your SVMs to have their own
secure storage, administration, and routing:
NOTE: A system SVM with the same name as the IPspace name is automatically
created.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To view IPspaces:
c1::> network ipspace show
IPspace Vserver List Broadcast Domains
---------- ---------------------------- -------------------
Cluster Cluster Cluster
Default svm1, svm2, c1 Default
IPspace_A SVM_A-1, SVM_A-2, IPspace_A bcast_A
IPspace_B SVM_B-1, SVM_B-2, IPspace_B bcast_B
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Broadcast domains enable you to group network ports that belong to the same
layer 2 network
The ports in the group can then be used by an SVM for data or management traffic
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SUBNETS: OVERVIEW
Subnets enable you to allocate specific blocks, or pools, of IP addresses for your Data ONTAP network
configuration. This allocation enables you to create LIFs more easily when you use the network
interface create command, by specifying a subnet name instead of having to specify IP address and
network mask values.
A subnet is created within a broadcast domain, and it contains a pool of IP addresses that belong to the same
layer 3 subnet. IP addresses in a subnet are allocated to ports in the broadcast domain when LIFs are created.
When LIFs are removed, the IP addresses are returned to the subnet pool and are available for future LIFs.
It is recommended that you use subnets because they make the management of IP addresses much easier, and
they make the creation of LIFs a simpler process. Additionally, if you specify a gateway when defining a
subnet, a default route to that gateway is added automatically to the SVM when a LIF is created using that
subnet.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To create a subnet:
NOTE: The broadcast domain and IPspace where you plan to add the subnet
must already exist, and subnet names must be unique within an IPspace.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ifgrp a0a
Port
Physical
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To view a LIF:
c1::> network interface show vserver SVM_A-1 lif SVM_A-1_lif2
Vserver Name: SVM_A-1
Logical Interface Name: SVM_A-1_lif2
Role: data
Data Protocol: nfs
Home Node: c1-02
Output edited
Home Port: e0f
for readability
Current Node: c1-02
Current Port: e0f
...
Is Home: true
Network Address: 10.1.2.92
Netmask: 255.255.255.0
...
Subnet Name: subnet_A
...
IPspace of LIF: IPspace_A
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETWORK COMPONENTS
This graphic shows clustered Data ONTAP 8.3 from a data network component perspective. Clustered Data
ONTAP requires data and management connectivity, which could coexist on the same network. In multinode
configurations, clustered Data ONTAP also requires a cluster interconnect for cluster traffic.
Two cluster connections to each node are typically required for redundancy and improved cluster traffic flow.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
These failover groups are created automatically based on the network ports
that are present in the particular broadcast domain:
A Cluster failover group contains the ports in the Cluster broadcast
domain
These ports are used for cluster communication and include all cluster ports from
all nodes in the cluster
Additional failover groups are created for each broadcast domain that you
create
The failover group has the same name as the broadcast domain, and it contains
the same ports as those in the broadcast domain
45 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
46 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAILOVER POLICIES
These default policies should be used in most cases.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
You can also add and remove targets from a failover group:
network interface failover-groups add-targets
network interface failover-groups remove-targets
48 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
How do I decide:
What are the benefits of each type of failover group and
failover policy type?
49 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
50 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Outbound traffic of LIFs in an SVM can be controlled by using route tables and static
routes:
Route tables:
Route tables are routes that are automatically created in an SVM when a service or
application is configured for the SVM
Routes are configured for each SVM, identifying the SVM, subnet, and destination
Because route tables are per-SVM, routing changes to one SVM do not pose a risk of
corrupting another SVM route table
The system SVM of each IPspace has its own route table
Static routes:
A static route is a defined route between a LIF and a specific destination IP address
The route can use a gateway IP address
NOTE: If a default gateway is defined when creating a subnet, a default route to that gateway is
added automatically to the SVM that uses a LIF from that subnet.
52 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
53 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
54 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
55 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
56 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
57 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
58 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
59 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. An appropriately
loaded LIF will be
chosen. 1 LIF4
Delegated zone/forwarder
SVM1.NETAPP.COM
Create a DNS zone
Example for LIF1 DNS Zone = SVM1.NETAPP.COM
c1::> net int create -vserver svm1 -lif lif1 -role data -home-node c1-01 -home-port e0e
-address 192.168.0.131 -netmask 255.255.255.0 -dns-zone svm1.netapp.com
60 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2. Mount client by
using host name.
LIF2
3. Configure DNS
Server for round-
robin load LIF3
balancing.
61 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3. Modify LIF to
subscribe to failover nfsclient% mount <lif1 IP>:/
/mnt/svm1
group and enable
automatic LIF
rebalancing.
62 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
63 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
64 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
65 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
66 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
67 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NFS iSCSI
CIFS
FCoE
FC
NAS SAN
(File-Level (Block-Level
Access) Access)
NetApp FAS
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Initialize disks.
5. System setup: Create a cluster on the first node, then join additional nodes
to the cluster.
6. Complete the initial configuration.
7. Create data aggregates.
This Module
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Client Client
mnt/NFSvol
Disk 1 (C:)
Disk 2 (E:) \\system\SMBvol
Server
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume
Qtree
Directory
File
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Or:
Create a second named project volume: Projects
c1::> volume create vserver vsNFS
-aggregate aggr1_system_01 volume Theseus
-size 20GB state online type RW
policy Default security-style unix
Mount the second named project volume under the Projects Theseus
volume:
c1::> volume mount vserver vsNFS
volume Theseus junction-path /Projects/Theseus
active true policy-override false
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
JUNCTIONS
Volume junctions are a way to join individual volumes together into a single logical namespace. Volume
junctions are transparent to CIFS and NFS clients. When NAS clients access data by traversing a junction, the
junction appears to be an ordinary directory.
A junction is formed when a volume is mounted to a mount point below the root and is used to create a file-
system tree. The top of a file-system tree is always the root volume, which is represented by a slash mark (/).
A junction points from a directory in one volume to the root directory of another volume.
A volume must be mounted at a junction point in the namespace to allow NAS client access to contained data.
Although specifying a junction point is optional when a volume is created, data in the volume cannot be
exported and a share cannot be created until the volume is mounted to a junction point in the namespace. A
volume that was not mounted during volume creation can be mounted post-creation. New volumes can be
added to the namespace at any time by mounting them to a junction point.
NOTE: Mounting volumes to junction paths is accomplished on the storage system.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Mounting
c1::> volume mount -vserver vs1 volume pro1
-junction-path /project1
Unmounting
c1::> volume unmount -vserver vs1 volume pro1
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
/project3
/acct
/project2
/project1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
/acct
/project /project/pro3
/project/pro2
/project/pro1
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
/acct
/project/pro3
/project/pro11 /project/pro2
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Client
mnt/NFS
Server
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NFS
NFS is a distributed file system that enables users to access resources, such as volumes that are located on
remote storage systems, as if the resources were located on their local computer system.
NFS provides its services through a client-server relationship.
Storage systems that allow their file systems and other resources to be available for remote access are
called servers.
The computers that use a server's resources are called clients.
The procedure of making file systems available is called exporting.
The act of a client accessing an exported file system is called mounting.
When a client mounts a file system that a server exports, users on the client machine can view and interact
with the mounted file systems on the server within the permissions granted.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Best Practice:
Configure NAS protocols
with OnCommand System
Manager.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLIENT SPECIFICATION
Data ONTAP controls access to its exported resources according to the authentication-based and file-based
restrictions that are specified. With authentication-based restrictions, you can specify which client machines
can connect to the storage system.
When the storage system receives a request to mount an exported resource, it looks up the name of the client
that is making the request. The storage system takes the client IP address and looks up the corresponding host
name that matches that address. Data ONTAP relies on correct resolution of client names and IP addresses to
provide basic connectivity for storage systems on the network. If you are unable to access the storage system
data or establish sessions, there might be problems with host-name resolution on your storage system or on a
name server.
Host: Typically, the UNIX host system that is connected to the storage system
Netgroup: A network-wide group of machines that are granted identical access to certain network
resources for security and organizational reasons
Subnet: A physical grouping of connected network devices. Nodes on a subnet tend to be located in close
physical proximity to each other on a LAN.
DNS subdomain: A domain that is part of a larger domain. A DNS hierarchy consists of the root-level
domain at the top, underneath which are the top-level domains, followed by second-level domains, and
finally the subdomains.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
7-MODE: EXPORTING
You can export or unexport a file system path, making it available or unavailable to NFS clients, by editing
the /etc/exportsfile or running the exportfs command. To specify which file system paths Data ONTAP
exports automatically when NFS starts, edit the /etc/exportsfile.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DNS Subdomain:
.learn.netapp.local
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Export /project/pro1:
All clients on the subnet 192.168.0.0/24 get r/o access. Users on
the subnet get r/w access with authentication by Kerberos 5.
Create an export policy:
c1::> vserver export-policy create vserver vs1
-policyname vs1_pro1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MOUNTS
To enable an NFS client, you mount a remote file system after NFS is started. Usually, only a privileged user
can mount file systems with NFS. However, you can enable users to mount and unmount selected file systems
by using the mount and umount commands if the user option is set in /etc/fstab. This setting can reduce
traffic by having file systems mounted only when they are needed. To enable user mounting, create an entry
in /etc/fstab for each file system to be mounted.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VERIFYING MOUNTS
To verify exported resources, use the mount command in UNIX systems:
On the client, use showmount e, nfsstat m, or an equivalent command to verify exported
resources and mount options.
With the showmount command, you can display:
What is being exported by the storage system
The clients that mount the storage system
In versions earlier than Data ONTAP 8.3, clients cannot use the showmount -e command to view the NFS
exports list. Instead, only the root volume (/) is displayed.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
# ls -l
d r - x r - -
read write exec read write exec
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Client
Disk 1 (C:)
Disk 2 (E:) \\system\SMBvol
Server
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Best Practice:
Configure NAS protocols
with OnCommand System
Manager.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SHARE PERMISSIONS
Share permissions apply only to users who access the resource over the network. They apply to all files and
folders in the shared resource.
Full Control: Full Control is the default permission that is assigned to the Administrators group on the
local computer. Full Control allows all Read and Change permissions, plus Changing permissions (NTFS
files and folders only).
Read: Read is the default permission that is assigned to the Everyone group. Read allows:
Viewing file names and subfolder names
Viewing data in files
Running program files
Change: Change is not a default permission for any group. The Change permission allows all Read
permissions, plus:
Adding files and subfolders
Changing data in files
Deleting subfolders and files
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATING SHARES
A CIFS share is a named access point in a volume that enables CIFS clients to view, browse, and manipulate
files on a file server. There are certain guidelines that you should take into consideration when creating CIFS
shares.
When you create a share, you must provide all of the following information:
The complete path in a volume to the CIFS share
The name of the share that is entered by users when they connect to the share
When you create a share, you can optionally specify a description for the share. The share description appears
in the Comment field when you browse the shares on the network.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CLI
C:\> net view \\system
C:\> net use e: \\system\SHARE1 /user:marketing\jdoe
UI
Use Run dialog box
Map a drive
45 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
\\system\pro1
Bob
46 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SMB SESSIONS
An SMB session is established between an authenticated user on an SMB client and an SMB server.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
50 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
52 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NAMESPACE REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
53 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NFS REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
54 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SMB REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
55 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
56 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NFS iSCSI
CIFS
FCoE
FC
NAS SAN
(File-Level (Block-Level
Access) Access)
NetApp FAS
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Initialize disks.
5. System setup: Create a cluster on the first node, then join additional nodes to the cluster.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SAN PROTOCOLS
LUNs on a NetApp storage system can be accessed through either of the following:
An FC SAN fabric that uses the FC protocol
An Ethernet network that uses either the FCoE protocol or the iSCSI protocol
In all cases, the transport portals (FC, FCoE, or iSCSI) carry encapsulated SCSI commands as the data
transport mechanism.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
a. 4
b. 8
c. 16
d. 24
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LUN SCSI Disk
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT IS A LUN?
A LUN in Data ONTAP is a logical representation of an attached SCSI disk. As we learned earlier, SAN is
often called block-based storage. The block refers to the logical blocks that the host writes tojust as it
would write to an attached SCSI disk. Traditionally, these logical blocks are 512 bytes per sector.
Hard disk manufacturers have started using 4096-byte (4-KB) sectors, called Advanced Format, in new hard
disk platforms. At this time, Data ONTAP LUNs are using the traditional SCSI standard of 512 bytes per
sector.
NOTE: This slide is meant to simplify the understanding of a LUN.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disk 1 (C:)
Disk 2 (E:) LUN
Connected
through a switch
Serv
Target HA
WAFL
(controller
or SVM)
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data SVM
Can be grouped into port sets
Recommendation: Use at least one LIF per
node, per SVM, per network.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disk 1 (C:)
The LUN
Disk 2 (E:)
Ethernet
Target
Portal
Groups My_IP_igroup
iqn.1999-04.com.a:system
LIF LIF Protocol: iSCSI
OS Type: Windows
ALUA: true
vs_iscsi Port set: myportset
ISCSI ARCHITECTURE
Data is communicated over ports. In an Ethernet SAN, the data is communicated by means of Ethernet ports.
In an FC SAN, the data is communicated over FC ports. For FCoE, the initiator has a converged network
adapter (CNA) and the target has a unified target adapter (UTA).
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A separate target
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
iqn.1995- 02.com.microsoft:
base.learn.netapp.local
LIF LIF
iqn.1992-08.com.netapp:sn.000:vs
Target: Data SVM
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ISCSI NODES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LUNa
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
LUN
Multipath Driver
0d 0e 0d 0e
HA
LUNa
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ALUA MULTIPATHING
ALUA, also called Target Port Group Support (TPGS), identified a set of one or more SCSI targets that are
unified by a purpose.
Active/optimized: While in the active/optimized state, all the target ports in the Target Port Group can
immediately access the LUN.
Active/non-optimized: While in the active/non-optimized state, the device server support all commands
that the LUN supports. The execution of specific commands, especially those that involve data transfer or
caching, might operate with lower performance than they would if the Target Port Group were in the
active/optimized state.
Unavailable: The target port returns a CHECK CONDITION status with the sense key set to NOT
READY and an additional sense code of LOGICAL UNIT NOT ACCESSIBLE, TARGET PORT IN
UNAVAILABLE STATE.
NOTE: Do not confuse a Target Port Group (a group of target ports) with a portal group (sometimes called a
Target Portal Group on the storage), which is a list of IP addresses and ports that listen for iSCSI
connections.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Multipath Driver
with ALUA Support
Direct
LUN
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Multipath Driver
with ALUA Support
LUN
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
a. FC only
b. FC and FCoE only
c. FC, FCoE, and iSCSI only
d. FC, FCoE, iSCSI, and NFS only
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Initiator
Target
Ethernet
(controller HA
or SVM)
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. Select the
IQN.
2. Click Connect.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Verify sessions:
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VERIFYING SESSION
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATING A LUN
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Create an igroup:
Data ONTAP 7-Mode
system> igroup create -i t windows ig_myWin2
iqn.1991-05.com.microsoft:win-frtp2qb78mr
Clustered Data ONTAP
c1::> lun igroup create -vserver svm1 -igroup ig_myWin2 -protocol iscsi
-ostype windows -initiator iqn.1991-05.com.microsoft:win-frtp2qb78mr
Verify an igroup:
Data ONTAP 7-Mode
system> igroup show
Clustered Data ONTAP
c1::> igroup show
Vserver Igroup Protocol OS Type Initiators
--------- -------- -------- -------- -------------------------
svm1 ig_myWin2 iscsi windows iqn.1991-
05.com.microsoft:win-frtp2qb78mr
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATING AN IGROUP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Verify igroups:
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VERIFYING IGROUPS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MAPPING A LUN
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Local nodes: The node that owns the LUN and its partner report
the LUN to the host (also called reporting nodes).
Remote nodes: All other nodes in the cluster do not report.
For information about Selective LUN Mapping and LUN Mobility,
see the SAN Implementation course.
44 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
45 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
In Windows, a LUN
appears as a disk.
46 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
49 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4. Verify the
configuration and click
Finish.
50 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
52 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SAN REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
53 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
54 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SNAPSHOT TECHNOLOGY
Snapshot technology is a key element in the implementation of the WAFL (Write Anywhere File Layout) file
system:
A Snapshot copy is a local, read-only, space-efficient, point-in-time image of data in a volume or
aggregate.
A Snapshot copy is only a picture of the file system, and it does not contain any data file content.
Snapshot copies are used for backup and error recovery.
Snapshot copies are only for local file recovery. If a volume is destroyed, then the Snapshot copies are
destroyed.
The Data ONTAP operating system automatically creates and deletes Snapshot copies of data in volumes to
support commands that are related to Snapshot technology.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
S1 S2
SNAP #1 SNAP #2
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
a. SnapRestore
b. SnapDrive
c. FlexClone
d. All of the above
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
a. .snapshot
b. ~snapshot
c. %snapshot
d. ~backup
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT RESERVE
The snap reserve command determines the percentage of the storage space that is set aside for Snapshot
copies.
You can change the percentage of storage space that is set aside for the Snapshot copies of a volume. By
default, volume Snapshot copies are stored in the Snapshot reserve storage space. The Snapshot reserve space
is not counted as part of the volumes disk space that is allocated for the active file system. When a Snapshot
copy is first created, none of the Snapshot reserve is consumed. The Snapshot copy is protecting the active
file system at the point in time when the Snapshot copy was created. As the Snapshot copy ages, and the
active file system changes, the Snapshot copy begins to own the data blocks that were deleted or changed by
the current active file system. The Snapshot copy begins to consume the Snapshot reserve space. The amount
of disk space that is consumed by Snapshot copies can grow, depending on the length of time that a Snapshot
copy is retained and the rate of change of the volume.
In some cases, if the Snapshot copy is retained for a long period of time, and the active file system has a high
rate of change, the Snapshot copy can consume 100% of the Snapshot reserve, which is the full 5% of the disk
space that is set aside for Snapshot copies. If the Snapshot copy is not deleted, the Snapshot copy can
consume a portion of the disk space that is intended for the active file system. You monitor and manage
Snapshot copies so that disk space is properly managed.
NOTE: Even if the Snapshot reserve is set to 0%, you can still create Snapshot copies. If there is no Snapshot
reserve, Snapshot copies, over time, consume blocks from the active file system.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Aggregate Space
Deleting a Snapshot copy
Data ONTAP 7-Mode
Active File
system> snap delete System
95%
system> snap autodelete
Clustered Data ONTAP
c1::> volume snapshot delete 5%
Snapshot
c1::> volume snapshot autodelete reserve
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
These basic 7-Mode and clustered Data ONTAP commands enable you to
create and manage Snapshot copies.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COMMANDS
Here are the basic Snapshot commands that you use on the storage system CLI:
To create and delete Snapshot copies, use the snap create command for 7-Mode or the volume
snapshot create command for clustered Data ONTAP.
To modify the Snapshot reserve on 7-Mode, use the snap reserve command. On a cluster, you
modify the Snapshot reserve at the volume level.
Use snap sched on 7-Mode to manipulate Snapshot schedules. Clustered Data ONTAP uses snapshot
policies to apply schedules to volumes.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT POLICIES
Two Snapshot policies are automatically created: default and none. If a volume uses none as its Snapshot
policy, no Snapshot copies of it are created. Create Snapshot policies by using the volume snapshot
policy create command and cluster-level schedules.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RECOVERING DATA
You can use Snapshot copies to recover data in two ways:
Copy a file from a Snapshot directory: To copy a lost or corrupted file from a Snapshot copy, navigate to
the Snapshot directory on the client host and locate the Snapshot copy that contains the correct version of
the file. You can copy the file to the original location and overwrite existing data or copy the file to a new
location.
Use the SnapRestore feature to recover data: To revert a volume or a file from a Snapshot copy, you need
the SnapRestore license. You can revert a volume or file from the storage CLI or from the OnCommand
System Manager interface. You can also revert a volume or file by using NetApp data protection software
solutions such as SnapManager, Snap Creator Framework, SnapProtect, or SnapDrive.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
# ls /system/vol01/.snapshot
weekly.2014-09-15_0015 daily.2014-09-18_0010
daily.2014-09-19_0010 hourly.2014-09-19_0605
hourly.2014-09-19_0705 hourly.2014-09-19_0805
hourly.2014-09-19_0905 hourly.2014-09-19_1005
hourly.2014-09-19_1105 hourly.2014-09-19_1205
snapmirror.3_2147484677.2014-09-19_114126
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
.snapshot
home
.snapshot daily.2014-09-18_0010
daily.2014-09-17_0010
daily.2014-09-18_0010
daily.2014-09-17_0010
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
S1 S2
SNAP #1 SNAP #2
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Prod A A A
B B B
C C C
A B C D E F F E D D D
E
E E E
F
F F F
F
Prod
S1 S2
Production:
SNAP #1 SNAP #2
Active
File System
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
aggr21
vol28
vol29 vol30
vol27
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
waste
App 3 8 spindles and space
waste
Shared
App 2 6 spindles capacity
App 3
12 spindles
waste
App 1
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THIN PROVISIONING
If you compare the NetApp storage use approach to the competitions approach, you find one feature that
stands out. Flexible dynamic provisioning with FlexVol technology provides high storage use rates and
enables customers to increase capacity without the need to physically reposition or repurpose storage devices.
NetApp thin provisioning enables users to oversubscribe data volumes, which results in high use models. You
can think of this approach as just-in-time storage.
To manage thin provisioning on a cluster, use the volume command.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
vol01
~/alan ~/doug ~/phil ~/stu
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DEDUPLICATION
Deduplication can be thought of as the process of unduplicating data. The term deduplication was first
coined by database administrators many years ago, as a way of describing the process of removing duplicate
records after two databases had been merged.
In the context of disk storage, deduplication refers to any algorithm that searches for duplicate data objects
(for example, blocks, chunks, and files) and discards those duplicates. When duplicate data is detected, it is
not retained, but instead a data pointer is modified so that the storage system references an exact copy of the
data object that is already stored on disk. This deduplication feature works well with datasets that have a lot of
duplicated date (for example, full backups).
When NetApp deduplication is configured, it runs as a background process that is transparent to any client
that accesses data from a storage system. This feature allows a reduction of storage costs by reducing the
actual amount of data that is stored over time. For example, if a 100-GB full backup is made on the first night,
and then a 5-GB change in the data occurs during the next day, the second nightly backup only needs to store
the 5 GB of changed data. This amounts to a 95% spatial reduction on the second backup. A full backup can
yield more than a 90% spatial reduction with incremental backups averaging about 30% of the time. With
nonbackup scenarios, such as with virtual machine images, gains of up to 40% space savings can be realized.
To estimate your own savings, visit the NetApp deduplication calculator at http://www.secalc.com.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
presentation1.ppt
= Identical blocks
presentation2.ppt
presentation3.ppt
Edited file
10 blocks added
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DEDUPLICATION IN ACTION
In this example, one user creates a Microsoft PowerPoint presentation (presentation.ppt) that includes 20
blocks of data. Then a second user copies the presentation to another location. Finally, a third user copies the
presentation to a third location and edits the file, adding 10 blocks.
When the files are stored on a storage system for which deduplication is configured, the original file is saved,
but the second copy (because it is identical to the original file) merely references the original files location on
the storage system. The edits to the file in the third location (the additional 10 blocks) are saved to the storage
system, but all unedited blocks are referenced back to the original file.
With NetApp deduplication, 30 blocks are used to store 70 blocks of data, and the space that is required for
storage is reduced by 58%.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURING DEDUPLICATION
Deduplication improves physical storage-space efficiency by eliminating redundant data blocks within a
FlexVol volume. Deduplication works at the block level on an active file system and uses the WAFL (Write
Anywhere File Layout) block-sharing mechanism. Each block of data has a digital signature that is compared
with all the other blocks in the data volume. If an exact match is identified, the duplicate block is discarded,
and a data pointer is modified so that the storage system references the copy of the data object that is stored
on disk. The deduplication feature works well with datasets that have large quantities of duplicated data or
white space. You can configure deduplication operations to run automatically or according to a schedule. You
can run deduplication on new or existing data on any FlexVol volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Inline compression
Parallelism is increased
Path length is decreased
Latency is increased
Postprocess compression
Uncompressed data is compressed during idle time
Only previously uncompressed blocks are compressed
Compression is done before deduplication
Data ONTAP 8.2 and later releases can detect incompressible data
before wasting cycles
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data Compression
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
aggr21
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexClone technology:
Enables the creation of multiple, instant dataset clones with
no storage overhead
Provides dramatic improvement for application test and
development environments
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume cloning:
aggr01 Starts with a volume
Creates a Snapshot copy of the
volume
vol01 Creates a clone (a new volume
Snapshot based on the Snapshot copy)
copy of
Parent parent Modifications of the original
volume are separate from
modifications of the cloned
volume
Clone Result: Independent volume
copies are efficiently stored
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
vol1
Aggregate
Unique Clone
Data Blocks
Unique vol1
Data Blocks
vol1
clone
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLONING
A FlexClone volume is a point-in-time, space-efficient, writable copy of the parent volume. The FlexClone
volume is a fully functional standalone volume. Changes that are made to the parent volume after the
FlexClone volume is created are not reflected in the FlexClone volume, and changes to the FlexClone volume
are not reflected in the parent volume.
FlexClone volumes are created in the same virtual server and aggregate as the parent volume, and FlexClone
volumes share common blocks with the parent volume. While a FlexClone copy of a volume exists, the parent
volume cannot be deleted or moved to another aggregate. You can sever the connection between the parent
and the FlexClone volume by executing a split operation.
A FlexClone split causes the FlexClone volume to use its own disk space, but the FlexClone split enables you
to delete the parent volume and to move the parent or the FlexClone volume to another aggregate.
To manage cloning on a cluster, use the volume clone command.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SPLITTING VOLUMES
Splitting a FlexClone volume from its parent removes any space optimizations that are currently employed by
the FlexClone volume. After the split, both the FlexClone volume and the parent volume require the full
space allocation that is specified by their space guarantees. After the split, the FlexClone volume becomes a
normal FlexVol volume.
When splitting clones, consider these important facts:
When you split a FlexClone volume from its parent, all existing Snapshot copies of the FlexClone volume
are deleted.
During the split operation, no new Snapshot copies of the FlexClone volume can be created.
Because the clone-splitting operation is a copy operation that could take some time to complete, the Data
ONTAP operating system provides the vol clone split stop and vol clone split
status commands to stop clone-splitting or to check the status of a clone-splitting operation.
The clone-splitting operation is executed in the background and does not interfere with data access to
either the parent or the clone volume.
If you take the FlexClone volume offline while clone-splitting is in progress, the splitting operation is
suspended. When you bring the FlexClone volume back online, the splitting operation resumes.
After a FlexClone volume and its parent volume have been split, they cannot be rejoined.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: QUOTAS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
~alan
~stu
~phil
~doug
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
/etc/quotas qtree3
qtree2
Quota policies
qtree1
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
QUOTAS
Quotas provide a way for you to restrict and track the disk space and number of files that are used by users,
groups, and qtrees. You apply quotas to specific volumes and qtrees. Clustered Data ONTAP enables you to
apply user and group quota rules to qtrees.
You can use quotas to:
Limit the amount of disk space or the number of files that can be used by a user or group
Limit the amount of disk space or the number of files that can be contained by a qtree
Track the amount of disk space or the number of files that are used by a user, group, or qtree without
imposing a hard limit
Warn users when their disk use or file use reaches a predefined threshold
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM1
quota policy - unassigned
quota policy assigned quota policy
quota rule --unassigned
vol1
quota policy
quota unassigned
rule unassigned
vol1
quota rule: vol1 quota policy
quota rule vol1
vol2
quota rule:
quota rule vol1
vol2
quota rule: vol2 quota rule
quota rule vol3
vol2
quota
quota rule vol3
quota rule: vol3 quotarule:
quota rule vol2
vol3
quota
quota
quota quota
quota
quota
quota
quota quota
quota
quota
quota quota
A set of quota rules for all the volumes of a storage virtual machine (SVM)
No sharing among SVMs
Up to five quota policies per SVM:
The SVM enables backup copies of quota policies.
One quota policy can be active on one SVM at a time.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
a. True
b. False
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7. Clients access the destination volume and the source volume is cleaned
up.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
aggr1
rg0 rg1
Add 3 disks
aggr2
rg0 rg1
rg2
Add 6 disks
Data ONTAP 7-Mode
system> disk show -n
system> aggr add aggr1 10
Clustered Data ONTAP
c1::> storage disk show -spare -owner node3
c1::> storage aggregate add-disks aggr aggr1 disks 3
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
GROWING AGGREGATES
You can add disks to an aggregate so that it can provide more storage to its associated volumes. You do this
by adding available spare disks to an existing aggregate. When adding disks, you should consider the size of
your RAID groups and plan to fill complete RAID groups to maximize that amount of useable space that is
gained in comparison to the number of disks that are used for parity. In the aggr2 example, six disks are added
to the aggregate, but only one more data disk adds capacity to the aggregate compared to adding three disks.
Other points to consider when adding disks:
Adding disks that are owned by the same system
Benefits of keeping your RAID groups homogeneous for disk size and speed
Which types of disks can be used together
Checksum rules when disks of more than one checksum type are in use
Ensuring that the correct disks are added to the aggregate (the disk addition operation cannot be undone)
How to add disks to aggregates from heterogeneous storage
Minimum number of disks to add for best performance
Number of hot spares that you need to provide for protection against disk failures
Requirements for adding disks from multidisk carrier disk shelves
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cost
Multiple specialized devices to buy
Limited flexibility
Archive Compliance
Restrictivesystems cannot be used for multiple
Servers Storage purposes
Difficult to use with virtual servers
$$$$ Not well suited to the on-demand, multi-tenancy
$$$$ needs of IT as a Service (ITaaS) and the cloud
$$$$
Personnel and Expenses
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HA PAIRS
HA pair controllers are connected to each other through an HA interconnect. This connection allows one node
to serve data that resides on the disks of its failed partner node. Each node continually monitors its partner,
mirroring the data for each others NVRAM or NVMEM. The interconnect is internal and requires no
external cabling if both controllers are in the same chassis.
Takeover is the process in which a node takes over the storage of its partner.
Giveback is the process in which that storage is returned to the partner.
HA pairs are components of the cluster in clustered Data ONTAP. Although both nodes in the HA pair are
connected to other nodes in the cluster through a cluster interconnect, only the nodes in the HA pair can take
over each others storage.
Although single-node clusters are supported, clusters that contain two or more nodes must be arranged in HA
pairs. If you join two single nodes into a Data ONTAP cluster, you must configure the two nodes as an HA
pair.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ter Intercon
Node 2 takes over root H
and data aggregates A
Node 2
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ter Intercon
failover takeover
command
H
A
Data aggregates change
ownership to node 2 one at Node 2
a time
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ter Intercon
n1_aggr0 is given back H
A
to node 1 to boot the
Node 2
node
Data aggregate giveback
occurs one aggregate at
a time
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Unplanned event in clustered All aggregates fail over to partner node in parallel.
Data ONTAP
Planned event in clustered All aggregates fail over to partner node in parallel.
Data ONTAP 8.1
Planned event in clustered Each aggregate is failed over serially. The root aggregate
Data ONTAP 8.2 and 8.3 is failed over after all aggregates that contain user data are
failed over to the partner node.
Giveback in clustered Data Root aggregate is given back first. After a node is
ONTAP assimilated back into the cluster, each aggregate that
contains data is given back serially to the partner node.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
HA FAILOVER SUMMARY
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Select the statement that is true about giveback with storage failover in
clustered Data ONTAP.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Source Destination
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR TECHNOLOGY
SnapMirror copies are disk-to-disk online backups. Data protection mirror copies are simpler, faster, more
reliable, and easier to restore than tape backups are, although data protection mirror copies are not portable for
storing offsite. A typical use of data protection mirror copies is to put them on aggregates of SATA disks that
use RAID-DP technology and then mirror data to them daily during the least active time in the cluster.
Data protection mirror copies are not meant for client access, although they can be mounted into the
namespace by an administrator. Junctions cannot be followed in a data protection mirror copy, so access is
given to only the data that is contained in that data protection mirror copy, not to any other volumes that are
mounted to the source read/write volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Qtree
replication
Volume SVM-to-SVM
replication replication
Asynchronous Cluster-to-
mirroring Synchronous cluster replication
mirroring
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FEATURES
SnapMirror software provides asynchronous data protection mirror copies on the volume level.
Data ONTAP operating in 7-Mode adds support for replication at the qtree level, and also semi-synchronous
and synchronous mirror replication in real time.
Clustered Data ONTAP adds support for replication among SVMs and among clusters. It also adds the ability
to balance loads among nodes in a cluster with load-sharing mirrors.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intercluster LIF
Full-mesh
connection
connectivity
Destination volume
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTERCLUSTER REPLICATION
Intercluster SnapMirror replication, as opposed to traditional intracluster mirroring, gives you the flexibility
to create an asynchronous SnapMirror volume on a cluster other than the source volumes cluster, for data
protection. The replication is carried out across the WAN by using intercluster LIFs. You can use intercluster
SnapMirror replication to store online copies of your data offsite, for disaster recovery.
To use intercluster SnapMirror replication, you must license the feature on both participating clusters.
You need a full mesh intercluster connectivity to support node failover and volume moves of the source or
destination volumes. For the network to be full mesh, every intercluster LIF on every node in the cluster must
be able to connect to every intercluster LIF on every node in the peer cluster.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
/vol_b /.admin/vol_b
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT BACKUPS
SnapVault software leverages block-level incremental replication for a reliable, low-overhead backup
solution. It provides efficient data protection by copying only the data blocks that have changed since the last
backup, instead of copying entire files. As a result, you can back up more often while reducing your storage
footprint because no redundant data is moved or stored.
With direct backups between NetApp systems, disk-to-disk vault backups minimize the need for external
infrastructure and appliances. By default, vault transfers retain storage efficiency on disk and over the
network, further reducing network traffic. You can also configure additional deduplication, compression, or
both on the destination volume. However, if additional compression is configured on the destination volume,
storage efficiencies from source to destination are not retained over the network.
The key advantages of vault backups for clusters include reduction of backup times from hours or days to
minutes, 100% success rates for backup reliability, reduction of disk capacity requirements by 90% or more,
simplified management across enterprise applications, and minimized network traffic.
For more information about backing up FlexVol volumes to a backup vault, see the Clustered Data ONTAP
Data Protection Guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
If the source FlexVol volume is lost The read-only SnapVault copy can
or destroyed, clients can connect to be rendered writable only by
the mirror image of the source data. creating a FlexClone volume copy.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Existing 7-Mode
MetroCluster
Customers
New MetroCluster
Customers
Existing Clustered
Data ONTAP
Customers
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
* OnCommand
Unified Manager
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. SnapDrive
2. SnapManager
3. SnapMirror
4. SnapProtect
5. SnapVault
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
REFERENCES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
Provides simple device management
System Manager
OnCommand
Workflow Automates and standardizes processes
Automation
OnCommand
Performance Provides performance monitoring and alerting
Manager
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Unified Manager
Server
Cluster management
Pings
IP address Cluster management
logical interface (LIF)
Management LIF
response
No Yes
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NOTE: A storage class is a definition of aggregate characteristics and volume settings. You can define
storage classes, and you can associate one or more storage classes with an infinite volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGE ANNOTATIONS
Annotation types enable you to annotate storage objects based on the priority of the data that they contain.
You can annotate volumes, clusters, and SVMs. Data-priority is the default annotation type; it has the values
mission-critical, high, and low. You can create custom annotations. You can also view custom annotation
information in an alert email and in the Event details page and Object details page.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REPORTING
Unified Manager reports display the current status of the storage so that you can make important decisions,
such as storage procurement based on the current usage. Reports provide an full view of storage objects, such
as a list of volumes, disk shelves, and aggregates. You can run reports, delete reports, create custom reports,
save a customized report, and import reports. Reports can be scheduled and shared to multiple recipients.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The system:
Writes events to the event log
Sends and routes notifications of events
Collects events cluster-wide
Can view events of all nodes from any node
system> ems log dump
c1::> event log show
Each event contains a:
Message name
Severity level
Display the contents
Description of your event log
Corrective action, if applicable
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NOTIFICATIONS OF EVENTS
The system collects and displays information about events that occur on your cluster. You can manage the
event destination, event route, mail history records, and SNMP trap history records. You can also configure
event notification and logging.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EVENT NOTIFICATIONS
On clustered Data ONTAP, you can further configure the system to send notifications to certain destinations
when an event of interest occurs on the cluster. Unlike AutoSupport messages, the event message is only a
notification rather than complete system diagnostic information. The notification can be associated with any
event.
The event route associates a given event message with an event destination. You modify a messages
destination value to indicate the email address to which the notification should be sent. You can perform this
action on all notifications at the same time by using a regular expression when specifying the event name in
the event route modify command.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EVENT DESTINATIONS
An event destination is a named combination of the email destination, the SNMP destination, or the syslog
destination. You can associate a named destination with a specific event message by using an event route.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EVENT ROUTES
Event routes have nothing to do with network routes but are merely associations between event messages and
receivers of notifications that are associated with the messages.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA STORAGE
For the most part, these commands are self-explanatory. Most show commands provide a view of whats
happening in a particular area of the cluster. Also, most show commands have some powerful query
capabilities which, if you take the time to learn them, can help you to pinpoint potential problems.
In the clustered Data ONTAP command volume show -state !online, the exclamation point means
not (negation). Therefore, this command shows all volumes that do not have a state of online. Because
youll want to know about other states that exist, it is important to use !online rather than offline.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
STORAGE FAILOVER
When the aggregates of one node fail over to the HA partner node, the aggregate that contains the vol0
volume of that node goes, too. Each node needs its vol0 to boot, so when the rebooted node begins to boot, it
signals the partner to do a giveback of that one aggregate and then waits for that to happen. If storage failover
(SFO) is working properly, giveback happens quickly, the node has its vol0 and can boot. When it gets far
enough in its boot process, the rest of the aggregates are given back. If problems exist, you probably see the
rebooted node go into a waiting for giveback state. If this happens, it is possible that its aggregates are stuck
in a transition state between the two nodes and might not be owned by either node. In this situation, contact
NetApp Global Support.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETWORKING
You can verify that all the network configuration, the ports, and the interfaces are functioning properly.
On clustered Data ONTAP, if the physical ports are fine, verify that the LIFs are working properly and note
which ones are home and which ones arent home. If the LIFs are not home, it doesnt mean that a problem
exists, but this condition might give you a sense of what is happening.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. Is disconnected
2. Has failed over
3. Is administratively disabled
4. Has been migrated
5. Is unhappy
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Object-instance-counter hierarchy:
7-Mode: stats command
Clustered Data ONTAP: statistics command
vol1 avg_latency:54.6us
vol3 avg_latency:53.8us
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
COMMAND SYNTAX
To begin using Counter Manager, use the start and stop options to collect a measured sample of data. You can
use object and instance parameters to narrow down the data that is being collected, or you can use wildcards
with these parameters to collect all objects or instances. When you have a sample to work with, you can use
the show commands with various object, instance, and counter values to further filter results. In clustered
Data ONTAP, you can use wildcards to specify subsets or thresholds of values for objects, instances, and
counters.
You can also simply collect instantaneous Snapshot copies of current statistics by using the i parameter in
7-Mode or the show-periodic option in clustered Data ONTAP. Use ? and tab completion, or view the
man pages for more details.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FILTERING STATISTICS
Displaying statistics in Data ONTAP 7-Mode requires the use of the stats show command on the most
recently collected sample. The stats show command shows groups of counters or individual counters and
can show multiple iterations of counters. The stats show command can be very useful for protocol
latencies.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SYSTEM LOGS
The system log contains information and error messages that the storage system displays on the console and
logs in message files. In 7-Mode, use an NFS or CIFS client to access the /etc/messages file. In clustered Data
ONTAP, use the debug log command to access the /mroot/etc/log/mlog/messages.log file. You can use
OnCommand System Manger to access system logs in either 7-Mode or clustered Data ONTAP.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CORE FILES
7-Mode core files are stored in /etc/crash. The n in the file name is a number that can be matched with a
date and time of panic based on the panic message in the /etc/messages log file.
User-space core dumps are named according to the process name (for example, mgwd) and use the process ID
(pid) of the instance of the process that generates the core file.
Kernel core dumps include the sysid, which is not the node name but a numerical representation of the node.
The date and time in the core dump name indicate when the panic occurred.
The Remote LAN Module (RLM) is an out-of-band connection to a node that allows for some management of
the node, even when the node is inaccessible from the console and UI. The RLM connection has a separate IP
address and its own shell. Examples of RLM commands are system power off, system power on,
system reset, and system console.
Some processes running within Data ONTAP run as part of the kernel. Others run in user space. This slide
gives you the information you need to find core files of either type.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
If the node is in bad shape, from the Remote LAN Module session
or the Storage Partition Management session, enter:
SP> system core
37 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To access logs:
http://cluster-mgmt-ip/spi/cluster1-01/etc/log/
40 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
You can find the technical triage templates at
https://kb.netapp.com/support/index?page=content&cat=TRIAGE&channel=HOW_TO.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-1 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-2 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-3 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
100%
Capacity and
Lifecycle performance
Operations
Measure of NDO
management
Planned
Event
Software upgrade,
Maintenance hardware
Operations replacement and
upgrade
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-4 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
UPGRADING NODES
A nondisruptive upgrade (NDU) is a mechanism that uses HA-pair controller technology to minimize client
disruption during an upgrade of Data ONTAP or controller firmware. This procedure allows each node of
HA-pair controllers to be upgraded individually to a newer version of Data ONTAP or firmware.
12-5 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-6 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12-7 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12-Node Cluster
* Based on a
60-minute average
upgrade time per
HA pair
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-8 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Batch 1
12-Node Cluster
Batch 2
Based on a
60-minute average
upgrade time per
HA pair
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-9 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. NFS
2. FTP
3. TFTP
4. HTTPS
5. HTTP
6. CIFS
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-10 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6-Node Cluster
Batch 1
12-Node Cluster
Batch 2
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-11 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-12 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. Batch
2. Systematic
3. Rolling
4. Consignment
5. Bunch
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-13 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-14 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Transition Fundamentals
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-15 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Define Transition
Sco nning
Enviro uster
Discovery esign
Migration
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-16 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Migration
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-17 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-18 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Replication-based migration
Uses SnapMirror software
Available with 7MTT and with manual transition by creating a SnapMirror
relationship of the type TDP
Application-based migration
Oracle Automatic Storage Management (ASM)
Microsoft Exchange Database Availability Group (DAG)
Virtualization environment Tools
Appliance-based migration
RapidData Migration tool
DTA2800
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-19 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Web-based courses:
NetApp Transition Fundamentals
Introduction to the Unified Transition
Methodology Framework
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-20 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
12-21 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-22 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12-23 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12-24 Clustered Data ONTAP Administration: Upgrading and Transitioning to Clustered Data ONTAP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
data
mgmt LIFs
LIF -----
NFS
SVM Admin Infinite CIFS
Client Access
Volume
Storage virtual machines (SVMs) with Infinite Volume contain only one
infinite volume:
One junction path, which is /NS by default
Can be used for NFS and CIFS (SMB 1.0) only
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NS NS
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 TB container
Intracluster volume
SnapMirror copy of
namespace constituent
Provides
Data protection for the
namespace constituent
(updated every 5 minutes)
Supports SnapDiff for
incremental tape backup of the
infinite volume (updated daily)
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
F1
F2
F3 DC1
F4 DC2 SVM for Infinite Volume
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Experienced Customer
Support Support
Professionals Centers
Award-
Global Winning
Logistics Support
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Procedure
Specify the problem controller
Select the problem category
Verify the problem does not have a case
Review the list of knowledgebase articles
Verify the case information is correct
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Support Community
https://forums.netapp.com/community/support
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Key Features
Sophisticated monitoring for faster incident management and resolution
Known as Phone Home
Sends weekly AutoSupport messages to NetApp
AutoSupport
Messages
NetApp Systems
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
AUTOSUPPORT
NetApp AutoSupport is an integrated, efficient monitoring and reporting technology that checks the health of
your AutoSupport enabled NetApp systems on a continual basis. This call home feature in the Data
ONTAP software for all NetApp systems collects detailed performance data and sends that diagnostic data
back to NetApp, where it is automatically analyzed for any issues that might affect system stability and
performance.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MY AUTOSUPPORT
My AutoSupport is a suite of web-based applications hosted on the NetApp Support site and accessible via
your web browser. Using the data from AutoSupport, My AutoSupport proactively identifies storage
infrastructure issues through a continuous health-check feature and automatically provides guidance on
remedial actions that help increase uptime and avoid disruptions to your business.
My AutoSupport provides four primary functions.
First, it identifies risks and provides best practice tips. For example, My AutoSupport might find a
configuration issue, a bad disk drive, or version incompatibility on your system.
Second, My AutoSupport can compare your hardware and software versions and alert you to potential
obsolescence. For example, My AutoSupport alerts you about end-of-life (EOL) issues or an upcoming
support contract expiration date.
Third, My AutoSupport provides performance and storage utilization reports to help you proactively plan
capacity needs.
Last, My AutoSupport provides new system visualization tools and transition advisor tools for clustered Data
ONTAP systems.
If you plan any changes to your controllers, NetApp recommends manually triggering an AutoSupport
message before you make the changes. This manually triggered AutoSupport message provides a before
snapshot for comparison, in case a problem arises later.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
UPGRADE ADVISOR
With the clustered Data ONTAP Dashboard, you can easily generate a Data ONTAP upgrade plan for a
cluster. Using the Upgrade Advisor link from the left navigation pane of the dashboard, select the nodes for
which you need an upgrade plan and then specify the target Data ONTAP version to generate an upgrade plan
for one or more nodes in the cluster.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Key Features
Web-based utility
Provides detailed configuration
information for NetApp products
that work with third-party
components
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Method 1 Method 2
Enable remote read-only HTTPS Run the system coredump upload
access command
Copy the file from the root volume to a Log in with user name anonymous and
local workstation. use any valid email address as the
password.
After the file is on a local workstation, The type and case number fields are
you can upload by using specific for the type of core that is being
https://upload.netapp.com. uploaded (application or kernel) and the
specific case number that is opened for
this issue.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NOTE: This option is available with clustered Data ONTAP 8.1.1 and later.
For information on how to enable remote read-only HTTPS access, see article 1013814: How to enable
remote access to a nodes root volume in a cluster
1. Copy the file from the root volume to a local workstation.
https://<cluster-mgmt-ip>/spi/<node_name>/etc/crash/
2. Once the file is on a local workstation, you can upload it using https://upload.netapp.com.
3. For more information, see article 1010364:How to upload a core file for analysis.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
> system node autosupport invoke -node <node> -type all -message
"invoke.all -uri file:///mroot/etc/log/retransmit/<seq-num>-<type>.7z
Use the HTTPS Web administrative interface that was mentioned earlier (Article 1013814) to download the
generated .7z files in /etc/log/retransmit from the root volume of the storage controller. You will need to log
in with administrative privileges to access this interface.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
https://<cluster-mgmt-ip>/spi/<node_name>/etc/log/retransmit
Log in to My AutoSupport via the NetApp Support site.
Click the AutoSupport Upload button that is located in the top right of the browser window.
For more information on this functionality, please check out the AutoSupport Manual Upload Feature
reference card.
Click the Select Files button and choose the .7z file you collected in Step 4.
Click the Upload button to complete the file upload to NetApp.
After the upload completes, the AutoSupport message should be available in My AutoSupport within 30
minutes. It may take up to 120 minutes during weekends and peak processing hours.
Resource
https://kb.netapp.com/support/index?page=content&id=1013073&locale=en_US
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You can specify up to five mail host names. Separate the names with commas, and do not include spaces in
the list. (Default host name is the administration host.) For example: options
autosupport.mailhost host1,host2,host3
NOTE: The storage system can send AutoSupport messages by SMTP (port 25), HTTP (port 80), or HTTPS
(port 443). HTTPS is the default. If the network connection does not allow HTTPS or HTTP, configure
AutoSupport for SMTP. To use HTTP or HTTPS to send AutoSupport messages, configure an HTTP or
HTTPS proxy.
Up to five email addresses can be specified. Separate the email addresses with commas, and do not include
spaces in the list. The default email address is autosupport@netapp.com. For example:
options autosupport.to autosupport@netapp.com,d@c.com
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Sometimes NetApp Support may need to contact the administrator of the storage system after receiving
automatic AutoSupport email. The options command for specifying the storage system administrator is:
The string is used in the subject line of the email message to explain why the email was sent. For example:
options autsupport.doit TESTING
Immediate messages contain the same storage system data as automatic AutoSupport messages. The
following is an example of an immediate message:
FILER> Wed Jul 26 09:48:08 PDT [asup_main]: System Notification mail sent
Send a short message:
The options autosupport.noteto command specifies the recipients of short email messages that are
sent by AutoSupport. The short email messages are for urgent events such as disk failures or storage system
reboots.
Short messages are useful if the person who should be notified of urgent events reads email on a small screen
such as that on an alphanumeric pager.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
Here are some links to learn more about the NetApp support site.
The NetApp Support Website: A website where you can access technical resources and log and monitor
problem reports. You are required to create an account to access the site.
The NetApp Knowledgebase: A self-help knowledgebase for articles and tips on NetApp product.
The NetApp Support Community: A web site where you can ask product usage questions and exchange tips
and suggestions. You are required to create an account to access the site.
The Interoperability Matrix Tool: A search tool that provides which NetApp and third-party products are
supported within a particular configuration. You are required to create an account to access this tool.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Online help
Current user
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Search for a
Browser navigation Number of
specific resource.
potential problems
Asset dashboard
global status charts
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Action
menu
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Current capacity
information
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Device configuration
summary
Correlation
information
Performance charts
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Violations
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ONCOMMAND INSIGHT
Insight is a single solution that enables cross-domain, multivendor, and E-Series resource management and
analysis across networks, storage, and servers in physical and virtual environments.
Insight improves operational efficiency by providing a "single pane of glass, enabling end-to-end visibility
into the storage environment, and generating meaningful reports on storage costs for chargeback and
showback.
Insight is a value-add product. Currently its pricing is based on capacity by terabyte for multivendor storage
environments.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
D-1 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
D-2 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VALIDATION METHODS
Disk-level checksums: Two checksum types are available for disks that are used by Data ONTAP: BCS
(block) and AZCS (zoned). Both checksum types provide the same resiliency capabilities. BCS optimizes for
data access speed and reserves the smallest amount of capacity for the checksum for disks with 520-byte
sectors. AZCS provides enhanced storage utilization and capacity for disks with 512-byte sectors. You cannot
change the checksum type of a disk. To determine the checksum type of a specific disk model, see the
Hardware Universe.
Media-level scrubbing: The purpose of the continuous media scrub is to detect and correct media errors to
minimize the chance of storage system disruption due to a media error while a storage system is in degraded
or reconstruction mode.
By default, Data ONTAP runs continuous background media scrubbing for media errors on all storage system
disks. If a media error is found, Data ONTAP uses RAID to reconstruct the data and repairs the error. Media
scrubbing is a continuous background process. Therefore, you might observe disk LEDs blinking on an
apparently idle storage system. You might also observe some CPU activity even when no user workload is
present.
Because continuous media scrubbing searches only for media errors, its impact on system performance is
negligible. In addition, the media scrub attempts to exploit idle disk bandwidth and free CPU cycles to make
faster progress. However, any client workload results in aggressive throttling of the media scrub resource.
D-3 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
D-4 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Prefail
Hot Spare
Copy
Fix or Fail
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
D-5 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Larger Size:
Unused Capacity
!! Degraded Mode:
No replacement
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
D-6 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DEGRADED MODE
If one disk in a RAID group fails, the system operates in degraded mode. In degraded mode, the system
does not operate optimally, but no data is lost. Within a RAID 4 group, if a second disk fails, data is lost;
within a RAID-DP group, if a third disk fails, data is lost. The following AutoSupport message is broadcast:
[monitor.brokenDisk.notice:notice].
If the maximum number of disks have failed in a RAID group (two for RAID-DP, one for RAID 4) and there
are no suitable spare disks available for reconstruction, the storage system automatically shuts down in the
period of time specified by the raid.timeout option. The default timeout value is 24 hours. See this FAQ
for more information: https://kb.netapp.com/support/index?page=content&id=2013508
Therefore, you should replace failed disks and used hot-spare disks as soon as possible. You can use the
options raid.timeout command to modify the timeout internally. However, keep in mind that, as the
timeout interval increases, the risk of subsequent disk failures also increases.
D-7 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Double-
Data Disks Parity Parity Spare Disks
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DISK REPLACEMENT
You can use the storage disk replace command to replace disks that are part of an aggregate without
disrupting data service. You do this to swap out mismatched disks from a RAID group. Keeping your RAID
groups homogeneous helps optimize storage system performance.
D-8 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DISK SANITIZATION
Disk sanitization is the process of physically obliterating data by overwriting disks with specified byte
patterns or with random data so that recovery of the original data is impossible. Use the disk sanitize
command to ensure that no one can recover the data on the disks.
The disk sanitize command uses three successive default or user-specified byte overwrite patterns for
up to seven cycles per operation. Depending on the disk capacity, the patterns, and the number of cycles, the
process can require several hours. Sanitization runs in the background. You can start, stop, and display the
status of the sanitization process.
D-9 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Verify and prepare Identify volumes Add new Evacuate Verify and
system and aggregates storage shelves data remove shelves
Nodes available, no Record details of As required, might Move all volumes Verify all disks
disk reconstruction volumes and require new HBA previously identified unowned
aggregates residing on
shelves to be removed Verify limits
Document storage Delete all If removing an
config, max Create new aggregates entire stack, remove
capacity, max aggregates, same all cables
spindle and volume size or larger than Remove disk
counts originals ownership on If removing some
evacuated shelves shelves from a
Identify shelves to stack, recable to
replace bypass the removed
shelves on path A,
then on path B
D-10 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
D-11 Clustered Data ONTAP Administration: Data ONTAP Physical Storage Maintenance
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMPONENTS
The modules refer to separate software state machines that are accessed only by well-defined APIs. Every
node contains a network module, a SCSI module, and a data module. Any network or SCSI module in the
cluster can talk to any data module in the cluster.
The network module and the SCSI module translate client requests into Spin Network Protocol (SpinNP)
requests and vice versa. The data module, which contains the WAFL (Write Anywhere File Layout) file
system, manages SpinNP requests. The cluster session manager (CSM) is the SpinNP layer between the
network, SCSI, and data modules. The SpinNP protocol is another form of remote procedure call (RPC)
interface. It is used as the primary intranode traffic mechanism for file operations among network, SCSI, and
data modules.
The members of each replicated database (RDB) unit on every node in the cluster are in constant
communication with each other to remain synchronized. The RDB communication is like the heartbeat of
each node. If the heartbeat cannot be detected by the other members of the unit, the unit corrects itself in a
manner that is discussed later in this course. The four RDB units on each node are the blocks configuration
and operations manager (BCOM), the volume location database (VLDB), VifMgr, and management.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management
Cluster Traffic
Vol0
4 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE CSM
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Requests
Responses
Root V
Vo Vol0
V
Vo Root
Vol 1
9 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Requests
Responses
ol0
Roo Root V
Vo V
Vol 1
Vo
10 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ct
A
SAN protocols
Interc The data module provides
storage access to shelves
(WAFL file system, RAID
subsystems, and storage
shelves subsystems)
Cl
V
R
A
11 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Traffic
Clients
To HA partner
Management
12 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A B C F
D E G H
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume Volume
Volume
Volume
Volume
Volume
17 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NAMESPACES
A namespace is a file system. A namespace is the external, client-facing representation of an SVM. A
namespace consists of volumes that are joined together through junctions. Each SVM has one namespace, and
the volumes in one SVM cannot be seen by clients that are accessing the namespace of another SVM.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE RDB
The RDB units do not contain user data. The RDB units contain data that helps to manage the cluster. These
databases are replicated; that is, each node has its own copy of the database, and that database is always
synchronized with the databases on the other nodes in the cluster. RDB database reads are performed locally
on each node, but an RDB write is performed to one master RDB database, and then those changes are
replicated to the other databases throughout the cluster. When reads of an RDB database are performed, those
reads can be fulfilled locally without the need to send requests over the cluster interconnects.
The RDB is transactional in that the RDB guarantees that when data is written to a database, either it all gets
written successfully or it all gets rolled back. No partial or inconsistent database writes are committed.
Four RDB units (the VLDB, management, VifMgr, and BCOM) exist in every cluster, which means that four
RDB unit databases exist on every node in the cluster.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGEMENT GATEWAY
The management RDB unit contains information that is needed by the management gateway daemon (mgwd)
process on each node. The kind of management data that is stored in the RDB is written infrequently and read
frequently. The management process on a given node can query the other nodes at run time to retrieve a great
deal of information, but some information is stored locally on each node, in the management RDB database.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Runs as vifmgr
Stores and monitors LIF configuration
Stores and administers LIF failover policies
23 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VIFMGR
The VifMgr is responsible for creating and monitoring NFS, CIFS, and iSCSI LIFs. It also handles automatic
NAS LIF failover and manual migration of NAS LIFs to other network ports and nodes.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Runs as bcomd
Stores LUN map definitions
Stores initiator groups (igroups)
24 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
node1
27 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RDB DATABASES
This slide shows a four-node cluster. The four databases that are shown for each node are the four RDB units
(management, VLDB, VifMgr, and BCOM). Each unit consists of four distributed databases. Each node has
one local database for each RDB unit.
The databases that are shown on this slide with dark borders are the masters. Note that the master of any
particular RDB unit is independent of the master of the other RDB units.
The node that is shown on this slide with a dark border has epsilon (the tie-breaking ability).
On each node, all the RDB databases are stored in the vol0 volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
QUORUM: OVERVIEW
A master can be elected only when a majority of local RDB units are connected and healthy for a particular
RDB unit on an eligible node. A master is elected when each local unit agrees on the first reachable healthy
node in the RDB site list. A healthy node is one that is connected, can communicate with the other nodes,
has CPU cycles, and has reasonable I/O.
The master of a given unit can change. For example, when the node that is the master for the management
unit is booted, a new management master must be elected by the remaining members of the management
unit.
A local unit goes out of quorum when cluster communication is interrupted for a few seconds; for example,
because of a booting or cluster interconnect hiccup that lasts for a few seconds. Because the RDB units
always work to monitor and maintain a good state, the local unit comes back in quorum automatically. When
a local unit goes out of quorum and then comes back into quorum, the RDB unit is synchronized again. Note
that the VLDB process on a node might go out of quorum although the VifMgr process on that same node has
no problem.
When a unit goes out of quorum, reads from that unit can be performed, but writes to that unit cannot. That
restriction is enforced so that no changes to that unit happen during the time that a master is not agreed upon.
In addition to the example above, if the VifMgr goes out of quorum, access to LIFs is not affected, but no LIF
failover can occur.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
QUORUM: DETAILS
Marking a node as ineligible (by using the cluster modify command) means that the node no longer
affects RDB quorum or voting. If you mark the epsilon node as ineligible, epsilon is automatically given to
another node.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
When half of the nodes in a cluster are isolated from the other
half, no simple majority exists
NOTE: This situation is rare.
One node has a weighted vote (epsilon)
The epsilon node is epsilon for the entire cluster, not only for
individual RDB units (such as the masters)
30 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4+
3
2+
31 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TWO-NODE CLUSTERS
From Ron Kownacki, author of the RDB:
Basically, quorum majority doesnt work well when down to two nodes and theres a failure, so RDB is
essentially locking the fact that quorum is no longer being used and enabling a single replica to be artificially
writable during that outage.
The reason we require a quorum (a majority) is so that all committed data is durable: if you successfully
write to a majority, you know that any future majority will contain at least one instance that has seen the
change, so the update is durable. If we didnt always require a majority, we could silently lose committed
data. So in two nodes, the node with epsilon is a majority and the other is a minorityso you would only
have one-directional failover (need the majority). So epsilon gives you a way to get majorities where you
normally wouldnt have them, but it only gives unidirectional failover because its static.
In two-node (high-availability mode), we try to get bidirectional failover. To do this, we remove the
configuration epsilon and make both nodes equaland form majorities artificially in the failover cases. So
quorum is two nodes available out of the total of two nodes in the cluster (no epsilon involved), but if theres
a failover, you artificially designate the survivor as the majority (and lock that fact). However, that means you
cant fail over the other way until both nodes are available, they sync up, and drop the lockotherwise you
would be discarding data.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management
Cluster Traffic
33 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34 2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
THANK YOU
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.