Beruflich Dokumente
Kultur Dokumente
Professional Workshop
NETAPP UNIVERSITY
Student Guide
Course ID: SALES-ILT-SE-ASAP-REV07
Catalog Number: SALES-ILT-SE-ASAP-REV07-SG
Content Version: 1.0
COPYRIGHT
2012 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this document covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of NetApp, Inc.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go further, faster, AdminNODE, Akorri, ApplianceWatch, ASUP, AutoSupport, BalancePoint,
BalancePoint Predictor, Bycast, Campaign Express, ChronoSpan, ComplianceClock, ControlNODE, Cryptainer, Data
ONTAP, DataFabric, DataFort, Decru, Decru DataFort, DenseStak, Engenio, E-Stack, FAServer, FastStak, FilerView,
FlexCache, FlexClone, FlexPod, FlexScale, FlexShare, FlexVol, FPolicy, GatewayNODE, gFiler, Imagine Virtually
Anything, Infinivol, Lifetime Key Management, LockVault, Manage ONTAP, MetroCluster, MultiStore, NearStore, NetApp
Select, NetCache, NetCache, NOW (NetApp on the Web), OnCommand, ONTAPI, PerformanceStak, RAID DP,
SANscreen, SANshare, SANtricity, SecureAdmin, SecureShare, Securitis, Service Builder, Simplicity, Simulate ONTAP,
SnapCopy, SnapDirector, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore,
Snapshot, SnapValidator, SnapVault, StorageGRID, StorageNODE, StoreVault, SyncMirror, Tech OnTap, VelocityStak,
vFiler, VFM, Virtual File Manager, WAFL, and XBB are trademarks or registered trademarks of NetApp, Inc. in the United
States and/or other countries.
All other brands or products are either trademarks or registered trademarks of their respective holders and should be
treated as such.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Schedule Safety
Start time Alarm signal
Stop time Evacuation procedure
Break times Electrical safety
guidelines
Facilities
Food and drinks
Restrooms
Phones
NetApp Confidential 2
CLASSROOM LOGISTICS
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
COURSE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
COURSE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Morning
Module 1: Welcome & NetApp Overview
Logistics, Agenda, and NetApp review
Module 2: Core Software Technology
Data ONTAP 8.1 Cluster and 7-Mode Options
Afternoon
Module 3: Core Hardware Technology
Current hardware technology
NetApp Confidential 5
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Morning
Module 3 Continued: Core Hardware
Technology
Current hardware technology
Module 4: Storage Efficiency
What is Storage Efficiency?
Afternoon
Module 5: Enterprise Data Storage
Windows and Unix file serving
Storage Area Networking
NetApp Confidential 6
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Morning
Module 6: Business Applications
SnapManager, Messaging and Collaboration, &
Virtualization
Module 7: Data Protection
OnCommand
SnapVault
Afternoon
Module 8: Disaster Recovery
Disaster Recovery Architecture
SnapMirror & MetroCluster
NetApp Confidential 7
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University
http://www.netapp.com/us/services/university/
NetApp Confidential 8
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Applications
and Servers
FC, iSCSI,
NFS, CIFS,
Enterprise Network
and FCoE
Remote
Data Abstraction Layer
Logical Pool of Storage
NetApp Data ONTAP
Disaster Architecture
Recovery NetApp V-Series Systems Storage Controller
NetApp Confidential 4
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 5
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage Pool
A Transformational Platform
NetApp Confidential 6
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 7
CORE TECHNOLOGY
This discussion starts with the core technologies that are listed in the middle of the slide. The Snapshot and
FlexVol technologies have their own sections, because they are so important for you to understand and be
able to explain to potential customers. These core technologies are what NetApp does, what NetApp is about,
and why NetApp technologies can work the way that they do:
WAFL core technology
Snapshot technology
RAID 4 or RAID-DP technology
NVRAM operations
Aggregates and volumes
You will certainly talk with most customers about RAID technology and how NetApp RAID protection
works, but getting down into the WAFL file system is usually not necessary. However, you must understand
the WAFL file system whether you talk to customers about it or not. The system is integral to how NetApp
storage products work.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 8
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 9
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexVol
Volumes
LUNs Aggregate
Physical
Layer Hard Hard
Disks Disks
NetApp Confidential 10
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 11
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 12
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 13
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
C
C C
Snapshot
Copy 1
NetApp Confidential 15
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
B1
Copy pointers only
Snapshot Snapshot
Copy 1 Copy 2
NetApp Confidential 16
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
C2 C2
C C
Continue writing data
B1 Create Snapshot copy 3.
C2
Simplicity of model:
Best disk utilization
A A
Fastest performance
B B1
C C
NetApp Confidential 17
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A Snapshot
copy is created.
NetApp Confidential 18
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 19
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A Copy
Out 1
B
Snapshot C
Copy 1
Copy
Out 1
NetApp Confidential 20
A COMPETITORS SNAPSHOT (1 OF 2)
How do NetApp competitors do snapshots?
They start with exactly the same picture. All storage works this way. This is the point where NetApp
separates from the competition. Our competition, in preparation for a snapshot of the file system, creates a
copy-out region. In some competitors products, this copy-out region must be allocated when the system is
initially configured, and others create it just prior to the snapshot with free disk space. If a snapshot is taken at
this point, the process is similar to the process that Data ONTAP software uses: The file system simply keeps
track of the inode map. This is true only for the first snapshot. After that, the rest is drastically different from
the NetApp method.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 21
A COMPETITORS SNAPSHOT (2 OF 2)
When data is changed, the snapshot procedure begins to differ from how Data ONTAP software does
snapshots. When data changes in a storage system from any of the competitors to NetApp, the file system:
Must first read the original data block
Then writes its contents to the copy-out region
Updates pointers
Updates the contents of the block on disk back at the blocks original location
So, the new data is written to the original location. In addition, after the file system updates the original
location, it must update the parity bits on any existing RAID drives.
To accomplish each update, file systems from the competitors to NetApp must do a:
Read of the old data
Write of the old data to its new location
Write of the new data to the old location
This is a total of one read and two writes to service one update request: three times the system overhead.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
SNAPSHOT COMPARISON
Because the activity occurs on first write, competitors performance slowly ramps back on these systems. If
the file system keeps updating block C, it does not have to do any extra work. Because it has stored the old
version, it can now write over the original location without the need to first copy the data to a copy-out area. It
is the first write on any block that is included in a snapshot that requires the extra overhead.
What typically happens on competitors systems is a cyclical change in performance. For example,
performance is at an expected level, then a snapshot is created, performance drops, and then performance
slowly comes back to an acceptable level. When another snapshot is created, performance drops again and
slowly returns, then drops again. So, although many NetApp competitors say that they can create thousands of
snapshots, best practices generally show that administrators should limit the number of snapshots of a given
set of data to anywhere from four to eight (it varies with each vendor) because of potential performance
impact and the difficulty of managing these copy-out areas.
When the snapshot feature on competitors systems is used regularly, the systems start to get multiple data
copies that are stored. The more snapshots that are created, the more likely the systems are to have multiple
copies of data. Administrators of these systems have questions to consider, such as:
How big should this copy-out region be made? (The answer depends on the delta rate.)
What is the delta rate?
If the administrator does not make the copy-out region large enough, the snapshot capability breaks.
The file system cannot keep the version of the old data and loses that snapshot. Of course, if the copy-out area
is too big, it is wasted space. Determining what size these copy-out areas should be is an art and must be fine-
tuned over time.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A A
B1
B B
C2 C
B1
C2
A A A
B B1 B1
C C C2
NetApp Confidential 24
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A A A
B B1 B1
C C C2
NetApp Confidential 25
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
C2
Restore from the
Snapshot copy with
SnapRestore technology.
A A
A A
B B1 B1
A single-file
B1
C C
C C2
SnapRestore instance
Snap- Snap- Snap- allows restoration of a
shot shot shot
Copy 1 Copy 2 Copy 3 single file from a
Snapshot copy.
NetApp Confidential 26
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A B C C1
New Block
NetApp Confidential 27
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 28
EXERCISE 1
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 30
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Network
Disk
NetApp Confidential 31
NVRAM OPERATION (1 OF 4)
Next in this module, by looking at a basic setup of systems, you step through the process that the WAFL file
system uses when integrating NVRAM into the system of reads and writes.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
N
V
Main NIC NIC Main R
Memory Memory A
M
BATT
ack
NVRAM OPERATION (2 OF 4)
Take a close look at NVRAM and WAFL file-system integration. The controller contains a special chunk of
RAM called NVRAM. In this case, NV means nonvolatile. It is nonvolatile because it has a battery. So,
if something happens, such as a disaster striking the system, the data that is stored in NVRAM is not lost.
After data gets to a NetApp storage system, it is treated in exactly the same way whether it came through a
SAN or NAS connection. As I/O requests come into the system, they first go to RAM. The RAM on a
NetApp system is used as in any other system; it is where Data ONTAP does active processing. As the write
requests come in, the OS also logs them into NVRAM.
When the WAFL file system receives a write from the host, it logs the write in NVRAM and immediately
sends an ACK (acknowledgment) back to the host. At that point, from the hosts perspective, the data is
written to storage. But, in fact, the data may be temporarily held in NVRAM. The goal of the WAFL file
system is to write data in full stripes across the storage media. To do this, it holds write requests in NVRAM
while it chooses the best location for the data, does RAID calculations, does parity calculations, and gathers
enough data to write a full stripe across the entire RAID group.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
NVRAM OPERATION (3 OF 4)
The WAFL file system never holds data for longer than 10 seconds before it establishes a consistency point
(CP). CP operations are atomic operations; in other words, they must be committed fully or they are
recommitted. This is why they are called CPs.
At least every 10 seconds, the WAFL system takes the content of NVRAM and commits it to disk. When a
write request is committed to a block on disk, the WAFL system clears it from the journal. On a system that is
lightly loaded, an administrator can see the 10-second CPs happen: Every 10 seconds, the lights cascade
across the system. Most systems run with a heavier load than that, and the CPs happen every second, every
two seconds, or every four seconds, depending on the system load.
A question that frequently arises is: Is NVRAM a performance bottleneck? No, it is not. The response time
of RAM and NVRAM is measured in microseconds. Disk response times are always in milliseconds, and it
takes a few milliseconds for a disk to respond to an I/O. Because disks are radically slower than any other
component on the system, such as the CPU or RAM, disks are always the performance bottleneck of any
storage system . When a system is committing back-to-back CPs, thats because the disks are taking writes as
fast as they can. That is a platform limit for that system. If that platform limit is reached, the option is to
spread the traffic across more heads or upgrade the head to a system with greater capacity. That is a disk
limitation; the disks are emptying NVRAM as quickly as possible. NVRAM could function faster if the disks
could keep up.
NVRAM is logically divided into two halves so that as one half is emptied the incoming requests fill the other
half. They go back and forth on that system. When the WAFL system fills one half of NVRAM, the WAFL
system forces a CP to happen, and it writes the contents of that half of NVRAM to the storage media. A fully
loaded system does back-to-back CPs, so it fills and refills both halves of the NVRAM.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
NVRAM OPERATION (4 OF 4)
One advantage that NetApp products gain from the use of NVRAM is the flexibility to use RAID more
efficiently. RAID 4 is the NetApp base RAID type that has been used since the founding of the company.
Because of the performance issues that result from its implementation, NetApp competitors do not use RAID
4 . The competitors may be capable of handling it, but in most cases they dont use it. Why?
For NetApp competitors, the parity drive is what is wrong with RAID 4. RAID 4 uses a single drive to write
parity. When you have a single drive that is dedicated to parity, NetApp competitors write down each request
as it comes in and write requests to disparate locations. All of those updates happen randomly on a data disk,
which means that the updates also require a parity change. This creates a parity drive that is exponentially
busier than each data drive. The parity drive gets hot (figuratively) and slows the entire system. The parity
drive is a bottleneck.
So why does NetApp use RAID 4? NetApp can use RAID 4 because the WAFL system controls where to put
the data on disk. It does the parity calculations in memory rather than having to read in extra data and parity
bits. The WAFL system can lay out complete stripes on disk and writes to the parity drive no more and no
less often than all the other drives in the array.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 35
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 36
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 37
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Write
Chain
RAID
Stripe
Parity Drive
NetApp Confidential 39
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 1 2 3 9
RAID-4
protects against
2 any single-disk failure.
NetApp Confidential 40
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3 1 2 3 9
2 RAID-DP technology
protects against
2 any double-disk
failure.
7
16
NetApp Confidential 41
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 42
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20%
17.9%
ATA ATA
15%
*Typical disk drive *Disk drive spec media or *Media or bit error *Media or bit error with
replacement rate bit error likelihood likelihood: single parity second failure likelihood:
(per year) (full-capacity transfer 300- (during reconstruction of an double parity
GB FC and 320-GB SATA) 8-drive RAID 4 or 5 set) (during reconstruction of
a 16-drive RAID-DP set)
*Source: NetApp, Seagate, and Hitachi
NetApp Confidential 43
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 45
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RAID
Group 0
RAID
Group 1
RAID
Group 2
NetApp Confidential 46
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 47
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 48
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RAID FlexVol2
Group 0 FlexVol1
RAID FlexVol2
Group 1 FlexVol1
RAID FlexVol2
Group 2 FlexVol1
NetApp Confidential 49
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20%
Reserve is 0%
Volume Snapshot Reserve Snapshot Copy Reserve 5% Snapshot Copy Reserve 0%
Reserve is 20%
Reserve is 5%
NetApp Confidential 50
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 51
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
QTREES
Qtrees are similar to flexible volumes but have the following unique characteristics:
allow you to set security styles
allow you to set oplocks for CIFS clients
allow you set setup and apply quotas
are used as a backup unit for SnapMirror and SnapVault
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 53
QUOTAS
Quotas are important tools for managing the use of disk space on your storage system. A quota is a limit set to
control or monitor the number of files, or amount of disk space an individual or group can consume. Quotas
allow you to manage and track the use of disk space by clients on your system.
A quota is used to:
Limit the amount of disk space or the number of files that can be used
Track the amount of disk space or number of files used, without imposing a limit
Warn users when their disk space or file usage is high
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 54
EXERCISE 2
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 55
MODULE SUMMARY
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2-1 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2-2 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
2-3 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
2-4 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 5
2-5 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 6
2-6 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-7 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 8
2-8 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
iSCSI
CIFS
NFS
FC
7G
Stack
WAFL Virtualization Layer
7G Volumes
NetApp Confidential 9
2-9 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-Mode
WAFL Virtualization Layer
Stack
RAID and Storage Interface
7-Mode Volumes
NetApp Confidential 10
2-10 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
D-Blade
8.1 supports SAN
WAFL Virtualization Layer
protocols:
RAID and storage interface
iSCSI, FC, FCoE
Cluster-Mode volumes
NetApp Confidential 11
2-11 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Apps
Servers
Network
Storage
CIO
NetApp Confidential 12
2-12 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 13
CLUSTER-MODE TERMINOLOGY
In the current version of Data ONTAP software, aggregates default to RAID-DP technology. They can be
changed to RAID 4 as an option, but in most cases no reason to do so exists. The majority of customers, both
primary and secondary, and online and near-line storage use RAID-DP technology. The RAID group size is
definable, but the default is the most efficient.
Aggregate Snapshot copies are required only in aggregates that use RAID SyncMirror software, including all
MetroCluster configurations.
Other customer-relevant uses are:
A feed into WAFL_check -prev_CP; this effectively restores the aggregate to that Snapshot copy (see
below) and then runs against it
The possibility of mirroring the entire aggregate
NOTE: This restores every FlexVol volume in the aggregate to the state that it was in when the aggregate
Snapshot copy was created. It is unlikely that this is what you want.
Users can use SyncMirror software to mirror aggregates if needed. Aggregate Snapshot copies are enabled by
default. A key point to consider when rolling back an aggregate Snapshot copy is that everything that is
contained in that aggregate is reverted to that point in time. reverts The SyncMirror all of the FlexVol
volumes simultaneously.
2-13 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance
Scaling
Capacity Scaling
Operational
Scaling
NetApp Confidential 14
2-14 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 15
2-15 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 16
2-16 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Thin provisioning
Storage efficiency: deduplication,
compression, and cloning
Integrated data protection:
Snapshot copies and replication
NetApp Confidential 17
2-17 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Interconnect enablement
of cluster-wide shared Storage
resources
2-18 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-19 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-20 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VS1
Workload Isolation
NetApp Confidential 21
2-21 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
2-22 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 23
2-23 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 24
2-24 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Nondisruptive
Operations
High Availability:
Nondisruptive
Storage Failover (SFO)
Upgrades (NDUs)
and LIF Failover
NetApp Confidential 25
2-25 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 26
VOLUME MOVEMENT
2-26 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Nondisruptively move
R
A1 A3
Uses Snapshot A2 B1 B2
in the background
NetApp Confidential 27
2-27 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The Results
Seamlessly added capacity
B2 A3 A2 A B1
C1 A1 C R
Rebalanced resources
LUN B
C1
LUN A LUN Rapidly deployed new system
LUN A1
LUN
NetApp Confidential 28
2-28 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A1 B C R The Results
C1
LUN
LUN
A LUN
Virtualized tiered services
Integrated unified system
Higher Performance Lower-Cost
Storage Storage Matched business priorities
NetApp Confidential 29
2-29 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A1 B2 A3 A2 The Results
C1
B1 C R Zero downtime
LUN
LUN
LUN B A Zero processing interruptions
Zero client changes
Always-On Infrastructure
NetApp Confidential 30
2-30 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 31
2-31 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Redistribution of client
access during
maintenance operations
NetApp Confidential 32
LIF MIGRATATION
2-32 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
2-33 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Network Demand
on an IP Address
NetApp Confidential 34
2-34 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 35
HIGH AVAILABILITY
2-35 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 36
2-36 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 37
2-37 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
NONDISRUPTIVE UPGRADE
2-38 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data ONTAP
Upgrade Is
Complete on
Cluster
New
Version
NetApp Confidential 39
2-39 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 40
2-40 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 41
2-41 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Additional protocols*
Protocols Includes: iSCSI, FCP*, CIFS, NFS
* = NA for 2240
SnapMirror
Enhanced disaster recovery and replication
Includes: SnapMirror
FlexClone
Automated virtual cloning
Includes: FlexClone
NetApp Confidential 42
2-42 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Protocols
Additional protocols
Includes: iSCSI, FCP, CIFS, NFS
SnapMirror
Enhanced disaster recovery and replication
Includes: SnapMirror
FlexClone
Automated virtual cloning
Includes: FlexClone
Insight Balance
Performance and Capacity Management
Includes: Insight Balance
SnapVault
Simplified disk-to-disk backup
Includes: SnapVault Primary and SnapVault Secondary
NetApp Confidential 43
2-43 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
2-44 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 45
CLUSTER-MODE CONCEPTS
High availability carries with it the idea of many nodes that work together but that are seen externally as one
system.
The global namespaces (one for each cluster Vserver) are the external, client-facing representation of this
distributed storage. Junctions are the glue that holds the global namespaces together. Junctions are analogous
to symbolic links. They connect volumes to create the global namespace of a cluster Vserver.
For the nodes to work as one, constant intracluster communication must occur over a dedicated cluster
network. That cluster network must be reliable.
Flexible volumes can be moved among aggregates and nodes. The movement does not cause the volumes
path in the global namespace to change, nor is the process of moving a volume seen by the client. No NFS
mountpoints or CIFS shares need to change, and the volume is available for reading and writing during the
process. This is explained in more detail later in this course .
Data LIFs are not permanently tied to particular network ports and nodes. As such, they can be migrated
(manually or automatically) away from problematic hardware or hardware that is heavily taxed.
2-45 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 46
2-46 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Solution: 64-bit aggregates, up to 100 TB in the Data ONTAP 8.0 operating system
16 x 2-TB drives = 32 TB
32 x 2-TB drives = 64 TB
48 x 2-TB drives = 96 TB
NetApp Confidential 47
2-47 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 48
2-48 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 49
2-49 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 50
2-50 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-51 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1 The maximum aggregate and volume sizes with 32-bit addressing are both 16 TB.
NetApp Confidential 52
2-52 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 53
2-53 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 54
2-54 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 55
2-55 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-56 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-57 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 58
2-58 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 59
EXERCISE 3
Please refer to your exercise guide.
2-59 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 60
2-60 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 61
2-61 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 62
2-62 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
recovery is MetroCluster.
SEC-compliant disk-based WORM
$ SnapLock technology
$ No license fee
$ License fee
NetApp Confidential 63
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 64
2-64 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-65 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 65
2-66 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 66
2-67 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Interconnect
10GbE
Management Network
NetApp Confidential 67
2-68 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 68
2-69 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 69
2-70 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 70
2-71 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 71
CONFIGURATION OVERVIEW
Refer to the compatibility matrix for more details:
http://now.netapp.com/knowledge/docs/olio/guides/cisco/Cluster_Mode_Compatibility.pdf
2-72 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 72
2-73 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 73
2-74 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 74
2-75 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CNA HBA
SLOT2
STAT
PS1
PS2
CONSOLE 8 7 6 5 4 3 2 1 N5K-M1008
L1 L2 MGMTO MGMT1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 10 19 20
UTA
FC Module
PCI 1 PCI 3
PCI 2 PCI 4
NetApp Confidential 75
UNIFIED CONNECT
CNA means converged network adapter, a technology that supports data networking (TCP/IP) and storage
networking (FC) traffic on a single I/O adapter. CNAs support Enhanced Ethernet and Fiber Channel over
Ethernet (FCoE).
HBA means host bus adapter, an I/O adapter that sits between the host computers bus and the FC loop and
manages the transfer of information between the two channels. To minimize the impact on host processor
performance, the HBA performs many low-level interface functions automatically or with minimal processor
involvement.
UTA means unified target adapter. With this adapter, customers can run FCoE and IP traffic through the same
port and on the same wire, which eliminates the need and expense for separate SAN and LAN adapters and
cables.
For detailed information regarding Unified Connect, see NetApp Unified Connect Technical Overview and
Implementation.
2-76 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC CNA
10GbE Switch
(FCoE-Enabled)
FC
NFS, FCoE
CIFS,
and
iSCSI
10GbE FC UTA
NetApp Confidential 76
2-77 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 77
2-78 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 78
2-79 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 79
2-80 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC and Ethernet
NetApp Confidential 80
2-81 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 81
2-82 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
IT INTEGRATION
NetApp Confidential 82
2-83 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
In-House
Management
Tools
NetApp Confidential 83
2-84 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Monitoring Dashboards exist for single systems and clusters, with graphing,
and alerting notifications, and reminders
NetApp Confidential 84
2-85 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapDrive Software:
Windows
UNIX
NetApp Confidential 85
2-86 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-87 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapManager software
Databases
Messaging
Virtualization
NetApp Confidential 86
2-88 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapProtect
Symantec NetBackup with Replication Director
NetApp Syncsort Backup (NSB)
Open System SnapVault
NearStore Personality License
NetApp Confidential 87
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-90 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
88
2-91 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 89
EXERCISE 4
Please refer to your exercise guide.
2-92 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 90
2-93 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NEW NEW
OnCommand OnCommand Insight
Service Automation Service Analytics
Integrates: Formerly SANscreen
Provisioning Manger and Akorri Balance-
Protection Manager Point
Operations Manager
SMVI and SMHV Device management
Problem detection
Monitoring and reporting
System Manager
Simple storage-device management
NetApp Confidential 91
2-94 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-95 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 92
2-96 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-97 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 93
2-98 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 94
2-99 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 95
2-100 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 96
2-101 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 97
2-102 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 98
2-103 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 99
2-104 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-105 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
priority on SATA
FAS Storage System Running Data ONTAP
Software with the FlexShare Tool
disks
NetApp Confidential 101
FLEXSHARE EXAMPLE
VOLUMES ON FC AND SATA DISKS
2-106 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MODULE SUMMARY
2-107 NetApp Accredited Storage Architect Professional Workshop: Core Software Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
3-1 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
3-2 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MODULE OBJECTIVES
3-3 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
LESSON 1: HARDWARE
3-4 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Overview Virtualization
FAS2X00 solutions, including
FAS3X00 V-Series systems
FAS6X00 Resources
SATA, SAS, FC, SSD
Remote LAN Module
(RLM), Embedded
Switch Hub (ESH),
AT-FCX
Performance
parameters
NetApp Confidential 5
AGENDA
3-5 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
iSCSI
Fibre Dedicated Corporate
Channel Ethernet LAN
NetApp
FAS
NetApp Confidential 6
3-6 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Unified Management
NetApp Confidential 7
3-7 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-8 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Servers
Network
Storage
NetApp Confidential 8
3-9 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-10 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS/V6210
4,320 TB
1,440
FAS/V3270 Drives
8-TB Flash
FAS/V3240 4,320 TB Cache
1,440
Drives
FAS/V3210 6-TB Flash
3,600 TB
1,200 Cache
Drives
FAS2240 2,880 TB 3-TB Flash
960 Drives Cache
FAS2040 2-TB Flash
1,800 TB Cache
600 Drives
1-TB Flash
720 TB Cache
240 Drives
432 TB
144 Drives
408 TB
136 Drives
NetApp Confidential 9
3-11 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
V6280
V6240 2,880 TB
V6210 2,880 TB
V3270 2,400 TB
V3240 1,920 TB
V3210 1,200 TB
480 TB
NetApp Confidential 10
3-12 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 11
3-13 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 12
3-14 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 13
3-15 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
3-16 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
New System
New Price
FAS2240
FAS2040 432 TB
408 TB
NetApp Confidential 15
3-17 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 16
3-18 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 17
3-19 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS2040 FAS2240
Included All Protocols All Protocols
Software Data ONTAP Base Data ONTAP Essentials
($0)
Snapshot copies, RAID-DP The features of Data ONTAP Base
technology, NearStore disk storage, plus:
FlexVol volumes, FlexShare tool,
Secure multi-tenancy
thin provisioning, deduplication,
compression, SyncMirror software Automated management
System Manager, FilerView tool
Virtualization
Windows Bundle
Protection Pack SnapMirror
Bundle
Complete Bundle
Complete Bundle
Server Pack SnapVault
NetApp Confidential 18
3-20 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS2040
Low acquisition cost
Easy order process
Comprehensive solution
NetApp Confidential 19
PORTFOLIO POSITIONING
OPTIMIZED FOR VIRTUALIZATION AND CONSOLIDATION
FAS3210
High availability and scalability for larger environments
Enterprise-class availability and data protection for critical applications
Higher scalability that adapts readily to rapid data growth
Flexibility to support diverse workloads
FAS2240 New System!
Improved performance to support demanding workloads
Two to three times improvement in performance
Investment protection for growing business needs
Industry-leading efficiency that maximizes utilization of IT budgets
FAS2040 New Price!
Popular entry platform now priced for best value
Low acquisition cost for smaller IT organizations
Easy-to-order configurations
A comprehensive solution at an entry-price point
3-21 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
3-22 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 21
3-23 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage consolidations
and server virtualization FAS3240
For mixed workloads
Windows storage (the best price and
consolidation performance)
NetApp Confidential 22
3-24 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
3-25 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6U
FAS3100
Dual-Enclosure HA
More expansion slots
6U
FAS/V32x0
Single-Enclosure HA
3U
Single-Enclosure HA
NetApp Confidential 24
3-26 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance Issues
Excessive Footprint
No Onboard SAS Ports Solution FAS/V3240A
FAS3100 FAS/V3270A
Performance Issues
Significant I/O Limitations
No Onboard SAS Ports
Solution
FAS3100 FAS/V3240AE
FAS/V3270AE
NetApp Confidential 25
3-27 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Chassis
3U
3U
NetApp Confidential 26
3-28 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Standalone Controller
2 PCIe v2.0 (Gen 2) x 8 slots Management (wrench)
Top full height and full length SP and e0M
Bottom full height and length Private management
2 x 6Gb SAS (0a, 0b) ACP (wrench w/lock)
2 x HA interconnect (c0a, c0b) Serial console port
2 x 4Gb FC (0c, 0d) I/O expansion module
2 x GbE (e0a, e0b) 4 x PCIe 8x
USB port (not currently used) Full length and full height slots
NetApp Confidential 27
3-29 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 28
3-30 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DIMMS
CPU0
CPU Air
Flow
Guide
USB (Open)
CPU1
NetApp Confidential 29
3-31 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DIMM Banks
Desc FAS3210 FAS3240 FAS3270
DIMM-4 Main Empty Empty Yes
DIMM-3 Main Empty Empty Yes
DIMM-2 Main Yes Yes Yes
DIMM-1 Main Yes Yes Yes
DIMM-NV2 NVMEM Empty Yes Yes
DIMM-NV1 NVMEM Yes Yes Yes
Battery-Backed
DIMMS
NetApp Confidential 30
3-32 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 31
3-33 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 32
3-34 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Memory 32 GB 8 GB 16 GB 32 GB
NVRAM 4 GB 1 GB 2 GB 4G B
4 x GbE
Onboard I/O 4 x 6Gb SAS, 4 x GbE, 4 x 4Gb FC
8 x 4Gb FC
NetApp Confidential 33
3-35 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-36 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Refer to the System Configuration Guide for the FAS3240, which can be accessed
from the NetApp Support site.
NetApp Confidential 34
3-37 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Memory 8 GB 8 GB 16 GB 16 GB 32 GB 32 GB
NVRAM NV8 (4 Gb) NV7 (1 GB) NV8 (4 Gb) NV7 (4 GB) NV8 (4 Gb) NV7 (4 GB)
Onboard 4-Gb FC 4 8 4 8 4 8
Maximum Number
240 420 600 672 960 840
of Spindles
7.2.6 and
Data ONTAP 7.2.5 and later 7.2.5 and
8.0 and later 8.0 and later 8.0 and later
Release Number later 7.3.1 and later
later
NetApp Confidential 35
3-38 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 36
3-39 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 37
3-40 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-41 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS6280
Large shared workloads Cloud Computing
Platform
Demanding performance
and capacity requirements
Virtualization and technical FAS6240
Enterprise Workload
applications Consolidation Platform
Large enterprises and
cloud-service providers
FAS6210
Virtualization
Platform
NetApp Confidential 39
3-42 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 40
FAS6200 PERFORMANCE
Stateless offload = is technical functionality that may have resided in the operating system software or
hardware and is now handled by a chipset, firmware or software which is on the 10 GbE NIC card.
3-43 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 41
3-44 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Physical Storage
NetApp Confidential 42
3-45 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 43
NETAPP ENTERPRISE-CLASS HA
NetApp designs enterprise-class high-availability into its storage products.
The NetApp portfolio delivers proven data availability (the whole storage infrastructure: system, disk shelves,
and software). Across thousands of customer deployments, AutoSupport data shows better than 9x5
availability. The industry-analyst firm IDC validated this finding in a white paper (on the Field Portal and on
NetApp.com).
With the FAS6200 series (and with the FAS3200 series), enterprise-class high availability is further enhanced
via provision of these features:
Service processor, for lights-out management
Alternate control path to storage, for nondisruptive recovery
With the HA software that is provided with the Data ONTAP system and the MetroCluster software that
customers can purchase, mission-critical applications are protected and planned and unplanned downtime is
eliminated.
3-46 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS6000 6U
Single-Enclosure HA
12U
Dual-Enclosure HA
Dual-Enclosure HA
Half the rack space and much higher performance or
the same rack space with much higher performance and
additional expansion capabilities
NetApp Confidential 44
3-47 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance challenges
Limited 10GbE and 8-Gb FC Solution
I/O
FAS/V3170 FAS/V6210
Performance challenges
Significant I/O limitations Solution
FAS/V6040 FAS/V6240
Insufficient performance
Significant I/O limitations Solution
FAS/V6080 FAS/V6280A
NetApp Confidential 45
3-48 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FAS6210A NA
FAS6240 FAS6240A
FAS6280 FAS6280A
FAS6240
FAS6280
NetApp Confidential 46
3-49 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 47
NVRAM8 ARCHITECTURE
NVRAM8 is two cards in one: the interconnect hardware card for HA and the NVRAM electronics card. In
this regard, NVRAM8 is similar to NVRAM5 and NVRAM6. However, unlike with NVRAM5 and
NVRAM6, NVRAM8s HA and NVRAM functions are handled by separate chips.
NVRAM is a key element of NetApp technology. It enables writes to disk to be completed efficiently. It
accomplishes this task by allowing writes to be delayed until they can be performed in one burst and by
insuring that the data is not lost by power outage or system panic before the burst is committed to disk.
The HA function carries the process one step further by linking two controllers into a redundant pair. The HA
link enables one controller to perform high-speed updates of the other controller's NVRAM with data that is
not yet committed to disk. If one controller fails, the other controller completes the tasks that the failed
controller did not complete.
No longer is battery power used to hold contents in DRAM memory for a minimum of three days. Instead,
when system power is lost unexpectedly, NVRAM8 performs a de-stage operation. The contents of DRAM
are moved to flash components within a minute of the power loss and then the card shuts down completely.
The battery is not needed to preserve customer data. When system power is restored, the Data ONTAP system
transfers the contents that are in the flash components back to DRAM and replays the NVRAM log from
DRAM memory.
Like NVRAM5 and NVRAM6, NVRAM8 uses InfiniBand as the protocol for the interconnection between
the redundant pairs of controllers for HA solutions. With the advent of NVRAM8, the speed of the link
doubled from SDR (2.5 Gb per second per lane or 10Gb per second per link) for NVRAM5 and NVRAM6 to
DDR (5 Gb per second per lane or 20 Gb per second per link) for NVRAM8. Like NVRAM7 in Spectre
(FAS3100 series), a chassis with two controllers does not need external cables to make the HA connection.
NVRAM8 features an additional high-speed connector to the controller board. This connector is part of a
physical link over the midplane to the other controller. A special LED on the PCI bracket lights up when two
controllers with NVRAM8 are present in a chassis.
3-50 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 48
NVRAM6
For both the software and hardware modules, the NVRAM card is referenced. The NVRAM6 card is
currently used on NetApp systems.
The battery uses Lithium Ion technology. Three or five 1.95Ah cells provide a total of 5.9 or 9.8Ah at 4.1V. If
an external power failure occurs, this configuration can supply onboard power for at least three days.
Each card contains two independent chargers. Together, the chargers charge the battery in less than 10 hours.
When the system is powered on, each charger is ON by default. Safety circuitry is built into the battery pack.
Each card has two InfiniBand CFO connections. A card has one or two batteries. If a card has 512 MB of
memory, it has one three-cell battery. If a card has 2 GB of memory, it has a second battery. Therefore,
NetApp guarantees at least 72 hours life of the battery.
Typically, a battery lasts longer than 72 hours, but NetApp guarantees at least 72 hours. Some people say that
72 hours (3 days) is not very long. However, 72 hours can be sufficient to enable the processes that prevent
data loss.
In most cases, within standard storage environments, backup power is available. When power is restored to a
system and the system is rebooted, the Data ONTAP operating system cleans the dirty writes and commits the
clean writes to disk. At that point, a clean shutdown can be executed via the halt command. Then,
NVRAM contains no data. The system shuts down completely, and all data is committed to disk. If all data
can be removed from NVRAM within the three days that the battery provides power, no data can be lost.
3-51 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Maximum Number of
8 8 10 24
PCIe Slots
Onboard 8-Gb FC -- 8 or 16 -- 8 or 16
Onboard 10 GbE -- 8 -- 8
Onboard 6-Gb SAS -- 0 or 8 -- 0 or 8
Maximum Number of
840 1200 1176 1440
Spindles
Maximum Capacity 1680 TB** 2400 TB 2352 TB** 2880 TB
Maximum Aggregate 70 TB 70 TB 100 TB 100 TB
Data ONTAP Release
7.2.5 and later 8.0.1 7.2.4 and later 8.0.1
Number
* Requires the Data ONTAP 8.0.2 system. Memory in the Data ONTAP 8.0.1 system is 96 GB.
** Requires the Data ONTAP 8.0 system or later; for earlier systems, maximum capacity is half what is specified.
NetApp Confidential 49
3-52 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 50
COMPARISON
Similar
One in a box
NVRAM as a separate FRU
Different
RLM: replaced by SP
SP Console: accessed via the system console port (CTRL-g)
NVRAM: only in slot 2
I/O: more and more flexible
IOXM: splitting the I/O into two modules
More I/O: 19 PCIe card equivalents versus 14 equivalents in the same 6u height chassis
Wrench port: replaces the RLM port
e0M and e0P: added
Locked wrench port: added
10-GbE ports: added
USB port: added
FC and SAS I/O board ports: added
Different chassis: different servicing model
LCD: eliminated
I/O expansion on separate module (IOXM): added
USB boot media: instead of CF
NVRAM8: instead of NVRAM6
NVRAM: no change in slots for HA versus standalone
3-53 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 51
COMPARISON
Similar
Two in a box
Horizontal PCIe slots
Onboard FC and GbE ports
Management Ethernet port
IB that is run over the midplane for HA
Different
High-line (220V) AC power: required
RLM: replaced by SP
SP Console: accessed over the system console port (CTRL-g)
NVRAM: a separate FRU
10 GbE and I/O slots: added
High-line power (220V): required
More I/O: nine PCI card equivalents versus six equivalents in the same 3u height tray
Locked wrench port: added
USB port: added
NVRAM8: in slot 2 versus NVRAM7 on Mobo
FC/SAS IO board: added
USB boot media: instead of CF
3-54 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Optimized for
Data Management:
Shared Infrastructure in the Data Center Data ONTAP
Optimized for
Analytics FMV HPC Performance:
E-Series
NetApp Confidential 52
3-55 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 53
3-56 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E2600 E5400
NetApp Confidential 54
3-57 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 55
3-58 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
StorageGRID
Media Content Management
Object-based storage with
Multi Petabyte capture and
Petabyte scale for distributed
playback platform for rich
image, video and records
media content creators
repositories
NetApp Confidential 56
E-SERIES SOLUTIONS
Weve identified six initial Big Data solutions for the E-Series Platform. The first, which was announced back
in May, is a full motion video solution. The FMV solution combines Quantum StorNext software and E5400
storage to create a single architecture for ingest, exploitation and dissemination. The FMV solution can
deliver over 20 gigabytes per second of read and write throughput and over a petabyte of raw storage in a
single rack.
The other solutions, which will roll out over the coming months, include three more bandwidth solutions:
Media Content Management and two HPC solutions -- seismic processing and Lustre. The first analytic
solution released will be for Hadoop. And the initial content solution is StorageGrid.
These six solutions are the only way to purchase E-Series storage directly from NetApp. And for each of these
solutions, a custom-configured E-Series storage system is tested and integrated with 3rd party software to
create a turnkey solution designed to meet the specific requirements of that vertical. Additional training
courses, presentations and collateral are available for each of these solutions.
NOTE: Its important to note that this course covers the full feature set and capabilities of the E-Series
platform. Solutions built on the E-Series are architected to include the specific product attributes that best
meet the workload, capacity and form factor requirements for that vertical. As a result, some of the features
and capabilities discussed in this course are not offered or relevant for a given E-Series solutions. Please refer
to solution documentation and collateral for an understanding of the E-Series attributes offered as part of the
solution.
3-59 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 57
EXERCISE 5
Please refer to your exercise guide.
3-60 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 58
3-61 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DRIVE TYPES
3-62 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 60
SATA
Primary SATA storage was introduced in May 2005. For the past couple of years, NetApp has used SATA
storage on FAS systems. SATA storage is intended for primary applications. SATA storage enables NetApp
to provide customized solutions.
The target markets for SATA are latency-insensitive primary applications. Latency considerations are very
important. ATA drives are inexpensive and widely available, but they are slow. To maintain less than 20-ms
latency, an ATA drive can provide approximately 40 IOPs. However, to maintain the same level of latency, a
15,000 RPM FC drive can provide approximately 200 IOPs.
You must carefully consider latency. You must ensure that, on installation, SATA drives are placed where
latency is not relevant. For example, you might use SATA drives in home-directory environments and-read
only warehouses.
Where latency is critical, do not use SATA drives. Therefore, in most cases, you should not use SATA drives
in production environments.
3-63 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 61
3-64 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 62
SAS
The term SAS refers to serial-attached SCSI drives. Basically, SAS drives and FC drives are the same,
but the SAS interface uses serial communication.
3-65 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 63
SAS USAGE
SAS drives and FC drives have identical performance profiles, but management and reliability considerations
make SAS drives the more attractive solution.
With SAS, the limit on the number of devices that can be connected is determined by bandwidth.
With FC, the maximum number of addressable devices is 128. Therefore, there can be only four shelves per
loop. With SAS, additional loops can be created, so there is no port burn (as there is on FC in very large
system environments).
Bandwidth over SAS can be better than bandwidth over FC. SAS drives are currently a little less expensive
than FC drives.
Few SAS storage devices are available, and no standalone storage systems have SAS drives. Sun is the only
NetApp competitor that offers a SAS-class drive.
3-66 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 64
3-67 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 65
3-68 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Which is cheapest?
The FC drives at 15,000 RPM cost 30%
more per drive but are the least expensive
way to meet requirement.
NetApp Confidential 66
3-69 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 67
3-70 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Bit Error Likelihood Single Parity (per reconstruction of an 8-Drive RAID 4/5 Set) 1.6% 18.4%
Bit Error Likelihood Dual Parity (per reconstruction of an 8-Drive RAID-DP Set) < 1 in a billion
NetApp Confidential 68
3-71 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 69
3-72 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 70
EXERCISE 6
Please refer to your exercise guide.
3-73 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 71
3-74 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 72
3-75 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 73
3-76 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 74
3-77 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 75
3-78 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 76
3-79 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 77
3-80 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 78
3-81 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
This table appears in the new NetApp Disk Shelves and Storage Media datasheet.
NetApp Confidential 79
STORAGE ALTERNATIVES
This table provides information that matches customer needs with media and disk-shelf options.
3-82 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Rack units 2 4 3
SSDs NA 100 GB NA
This table appears in the Compare tab of the Disk Shelves and Storage Media page on NetApp.com.
NetApp Confidential 80
3-83 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 81
3-84 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 82
IOM MODULES
IOM is defined as input/output module.
The number 3 refers to 3-Gbps SAS.
Each IOM3 contains two ACP and two SAS ports.
Dual redundant IOMs, which are standard for the DS4243, provide resilient multipath high availability
(MPHA).
3-85 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 83
3-86 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 84
3-87 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
+ Flash + Flash
Cache Cache
NetApp Confidential 85
3-88 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VM 1
Virtual-Machine Reads
During a Boot Storm
VM 2
VM 3
VM 4
Storage Controller
VM 5
Deduplicated Volume
of VM Boot Images with Flash Cache
NetApp Confidential 86
3-89 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 87
SETTING EXPECTATIONS
Set realistic expectations, as to when Flash Cache will help and when it will not help.
Using Flash Cache helps with many workloads but not with all workloads. Read caching is most effective for
small-block, random read-intensive workloads.
Flash Cache is not significantly helpful for sequential or write-intensive workloads or for CPU-based
problems.
3-90 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 88
LESSON 9: PERFORMANCE
3-91 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management of fragmentation
Memory of NetApp systems
CIFS performance
Comparison: iSCSI versus FC
NetApp Confidential 89
PERFORMANCE TOPICS
3-92 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-93 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 91
3-94 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-95 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 92
MEMORY CONSIDERATIONS
More memory on the host is almost always helpful.
More memory on the controller helps hosts to connect, helps with large metadata needs, and helps
applications with wide data footprints.
3-96 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 93
3-97 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 94
CIFS PERFORMANCE
CIFS is not a high-performance protocol, but tens of thousands of CIFS users create a high-performance load.
Consolidation of CIFS users provides a great opportunity. Administrators appreciate the benefits. And, they
expect consolidation to produce fantastic performance.
Be aware of and careful about anti-virus needs and advanced CIFS features. One such CIFS feature is SMB
server signing. This feature was introduced in one of the service packs of 2000 and is included in 2003. If two
systems are enabled for SMB server signing (enabled by default on Microsoft systems), the signing occurs
automatically. An MD5 signature is added to every packet that is transmitted between the two systems. The
addition of the MD5 signatures adds a huge load to the CPU.
NetApp supports SMB server signing. However, if it is turned on, the CPU will probably peg and
performance will decrease. At this time, there is little demand for SMB signing. If customers begin to demand
SMB signing, we will qualify an MD5 offload card and off load all of the calculations to a daughterboard to
reduce the impact on the CPU.
Be aware of the impact on performance. Make sure that customers understand what CIFS is doing, as MD5s
are complicated and can impair performance on the client side. MD5 signing is not only a server feature.
Other features to be aware of are quotas and oplocks.
Consolidated CIFS environments are expected to be high performance, so you should ensure that very large
CIFS environments are sized appropriately.
3-98 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 95
ISCSI VERSUS FC
The choice between iSCSI and FC is often a question of business, politics, or philosophyrarely a technical
question. NetApp systems work effectively and efficiently with both iSCSI and FC, so whatever the customer
prefers is the right choice.
Typically, customers who already have FC choose FC, because they want to leverage the environment that
that have. Typically, customers who do not have FC choose iSCSI, because starting a new fabric requires a
large investment.
The only performance caveats concern software initiators. Software initiators require more CPU load.
Bandwidth aggregation makes iSCSI relatively competitive with FC. For most cases, iSCSI performance is
similar to FC performance.
3-99 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 96
EXERCISE 7
Please refer to your exercise guide.
3-100 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 97
3-101 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexVol Volumes
V-Series
Front End
Aggregate
NetApp Confidential 98
3-102 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC
iSCSI Ethernet LAN
NetApp Confidential 99
3-103 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-104 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-105 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EXERCISE 8
Please refer to your exercise guide.
3-106 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-107 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RESOURCES
3-108 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-109 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MODULE SUMMARY
3-110 NetApp Accredited Storage Architect Professional Workshop: Core Hardware Technology
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 5
SOFTWARE EFFICIENCIES
RAID 6 (RAID-DP technology) protects against double-disk failure without sacrificing performance or
adding disk-mirroring overhead.
Thin provisioning (FlexVol technology) keeps a common pool of storage readily available to all
applications.
Thin replication (SnapVault and SnapMirror software) enables block-level, incremental data backup and
replication for significant storage and bandwidth savings.
Snapshot copies provide instant, point-in-time data copies with minimal storage Snapshot space.
Virtual copies (FlexClone volumes) use virtual cloning to create on-demand, space-efficient virtual clones
of volumes, LUNs, and individual files.
Deduplication across applications and protocols identifies, validates, and removes redundant data blocks
from volumes for up to 95% disk savings.
Data compression is performed inline and immediately reduces the amount of stored data.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 6
HARDWARE EFFICIENCIES
USING HIGH-DENSITY DISK DRIVES
Explain the use of large-capacity SATA drives in enterprise applications.
Flash Cache is the current brand name for PAM II, the next-generation card that replaces the original
Performance Acceleration Module (PAM).
The use of 144-GB FC drives instead of 1-TB SATA drives results in seven times more capacity.
Because SATA drives store much more data per disk, resiliency is important. RAID-DP technology provides
this resiliency but without the capacity overhead of disk mirroring.
The new PAM can effectively increase the read performance of SATA drives, which allows you to use SATA
drives in more applications.
The combination of SATA drives, RAID-DP technology, and PAM radically changes what constitutes high-
performance storage.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 7
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
seconds or minutes.
The benefits are:
Reduced capacity Servers with
requirements Standard
1Gb/10GbE Master Cloned
Rapid server NICs Boot LUN Boot LUNs
deployment
NetApp Confidential 8
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 10
THIN REPLICATION
Thin replication is a term that is used to describe SnapMirror and SnapVault technologies in the context of
storage efficiency.
Because only incremental block changes are transferred after the baseline copy is made, SnapMirror and
SnapVault technologies improve efficiency.
Deduplication can be easily combined with thin replication for even greater savings. The resulting thin
transfers reduce storage space requirements at the source and the destination and also reduce WAN traffic.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 11
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 12
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Vol
Aggregate
NetApp Confidential 13
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 15
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 16
NETAPP DEDUPLICATION
Explain the effect of NetApp deduplication on storage efficiency.
Deduplication searches for and removes duplicate data.
NetApp is the market leader in deduplication, and thousands of customers use deduplication in production.
NetApp deduplication is different in that it can be applied to a broad variety of applications and storage tiers,
including primary storage, replicated storage, backup storage, and archival storage.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 17
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 18
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lower TCO
Space savings for varied datasets
Compression for primary, secondary, and
archive storage
NetApp Confidential 19
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Compression
Groups
32K
32K
32K
32K
32K
32K
192k file
NetApp Confidential 21
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32K
32K
32K
32K
32K
32K
NetApp Confidential 22
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 24
Data ONTAP 8.0.1 7-Mode: It supports only 7-Mode (not Cluster-Mode) configurations.
Deduplication
NetApp data compression requires deduplication to be enabled on the same volume. After you enable
deduplication, you can choose to enable data compression. You do not need to schedule deduplication to run;
you only have to enable it on the same volume.
Free license
NetApp data compression requires both the deduplication and the compression license. Both are free.
64-bit aggregates
NetApp data compression does not support 32-bit aggregates. No plans exist for supporting 32-bit aggregates.
Is enabled per FlexVol volume
Works on FlexVol volumes only, not on traditional volumes
Limits maximum volume size
Limits volume (same as deduplication). For Data ONTAP 8.0.1, the limit is 16 TB for all supported storage
systems.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 25
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
*Exchange 2010: deduplication for primary; compression for backup and archive
These are typical space savings; actual results may vary. Use the Space Savings Estimation Tool (SSET) v3.0.
NetApp Confidential 26
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 27
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 28
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
0 300 15
NetApp Competition
53%
10
0
NetApp Competition
5
0
NetApp Competition
Source: Oliver Wyman Study: Making Green IT a Reality, November 2007. Competitors: EMC CLARiiON and HP EVA.
NetApp Confidential 29
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 30
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 31
LESSON 1: TOOLS
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 32
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
THE SSET
This tool is a confidential NetApp product. It is intended for use only by NetApp employees and authorized
NetApp partners when analyzing data at current or prospective NetApp customer accounts. By installing this
software, you agree to keep the tool and its results confidential to NetApp, the NetApp authorized partner, and
the customer account.
Overview:
FAS deduplication is a NetApp storage space-saving technology that increases stored data efficiency by
deduplicating and storing only unique data.
The SSET for Linux crawls through all the files in the specified path and estimates the space savings that will
be achieved by FAS deduplication.
NOTE: This tool reports the percentage of duplicate data that is found in the file system and not the amount
of data that is actually saved by enabling FAS deduplication. The tool is for estimation only.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 35
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 37
CREATING AN ANALYSIS
1. Set up your analysis.
NetApp enters your information and reviews default assumptions for your financial environment.
2. Identify the existing storage environment.
NetApp works with you to identify data requirements and existing storage technology.
3. Propose solutions.
Propose storage solutions that NetApp believes are appropriate alternatives to existing solutions.
4. Analyze and compare.
NetApp Realize analyzes the financial impact of proposed solutions and shows savings and benefits
compared to the existing system.
5. Present results.
Use the NetApp Realize outputs as a summary to allow you to take the next step.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 39
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
http://synergy.netapp.com
NetApp Confidential 41
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 42
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 43
EXERCISE 9
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
MODULE SUMMARY
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
5-1 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
5-2 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
5-3 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
LESSON 1: CONSOLIDATION
5-4 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 5
5-5 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Microsoft Microsoft
Active Active
Directory Directory
Server Integration
NetApp Confidential 6
SEAMLESS TRANSITION
INTEGRATION WITH WINDOWS INFRASTRUCTURE
This image represents a typical Windows file-serving environment. The computers at the top may be
thousands of users on the network who access data on the servers below. You can see that each server is
independent, with its own backup systems, storage capacity, and administrative needs. In a typical file-server
environment, hundreds or even thousands of these servers may exist. The challenge here is maintaining all of
the servers, backing them up, keeping them up-to-date, and utilizing storage assets effectively.
Here we see the same users, but now they are accessing one consolidated server that interoperates fully with
the Windows environment. From the perspective of the Windows clients and administrators, it looks like a
Windows file server that allows them to leverage existing Windows applications and tools. NetApp integrates
with Active Directory, supports Kerberos authentication and Group Policy Objects, and integrates with
Volume Shadow Copy Services (VSS), which is Microsofts snapshot implementation. It also works with
existing software for backup, storage management, and antivirus scanning.
The benefits are many. Because customers are moving their data from slow, unreliable servers with direct-
attached storage (DAS) to a highly reliable enterprise-class file server, they get highly available storage. They
can also consolidate hundreds of file servers with minimal impact on users and take advantage of pooled
storage for more efficient use of storage resources. With pooled storage, customers also get the ability to
expand their storage capacity without disruption for just-in-time provisioning, which also greatly increases
their storage-utilization levels. Another benefit is heterogeneous file sharing, which allows rapid, secure
access for data sharing to both UNIX and Windows users. Because the storage systems to manage are fewer
and simpler, customers get simplified data management. Finally, because NetApp is built on open systems, it
seamlessly integrates with existing software and hardware.
This is a big opportunity.
5-6 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Typical Uses
User data and home directories
Shared project files
Application files and data
NetApp Confidential 7
5-7 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 8
5-8 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 9
5-9 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-10 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 10
5-11 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Challenges:
Excessive file-server
sprawl to handle
growth
Poor server and
storage utilization
Silos of file storage
File Servers with
Dedicated Storage
NetApp Confidential 11
CONSOLIDATE (1 OF 2)
Windows file servers were originally intended for small workgroups and have eventually scaled up to provide
department-level storage.
These file servers, however, do not scale well for many reasons, which results in silos of file storage that can
be accessed only by their respective file servers.
With NetApp, customers can:
Break the cycle of deploying more
Choose the right platform for current and future needs
5-12 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Our storage utilization went up from 43% to 76% once we moved to NetApp.
Beaumont Hospitals
NetApp Confidential 12
CONSOLIDATE (2 OF 2)
5-13 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 13
MANAGE
5-14 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
SIMPLIFYING MANAGEMENT
Deploy new storage and services with integrated solutions in minutes versus hours or even days.
Windows administrators directly manage storage without having to rely on their storage counterparts.
5-15 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 15
5-16 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp storage is trusted with our intellectual property, the TI crown jewelsthats the real
proof of our confidence in NetApp solutions.
Texas Instruments
NetApp Confidential 16
5-17 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 17
5-18 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 18
5-19 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 19
EXERCISE 10
Please refer to your exercise guide.
5-20 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
5-21 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 21
5-22 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
5-23 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
5-24 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 24
5-25 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OS-consistent Snapshot
copies
Near-instantaneous restores
that use the SnapRestore
feature Storage
Network
Multipathing
Cluster awareness
OS-consistent replication
SnapDrive best practices:
http://now.netapp.com/NOW/knowledge/docs/other/best_practices_snapdrive/bestpract.htm
NetApp Confidential 25
SNAPDRIVE SOFTWARE
EXTENDING NETAPP SIMPLICITY TO SANS
SnapDrive software is part of the NetApp server suite and comprises SnapDrive for Windows and SnapDrive
for UNIX.
SnapDrive software allows all storage-provisioning activities to be managed from the host
(the server administrator):
LUN creation
igroup creation
Mapping
Partitioning
Formatting
Mounting
Windows and UNIX versions:
Windows 2000 Server and Windows Server 2003
AIX, Solaris, HP-UX, Red Hat Linux, SUSE, and Oracle Enterprise Linux
SnapDrive software handles dynamic volume management. SnapDrive software provides OS-consistent
Snapshot copies. This is the most important technical reason for having SnapDrive software (along with the
management reasons). Customers get near-instantaneous restores with SnapRestore software, which is
multipathing-aware and cluster-aware, and customers get OS-consistent replication.
5-26 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-27 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 26
5-28 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 27
5-29 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-30 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 28
5-31 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 29
5-32 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
X
Volume None File
NetApp Confidential 30
5-33 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Command Result
vol size FlexVol 50m FlexVol will now be 50 M
vol size FlexVol +50m FlexVol will be increased 50 M to 100 M
vol size FlexVol -25m FlexVol will be decreased 25 M to 75 M
NetApp Confidential 31
5-34 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-35 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 32
5-36 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
5-37 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
5-38 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Local:
The OS owns the drive and its storage space.
No other system can access the drive.
Any blocks can be accessed at any time.
NetApp Confidential 35
DAS SYSTEMS
5-39 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Local:
Write three-block file
NetApp Confidential 36
DAS SCENARIO
In this case, the file system layer of the host OS issues an SCSI ENOSPC message. This is a normal
condition. The OS responds by reporting back to the user or application that no space is available, and the
write fails. Well-written applications have no problem with this message.
5-40 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 37
5-41 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
SAN-ATTACHED SCENARIO
The file system layer of the host OS issues the SCSI ENOSPC message. This is a normal condition, and the
OS and applications respond normally.
5-42 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 39
5-43 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Example:
A 10-block LUN
Snapshot copies
100% space reservation
This guarantees that WAFL file system
ENOSPC cannot occur.
NetApp Confidential 40
5-44 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot copy
Snapshot copy
Snapshot copy?
NetApp Confidential 41
5-45 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 42
EXERCISE 11
Please refer to your exercise guide.
5-46 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 43
LESSON 5: POSITIONING
5-47 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
5-48 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 45
WHICH PROTOCOL?
When you talk about the core four, you must talk about which protocol you want in a given environment.
Thankfully, most customers have this well established by the time that people come in to service accounts. FC
SANs usually provide the highest performance option, of course, yet performance is not always the top
criterion, especially if the customer does not have FC infrastructure. It is expensive to create infrastructure if
it does not exist. Certainly SAN has the advantage of being totally application-independent. It looks like a
hard drive. Anything that can run on anything can run on SAN.
NAS is the most independent protocol. Because it has been around as a standard for so much longer than
CIFS, better support is usually available in the NFS world.
You must watch to ensure that an application will be supported if NetApp moves off of DAS. For a Windows
server that runs an application, use SAN. Some, but not many, circumstances exist in which you can use CIFS
by Windows. Microsoft requires the use of SAN for most applications.
NAS can be easier to administer, because only one file-system layer exists, and that layer is NetApp. Using
NAS makes it easier to manage Snapshot copies, and you do not have to worry about space reservations.
Be a trusted advisor, but let customers make their own decisions.
Usually customers have reasons for their choices that are defined and in place.
Frequently, these are not technical reasons.
Be aware that some of their reasons may be political.
5-49 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 46
5-50 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 47
5-51 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 48
5-52 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 49
5-53 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 50
5-54 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 51
5-55 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume vol_SAN1:
current snapshot
reserve is 20% or
2097152 k-bytes.
NetApp Confidential 52
SNAPSHOT RESERVE
The Snapshot reserve specifies a set percentage of disk space for Snapshot copies. By default, the Snapshot
reserve is 20% of disk space. The Snapshot reserve can be used only by Snapshot copies, not by the active file
system. This means that if the active file system runs out of disk space, any disk space that remains in the
Snapshot reserve is not available for active file system use.
NOTE: Although the active file system cannot consume disk space that is reserved for Snapshot copies,
Snapshot copies can exceed the Snapshot reserve and consume disk space that is normally available to the
active file system.
The Snapshot reserve is not a reservation of physical disk; it is an amount of space to be counted against
Snapshot copies.
5-56 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 53
5-57 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 54
VOLUME AUTOSIZE (1 OF 2)
This value, when changed from the defaults, is not persistent; it reverts to the default values after booting. So
to change this value (for example, 90% for tiny volumes of less than 20 G) and make it persist after booting,
you should add the following line to each /etc/rc file on both controllers:
priv set q diag;
setflag wafl_reclaim_threshold_t 90;
priv set;
5-58 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Configuration:
Is set at the volume level
Can use these values:
ON:
Increment size (default 5% of original size)
Maximum size (default 120% of original size)
OFF:
vol autosize vol_name [-m
size[k|m|g|t]]
[-i size[k|m|g|t]] [on|off|reset]
NetApp Confidential 55
VOLUME AUTOSIZE (2 OF 2)
Volume autosize can be run only a maximum of 10 times on any particular volume. If you set the incremental
size too small, you cannot expand it as much as you may want to. For that reason, it is generally
recommended that you use the -m and -i switch when configuring the volume autosize feature to set the
incremental size and the maximum size to something larger than the defaults.
NOTE: The volume can grow only to a maximum size that is 10 times the original volume size.
5-59 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 56
ADMINISTRATORS CHOICE
Configurations can get complex. If you have doubts as to the recommended best practice of reservations,
consult this guide: Technical Report: Thin Provisioning in a NetApp SAN or IP SAN Enterprise
Environment at http://media.netapp.com/documents/tr-3483.pdf.
5-60 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 57
EXERCISE 12
Please refer to your exercise guide.
5-61 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 58
MODULE SUMMARY
5-62 NetApp Accredited Storage Architect Professional Workshop: Enterprise Data Storage
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 5
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volumes and
data management
A Data ONTAP 7G aggregate pool
of physical disks, flexible volumes,
and increased aggregate disk I/O
bandwidth
NetApp Confidential 6
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 7
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 9
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 10
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exchange Server
Exchange Server
with SnapManager
for Exchange
VSS
Exchange Transaction
Database Logs
Snapshot
Copy
NetApp Confidential 11
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 12
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 13
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Active Replica
Database A Database B
9:00 AM Backup-1
NetApp
9:15 AM Backup-2
9:30 AM Backup-3
Deduplication
NetApp Confidential 15
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 16
EXERCISE 13
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 17
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 18
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 19
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data Written
Result: to Disk
Independent volume copies Volume 1
Changed Blocks
that are efficiently stored Cloned Volume
Changed Blocks
NetApp Confidential 21
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 24
SIZING
Sizing is important in database environments, perhaps more so than in Exchange environments. Exchange is a
specialized database.
NetApp has a good database sizer, similar to the Exchange sizer. This sizer is ready for major supported
databases: Oracle, Microsoft SQL, Sybase, and DB2. It sizes for space and performance.
By clicking the second link that is shown here, you can find many technical reports and technical reports that
were co-authored by NetApp with Oracle and, in some cases, Red Hat. You can find the best practices as
recommended by all three parties.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 25
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 26
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ESX Server
Data Store A
A A A A
O O O O
p .vmdk* p .vmdk p .vmdk p .vmdk
S S S S
p p p p
Acceleration
Duplicate Data
A A A A
O O OIs Eliminated
O
P A.VMDK P .VMDK P .VMDK P .VMDK
S O p .vmdk S S S
SP P P P
p
FlexVol
RAIDTechnology
Layer
NetApp
Traditional FAS System
Enterprise RAID Arrays
*.vmdk = Virtual Machine Disk
NetApp Confidential 27
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Transparent Deduplicated
Server
memory sharing array cache
FlexClone
Storage Linked clones
zero-cost clones
NetApp Confidential 28
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 29
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage Pool
Storage Administrator
NetApp Confidential 30
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 31
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 32
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
STORAGE CHALLENGES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Virtual Desktops
VM VM VM VM VM VM
Hypervisor (VMware ESX)
Physical Servers
Data Center
NetApp Confidential 35
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
User Storage
user data
Efficiency for both individual
and pooled desktops
Provision thousands of VMs in
SAN NAS
minutes.
Create instantaneous clones.
user data
Scale capacity in real time.
Storage Pool Support thousands of
desktops per system.
NetApp Confidential 36
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage Resource
Management
Building 1 Building 2 ( SRM) with Disaster-Recovery Site
SnapMirror Software
View users stay connected.
NetApp Confidential 37
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Desktop #1:
Windows
Vista
Desktop #2:
Windows
Vista
Desktop #3: Clone a Clone a
Windows XP Desktop Data Store
NetApp Confidential 38
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 39
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 40
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Clone A: 0 GB
Clone B: 0 GB
Clone C: 0 GB
NetApp Confidential 41
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 42
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 43
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 45
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Unify
Computing
Cisco Unified Computing System
FC SAN
NetApp
Virtualize
Storage
V-Series Systems
Protect investments.
Achieve benefits in
each layer as you go.
Move stepwise rather
Storage
Array than all at the same
time.
Existing
NetApp Confidential 46
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 47
MODULE SUMMARY
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 3
MODULE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Disaster
Copies Recovery
Clone for Development
and Test
Archive
Application
Backup
Remote Office
SnapVault
OSSV
NetApp Confidential 5
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 6
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Main Remote
Data Center Data Center
WAN
A A C2 A1
B C2
B2 A2 LUN
A2 LUN B
C1 C A1 C
B2
A3 LUN LUN B1 C1 LUN
R A3 B1 R
LUN
NetApp Confidential 7
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RW DP
NetApp Confidential 8
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Source volume RW
Intercluster LIF
connection WAN
DP Destination volume
NetApp Confidential 9
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
M M
M M
M
NetApp Confidential 10
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 11
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
System Manager
Simple storage device management
NetApp Confidential 12
ONCOMMAND PRODUCTS
SERVICE AUTOMATION AND ANALYTICS
To help customers achieve the storage efficiency that they require, the newest release of OnCommand
management software groups multiple products into one family and unifies multiple capabilities into one
product.
OnCommand produces are designed to make NetApp storage the best choice for physical, virtual, and cloud
environments.
Control NetApp storage with System Manager and My AutoSupport.
System Manager provides simple, workflow-based wizards that automate device-management tasks.
Administrators can quickly set up and efficiently manage NetApp SAN and NAS systems.
Automate NetApp storage infrastructures via OnCommand unified manager and SnapManager software.
OnCommand unified manager integrates the functions of Provisioning Manager, Protection Manager, and
Operations Manager into one user interface. Through one view, customers can monitor their shared
storage environment and drill down to define storage-service levels and policy-based workflows.
SnapManager software provides the ability to connect to and manage from various platforms, including
from virtualized platforms.
Analyze shared IT infrastructures via the OnCommand Insight products.
OnCommand Insight products provide visibility and optimization across heterogeneous storage
infrastructures. The products that were formerly known as SANscreen and Akorri BalancePoint have been
integrated into OnCommand Insight. With OnCommand Insight, customers can optimize performance,
plan capacity requirements, and ensure that they are meeting their service-level needs.
Insight (SANscreen) - Assure, Plan and Protect
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Simple
Provide effective
Single unified approach storage for the
Physical and virtual service virtualized data
center
Efficient
Automation and analytics
Reduce IT
Storage efficiency spend up to 50%
Service efficiency
Flexible
Rapidly respond
Visibility and insight to changing
Open API that integrates with third-party demands
management products and hypervisors
NetApp Confidential 13
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
ONCOMMAND
INTEGRATED STORAGE MANAGEMENT AND AUTOMATION
OnCommand management software is the fifth generation of NetApp storage-resource management products.
To improve administrative efficiency, OnCommand products integrate numerous, previously separate
capabilities. These capabilities were previously identified as Provisioning Manager, Protection Manager,
Operations Manager, SnapManager for Virtual Infrastructures (VMWare) and SnapManager for Hyper-V
(Microsoft).
OnCommand software provides a unified platform. The unified platform enables creation and extension of
policies that can be specific to servers, VMs, and applications. It centralizes provisioning, cloning, backup-
and-recovery, and disaster-recovery policies and provides security features such as role-based access control
(RBAC) and delegated manageability.
OnCommand software enables management across workloads for snapshot naming, backup-type and
retention-period specification, prescripting and postscripting, and policy extension. It integrates the back-end
into one configuration repository for reporting, event, and audit logs and provides one dashboard from which
storage resources can be viewed and interface options can be selected.
OnCommand software is included with the purchase of NetApp storage hardware.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 15
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Two packages:
Core services physical
storage manageability Core
Host services,
virtualization plug-ins
Host
NetApp Confidential 16
ONCOMMAND COMPONENTS
OnCommand 5.0 has been packaged in to the central and host services based on physical or virtual
management capabilities.
The central services are comprised of the core manageability software, pertaining to the tools related to
physical storage.
The Host package encompasses the host plug-ins based on the type of virtual infrastructure supported.
For example, the host package would install the services to monitor and manage virtual infrastructure (VIM).
When you install host services in a VMware environment, then OnCommand 5.0 host plug-ins for V-center
server is also automatically installed.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
vSphere
Client GUI
Front-end GUI
Back-end server or service
NetApp Confidential 17
ONCOMMAND ARCHITECTURE
The architecture diagram identifies the basic components of the OnCommand core and host packages.
The color-coding distinguishes the core components (orange) from the host components (green).
Solid boxes identify front-end GUIs that users interact with directly, and the dashed boxes identify back-end
servers or services that are not directly visible to the user.
The OnCommand console serves as the GUI from which Hyper-V objects are managed and, alternatively, as
the GUI from which VMware objects are managed. The OnCommand console launches Operations Manager
console and NetApp Management Console, from which the physical environment is managed.
DataFabric Manager server can be installed in the standard edition or the express edition.
OnCommand host services caches schedules, catalogs, and events for short periods and enables execution
without DataFabric Manager server.
The plug-ins for Hyper-V and VMware are collections of primitives that enable connection into Hyper-V and
VMware environments.
SnapDrive for Windows software is used only within the Hyper-V environment. It is used for storage
discovery and to manage LUNs and Snapshot copies.
The vSphere Client GUI is native VMware software that is used by the VMware administrator for virtual
environment administration. OnCommand software provides the GUI with access to the storage environment.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Dashboard
NetApp Confidential 18
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 19
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Assign preconfigured
services to datasets
NetApp Confidential 21
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
ONCOMMAND: PROTECTION
OnCommand software simplifies the process of protecting enterprise data by enabling administrators to group
data into datasets and apply preset policies to the datasets. It automatically correlates datasets and underlying
physical storage resources, so administrators do not need to think in terms of the storage infrastructure.
OnCommand software helps protect data by providing administrators with an easy-to-use management
console that they can use to quickly configure and control all SnapMirror, SnapVault, Open Systems
SnapVault (OSSV), and SnapManager operations. Administrators can apply data-protection policies
consistently, automate complex protection processes, and pool backup and replication resources.
A simple dashboard provides an at-a-glance view of comprehensive data-protection information, including
information about unprotected data. The software enables administrators to apply predefined policies to the
data, thus minimizing the potential for error. OnCommand software also provides e-mail alerting to enable
issues to be analyzed and corrected before they significantly impact data protection.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VMware
Virtual Storage Console
Microsoft
ApplianceWatchPRO for Microsoft System
Center
NetApp Confidential 23
ONCOMMAND PLUG-INS
OnCommand plug-ins for VMware and Microsoft provide access to OnCommand control and automation
features from those respective management frameworks.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Network
Server
Unique to NetApp
Application
Resource Pool
Network
Server
Storage
Policies
Metrics Architect
NetApp Confidential 24
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 25
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management
Management
Virtualization
In-House
Custom
Management
Tools
Enterprise
Management
NetApp Confidential 26
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Apps
Servers
Network
Storage
NetApp Confidential 27
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Service Policy
Measurement Infrastructure
SnapVault SnapMirror
NetApp Confidential 28
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Application Administrator
Service Service
Analysis Catalog
Service
Service Policy
Efficiency
Measurement Infrastructure
Storage
SnapVault SnapMirror
Efficiency
NetApp Confidential 29
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 30
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Infrastructure Storage
Admin
NetApp Confidential 31
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 32
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Enterprise License
Sold Separately OnCommand Insight
Value-Added, Controller-
Based Pricing Attach Sale SnapManager Suite
OnCommand 5.0
(Operations Manager, Protection Manager, Provisioning
Manager)
Data ONTAP Essentials
Included with Controller
System Manager 2.0
NetApp Confidential 33
ONCOMMAND PORTFOLIO
Most of the components of OnCommand software are delivered with NetApp hardware.
System Manager, which provides basic storage-system management, is ideal for customers who have only a
few controllers. The 2.0 version, which was available as of August 2011, is included with the purchase of a
storage system.
Similarly, OnCommand management software is provided with NetApp storage systems. OnCommand
software is recommended for use with multiple controllers, to enable efficient management of larger
environments. It was available as of September 2011. OnCommand and System Manager are included within
the Data ONTAP Essentials bundle.
To take full advantage of virtualization-aware capabilities, customers must purchase the SnapManager suite,
which includes entitlement to the SMVI and SMHV products.
Finally, NetApp analysis capabilities are provided by OnCommand Insight products (formerly OnCommand
Insight and Akorri). The Insight products have capacity-based enterprise licenses, available separately.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 35
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 36
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Heterogeneous UNIX
Storage Servers
NetApp Confidential 37
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault
SnapVault SnapVault SnapVault
Snapshot 1 Snapshot 2 Snapshot 3
Backup 1 Backup 2 Backup 3
NetApp Confidential 40
SNAPVAULT OPERATIONS
Here is an example of a baseline transfer. At some point, all of the active data on the primary system (source)
needs to be moved to the secondary system (destination). Because the transfer is based on a Snapshot copy, as
the transfer is processed, changes are occurring and production is continuing in the source. Therefore, there
may be more Snapshot copies on the source than on the destination.
After the baseline transfer is completed, you can create a Snapshot copy and interact with the file system
(view, browse, mount LUNs, and so on). During this time, changes continue on the source. Because the
SnapVault secondary data is based on a Snapshot copy, the data never has to be quiescedbecause it was
quiesced before the Snapshot copy was created.
The destination does not request all of the blocks that are within the Snapshot copy; rather, it requests only the
changed blocks. The destination and source views of the data are unique. The destination view is more
backup-focused. Production on the source system is not affected by the data transfer of the SnapVault
operation.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 41
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Command line
OnCommand
Third-party backup solution
NetApp Confidential 42
SNAPVAULT MANAGEMENT
SnapVault management options include the following:
Command line
OnCommand
Third-party backup solutions
BakBone from NetVault
Syncsort
SnapVault for NetBackup
Tivoli
The third-party options are a part of NetApp original equipment manufacturer (OEM) relationships.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 43
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 44
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 45
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 46
EXERCISE 14
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 47
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 48
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 49
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 50
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 51
EXERCISE 15
Please refer to your exercise guide.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MODULE SUMMARY
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 1
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 2
MODULE OVERVIEW
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MODULE OBJECTIVES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 4
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Continuous
Operations
Cost and Availability
Hot Standby
Mirroring
Cost
Database Replication
Remote Journaling
Remote Vaulting
Weekly Daily
Backup Backup
Currency of Data
Source: Deloitte and Touche
NetApp Confidential 5
RECOVERY OBJECTIVES
This graphic shows that the cost of a solution increases as the recovery point objective (RPO), the point to
which you want to be able to recover, becomes closer and closer to real time (or immediate). The concept is
valid, and most businesses have multiple types of data with multiple priorities along this curve.
Not many environments have a business need for continuous operations for any class of data. Financial
environments are the most common that have a real-time recovery point. Some types of companies exist for
which online transaction processing (OLTP) requires data that is current up to the last I/O operation.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40% 40% 7% 3%
10 %
Probability of Occurrence
NetApp Confidential 6
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Reliance on tape for all backup and Emphasis on Disaster-recovery protection for
recovery needs high- only the most mission-critical
availability applications
(HA) clustered Cost and complexity: barriers to
solutions widespread adoption
NetApp Confidential 7
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault
Application Software
Cost
Recovery
SnapRestore
Software
Snapshot
Daily Copies
Backup
Cost
NetApp Confidential 8
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault MetroCluster
Software
Windows
Server
UNIX
Server
FAS System
with NPL
NetApp Confidential 9
DISASTER-RECOVERY ARCHITECTURE
This is a representation of a hypothetical disaster-recovery architecture. Many NetApp customers have these
cascading environments, especially large customers with multiple sites around the world.
As you see, multiple classes of data are handled in different ways. Some of the data is immediately mirrored
by using SnapMirror technology directly to a remote site. Some of the data is stored by SnapVault software
locally. Eventually, all of the data is mirrored by SnapMirror technology to the remote site.
The example also shows the use of Open Systems SnapVault, MetroCluster, regular clusters, and some stand-
alone systems. All of these are mirrored to a third site where they have their backup structure. This entire
operation can be performed by using NetApp technology, which provides a single-vendor solution.
NetApp uses the same design internally. The primary NetApp disaster-recovery center is in Sacramento,
California, 75 miles away in a straight line from NetApp headquarters in Sunnyvale, California. The
advantage is that the primary NetApp disaster-recovery center is outside the most dangerous earthquake zone,
so it is theoretically safer. Everything gets replicated to the Sacramento site, and then the most critical data
gets replicated to Amsterdam, the NetApp European headquarters. From there, it gets replicated to Bangalore,
India, which is the largest NetApp Asia-Pacific office, and from Bangalore it is replicated back to North
America to the Research Triangle Park facility. Each of those sites has its own primary data, so that primary
data is also replicated out to the other sites.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 10
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 11
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 12
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SNAPMIRROR OVERVIEW
NetApp has disaster-recovery relationships that go back and forth between all five of the NetApp sites around
the world. The product that makes that possible is SnapMirror software.
SnapMirror technology replicates a file system on one controller to a read-only copy on another controller.
The replication can be volume-based or qtree-based, depending on the circumstances of the transfer. Like
SnapVault software, SnapMirror software is based on Snapshot technology, so only the changed blocks must
be moved after the initial baseline is in place. SnapMirror software can be asynchronous or synchronous in its
transfer type and can run over IP or FC.
Customers can have one source that goes to many destinations or have many sources that go to one
destination. SnapMirror technology can cascade and be utilized in multihop scenarios. Probably the most
important difference is the resynchronization process. If you move production to the destination and make
changes there, you must be able to get those changes back to the original source. That is easy to do with
SnapMirror technology: Like SnapVault software, SnapMirror software is easy to schedule and throttle.
SnapMirror software was the first replication product from NetApp and came out in 1997. SnapVault
software was then based on the SnapMirror technology, which utilizes the same underlying engine.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 14
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 15
SNAPMIRROR MODES
SnapMirror software can be configured into three replication modes. All are available with a single license.
The first mode is synchronous SnapMirror. In this solution, the data at the disaster-recovery site exactly
matches the data at the primary site. This is achieved by replicating every data write to the remote location
and not acknowledging to the host that the write has occurred until the remote systems confirm that the data
has been written. This solution provides the least data loss, but a limit of 50 to 100 km exists before latency
becomes too great, because the host application must wait for an acknowledgment from the remote NetApp
devices.
Semi-synchronous SnapMirror allows customers to achieve a near-zero-data-loss disaster recovery solution
without performance impact on the host application. The solution also allows customers to perform
synchronous-type replication over longer distances. When data is written to the primary storage, an
acknowledgment is immediately sent back, which eliminates the latency impact on the host. In the
background, SnapMirror software tries to maintain as close to synchronous communication as possible with
the remote system. SnapMirror software has user-defined thresholds that control how far out of synchronicity
the source and remote copy datasets are allowed to get.
Asynchronous SnapMirror allows customers to replicate data at adjustable frequencies. Customers can do this
type of point-in-time replication as frequently as once per minute or as infrequently as once in several days.
No distance limitation exists, and the mode is frequently used to replicate across long distances to protect
against regional disasters. Only the blocks that change between each replication are sent, which minimizes
network usage.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 16
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 17
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Asynchronous SnapMirror
Read Write
Compressed Data
Across the Wire
NetApp Confidential 18
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Sync Async
Cascading Many-to-One
Asymmetric replication
V-Series
Heterogeneous Enterprise Storage Array
FAS
SNAPMIRROR FLEXIBILITY
Multiple hops can be used to protect against site disasters (with a synchronous replication solution) and
regional disasters (with an asynchronous replication solution). SnapMirror technology can also replicate from
multiple data centers to a central disaster-recovery site, where you can centralize your tape backup
infrastructure, which reduces your costs.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 20
SNAPMIRROR LICENSING
When customers buy SnapMirror technology, they get everything, but two license numbers exist:
One for semi-synchronous SnapMirror
Another for asynchronous SnapMirror
A user can change the relationship between synchronous, semi-synchronous, and asynchronous modes. The
relationship can be set up in any way as long as the baseline is established. The modes can be changed
without performance impact or baseline resynchronization.
No separate source or destination license exists. Because only one license exists for both source and
destination, the same box can be a destination and a source.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 21
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 22
LESSON 3: METROCLUSTER
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 23
METROCLUSTER OVERVIEW
DESIGN GOALS
The primary goal of MetroCluster is to provide mission-critical applications with redundant storage services
in the event of site-specific disasters such as fire or long-term power loss.
MetroCluster can also be described as follows. MetroCluster is designed to tolerate site-specific disasters with
minimal interruption to mission-critical applications and zero data loss by synchronously mirroring data
between two sites.
You should adjust the focus depending on whom you are talking to. Some NetApp clients focus on the
redundancy of data; others focus on the recoverability of the system.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 24
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 25
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disks
Fabric MetroCluster
provides metropolitan
disaster recovery
protection
Can stretch up to 100km
with FC switches
V-Series MetroCluster
NetApp Confidential 26
METROCLUSTER
MetroCluster is a way to stretch a cluster beyond the 500 meter distance limitation. This is very valuable for
sites that need a cluster on a campus or
metropolitan area to allow for some localized failures as well as run as a cluster with failover integration.
This is very popular in industries and countries where a metropolitan separation is mandated for disaster
recovery.
A MetroCluster configuration comprises the following components and requires the following licenses:
An HA pair Provides automatic failover capability
(cf license) between sites in the case of hardware failures
SyncMirror software Provides an up-to-date copy of data at the remote site; data is ready for access after
(syncmirror_local) failover without administrator intervention
Controller failover Provides a mechanism for the administrator to declare remote site disaster and initiate
(cf_remote) a site failover through a single command for ease of use
FC switch Provides controller connectivity between sites that (vendor-specific) are greater than
500* meters apart; enables sites to be located at a safe distance away from each other
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MetroClusterMetroCluster:
MetroCluster Stretch up Stretch
to 500 mup to 100 km
NetApp Confidential 27
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Dark Fiber
HA interconnect (FC-VI)
A-loop
B-loop
NetApp Confidential 28
STRETCH METROCLUSTER
CAMPUS DISTANCES
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Host 1 Host 2
System1 System2
METROCLUSTER: OVERVIEW
MetroCluster combines the reliability of a high-availability pair with the synchronous replication of
SyncMirror over a distance.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Plex Plex
0 1
Pools set by
disk ownership
(software only for
Data ONTAP 8.0
7-Mode and later)
Pool 0 Pool 1
NetApp Confidential 30
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
STRETCH METROCLUSTER
CONNECTIVITY
Two versions of MetroCluster exist: fabric and stretch.
Stretch is for short distances of up to 500m and with a direct FC connection between the systems.
Fabric is the long-distance version, for up to 30 km out of the box or up to 100 km with a policy-variance
request ( PVR).
The heartbeat for an HA pair uses the InfiniBand connections on the nonvolatile RAM ( NVRAM) card of the
FAS6000 series.
Because the FAS3100 series uses a chassis connection (dual-controller chassis) for the heartbeat, a stretch
MetroCluster requires an FC-VI card.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FC Switches
Dark fiber
A-loop
B-loop
HA interconnect (FC-VI)
NetApp Confidential 32
FABRIC METROCLUSTER
METROPOLITAN AREA DISTANCES
Two versions of MetroCluster exist: fabric and stretch.
Stretch is for short distances of up to 500m and with a direct FC connection between the systems.
Fabric is the long-distance version, for up to 30 km out of the box or up to 100 km with a policy-variance
request ( PVR).
Functionally, the switched MetroCluster environment is identical to the nonswitched environment. The major
exception is the distance that can be achieved with the switched back end.
Here is an example of the long-distance version. The cluster interconnect, the NVRAM mirroring, the
heartbeat, and the disk mirroring go over dark fiber. As with standard clusters, things are in production,
volume X is mirrored over to X prime, and volume Y is in production on the other side that is mirrored over
to Y prime.
The mirroring of data can go both directions and frequently is performed both ways. Brocade switches are
used to achieve the distance, and the switch must be a Brocade switch. The Brocade switch is a specific set of
switches that NetApp sells with the solution.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 33
FABRIC METROCLUSTER
CONNECTIVITY (1 OF 2)
Because all connections have been moved onto an FC-switched environment, the heartbeat for an HA pair, a
fabric MetroCluster requires an FC-VI card in the FAS6000 and FAS3000 series.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 34
FABRIC METROCLUSTER
CONNECTIVITY (2 OF 2)
In many customer solutions, NetApp uses Brocade 200E switches for physical connectivity. The
MetroCluster fabric operates well in switched environments.
Switches are prewired, preconfigured, internal components of MetroCluster. As you do not have a choice of
disks, likewise you do not have a choice of switches to use.
Only one Inter-Switch Link ( ISL) connection exists between each of the switches. Any switch port can be
used.
Trunking is not supported.
This uses a VI interconnect (X1922A) card.
Interconnect is VI over FC (versus SCSI).
The card is a different version of the standard Qlogic QLA2352, currently a 2-Gb card.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FMC1-1 FMC1-2
S1 S2 S3 S4
Fabric-
attached
shown,
stretch also
supported
ATTO
FibreBridge
6500N
NetApp Confidential 35
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FMC1-1 FMC1-2
0 1 2 3 0 1 2 3
17 17
S1 S3
18 18
7 6 5 4 7 6 5 4
7 6 5 4 7 6 5 4
17 17
S2 S4
18 18
0 1 2 3 0 1 2 3
FMC2-1 FMC2-2
NetApp Confidential 36
SHARED FABRIC
Prior to Data ONTAP 8.1, a single fabric MetroCluster (FMC) uses four dedicated switches which carries HA
interconnect and storage traffic. This means if the storage administrator needs two fabric MetroCluster setups
using eight switches. These switches might be under-utilized in some environment. In cases where the storage
administrator feels that the existing switches and ISL are carrying less than 50 percent of their maximum
capacity, the storage administrator may opt for a shared fabric configuration. In this configuration, two fabric
MetroCluster setups use just four switches.
The example on the slide illustrates a simple shared fabric MetroCluster scenario. The connections described
not the only method to connect these storage systems, disks and switches. This should be only as an example
to give a better clarity to the solution. In the above setup, FMC1 and FMC2 form two fabric MetroCluster
pairs that share the switches and the ISLs between the switches. The switches are named S1, S2, S3 and S4
with domain IDs 1, 2, 3 and 4 respectively. For simplicity reasons, let us assume each storage controller has 2
FCVI and 2 HBA ports. One of each is connected to the primary and secondary switches. FMC1 storage
controllers connect the FCVI and HBA to switches via port 0 and port 2 respectively. FMC2 storage
controllers use port 1 for FCVI and 3 for HBA. The disk shelves are connected to the switch through ports 4,
5, 6 and 7. In addition to these we have 2 ISL on port 17 and 18 on all the switches. So in summary, this
configuration has F-ports on 0, 1, 2 and 3, E-ports on 17 and 18, and L ports on 4, 5, 6 and 7.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Two-chassis configurations:
Each chassis is single-enclosure and stand-
alone:
FAS3210 controller with blank
FAS3240 and FAS3270 controller with IOXM
Two chassis with single-enclosure high
availability (twin):
Supported on all three FAS3200 systems
Not directly quotable but is supported
NetApp Confidential 37
SUPPORTED METROCLUSTER
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 38
SUPPORTED CONFIGURATIONS
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 39
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 40
BEST PRACTICES
METROCLUSTER
Controller sizing for MetroCluster is the same as for a standard active-active system configuration.
Be aware of the impact of SyncMirror software:
Write performance decreases in a heavy load situation by approximately five percent.
If you activate read from both plexes, read performance can increase.
Mirrored plexes result in half the usable maximum spindle count.
Connections are important:
Stretch MetroCluster interconnect is InfiniBand with Multi-Fiber Push-On ( MPO) Adapter. (Check
customers patch panels.)
Remember to account for patch panels in distance and link-budget calculations.
Ensure that the correct type of fiber is in use.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 41
HIGH AVAILABILITY
SUMMARY
HA provides fault tolerance and the ability to perform nondisruptive upgrades and maintenance.
Configuring storage systems in an HA pair provides the following benefits:
Fault tolerance
When one node fails or becomes impaired a takeover occurs, and the partner node continues to serve the
failed nodes data.
Nondisruptive software upgrades
When you halt one node and allow takeover, the partner node continues to serve data for the halted node
while you upgrade the node you halted.
Nondisruptive hardware maintenance
When you halt one node and allow takeover, the partner node continues to serve data for the halted node
while you replace or repair hardware in the node you halted.
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential 42
MODULE SUMMARY
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
THANK YOU
2012 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.